WorldWideScience

Sample records for traditional threat vectors

  1. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  2. Vector-borne disease intelligence: strategies to deal with disease burden and threats

    Czech Academy of Sciences Publication Activity Database

    Braks, M.; Medlock, J. M.; Hubálek, Zdeněk; Hjertqvist, M.; Perrin, Y.; Lancelot, R.; Duchyene, E.; Hendrickx, G.; Stroo, A.; Heyman, P.; Sprong, H.

    2014-01-01

    Roč. 2, č. 280 (2014), s. 280 ISSN 2296-2565 Institutional support: RVO:68081766 Keywords : disease burden * emerging diseases * one health * surveillance * threat * vector-borne diseases Subject RIV: EE - Microbiology, Virology

  3. Traditional vectors as an introduction to geometric algebra

    International Nuclear Information System (INIS)

    Carroll, J E

    2003-01-01

    The 2002 Oersted Medal Lecture by David Hestenes concerns the many advantages for education in physics if geometric algebra were to replace standard vector algebra. However, such a change has difficulties for those who have been taught traditionally. A new way of introducing geometric algebra is presented here using a four-element array composed of traditional vector and scalar products. This leads to an explicit 4 x 4 matrix representation which contains key requirements for three-dimensional geometric algebra. The work can be extended to include Maxwell's equations where it is found that curl and divergence appear naturally together. However, to obtain an explicit representation of space-time algebra with the correct behaviour under Lorentz transformations, an 8 x 8 matrix representation has to be formed. This leads to a Dirac representation of Maxwell's equations showing that space-time algebra has hidden within its formalism the symmetry of 'parity, charge conjugation and time reversal'

  4. Hidden sylvatic foci of the main vector of Chagas disease Triatoma infestans: threats to the vector elimination campaign?

    Directory of Open Access Journals (Sweden)

    Leonardo A Ceballos

    2011-10-01

    Full Text Available Establishing the sources of reinfestation after residual insecticide spraying is crucial for vector elimination programs. Triatoma infestans, traditionally considered to be limited to domestic or peridomestic (abbreviated as D/PD habitats throughout most of its range, is the target of an elimination program that has achieved limited success in the Gran Chaco region in South America.During a two-year period we conducted semi-annual searches for triatomine bugs in every D/PD site and surrounding sylvatic habitats after full-coverage spraying of pyrethroid insecticides of all houses in a well-defined rural area in northwestern Argentina. We found six low-density sylvatic foci with 24 T. infestans in fallen or standing trees located 110-2,300 m from the nearest house or infested D/PD site detected after insecticide spraying, when house infestations were rare. Analysis of two mitochondrial gene fragments of 20 sylvatic specimens confirmed their species identity as T. infestans and showed that their composite haplotypes were the same as or closely related to D/PD haplotypes. Population studies with 10 polymorphic microsatellite loci and wing geometric morphometry consistently indicated the occurrence of unrestricted gene flow between local D/PD and sylvatic populations. Mitochondrial DNA and microsatellite sibship analyses in the most abundant sylvatic colony revealed descendents from five different females. Spatial analysis showed a significant association between two sylvatic foci and the nearest D/PD bug population found before insecticide spraying.Our study shows that, despite of its high degree of domesticity, T. infestans has sylvatic colonies with normal chromatic characters (not melanic morphs highly connected to D/PD conspecifics in the Argentinean Chaco. Sylvatic habitats may provide a transient or permanent refuge after control interventions, and function as sources for D/PD reinfestation. The occurrence of sylvatic foci of T. infestans in

  5. Chinese Perceptions of Traditional and Nontraditional Security Threats

    Science.gov (United States)

    2007-03-01

    will not be challenged.) For example, during a speech in Singapore in June 2005, the U.S. Secretary of Defense Donald Rumsfeld expressed the belief ...right answer. The individual is paramount and is in control of events around him. Easterners, on the other hand, products of the teachings of Taoism ...seen as American scholars who refute the China threat theory. Their belief in power politics supports the perception that America’s goal is hegemony

  6. Advertising in virtual space. An increasing threat for traditional advertising.

    Directory of Open Access Journals (Sweden)

    Razvan DINA

    Full Text Available Traditional advertising media used as a main TV, radio and print media. When the Internet has become one of the most important channels of communication between people, advertising has proposed to use this new medium to promote products and services on the market. Currently, more than 50% of the western countries population and share increasingly larger of population from other countries have Internet access, which creates a huge potential for online advertising.

  7. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Science.gov (United States)

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  8. Syrian Refugees: Are They a Non Traditional Threat to Water Supplies in Lebanon and Jordan

    Science.gov (United States)

    2016-09-01

    effects of Syrian refugees on the water supplies of each country as a non-traditional security threat. Political stability is the ultimate goal of each...security.html. 11 against Syrians sets the stage for political instability because the Syrians represent an increasing portion of the population, if...of political instability could send shockwaves through the region and drastically alter U.S. foreign policy in the Middle East. Though the stakes

  9. Data fusion and machine learning to identify threat vectors for the Zika virus and classify vulnerability

    Science.gov (United States)

    Gentle, J. N., Jr.; Kahn, A.; Pierce, S. A.; Wang, S.; Wade, C.; Moran, S.

    2016-12-01

    With the continued spread of the zika virus in the United States in both Florida and Virginia, increased public awareness, prevention and targeted prediction is necessary to effectively mitigate further infection and propagation of the virus throughout the human population. The goal of this project is to utilize publicly accessible data and HPC resources coupled with machine learning algorithms to identify potential threat vectors for the spread of the zika virus in Texas, the United States and globally by correlating available zika case data collected from incident reports in medical databases (e.g., CDC, Florida Department of Health) with known bodies of water in various earth science databases (e.g., USGS NAQWA Data, NASA ASTER Data, TWDB Data) and by using known mosquito population centers as a proxy for trends in population distribution (e.g., WHO, European CDC, Texas Data) while correlating historical trends in the spread of other mosquito borne diseases (e.g., chikungunya, malaria, dengue, yellow fever, west nile, etc.). The resulting analysis should refine the identification of the specific threat vectors for the spread of the virus which will correspondingly increase the effectiveness of the limited resources allocated towards combating the disease through better strategic implementation of defense measures. The minimal outcome of this research is a better understanding of the factors involved in the spread of the zika virus, with the greater potential to save additional lives through more effective resource utilization and public outreach.

  10. Traditional and robust vector selection methods for use with similarity based models

    International Nuclear Information System (INIS)

    Hines, J. W.; Garvey, D. R.

    2006-01-01

    Vector selection, or instance selection as it is often called in the data mining literature, performs a critical task in the development of nonparametric, similarity based models. Nonparametric, similarity based modeling (SBM) is a form of 'lazy learning' which constructs a local model 'on the fly' by comparing a query vector to historical, training vectors. For large training sets the creation of local models may become cumbersome, since each training vector must be compared to the query vector. To alleviate this computational burden, varying forms of training vector sampling may be employed with the goal of selecting a subset of the training data such that the samples are representative of the underlying process. This paper describes one such SBM, namely auto-associative kernel regression (AAKR), and presents five traditional vector selection methods and one robust vector selection method that may be used to select prototype vectors from a larger data set in model training. The five traditional vector selection methods considered are min-max, vector ordering, combination min-max and vector ordering, fuzzy c-means clustering, and Adeli-Hung clustering. Each method is described in detail and compared using artificially generated data and data collected from the steam system of an operating nuclear power plant. (authors)

  11. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    Science.gov (United States)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  12. Vector-borne disease intelligence: Strategies to deal with disease burden and threats

    Directory of Open Access Journals (Sweden)

    Marieta eBraks

    2014-12-01

    Full Text Available Owing to the complex nature of vector-borne diseases, whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of vector-borne diseases. Knowledge on the presence and distribution of vectors and the pathogens they transmit is vital to a risk assessment process to permit effective early warning, surveillance and control of vector-borne diseases. Upon accepting this reality, public health authorities face the phenomenon of an exponential rise in the number of possible surveillance targets and how to decide which are essential. Here, . we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance and context-based surveillance for EU member states to tailor the best surveillance strategy for control of vector-borne diseases in their geographic region. By classifying the surveillance structure into 5 different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for vector-borne diseases entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure.

  13. Speaking up about traditional and professionalism-related patient safety threats: a national survey of interns and residents.

    Science.gov (United States)

    Martinez, William; Lehmann, Lisa Soleymani; Thomas, Eric J; Etchegaray, Jason M; Shelburne, Julia T; Hickson, Gerald B; Brady, Donald W; Schleyer, Anneliese M; Best, Jennifer A; May, Natalie B; Bell, Sigall K

    2017-11-01

    Open communication between healthcare professionals about care concerns, also known as 'speaking up', is essential to patient safety. Compare interns' and residents' experiences, attitudes and factors associated with speaking up about traditional versus professionalism-related safety threats. Anonymous, cross-sectional survey. Six US academic medical centres, 2013-2014. 1800 medical and surgical interns and residents (47% responded). Attitudes about, barriers and facilitators for, and self-reported experience with speaking up. Likelihood of speaking up and the potential for patient harm in two vignettes. Safety Attitude Questionnaire (SAQ) teamwork and safety scales; and Speaking Up Climate for Patient Safety (SUC-Safe) and Speaking Up Climate for Professionalism (SUC-Prof) scales. Respondents more commonly observed unprofessional behaviour (75%, 628/837) than traditional safety threats (49%, 410/837); pbarrier to speaking up about unprofessional behaviour compared with traditional safety threats (58%, 482/837 vs 42%, 348/837; psafety vignette, even when they perceived high potential patient harm (20%, 49/251 vs 71%, 179/251; psafety vignette (OR 1.90, 99% CI 1.36 to 2.66 and 1.46, 1.02 to 2.09, respectively), while only a positive perception of SUC-Prof was associated with speaking up in the professionalism vignette (1.76, 1.23 to 2.50). Interns and residents commonly observed unprofessional behaviour yet were less likely to speak up about it compared with traditional safety threats even when they perceived high potential patient harm. Measuring SUC-Safe, and particularly SUC-Prof, may fill an existing gap in safety culture assessment. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  14. Automated cyber threat analysis and specified process using vector relational data modeling

    OpenAIRE

    Kelly, Ryan Forrest

    2014-01-01

    Approved for public release; distribution is unlimited Computer network defense systems should be sufficiently integrated to pull data from any information source, model an expert cyber analyst’s decision process, continuously adapt to an evolving cyber threat environment, and amalgamate with industry standard network hardware. Unfortunately, cyber defense systems are generally stovepipe solutions that do not natively integrate disparate network systems. Correlation engines are generally l...

  15. NON-TRADITIONAL SECURITY THREATS IN CENTRAL ASIA REGIONAL PERSPECTIVE OF COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ramakant Trivedi

    2011-01-01

    Full Text Available Abstract: The article explores the roots and current state of religious extremism in Central Asia, as well as investigates its connections with the global salafi movement. It evaluates attempts of the regional players and external stakeholders to address the existing threats, and provides recommendations for their advancement.

  16. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  17. The unique character of traditional forest-related knowledge: threats and challenges ahead

    Science.gov (United States)

    Ronald L. Trosper; John A. Parrotta; Mauro Agnoletti; Vladimir Bocharnikov; Suzanne A. Feary; Monica Gabay; Christian Gamborg; Jesus García Latorre; Elisabeth Johann; Andrey Laletin; Hin Fui Lim; Alfred Oteng-Yeboah; Miguel A. Pinedo-Vasquez; P.S. Ramakrishnan; Yeo-Chang. Youn

    2012-01-01

    This chapter refl ects on the major fi ndings of the lead authors of this book regarding traditional forest-related knowledge (TFRK) using five criteria for distinguishing the unique character of traditional knowledge: (1) its attention to sustainability; (2) relationships to land; (3) identity; (4) reciprocity; and (5) limitations on market involvement. Following an...

  18. Malaria vectors in a traditional dry zone village in Sri Lanka

    DEFF Research Database (Denmark)

    Amerasinghe, P H; Amerasinghe, F P; Konradsen, F

    1999-01-01

    Malaria transmission by anopheline mosquitoes was studied in a traditional tank-irrigation-based rice-producing village in the malaria-endemic low country dry zone of northcentral Sri Lanka during the period August 1994-February 1997. Adult mosquitoes were collected from human and bovid bait...... catches, bovid-baited trap huts, indoor catches, and pit traps. Mosquito head-thoraces were tested for the presence of Plasmodium falciparum and P. vivax, and blood-engorged abdomens for the presence of human blood by ELISAs. House surveys were done at two-day intervals to record cases of blood film...... in An. culicifacies and An. peditaeniatus. Malaria parasite infections were seen in seven mosquito species, with 75% of the positive mosquitoes containing P. falciparum and 25% P. vivax. Polymorph PV247 was recorded from a vector (i.e., An. varuna) for the first time in Sri Lanka. Computations of mean...

  19. Vectors

    DEFF Research Database (Denmark)

    Boeriis, Morten; van Leeuwen, Theo

    2017-01-01

    should be taken into account in discussing ‘reactions’, which Kress and van Leeuwen link only to eyeline vectors. Finally, the question can be raised as to whether actions are always realized by vectors. Drawing on a re-reading of Rudolf Arnheim’s account of vectors, these issues are outlined......This article revisits the concept of vectors, which, in Kress and van Leeuwen’s Reading Images (2006), plays a crucial role in distinguishing between ‘narrative’, action-oriented processes and ‘conceptual’, state-oriented processes. The use of this concept in image analysis has usually focused...

  20. Brazil’s fight against narcotraffic in the border with Colombia. An approach to the restrains of non-traditional threats over foreign policy

    Directory of Open Access Journals (Sweden)

    Emilse Calderón

    2014-05-01

    Full Text Available In the post-Cold War international scenario, the non-traditional nature of security threats conditions the states’ foreign policies. An example of the above is the policy employed by Brazil regarding the border shared with Colombia regarding the development that narcotraffic has been having since the end of the 20th century. Therefore, this article proposes a brief analysis around the influence exercised by the non-traditional nature of the drug traffic threat over the design of Brazilian foreign policy between 1999 and 2010.

  1. TRADITIONAL RURAL WETLANDS IN HARYANA STATE OF INDIA ARE CURRENTLY CONFRONTING MULTICORNERED THREATS LEADING TO EXTINCTION SOONER THAN LATER

    Directory of Open Access Journals (Sweden)

    Rohtash chand Gupta

    2012-05-01

    Full Text Available The most serious threat to traditional rural ponds in Haryana is associated with transformed societal behavioural patterns, ethics, values and life style, amongst several others. The siltation of ponds with adjoining areas, soil coming in with rain water is a very serious cause of stratification of rural ponds. Also contracting of village community land for sun drying of cow dung cakes inspires villagers to overload periphery of each pond with cow dung turning the premises into grave-yard of dung. This dung is the major source of polluting pond water into blackish water with high load of organic matter. Moreover, it leads to over excessive eutrophication. Building of major highways and connectivity roads have resulted into compartmentalization and degradation of village ponds. Inhabitation of peripheral village ponds boundaries by lower section of society for dwelling purposes is more threat to wetlands. The indifferent inclination of villagers towards silted ponds drenched in bad odour and blackish sludge is the story of 80% of the cases. The total blockage of run-off rainy water towards the natural age old rural ponds due to obstruction by way of human inhabitation has resulted into desertification of shallow water sheet in 90% of the cases. The oblivion of harvesting dried silt in summer for brick making has spelled doom for the ponds turning them into flat ground through successive decades and so on. The water quality in all ponds was overshooting the decaying stage due to the continuous mixing of cow dung drenched rainy water. Over excessive usage of ponds for bathing of cattle, dumping of cow dung and rotten vegetables waste has turned ponds into live sinks of dirt, garbage and rural dairy wastes. Majority of village ponds are now out of existence or in deep black sludge laden or converted into Fish-Farming wetlands. The present studies have indicated that Winter migratory birds like Greylag Goose Anser anser, Bar-headed Goose Anser

  2. Traditional products – vectors of sustainable development on the regional and national markets

    Directory of Open Access Journals (Sweden)

    Georgică Gheorghe

    2013-11-01

    Full Text Available Traditional products represent an important component of the Romanian culture, of the Romanian identity, of the national heritage. In order to succeed imposing over fakes on the market, this product’s regime must be very well defined and regulated by the acting legislation. While also sanctioning those who produce the so called traditional products, for which they ask a price that is usually greater, offering – not in few cases, products which can affect the consumers’ health through their contents of additives or other substances that have no connection to the traditional preparation methods. The purpose of this paper was to review the main traditional Romanian products, by geographic area and finding the clients’ interest towards buying such products. The analysis is realised from the point of view of a sustainable development of this sector and by areas of provenience. In order to observe what types of traditional products are demanded on the market a research from secondary sources has been made, by analysing the information provided by the Ministry of Agriculture and Rural Development, in the period of 1 – 20 September, and also a direct marketing research realised in the virtual environment, which followed the investigation of the main dimension/characteristics of the consumers behaviour towards the traditional products that exist on the Romanian market.

  3. Tradition

    DEFF Research Database (Denmark)

    Otto, Ton

    2016-01-01

    : beliefs, practices, institutions, and also things. In this sense, the meaning of the term in social research is very close to its usage in common language and is not always theoretically well developed (see Shils, 1971: 123). But the concept of tradition has also been central to major theoretical debates...... on the nature of social change, especially in connection with the notion of modernity. Here tradition is linked to various forms of agency as a factor of both stability and intentional change....

  4. Multidirectional Vector Excision Leads to Better Outcomes than Traditional Elliptical Excision of Facial Congenital Melanocytic Nevus

    Directory of Open Access Journals (Sweden)

    Seung Il Oh

    2013-09-01

    Full Text Available Background The elliptical excision is the standard method of removing benign skin lesions,such as congenital melanocytic nevi. This technique allows for primary closure, with little to nodog-ear deformity, but may sacrifice normal tissue adjacent to the lesion, resulting in scarswhich are unnecessarily long. This study was designed to compare the predicted results ofelliptical excision with those resulting from our excision technique.Methods Eighty-two patients with congenital melanocytic nevus on the face were prospectivelystudied. Each lesion was examined and an optimal ellipse was designed and marked onthe skin. After an incision on one side of the nevus margin, subcutaneous undermining wasperformed in the appropriate direction. The skin flap was pulled up and approximated alongseveral vectors to minimize the occurrence of dog-ear deformity.Results Overall, the final wound length was 21.1% shorter than that achieved by ellipticalexcision. Only 8.5% of the patients required dog-ear repair. There was no significant distortionof critical facial structures. All of the scars were deemed aesthetically acceptable based ontheir Patient and Observer Scar Assessment Scale scores.Conclusions When compared to elliptical excision, our technique appears to minimize dogeardeformity and decrease the final wound length. This technique should be considered analternative method for excision of facial nevi.

  5. British National Party representations of Muslims in the month after the London bombings: homogeneity, threat, and the conspiracy tradition.

    Science.gov (United States)

    Wood, C; Finlay, W M L

    2008-12-01

    This study presents an analysis of articles written by prominent members of the British National Party. Each of these articles discussed Muslims and Islam in the aftermath of the 7 July 2005 London bombings. Two prominent discursive themes are discussed here. The first concerned the writers' constructions of the threat that Muslims and Islam pose to Britain. Central to this theme were constructions of Muslims as 'fascists', anti-white racists, and all potentially dangerous, although there was variability in this. Using the Koran as evidence, the articles present a vision of a faith which intends to take over the country; in this way, a homogenous, culturally essentialist version of Muslims is worked up. The second theme illustrates how the writers challenge those who believe that creating a British multicultural society is possible, and in doing so construct liberals and multiculturalists as also posing a threat to the country. The ways in which this represents a variety of conspiracy theory, and the implications of these constructions for social action, are discussed.

  6. A Novel Method for Evaluating the Cardiotoxicity of Traditional Chinese Medicine Compatibility by Using Support Vector Machine Model Combined with Metabonomics

    Directory of Open Access Journals (Sweden)

    Yubo Li

    2016-01-01

    Full Text Available Traditional biochemical and histopathological tests have been used to evaluate the safety of traditional Chinese medicine (TCM compatibility for a long time. But these methods lack high sensitivity and specificity. In the previous study, we have found ten biomarkers related to cardiotoxicity and established a support vector machine (SVM prediction model. Results showed a good sensitivity and specificity. Therefore, in this study, we used SVM model combined with metabonomics UPLC/Q-TOF-MS technology to build a rapid and sensitivity and specificity method to predict the cardiotoxicity of TCM compatibility. This study firstly applied SVM model to the prediction of cardiotoxicity in TCM compatibility containing Aconiti Lateralis Radix Praeparata and further identified whether the cardiotoxicity increased after Aconiti Lateralis Radix Praeparata combined with other TCM. This study provides a new idea for studying the evaluation of the cardiotoxicity caused by compatibility of TCM.

  7. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  8. Tackling the growing threat of dengue: Phyllanthus niruri-mediated synthesis of silver nanoparticles and their mosquitocidal properties against the dengue vector Aedes aegypti (Diptera: Culicidae).

    Science.gov (United States)

    Suresh, Udaiyan; Murugan, Kadarkarai; Benelli, Giovanni; Nicoletti, Marcello; Barnard, Donald R; Panneerselvam, Chellasamy; Kumar, Palanisamy Mahesh; Subramaniam, Jayapal; Dinesh, Devakumar; Chandramohan, Balamurugan

    2015-04-01

    Mosquitoes are vectors of devastating pathogens and parasites, causing millions of deaths every year. Dengue is a mosquito-borne viral infection found in tropical and subtropical regions around the world. Recently, transmission has strongly increased in urban and semiurban areas, becoming a major international public health concern. Aedes aegypti (Diptera: Culicidae) is the primary vector of dengue. The use of synthetic insecticides to control Aedes mosquitoes lead to high operational costs and adverse nontarget effects. In this scenario, eco-friendly control tools are a priority. We proposed a novel method to synthesize silver nanoparticles using the aqueous leaf extract of Phyllanthus niruri, a cheap and nontoxic material. The UV-vis spectrum of the aqueous medium containing silver nanostructures showed a peak at 420 nm corresponding to the surface plasmon resonance band of nanoparticles. SEM analyses of the synthesized nanoparticles showed a mean size of 30-60 nm. EDX spectrum showed the chemical composition of the synthesized nanoparticles. XRD highlighted that the nanoparticles are crystalline in nature with face-centered cubic geometry. Fourier transform infrared spectroscopy (FTIR) of nanoparticles exhibited prominent peaks 3,327.63, 2,125.87, 1,637.89, 644.35, 597.41, and 554.63 cm(-1). In laboratory assays, the aqueous extract of P. niruri was toxic against larval instars (I-IV) and pupae of A. aegypti. LC50 was 158.24 ppm (I), 183.20 ppm (II), 210.53 ppm (III), 210.53 ppm (IV), and 358.08 ppm (pupae). P. niruri-synthesized nanoparticles were highly effective against A. aegypti, with LC50 of 3.90 ppm (I), 5.01 ppm (II), 6.2 ppm (III), 8.9 ppm (IV), and 13.04 ppm (pupae). In the field, the application of silver nanoparticles (10 × LC50) lead to A. aegypti larval reduction of 47.6%, 76.7% and 100%, after 24, 48, and 72 h, while the P. niruri extract lead to 39.9%, 69.2 % and 100 % of reduction, respectively. In adulticidal experiments, P. niruri extract

  9. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  10. Breast-milk substitutes: a new old-threat for breastfeeding policy in developing countries. A case study in a traditionally high breastfeeding country.

    Directory of Open Access Journals (Sweden)

    Hubert Barennes

    Full Text Available BACKGROUND: Developing countries with traditionally breastfeeding are now experiencing the increasing pressure of formula milk marketing. This may endanger lives and undermine the efforts of national policies in achieving the objectives of the Millennium Development Goals. We examined the use of, and factors for use, of all available breast-milk substitutes (BMS in a country with a traditionally high rate of breastfeeding. METHODS: Randomised multi-stage sampling surveys in 90 villages in 12/17 provinces in Laos. PARTICIPANTS: 1057 mothers with infants under 24 months of age. TOOLS: 50-query questionnaire and a poster of 22 BMS (8 canned or powdered milk; 6 non-dairy; 6 formulas; 2 non-formulas. OUTCOME MEASURES INCLUDED: prevalence of use and age of starting BMS in relation to socio-demographic characteristics and information sources, by univariate and multivariate analyses. RESULTS: Of 1057 mothers: 72.5% currently breastfed; 25.4% gave BMS (10.6% infant formula; 19.6% gave BMS before 6 months of age (of them: 83% non-dairy or cereals; mean age: 2.9 months; 95% Confidence interval: 2.6-3.2. One formula and one non-formula product accounted for 85% of BMS. BMS were considered as milk by the majority of mothers. Thai TV was the main source of information on BMS for mothers. Lao Loum mothers (the main ethnic group living in concrete houses with good sanitary conditions, were more likely than others to use BMS before 6 months (OR: 1.79, (1.15-2.78, p<0.009. Mothers who fed their infants colostrum at birth were less likely to use BMS before 6 months of age (OR: 0.63, (0.41-0.99, p = 0.04. Unemployed mothers living in rural areas were less likely to consider BMS better than breast milk. CONCLUSION: In Laos, mothers with the highest socio-economic status are showing a tendency to give up breastfeeding. Successful educational strategies and advocacy measures should be urgently developed to promote and sustain breastfeeding in developing countries.

  11. Tensor Calculus: Unlearning Vector Calculus

    Science.gov (United States)

    Lee, Wha-Suck; Engelbrecht, Johann; Moller, Rita

    2018-01-01

    Tensor calculus is critical in the study of the vector calculus of the surface of a body. Indeed, tensor calculus is a natural step-up for vector calculus. This paper presents some pitfalls of a traditional course in vector calculus in transitioning to tensor calculus. We show how a deeper emphasis on traditional topics such as the Jacobian can…

  12. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  13. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  14. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  15. Recommendation on vectors and vector-transmitted diseases

    OpenAIRE

    Netherlands Food and Consumer Product Safety Authority

    2009-01-01

    In view of their increasing risk of introduction and their possible implications in causing major disease outbreaks, vectors, as well as vector-transmitted diseases like dengue, West Nile disease, Lyme disease and bluetongue need to be recognised as a threat to public and animal health and to the economy, also in the Netherlands. There has been an increase in the incidence of these diseases in the past two to three decades. Climate changes and changes in the use of land, water managemen...

  16. Vector analysis

    CERN Document Server

    Newell, Homer E

    2006-01-01

    When employed with skill and understanding, vector analysis can be a practical and powerful tool. This text develops the algebra and calculus of vectors in a manner useful to physicists and engineers. Numerous exercises (with answers) not only provide practice in manipulation but also help establish students' physical and geometric intuition in regard to vectors and vector concepts.Part I, the basic portion of the text, consists of a thorough treatment of vector algebra and the vector calculus. Part II presents the illustrative matter, demonstrating applications to kinematics, mechanics, and e

  17. About vectors

    CERN Document Server

    Hoffmann, Banesh

    1975-01-01

    From his unusual beginning in ""Defining a vector"" to his final comments on ""What then is a vector?"" author Banesh Hoffmann has written a book that is provocative and unconventional. In his emphasis on the unresolved issue of defining a vector, Hoffmann mixes pure and applied mathematics without using calculus. The result is a treatment that can serve as a supplement and corrective to textbooks, as well as collateral reading in all courses that deal with vectors. Major topics include vectors and the parallelogram law; algebraic notation and basic ideas; vector algebra; scalars and scalar p

  18. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  19. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  20. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  1. Viral Vectors for Use in the Development of Biodefense Vaccines

    National Research Council Canada - National Science Library

    Lee, John S; Hadjipanayis, Angela G; Parker, Michael D

    2005-01-01

    ... agents of bioterrorism or biowarfare. The use of viruses, for example adenovirus, vaccinia virus, and Venezuelan equine encephalitis virus, as vaccine-vectors has enabled researchers to develop effective means for countering the threat of bioterrorism and biowarfare. An overview of the different viral vectors and the threats they counter will be discussed.

  2. Elementary vectors

    CERN Document Server

    Wolstenholme, E Œ

    1978-01-01

    Elementary Vectors, Third Edition serves as an introductory course in vector analysis and is intended to present the theoretical and application aspects of vectors. The book covers topics that rigorously explain and provide definitions, principles, equations, and methods in vector analysis. Applications of vector methods to simple kinematical and dynamical problems; central forces and orbits; and solutions to geometrical problems are discussed as well. This edition of the text also provides an appendix, intended for students, which the author hopes to bridge the gap between theory and appl

  3. Vector analysis

    CERN Document Server

    Brand, Louis

    2006-01-01

    The use of vectors not only simplifies treatments of differential geometry, mechanics, hydrodynamics, and electrodynamics, but also makes mathematical and physical concepts more tangible and easy to grasp. This text for undergraduates was designed as a short introductory course to give students the tools of vector algebra and calculus, as well as a brief glimpse into these subjects' manifold applications. The applications are developed to the extent that the uses of the potential function, both scalar and vector, are fully illustrated. Moreover, the basic postulates of vector analysis are brou

  4. Environmental statistical modelling of mosquito vectors at different geographical scales

    NARCIS (Netherlands)

    Cianci, D.

    2015-01-01

    Vector-borne diseases are infections transmitted by the bite of infected arthropod vectors, such as mosquitoes, ticks, fleas, midges and flies. Vector-borne diseases pose an increasingly wider threat to global public health, both in terms of people affected and their geographical spread. Mosquitoes

  5. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  6. Vector velocimeter

    DEFF Research Database (Denmark)

    2012-01-01

    The present invention relates to a compact, reliable and low-cost vector velocimeter for example for determining velocities of particles suspended in a gas or fluid flow, or for determining velocity, displacement, rotation, or vibration of a solid surface, the vector velocimeter comprising a laser...

  7. Cloning vector

    Science.gov (United States)

    Guilfoyle, Richard A.; Smith, Lloyd M.

    1994-01-01

    A vector comprising a filamentous phage sequence containing a first copy of filamentous phage gene X and other sequences necessary for the phage to propagate is disclosed. The vector also contains a second copy of filamentous phage gene X downstream from a promoter capable of promoting transcription in a bacterial host. In a preferred form of the present invention, the filamentous phage is M13 and the vector additionally includes a restriction endonuclease site located in such a manner as to substantially inactivate the second gene X when a DNA sequence is inserted into the restriction site.

  8. Cloning vector

    Science.gov (United States)

    Guilfoyle, R.A.; Smith, L.M.

    1994-12-27

    A vector comprising a filamentous phage sequence containing a first copy of filamentous phage gene X and other sequences necessary for the phage to propagate is disclosed. The vector also contains a second copy of filamentous phage gene X downstream from a promoter capable of promoting transcription in a bacterial host. In a preferred form of the present invention, the filamentous phage is M13 and the vector additionally includes a restriction endonuclease site located in such a manner as to substantially inactivate the second gene X when a DNA sequence is inserted into the restriction site. 2 figures.

  9. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  10. Equivalent Vectors

    Science.gov (United States)

    Levine, Robert

    2004-01-01

    The cross-product is a mathematical operation that is performed between two 3-dimensional vectors. The result is a vector that is orthogonal or perpendicular to both of them. Learning about this for the first time while taking Calculus-III, the class was taught that if AxB = AxC, it does not necessarily follow that B = C. This seemed baffling. The…

  11. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  12. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  13. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  14. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  15. Emerging vector borne diseases – incidence through vectors

    Directory of Open Access Journals (Sweden)

    Sara eSavic

    2014-12-01

    Full Text Available Vector borne diseases use to be a major public health concern only in tropical and subtropical areas, but today they are an emerging threat for the continental and developed countries also. Nowdays, in intercontinetal countries, there is a struggle with emerging diseases which have found their way to appear through vectors. Vector borne zoonotic diseases occur when vectors, animal hosts, climate conditions, pathogens and susceptible human population exist at the same time, at the same place. Global climate change is predicted to lead to an increase in vector borne infectious diseases and disease outbreaks. It could affect the range and popultion of pathogens, host and vectors, transmission season, etc. Reliable surveilance for diseases that are most likely to emerge is required. Canine vector borne diseases represent a complex group of diseases including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, erlichiosis, leishmaniosis. Some of these diseases cause serious clinical symptoms in dogs and some of them have a zoonotic potential with an effect to public health. It is expected from veterinarians in coordination with medical doctors to play a fudamental role at primeraly prevention and then treatment of vector borne diseases in dogs. The One Health concept has to be integrated into the struggle against emerging diseases.During a four year period, from 2009-2013, a total number of 551 dog samples were analysed for vector borne diseases (borreliosis, babesiosis, erlichiosis, anaplasmosis, dirofilariosis and leishmaniasis in routine laboratory work. The analysis were done by serological tests – ELISA for borreliosis, dirofilariosis and leishmaniasis, modified Knott test for dirofilariosis and blood smear for babesiosis, erlichiosis and anaplasmosis. This number of samples represented 75% of total number of samples that were sent for analysis for different diseases in dogs. Annually, on avarege more then half of the samples

  16. Vector geometry

    CERN Document Server

    Robinson, Gilbert de B

    2011-01-01

    This brief undergraduate-level text by a prominent Cambridge-educated mathematician explores the relationship between algebra and geometry. An elementary course in plane geometry is the sole requirement for Gilbert de B. Robinson's text, which is the result of several years of teaching and learning the most effective methods from discussions with students. Topics include lines and planes, determinants and linear equations, matrices, groups and linear transformations, and vectors and vector spaces. Additional subjects range from conics and quadrics to homogeneous coordinates and projective geom

  17. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  18. VECTOR INTEGRATION

    NARCIS (Netherlands)

    Thomas, E. G. F.

    2012-01-01

    This paper deals with the theory of integration of scalar functions with respect to a measure with values in a, not necessarily locally convex, topological vector space. It focuses on the extension of such integrals from bounded measurable functions to the class of integrable functions, proving

  19. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  20. Speculative dynamic vectorization to assist static vectorization in a HW/SW co-designed environment

    OpenAIRE

    Kumar, R.; Martinez, A.; Gonzalez, A.

    2013-01-01

    Compiler based static vectorization is used widely to extract data level parallelism from computation intensive applications. Static vectorization is very effective in vectorizing traditional array based applications. However, compilers inability to reorder ambiguous memory references severely limits vectorization opportunities, especially in pointer rich applications. HW/SW co-designed processors provide an excellent opportunity to optimize the applications at runtime. The availability of dy...

  1. An introduction to vectors, vector operators and vector analysis

    CERN Document Server

    Joag, Pramod S

    2016-01-01

    Ideal for undergraduate and graduate students of science and engineering, this book covers fundamental concepts of vectors and their applications in a single volume. The first unit deals with basic formulation, both conceptual and theoretical. It discusses applications of algebraic operations, Levi-Civita notation, and curvilinear coordinate systems like spherical polar and parabolic systems and structures, and analytical geometry of curves and surfaces. The second unit delves into the algebra of operators and their types and also explains the equivalence between the algebra of vector operators and the algebra of matrices. Formulation of eigen vectors and eigen values of a linear vector operator are elaborated using vector algebra. The third unit deals with vector analysis, discussing vector valued functions of a scalar variable and functions of vector argument (both scalar valued and vector valued), thus covering both the scalar vector fields and vector integration.

  2. Emerging Vector-Borne Diseases - Incidence through Vectors.

    Science.gov (United States)

    Savić, Sara; Vidić, Branka; Grgić, Zivoslav; Potkonjak, Aleksandar; Spasojevic, Ljubica

    2014-01-01

    Vector-borne diseases use to be a major public health concern only in tropical and subtropical areas, but today they are an emerging threat for the continental and developed countries also. Nowadays, in intercontinental countries, there is a struggle with emerging diseases, which have found their way to appear through vectors. Vector-borne zoonotic diseases occur when vectors, animal hosts, climate conditions, pathogens, and susceptible human population exist at the same time, at the same place. Global climate change is predicted to lead to an increase in vector-borne infectious diseases and disease outbreaks. It could affect the range and population of pathogens, host and vectors, transmission season, etc. Reliable surveillance for diseases that are most likely to emerge is required. Canine vector-borne diseases represent a complex group of diseases including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, ehrlichiosis, and leishmaniosis. Some of these diseases cause serious clinical symptoms in dogs and some of them have a zoonotic potential with an effect to public health. It is expected from veterinarians in coordination with medical doctors to play a fundamental role at primarily prevention and then treatment of vector-borne diseases in dogs. The One Health concept has to be integrated into the struggle against emerging diseases. During a 4-year period, from 2009 to 2013, a total number of 551 dog samples were analyzed for vector-borne diseases (borreliosis, babesiosis, ehrlichiosis, anaplasmosis, dirofilariosis, and leishmaniasis) in routine laboratory work. The analysis was done by serological tests - ELISA for borreliosis, dirofilariosis, and leishmaniasis, modified Knott test for dirofilariosis, and blood smear for babesiosis, ehrlichiosis, and anaplasmosis. This number of samples represented 75% of total number of samples that were sent for analysis for different diseases in dogs. Annually, on average more then half of the samples

  3. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  4. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  5. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  6. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  7. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  8. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  9. Keeping Tradition

    NARCIS (Netherlands)

    Zenhong, C.; Buwalda, P.L.

    2011-01-01

    Chinese dumplings such as Jiao Zi and Bao Zi are two of the popular traditional foods in Asia. They are usually made from wheat flour dough (rice flour or starch is sometimes used) that contains fillings. They can be steamed, boiled and fried and are consumed either as a main meal or dessert. As

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  12. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  13. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  14. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  15. Vertical vector face lift.

    Science.gov (United States)

    Somoano, Brian; Chan, Joanna; Morganroth, Greg

    2011-01-01

    Facial rejuvenation using local anesthesia has evolved in the past decade as a safer option for patients seeking fewer complications and minimal downtime. Mini- and short-scar face lifts using more conservative incision lengths and extent of undermining can be effective in the younger patient with lower face laxity and minimal loose, elastotic neck skin. By incorporating both an anterior and posterior approach and using an incision length between the mini and more traditional face lift, the Vertical Vector Face Lift can achieve longer-lasting and natural results with lesser cost and risk. Submentoplasty and liposuction of the neck and jawline, fundamental components of the vertical vector face lift, act synergistically with superficial musculoaponeurotic system plication to reestablish a more youthful, sculpted cervicomental angle, even in patients with prominent jowls. Dramatic results can be achieved in the right patient by combining with other procedures such as injectable fillers, chin implants, laser resurfacing, or upper and lower blepharoplasties. © 2011 Wiley Periodicals, Inc.

  16. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  17. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  18. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  19. [Traditional nostrum].

    Science.gov (United States)

    Sugiyama, Shigeru

    2006-01-01

    The commercialization of drugs started toward the end of Heian period (794-1192) when not only aristocrats and monks who were traditional patrons to drug makers, but also local clans and landlords who became powerful as a result of the disbanding of aristocratic manors accumulated enough wealth to spend money on medicine. Although traveling around the country was still a dangerous endeavor, merchants assembled groups to bring lucrative foreign drugs (mainly Chinese) to remote areas. The spread of commercial drugs to common people, however, did not happen until the early Edo period (1603-1867), when the so-called barrier system was installed nationwide to make domestic travel safe. Commercialization started in large cities and gradually spread to other areas. Many nostrums popular until recently appeared in the Genroku period (1688-1703) or later. Many such nostrums were all-cures, often consisting of such active ingredients as Saussureae radix, Agalloch, or Gambir. Even in the Edo period, many people living in agricultural or fishing villages, as well as those in the lower tier, were still poor. Much of the medication available to those people was therefore made of various plant or animal-derived substances that were traditionally used as folk medicines.

  20. Evaluación del peso seco y el agua corporal según bioimpedancia vectorial frente al método tradicional Assessing dry weight and body water using bioimpedance vector analysis compared to the traditional method

    Directory of Open Access Journals (Sweden)

    María Teresa Centellas Tristán

    2013-03-01

    Full Text Available Introducción: La bioimpedancia eléctrica se puede utilizar para establecer el estado de hidratación y nutrición en hemodiálisis. La valoración del estado de hidratación de los pacientes se hace habitualmente a modo de "arte clínico" mediante el concepto de "peso seco". Existen pocos trabajos que estudien la concordancia entre el peso seco estimado de forma clínica y el deducido post-bioimpedancia. Material y métodos: Se estudiaron 36 pacientes (26 varones y 10 mujeres. Se realizó bioimpedancia eléctrica vectorial antes y 30' después de diálisis de mitad de semana midiendo, el peso, el agua total y su distribución, el ángulo de fase, la relación de Na/K, y la posición del vector de cada paciente en el normograma de esferas: percentiles 50,75 y 95. El peso-seco se estimó según la valoración subjetiva del nefrólogo, enfermera y paciente. Además en 12 pacientes estables se continuó el análisis por bioimpedancia durante 4 semanas. Resultados: La edad fue de 69.6±12.5 (r=29-89. Prediálisis el peso fue de 73.1±14.1, y postdiálisis de 70.4±13.6. El agua corporal total fue de 24.7±2.8 L/m (53.7±8.2% del peso; 22.1±3.0 L (56.2±5.9% del peso correspondían a agua extracelular y 17.4±3.8 L/m a intracelular. post-hemodiálisis, el agua total se redujo a 22.8±2.4 L/m (51.8±8.6% del peso (23.5±2.2 L en varones; y 21,5±3 L en mujeres de los que 19.6±2.5 L (54,3±5.8% del peso correspondían a agua extracelular y 16.7±3.3 a agua intracelular. Un varón y 5 mujeres sobrepasaron el valor de referencia más alto. El peso post-hemodiálisis fue de 70,4±13,6 ligeramente superior al peso seco establecido: 70,2±13,4 (p=0,02. El ángulo de fase fue 1.2, indicando malnutrición. El estudio de las elipses mostró en el percentil 50 el 58.3% (21 pacientes. El resto se repartían en el 75% de sobrehidratación: 9 (25% y en el 95%, 5 (13,8%. En los 12 pacientes en los que se efectuaron las bioimpedancias seriadas durante 4 semanas

  1. Raster images vectorization system

    OpenAIRE

    Genytė, Jurgita

    2006-01-01

    The problem of raster images vectorization was analyzed and researched in this work. Existing vectorization systems are quite expensive, the results are inaccurate, and the manual vectorization of a large number of drafts is impossible. That‘s why our goal was to design and develop a new raster images vectorization system using our suggested automatic vectorization algorithm and the way to record results in a new universal vectorial file format. The work consists of these main parts: analysis...

  2. Kochen-Specker vectors

    International Nuclear Information System (INIS)

    Pavicic, Mladen; Merlet, Jean-Pierre; McKay, Brendan; Megill, Norman D

    2005-01-01

    We give a constructive and exhaustive definition of Kochen-Specker (KS) vectors in a Hilbert space of any dimension as well as of all the remaining vectors of the space. KS vectors are elements of any set of orthonormal states, i.e., vectors in an n-dimensional Hilbert space, H n , n≥3, to which it is impossible to assign 1s and 0s in such a way that no two mutually orthogonal vectors from the set are both assigned 1 and that not all mutually orthogonal vectors are assigned 0. Our constructive definition of such KS vectors is based on algorithms that generate MMP diagrams corresponding to blocks of orthogonal vectors in R n , on algorithms that single out those diagrams on which algebraic (0)-(1) states cannot be defined, and on algorithms that solve nonlinear equations describing the orthogonalities of the vectors by means of statistically polynomially complex interval analysis and self-teaching programs. The algorithms are limited neither by the number of dimensions nor by the number of vectors. To demonstrate the power of the algorithms, all four-dimensional KS vector systems containing up to 24 vectors were generated and described, all three-dimensional vector systems containing up to 30 vectors were scanned, and several general properties of KS vectors were found

  3. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    Science.gov (United States)

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  4. Diversity of medicinal plants and anthropogenic threats in the ...

    African Journals Online (AJOL)

    Diversity of medicinal plants and anthropogenic threats in the Samburu Central Sub-County of Kenya. ... Biodiversity of medicinal plants and effects of human activities on availability of traditional ... There is, therefore need to adopt management strategies that enhance the conservation of these valuable natural resources.

  5. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  6. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  7. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  8. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  9. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  10. Vector regression introduced

    Directory of Open Access Journals (Sweden)

    Mok Tik

    2014-06-01

    Full Text Available This study formulates regression of vector data that will enable statistical analysis of various geodetic phenomena such as, polar motion, ocean currents, typhoon/hurricane tracking, crustal deformations, and precursory earthquake signals. The observed vector variable of an event (dependent vector variable is expressed as a function of a number of hypothesized phenomena realized also as vector variables (independent vector variables and/or scalar variables that are likely to impact the dependent vector variable. The proposed representation has the unique property of solving the coefficients of independent vector variables (explanatory variables also as vectors, hence it supersedes multivariate multiple regression models, in which the unknown coefficients are scalar quantities. For the solution, complex numbers are used to rep- resent vector information, and the method of least squares is deployed to estimate the vector model parameters after transforming the complex vector regression model into a real vector regression model through isomorphism. Various operational statistics for testing the predictive significance of the estimated vector parameter coefficients are also derived. A simple numerical example demonstrates the use of the proposed vector regression analysis in modeling typhoon paths.

  11. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  12. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  13. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  14. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  15. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  16. VectorBase

    Data.gov (United States)

    U.S. Department of Health & Human Services — VectorBase is a Bioinformatics Resource Center for invertebrate vectors. It is one of four Bioinformatics Resource Centers funded by NIAID to provide web-based...

  17. Generalization of concurrence vectors

    International Nuclear Information System (INIS)

    Yu Changshui; Song Heshan

    2004-01-01

    In this Letter, based on the generalization of concurrence vectors for bipartite pure state with respect to employing tensor product of generators of the corresponding rotation groups, we generalize concurrence vectors to the case of mixed states; a new criterion of separability of multipartite pure states is given out, for which we define a concurrence vector; we generalize the vector to the case of multipartite mixed state and give out a good measure of free entanglement

  18. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  19. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  20. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  1. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  2. Convexity and Marginal Vectors

    NARCIS (Netherlands)

    van Velzen, S.; Hamers, H.J.M.; Norde, H.W.

    2002-01-01

    In this paper we construct sets of marginal vectors of a TU game with the property that if the marginal vectors from these sets are core elements, then the game is convex.This approach leads to new upperbounds on the number of marginal vectors needed to characterize convexity.An other result is that

  3. Custodial vector model

    DEFF Research Database (Denmark)

    Becciolini, Diego; Franzosi, Diogo Buarque; Foadi, Roshan

    2015-01-01

    We analyze the Large Hadron Collider (LHC) phenomenology of heavy vector resonances with a $SU(2)_L\\times SU(2)_R$ spectral global symmetry. This symmetry partially protects the electroweak S-parameter from large contributions of the vector resonances. The resulting custodial vector model spectrum...

  4. Malaria Vector Control Still Matters despite Insecticide Resistance.

    Science.gov (United States)

    Alout, Haoues; Labbé, Pierrick; Chandre, Fabrice; Cohuet, Anna

    2017-08-01

    Mosquito vectors' resistance to insecticides is usually considered a major threat to the recent progresses in malaria control. However, studies measuring the impact of interventions and insecticide resistance reveal inconsistencies when using entomological versus epidemiological indices. First, evaluation tests that do not reflect the susceptibility of mosquitoes when they are infectious may underestimate insecticide efficacy. Moreover, interactions between insecticide resistance and vectorial capacity reveal nonintuitive outcomes of interventions. Therefore, considering ecological interactions between vector, parasite, and environment highlights that the impact of insecticide resistance on the malaria burden is not straightforward and we suggest that vector control still matters despite insecticide resistance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  6. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  7. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  8. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  9. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  10. Alternatives to the stochastic "noise vector" approach

    DEFF Research Database (Denmark)

    Forcrand, Philippe de; Jaeger, Benjamin

    2018-01-01

    Several important observables, like the quark condensate and the Taylor coefficients of the expansion of the QCD pressure with respect to the chemical potential, are based on the trace of the inverse Dirac operator and of its powers. Such traces are traditionally estimated with "noise vectors...

  11. Rotations with Rodrigues' vector

    International Nuclear Information System (INIS)

    Pina, E

    2011-01-01

    The rotational dynamics was studied from the point of view of Rodrigues' vector. This vector is defined here by its connection with other forms of parametrization of the rotation matrix. The rotation matrix was expressed in terms of this vector. The angular velocity was computed using the components of Rodrigues' vector as coordinates. It appears to be a fundamental matrix that is used to express the components of the angular velocity, the rotation matrix and the angular momentum vector. The Hamiltonian formalism of rotational dynamics in terms of this vector uses the same matrix. The quantization of the rotational dynamics is performed with simple rules if one uses Rodrigues' vector and similar formal expressions for the quantum operators that mimic the Hamiltonian classical dynamics.

  12. Emerging Vector-Borne Diseases.

    Science.gov (United States)

    Huntington, Mark K; Allison, Jay; Nair, Dilip

    2016-10-01

    Several mosquito-borne viral infections have recently emerged in North America; West Nile virus is the most common in the United States. Although West Nile virus generally causes a self-limited, flulike febrile illness, a serious neuroinvasive form may occur. Dengue is the most common vector-borne viral disease worldwide, and it has been a significant public health threat in the United States since 2009. Known as breakbone fever for its severe myalgias and arthralgias, dengue may cause a hemorrhagic syndrome. Chikungunya also causes flulike febrile illness and disabling arthralgias. Although meningoencephalitis may occur with chikungunya, bleeding is uncommon. Symptoms of Zika virus infection are similar to those of dengue, but milder. Zika virus increases the risk of fetal brain abnormalities, including microcephaly, if a pregnant woman is infected. Zika virus is spread through Aedes albopictus mosquito bites, is transmitted sexually, and may rarely spread nonsexually from person to person. Diagnosis of these vectorborne infections is clinical and serologic, and treatment is supportive. Other, well-established vector-borne diseases are also important. Ehrlichiosis is a tick-borne bacterial disease that presents as a nonspecific syndrome of fever, headache, malaise, and myalgias. It is diagnosed via blood smear testing, with confirmatory serology. Ehrlichiosis is treated with doxycycline. Rickettsial infections are transmitted by fleas, mites, and ticks, and severity ranges from mild to life threatening. Rocky Mountain spotted fever, the most significant rickettsial infection, is primarily a clinical diagnosis that presents as fever, headache, myalgias, petechial rash, and tick exposure. Doxycycline is effective for rickettsial infections if administered promptly. Vector avoidance strategies are critical to the prevention of all of these infections.

  13. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  14. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  15. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  16. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  17. Supergravity inspired vector curvaton

    International Nuclear Information System (INIS)

    Dimopoulos, Konstantinos

    2007-01-01

    It is investigated whether a massive Abelian vector field, whose gauge kinetic function is growing during inflation, can be responsible for the generation of the curvature perturbation in the Universe. Particle production is studied and it is shown that the vector field can obtain a scale-invariant superhorizon spectrum of perturbations with a reasonable choice of kinetic function. After inflation the vector field begins coherent oscillations, during which it corresponds to pressureless isotropic matter. When the vector field dominates the Universe, its perturbations give rise to the observed curvature perturbation following the curvaton scenario. It is found that this is possible if, after the end of inflation, the mass of the vector field increases at a phase transition at temperature of order 1 TeV or lower. Inhomogeneous reheating, whereby the vector field modulates the decay rate of the inflaton, is also studied

  18. Custodial vector model

    Science.gov (United States)

    Becciolini, Diego; Franzosi, Diogo Buarque; Foadi, Roshan; Frandsen, Mads T.; Hapola, Tuomas; Sannino, Francesco

    2015-07-01

    We analyze the Large Hadron Collider (LHC) phenomenology of heavy vector resonances with a S U (2 )L×S U (2 )R spectral global symmetry. This symmetry partially protects the electroweak S parameter from large contributions of the vector resonances. The resulting custodial vector model spectrum and interactions with the standard model fields lead to distinct signatures at the LHC in the diboson, dilepton, and associated Higgs channels.

  19. Vector Differential Calculus

    OpenAIRE

    HITZER, Eckhard MS

    2002-01-01

    This paper treats the fundamentals of the vector differential calculus part of universal geometric calculus. Geometric calculus simplifies and unifies the structure and notation of mathematics for all of science and engineering, and for technological applications. In order to make the treatment self-contained, I first compile all important geometric algebra relationships,which are necesssary for vector differential calculus. Then differentiation by vectors is introduced and a host of major ve...

  20. Implicit Real Vector Automata

    Directory of Open Access Journals (Sweden)

    Jean-François Degbomont

    2010-10-01

    Full Text Available This paper addresses the symbolic representation of non-convex real polyhedra, i.e., sets of real vectors satisfying arbitrary Boolean combinations of linear constraints. We develop an original data structure for representing such sets, based on an implicit and concise encoding of a known structure, the Real Vector Automaton. The resulting formalism provides a canonical representation of polyhedra, is closed under Boolean operators, and admits an efficient decision procedure for testing the membership of a vector.

  1. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  2. Vectorized Monte Carlo

    International Nuclear Information System (INIS)

    Brown, F.B.

    1981-01-01

    Examination of the global algorithms and local kernels of conventional general-purpose Monte Carlo codes shows that multigroup Monte Carlo methods have sufficient structure to permit efficient vectorization. A structured multigroup Monte Carlo algorithm for vector computers is developed in which many particle events are treated at once on a cell-by-cell basis. Vectorization of kernels for tracking and variance reduction is described, and a new method for discrete sampling is developed to facilitate the vectorization of collision analysis. To demonstrate the potential of the new method, a vectorized Monte Carlo code for multigroup radiation transport analysis was developed. This code incorporates many features of conventional general-purpose production codes, including general geometry, splitting and Russian roulette, survival biasing, variance estimation via batching, a number of cutoffs, and generalized tallies of collision, tracklength, and surface crossing estimators with response functions. Predictions of vectorized performance characteristics for the CYBER-205 were made using emulated coding and a dynamic model of vector instruction timing. Computation rates were examined for a variety of test problems to determine sensitivities to batch size and vector lengths. Significant speedups are predicted for even a few hundred particles per batch, and asymptotic speedups by about 40 over equivalent Amdahl 470V/8 scalar codes arepredicted for a few thousand particles per batch. The principal conclusion is that vectorization of a general-purpose multigroup Monte Carlo code is well worth the significant effort required for stylized coding and major algorithmic changes

  3. Vectors and their applications

    CERN Document Server

    Pettofrezzo, Anthony J

    2005-01-01

    Geared toward undergraduate students, this text illustrates the use of vectors as a mathematical tool in plane synthetic geometry, plane and spherical trigonometry, and analytic geometry of two- and three-dimensional space. Its rigorous development includes a complete treatment of the algebra of vectors in the first two chapters.Among the text's outstanding features are numbered definitions and theorems in the development of vector algebra, which appear in italics for easy reference. Most of the theorems include proofs, and coordinate position vectors receive an in-depth treatment. Key concept

  4. Symbolic computer vector analysis

    Science.gov (United States)

    Stoutemyer, D. R.

    1977-01-01

    A MACSYMA program is described which performs symbolic vector algebra and vector calculus. The program can combine and simplify symbolic expressions including dot products and cross products, together with the gradient, divergence, curl, and Laplacian operators. The distribution of these operators over sums or products is under user control, as are various other expansions, including expansion into components in any specific orthogonal coordinate system. There is also a capability for deriving the scalar or vector potential of a vector field. Examples include derivation of the partial differential equations describing fluid flow and magnetohydrodynamics, for 12 different classic orthogonal curvilinear coordinate systems.

  5. Endogenous Pain Modulation Induced by Extrinsic and Intrinsic Psychological Threat in Healthy Individuals.

    Science.gov (United States)

    Gibson, William; Moss, Penny; Cheng, Tak Ho; Garnier, Alexandre; Wright, Anthony; Wand, Benedict M

    2018-03-01

    Many factors interact to influence threat perception and the subsequent experience of pain. This study investigated the effect of observing pain (extrinsic threat) and intrinsic threat of pain to oneself on pressure pain threshold (PPT). Forty socially connected pairs of healthy volunteers were threat-primed and randomly allocated to experimental or control roles. An experimental pain modulation paradigm was applied, with non-nociceptive threat cues used as conditioning stimuli. In substudy 1, the extrinsic threat to the experimental participant was observation of the control partner in pain. The control participant underwent hand immersion in noxious and non-noxious water baths in randomized order. Change in the observing participant's PPT from baseline to mid- and postimmersion was calculated. A significant interaction was found for PPT between conditions and test time (F 2,78  = 24.9, P Extrinsic and intrinsic threat of pain, in the absence of any afferent input therefore influences pain modulation. This may need to be considered in studies that use noxious afferent input with populations who show dysfunctional pain modulation. The effect on endogenous analgesia of observing another's pain and of threat of pain to oneself was investigated. Extrinsic as well as intrinsic threat cues, in the absence of any afferent input, increased pain thresholds, suggesting that mere threat of pain may initiate analgesic effects in traditional noxious experimental paradigms. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  6. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  7. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  8. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  9. Vector-borne disease surveillance in livestock populations: a critical review of literature recommendations and implemented surveillance (BTV-8) in five European countries

    DEFF Research Database (Denmark)

    Dórea, Fernanda C.; Elbers, Armin R.W.; Hendrikx, Pascal

    2016-01-01

    Preparedness against vector-borne threats depends on the existence of a long-term, sustainable surveillance of vector-borne disease and their relevant vectors. This work reviewed the availability of such surveillance systems in five European countries (Denmark, France, The Netherlands, Sweden and...

  10. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  11. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  13. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  14. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  15. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  16. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  17. Vector-Vector Scattering on the Lattice

    Science.gov (United States)

    Romero-López, Fernando; Urbach, Carsten; Rusetsky, Akaki

    2018-03-01

    In this work we present an extension of the LüScher formalism to include the interaction of particles with spin, focusing on the scattering of two vector particles. The derived formalism will be applied to Scalar QED in the Higgs Phase, where the U(1) gauge boson acquires mass.

  18. Selection vector filter framework

    Science.gov (United States)

    Lukac, Rastislav; Plataniotis, Konstantinos N.; Smolka, Bogdan; Venetsanopoulos, Anastasios N.

    2003-10-01

    We provide a unified framework of nonlinear vector techniques outputting the lowest ranked vector. The proposed framework constitutes a generalized filter class for multichannel signal processing. A new class of nonlinear selection filters are based on the robust order-statistic theory and the minimization of the weighted distance function to other input samples. The proposed method can be designed to perform a variety of filtering operations including previously developed filtering techniques such as vector median, basic vector directional filter, directional distance filter, weighted vector median filters and weighted directional filters. A wide range of filtering operations is guaranteed by the filter structure with two independent weight vectors for angular and distance domains of the vector space. In order to adapt the filter parameters to varying signal and noise statistics, we provide also the generalized optimization algorithms taking the advantage of the weighted median filters and the relationship between standard median filter and vector median filter. Thus, we can deal with both statistical and deterministic aspects of the filter design process. It will be shown that the proposed method holds the required properties such as the capability of modelling the underlying system in the application at hand, the robustness with respect to errors in the model of underlying system, the availability of the training procedure and finally, the simplicity of filter representation, analysis, design and implementation. Simulation studies also indicate that the new filters are computationally attractive and have excellent performance in environments corrupted by bit errors and impulsive noise.

  19. Brane vector phenomenology

    International Nuclear Information System (INIS)

    Clark, T.E.; Love, S.T.; Nitta, Muneto; Veldhuis, T. ter; Xiong, C.

    2009-01-01

    Local oscillations of the brane world are manifested as massive vector fields. Their coupling to the Standard Model can be obtained using the method of nonlinear realizations of the spontaneously broken higher-dimensional space-time symmetries, and to an extent, are model independent. Phenomenological limits on these vector field parameters are obtained using LEP collider data and dark matter constraints

  20. Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    The two branches of dynamical systems, continuous and discrete, correspond to the study of differential equations (vector fields) and iteration of mappings respectively. In holomorphic dynamics, the systems studied are restricted to those described by holomorphic (complex analytic) functions...... or meromorphic (allowing poles as singularities) functions. There already exists a well-developed theory for iterative holomorphic dynamical systems, and successful relations found between iteration theory and flows of vector fields have been one of the main motivations for the recent interest in holomorphic...... vector fields. Since the class of complex polynomial vector fields in the plane is natural to consider, it is remarkable that its study has only begun very recently. There are numerous fundamental questions that are still open, both in the general classification of these vector fields, the decomposition...

  1. Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    Dias, Kealey

    vector fields. Since the class of complex polynomial vector fields in the plane is natural to consider, it is remarkable that its study has only begun very recently. There are numerous fundamental questions that are still open, both in the general classification of these vector fields, the decomposition...... of parameter spaces into structurally stable domains, and a description of the bifurcations. For this reason, the talk will focus on these questions for complex polynomial vector fields.......The two branches of dynamical systems, continuous and discrete, correspond to the study of differential equations (vector fields) and iteration of mappings respectively. In holomorphic dynamics, the systems studied are restricted to those described by holomorphic (complex analytic) functions...

  2. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  3. [Orthogonal Vector Projection Algorithm for Spectral Unmixing].

    Science.gov (United States)

    Song, Mei-ping; Xu, Xing-wei; Chang, Chein-I; An, Ju-bai; Yao, Li

    2015-12-01

    Spectrum unmixing is an important part of hyperspectral technologies, which is essential for material quantity analysis in hyperspectral imagery. Most linear unmixing algorithms require computations of matrix multiplication and matrix inversion or matrix determination. These are difficult for programming, especially hard for realization on hardware. At the same time, the computation costs of the algorithms increase significantly as the number of endmembers grows. Here, based on the traditional algorithm Orthogonal Subspace Projection, a new method called. Orthogonal Vector Projection is prompted using orthogonal principle. It simplifies this process by avoiding matrix multiplication and inversion. It firstly computes the final orthogonal vector via Gram-Schmidt process for each endmember spectrum. And then, these orthogonal vectors are used as projection vector for the pixel signature. The unconstrained abundance can be obtained directly by projecting the signature to the projection vectors, and computing the ratio of projected vector length and orthogonal vector length. Compared to the Orthogonal Subspace Projection and Least Squares Error algorithms, this method does not need matrix inversion, which is much computation costing and hard to implement on hardware. It just completes the orthogonalization process by repeated vector operations, easy for application on both parallel computation and hardware. The reasonability of the algorithm is proved by its relationship with Orthogonal Sub-space Projection and Least Squares Error algorithms. And its computational complexity is also compared with the other two algorithms', which is the lowest one. At last, the experimental results on synthetic image and real image are also provided, giving another evidence for effectiveness of the method.

  4. Application of Vector Triggering Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J. C.; Ibrahim, S. R.; Brincker, Rune

    result is a Random Decrement function from each measurement. In traditional Random Decrement estimation the triggering condition is a scalar condition, which should only be fulfilled in a single measurement. In vector triggering Random Decrement the triggering condition is a vector condition......This paper deals with applications of the vector triggering Random Decrement technique. This technique is new and developed with the aim of minimizing estimation time and identification errors. The theory behind the technique is discussed in an accompanying paper. The results presented...... in this paper should be regarded as a further documentation of the technique. The key point in Random Decrement estimation is the formulation of a triggering condition. If the triggering condition is fulfilled a time segment from each measurement is picked out and averaged with previous time segments. The final...

  5. Application of Vector Triggering Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J. C.; Ibrahim, S. R.; Brincker, Rune

    1997-01-01

    result is a Random Decrement function from each measurement. In traditional Random Decrement estimation the triggering condition is a scalar condition, which should only be fulfilled in a single measurement. In vector triggering Random Decrement the triggering condition is a vector condition......This paper deals with applications of the vector triggering Random Decrement technique. This technique is new and developed with the aim of minimizing estimation time and identification errors. The theory behind the technique is discussed in an accompanying paper. The results presented...... in this paper should be regarded as a further documentation of the technique. The key point in Random Decrement estimation is the formulation of a triggering condition. If the triggering condition is fulfilled a time segment from each measurement is picked out and averaged with previous time segments. The final...

  6. Fractal vector optical fields.

    Science.gov (United States)

    Pan, Yue; Gao, Xu-Zhen; Cai, Meng-Qiang; Zhang, Guan-Lin; Li, Yongnan; Tu, Chenghou; Wang, Hui-Tian

    2016-07-15

    We introduce the concept of a fractal, which provides an alternative approach for flexibly engineering the optical fields and their focal fields. We propose, design, and create a new family of optical fields-fractal vector optical fields, which build a bridge between the fractal and vector optical fields. The fractal vector optical fields have polarization states exhibiting fractal geometry, and may also involve the phase and/or amplitude simultaneously. The results reveal that the focal fields exhibit self-similarity, and the hierarchy of the fractal has the "weeding" role. The fractal can be used to engineer the focal field.

  7. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  8. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  9. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  10. Sustainable Traditional Medicine: Taking the Inspirations from Ancient Veterinary Science

    Directory of Open Access Journals (Sweden)

    Sanjeev Rastogi

    2011-01-01

    Full Text Available Rapid reduction in natural resources as a consequence to the expanded urbanization, global warming and reduced natural habitat posed a considerable threat to the sustainability of traditional medicine. Being completely dependent upon natural resources like herbs, minerals and animal products, traditional medicine would possibly rank first in order of extinction of heritage if an alternative way is not considered well in time. In reference to the use of animal products, Ayurveda presents some unique examples where animals are used without causing harm to them and so without posing a threat to their existence. In the current context, when natural resources are facing a threat to their existence, a revisit to these ideas may give us a new insight to refine our look at natural resources used in traditional medicine.

  11. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Noncausal Bayesian Vector Autoregression

    DEFF Research Database (Denmark)

    Lanne, Markku; Luoto, Jani

    We propose a Bayesian inferential procedure for the noncausal vector autoregressive (VAR) model that is capable of capturing nonlinearities and incorporating effects of missing variables. In particular, we devise a fast and reliable posterior simulator that yields the predictive distribution...

  13. Understanding Vector Fields.

    Science.gov (United States)

    Curjel, C. R.

    1990-01-01

    Presented are activities that help students understand the idea of a vector field. Included are definitions, flow lines, tangential and normal components along curves, flux and work, field conservation, and differential equations. (KR)

  14. GAP Land Cover - Vector

    Data.gov (United States)

    Minnesota Department of Natural Resources — This vector dataset is a detailed (1-acre minimum), hierarchically organized vegetation cover map produced by computer classification of combined two-season pairs of...

  15. Sesquilinear uniform vector integral

    Indian Academy of Sciences (India)

    theory, together with his integral, dominate contemporary mathematics. ... directions belonging to Bartle and Dinculeanu (see [1], [6], [7] and [2]). ... in this manner, namely he integrated vector functions with respect to measures of bounded.

  16. Tagged Vector Contour (TVC)

    Data.gov (United States)

    Kansas Data Access and Support Center — The Kansas Tagged Vector Contour (TVC) dataset consists of digitized contours from the 7.5 minute topographic quadrangle maps. Coverage for the state is incomplete....

  17. Vector hysteresis models

    Czech Academy of Sciences Publication Activity Database

    Krejčí, Pavel

    1991-01-01

    Roč. 2, - (1991), s. 281-292 ISSN 0956-7925 Keywords : vector hysteresis operator * hysteresis potential * differential inequality Subject RIV: BA - General Mathematics http://www.math.cas.cz/~krejci/b15p.pdf

  18. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  19. Support vector machines applications

    CERN Document Server

    Guo, Guodong

    2014-01-01

    Support vector machines (SVM) have both a solid mathematical background and good performance in practical applications. This book focuses on the recent advances and applications of the SVM in different areas, such as image processing, medical practice, computer vision, pattern recognition, machine learning, applied statistics, business intelligence, and artificial intelligence. The aim of this book is to create a comprehensive source on support vector machine applications, especially some recent advances.

  20. Exotic composite vector boson

    International Nuclear Information System (INIS)

    Akama, K.; Hattori, T.; Yasue, M.

    1991-01-01

    An exotic composite vector boson V is introduced in two dynamical models of composite quarks, leptons, W, and Z. One is based on four-Fermi interactions, in which composite vector bosons are regarded as fermion-antifermion bound states and the other is based on the confining SU(2) L gauge model, in which they are given by scalar-antiscalar bound states. Both approaches describe the same effective interactions for the sector of composite quarks, leptons, W, Z, γ, and V

  1. Vector borne diseases

    OpenAIRE

    Melillo Fenech, Tanya

    2010-01-01

    A vector-borne disease is one in which the pathogenic microorganism is transmitted from an infected individual to another individual by an arthropod or other agent. The transmission depends upon the attributes and requirements of at least three different Iiving organisms : the pathologic agent which is either a virus, protozoa, bacteria or helminth (worm); the vector, which is commonly an arthropod such as ticks or mosquitoes; and the human host.

  2. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  3. Vector financial rogue waves

    International Nuclear Information System (INIS)

    Yan, Zhenya

    2011-01-01

    The coupled nonlinear volatility and option pricing model presented recently by Ivancevic is investigated, which generates a leverage effect, i.e., stock volatility is (negatively) correlated to stock returns, and can be regarded as a coupled nonlinear wave alternative of the Black–Scholes option pricing model. In this Letter, we analytically propose vector financial rogue waves of the coupled nonlinear volatility and option pricing model without an embedded w-learning. Moreover, we exhibit their dynamical behaviors for chosen different parameters. The vector financial rogue wave (rogon) solutions may be used to describe the possible physical mechanisms for the rogue wave phenomena and to further excite the possibility of relative researches and potential applications of vector rogue waves in the financial markets and other related fields. -- Highlights: ► We investigate the coupled nonlinear volatility and option pricing model. ► We analytically present vector financial rogue waves. ► The vector financial rogue waves may be used to describe the extreme events in financial markets. ► This results may excite the relative researches and potential applications of vector rogue waves.

  4. Integrating Transgenic Vector Manipulation with Clinical Interventions to Manage Vector-Borne Diseases.

    Directory of Open Access Journals (Sweden)

    Kenichi W Okamoto

    2016-03-01

    Full Text Available Many vector-borne diseases lack effective vaccines and medications, and the limitations of traditional vector control have inspired novel approaches based on using genetic engineering to manipulate vector populations and thereby reduce transmission. Yet both the short- and long-term epidemiological effects of these transgenic strategies are highly uncertain. If neither vaccines, medications, nor transgenic strategies can by themselves suffice for managing vector-borne diseases, integrating these approaches becomes key. Here we develop a framework to evaluate how clinical interventions (i.e., vaccination and medication can be integrated with transgenic vector manipulation strategies to prevent disease invasion and reduce disease incidence. We show that the ability of clinical interventions to accelerate disease suppression can depend on the nature of the transgenic manipulation deployed (e.g., whether vector population reduction or replacement is attempted. We find that making a specific, individual strategy highly effective may not be necessary for attaining public-health objectives, provided suitable combinations can be adopted. However, we show how combining only partially effective antimicrobial drugs or vaccination with transgenic vector manipulations that merely temporarily lower vector competence can amplify disease resurgence following transient suppression. Thus, transgenic vector manipulation that cannot be sustained can have adverse consequences-consequences which ineffective clinical interventions can at best only mitigate, and at worst temporarily exacerbate. This result, which arises from differences between the time scale on which the interventions affect disease dynamics and the time scale of host population dynamics, highlights the importance of accounting for the potential delay in the effects of deploying public health strategies on long-term disease incidence. We find that for systems at the disease-endemic equilibrium, even

  5. Understanding traditional African healing

    OpenAIRE

    MOKGOBI, M.G.

    2014-01-01

    Traditional African healing has been in existence for many centuries yet many people still seem not to understand how it relates to God and religion/spirituality. Some people seem to believe that traditional healers worship the ancestors and not God. It is therefore the aim of this paper to clarify this relationship by discussing a chain of communication between the worshipers and the Almighty God. Other aspects of traditional healing namely types of traditional healers, training of tradition...

  6. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  7. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  8. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  9. Understanding traditional African healing.

    Science.gov (United States)

    Mokgobi, M G

    2014-09-01

    Traditional African healing has been in existence for many centuries yet many people still seem not to understand how it relates to God and religion/spirituality. Some people seem to believe that traditional healers worship the ancestors and not God. It is therefore the aim of this paper to clarify this relationship by discussing a chain of communication between the worshipers and the Almighty God. Other aspects of traditional healing namely types of traditional healers, training of traditional healers as well as the role of traditional healers in their communities are discussed. In conclusion, the services of traditional healers go far beyond the uses of herbs for physical illnesses. Traditional healers serve many roles which include but not limited to custodians of the traditional African religion and customs, educators about culture, counselors, social workers and psychologists.

  10. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  11. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  12. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  13. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  14. Vectorization in quantum chemistry

    International Nuclear Information System (INIS)

    Saunders, V.R.

    1987-01-01

    It is argued that the optimal vectorization algorithm for many steps (and sub-steps) in a typical ab initio calculation of molecular electronic structure is quite strongly dependent on the target vector machine. Details such as the availability (or lack) of a given vector construct in the hardware, vector startup times and asymptotic rates must all be considered when selecting the optimal algorithm. Illustrations are drawn from: gaussian integral evaluation, fock matrix construction, 4-index transformation of molecular integrals, direct-CI methods, the matrix multiply operation. A cross comparison of practical implementations on the CDC Cyber 205, the Cray-IS and Cray-XMP machines is presented. To achieve portability while remaining optimal on a wide range of machines it is necessary to code all available algorithms in a machine independent manner, and to select the appropriate algorithm using a procedure which is based on machine dependent parameters. Most such parameters concern the timing of certain vector loop kernals, which can usually be derived from a 'bench-marking' routine executed prior to the calculation proper

  15. [Lymphoscintigrams with anatomical landmarks obtained with vector graphics].

    Science.gov (United States)

    Rubini, Giuseppe; Antonica, Filippo; Renna, Maria Antonia; Ferrari, Cristina; Iuele, Francesca; Stabile Ianora, Antonio Amato; Losco, Matteo; Niccoli Asabella, Artor

    2012-11-01

    Nuclear medicine images are difficult to interpret because they do not include anatomical details. The aim of this study was to obtain lymphoscintigrams with anatomical landmarks that could be easily interpreted by General Physicians. Traditional lymphoscintigrams were processed with Adobe© Photoshop® CS6 and converted into vector images created by Illustrator®. The combination with a silhouette vector improved image interpretation, without resulting in longer radiation exposure or acquisition times.

  16. Vector Fields on Product Manifolds

    OpenAIRE

    Kurz, Stefan

    2011-01-01

    This short report establishes some basic properties of smooth vector fields on product manifolds. The main results are: (i) On a product manifold there always exists a direct sum decomposition into horizontal and vertical vector fields. (ii) Horizontal and vertical vector fields are naturally isomorphic to smooth families of vector fields defined on the factors. Vector fields are regarded as derivations of the algebra of smooth functions.

  17. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  18. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  19. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  20. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  1. Bunyavirus-Vector Interactions

    Directory of Open Access Journals (Sweden)

    Kate McElroy Horne

    2014-11-01

    Full Text Available The Bunyaviridae family is comprised of more than 350 viruses, of which many within the Hantavirus, Orthobunyavirus, Nairovirus, Tospovirus, and Phlebovirus genera are significant human or agricultural pathogens. The viruses within the Orthobunyavirus, Nairovirus, and Phlebovirus genera are transmitted by hematophagous arthropods, such as mosquitoes, midges, flies, and ticks, and their associated arthropods not only serve as vectors but also as virus reservoirs in many cases. This review presents an overview of several important emerging or re-emerging bunyaviruses and describes what is known about bunyavirus-vector interactions based on epidemiological, ultrastructural, and genetic studies of members of this virus family.

  2. Sums and Gaussian vectors

    CERN Document Server

    Yurinsky, Vadim Vladimirovich

    1995-01-01

    Surveys the methods currently applied to study sums of infinite-dimensional independent random vectors in situations where their distributions resemble Gaussian laws. Covers probabilities of large deviations, Chebyshev-type inequalities for seminorms of sums, a method of constructing Edgeworth-type expansions, estimates of characteristic functions for random vectors obtained by smooth mappings of infinite-dimensional sums to Euclidean spaces. A self-contained exposition of the modern research apparatus around CLT, the book is accessible to new graduate students, and can be a useful reference for researchers and teachers of the subject.

  3. Duality in vector optimization

    CERN Document Server

    Bot, Radu Ioan

    2009-01-01

    This book presents fundamentals and comprehensive results regarding duality for scalar, vector and set-valued optimization problems in a general setting. After a preliminary chapter dedicated to convex analysis and minimality notions of sets with respect to partial orderings induced by convex cones a chapter on scalar conjugate duality follows. Then investigations on vector duality based on scalar conjugacy are made. Weak, strong and converse duality statements are delivered and connections to classical results from the literature are emphasized. One chapter is exclusively consecrated to the s

  4. Multithreading in vector processors

    Science.gov (United States)

    Evangelinos, Constantinos; Kim, Changhoan; Nair, Ravi

    2018-01-16

    In one embodiment, a system includes a processor having a vector processing mode and a multithreading mode. The processor is configured to operate on one thread per cycle in the multithreading mode. The processor includes a program counter register having a plurality of program counters, and the program counter register is vectorized. Each program counter in the program counter register represents a distinct corresponding thread of a plurality of threads. The processor is configured to execute the plurality of threads by activating the plurality of program counters in a round robin cycle.

  5. Matrix vector analysis

    CERN Document Server

    Eisenman, Richard L

    2005-01-01

    This outstanding text and reference applies matrix ideas to vector methods, using physical ideas to illustrate and motivate mathematical concepts but employing a mathematical continuity of development rather than a physical approach. The author, who taught at the U.S. Air Force Academy, dispenses with the artificial barrier between vectors and matrices--and more generally, between pure and applied mathematics.Motivated examples introduce each idea, with interpretations of physical, algebraic, and geometric contexts, in addition to generalizations to theorems that reflect the essential structur

  6. Free topological vector spaces

    OpenAIRE

    Gabriyelyan, Saak S.; Morris, Sidney A.

    2016-01-01

    We define and study the free topological vector space $\\mathbb{V}(X)$ over a Tychonoff space $X$. We prove that $\\mathbb{V}(X)$ is a $k_\\omega$-space if and only if $X$ is a $k_\\omega$-space. If $X$ is infinite, then $\\mathbb{V}(X)$ contains a closed vector subspace which is topologically isomorphic to $\\mathbb{V}(\\mathbb{N})$. It is proved that if $X$ is a $k$-space, then $\\mathbb{V}(X)$ is locally convex if and only if $X$ is discrete and countable. If $X$ is a metrizable space it is shown ...

  7. Scalar-vector bootstrap

    Energy Technology Data Exchange (ETDEWEB)

    Rejon-Barrera, Fernando [Institute for Theoretical Physics, University of Amsterdam,Science Park 904, Postbus 94485, 1090 GL, Amsterdam (Netherlands); Robbins, Daniel [Department of Physics, Texas A& M University,TAMU 4242, College Station, TX 77843 (United States)

    2016-01-22

    We work out all of the details required for implementation of the conformal bootstrap program applied to the four-point function of two scalars and two vectors in an abstract conformal field theory in arbitrary dimension. This includes a review of which tensor structures make appearances, a construction of the projectors onto the required mixed symmetry representations, and a computation of the conformal blocks for all possible operators which can be exchanged. These blocks are presented as differential operators acting upon the previously known scalar conformal blocks. Finally, we set up the bootstrap equations which implement crossing symmetry. Special attention is given to the case of conserved vectors, where several simplifications occur.

  8. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  9. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  10. Plasmodium knowlesi in humans: a review on the role of its vectors in Malaysia.

    Science.gov (United States)

    Vythilingam, Indra

    2010-04-01

    Plasmodium knowlesi in humans is life threatening, is on the increase and has been reported from most states in Malaysia. Anopheles latens and Anopheles cracens have been incriminated as vectors. Malaria is now a zoonoses and is occurring in malaria free areas of Malaysia. It is also a threat to eco-tourism. The importance of the vectors and possible control measures is reviewed here.

  11. Estimation of vector velocity

    DEFF Research Database (Denmark)

    2000-01-01

    Using a pulsed ultrasound field, the two-dimensional velocity vector can be determined with the invention. The method uses a transversally modulated ultrasound field for probing the moving medium under investigation. A modified autocorrelation approach is used in the velocity estimation. The new...

  12. Production of lentiviral vectors

    Directory of Open Access Journals (Sweden)

    Otto-Wilhelm Merten

    2016-01-01

    Full Text Available Lentiviral vectors (LV have seen considerably increase in use as gene therapy vectors for the treatment of acquired and inherited diseases. This review presents the state of the art of the production of these vectors with particular emphasis on their large-scale production for clinical purposes. In contrast to oncoretroviral vectors, which are produced using stable producer cell lines, clinical-grade LV are in most of the cases produced by transient transfection of 293 or 293T cells grown in cell factories. However, more recent developments, also, tend to use hollow fiber reactor, suspension culture processes, and the implementation of stable producer cell lines. As is customary for the biotech industry, rather sophisticated downstream processing protocols have been established to remove any undesirable process-derived contaminant, such as plasmid or host cell DNA or host cell proteins. This review compares published large-scale production and purification processes of LV and presents their process performances. Furthermore, developments in the domain of stable cell lines and their way to the use of production vehicles of clinical material will be presented.

  13. Orthogonalisation of Vectors

    Indian Academy of Sciences (India)

    The Gram-Schmidt process is one of the first things one learns in a course ... We might want to stay as close to the experimental data as possible when converting these vectors to orthonormal ones demanded by the model. The process of finding the closest or- thonormal .... is obtained by writing the matrix A = [aI, an], then.

  14. From vectors to mnesors

    OpenAIRE

    Champenois, Gilles

    2007-01-01

    The mnesor theory is the adaptation of vectors to artificial intelligence. The scalar field is replaced by a lattice. Addition becomes idempotent and multiplication is interpreted as a selection operation. We also show that mnesors can be the foundation for a linear calculus.

  15. Calculus with vectors

    CERN Document Server

    Treiman, Jay S

    2014-01-01

    Calculus with Vectors grew out of a strong need for a beginning calculus textbook for undergraduates who intend to pursue careers in STEM. fields. The approach introduces vector-valued functions from the start, emphasizing the connections between one-variable and multi-variable calculus. The text includes early vectors and early transcendentals and includes a rigorous but informal approach to vectors. Examples and focused applications are well presented along with an abundance of motivating exercises. All three-dimensional graphs have rotatable versions included as extra source materials and may be freely downloaded and manipulated with Maple Player; a free Maple Player App is available for the iPad on iTunes. The approaches taken to topics such as the derivation of the derivatives of sine and cosine, the approach to limits, and the use of "tables" of integration have been modified from the standards seen in other textbooks in order to maximize the ease with which students may comprehend the material. Additio...

  16. On vector equilibrium problem

    Indian Academy of Sciences (India)

    [G] Giannessi F, Theorems of alternative, quadratic programs and complementarity problems, in: Variational Inequalities and Complementarity Problems (eds) R W Cottle, F Giannessi and J L Lions (New York: Wiley) (1980) pp. 151±186. [K1] Kazmi K R, Existence of solutions for vector optimization, Appl. Math. Lett. 9 (1996).

  17. Vector-borne Infections

    Centers for Disease Control (CDC) Podcasts

    2011-04-18

    This podcast discusses emerging vector-borne pathogens, their role as prominent contributors to emerging infectious diseases, how they're spread, and the ineffectiveness of mosquito control methods.  Created: 4/18/2011 by National Center for Emerging Zoonotic and Infectious Diseases (NCEZID).   Date Released: 4/27/2011.

  18. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  19. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  20. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  1. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  2. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  3. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  4. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  5. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  6. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  7. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  8. Use of adenoviral vectors as veterinary vaccines.

    Science.gov (United States)

    Ferreira, T B; Alves, P M; Aunins, J G; Carrondo, M J T

    2005-10-01

    Vaccines are the most effective and inexpensive prophylactic tool in veterinary medicine. Ideally, vaccines should induce a lifelong protective immunity against the target pathogen while not causing clinical or pathological signs of diseases in the vaccinated animals. However, such ideal vaccines are rare in the veterinary field. Many vaccines are either of limited effectiveness or have harmful side effects. In addition, there are still severe diseases with no effective vaccines. A very important criterion for an ideal vaccine in veterinary medicine is low cost; this is especially important in developing countries and even more so for poultry vaccination, where vaccines must sell for a few cents a dose. Traditional approaches include inactivated vaccines, attenuated live vaccines and subunit vaccines. Recently, genetic engineering has been applied to design new, improved vaccines. Adenovirus vectors are highly efficient for gene transfer in a broad spectrum of cell types and species. Moreover, adenoviruses often induce humoral, mucosal and cellular immune responses to antigens encoded by the inserted foreign genes. Thus, adenoviruses have become a vector of choice for delivery and expression of foreign proteins for vaccination. Consequently, the market requirements for adenovirus vaccines are increasing, creating a need for production methodologies of concentrated vectors with warranted purity and efficacy. This review summarizes recent developments and approaches of adenovirus production and purification as the application of these vectors, including successes and failures in clinical applications to date.

  9. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  10. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  11. Present and future arboviral threats.

    Science.gov (United States)

    Weaver, Scott C; Reisen, William K

    2010-02-01

    Arthropod-borne viruses (arboviruses) are important causes of human disease nearly worldwide. All arboviruses circulate among wild animals, and many cause disease after spillover transmission to humans and agriculturally important domestic animals that are incidental or dead-end hosts. Viruses such as dengue (DENV) and chikungunya (CHIKV) that have lost the requirement for enzootic amplification now produce extensive epidemics in tropical urban centers. Many arboviruses recently have increased in importance as human and veterinary pathogens using a variety of mechanisms. Beginning in 1999, West Nile virus (WNV) underwent a dramatic geographic expansion into the Americas. High amplification associated with avian virulence coupled with adaptation for replication at higher temperatures in mosquito vectors, has caused the largest epidemic of arboviral encephalitis ever reported in the Americas. Japanese encephalitis virus (JEV), the most frequent arboviral cause of encephalitis worldwide, has spread throughout most of Asia and as far south as Australia from its putative origin in Indonesia and Malaysia. JEV has caused major epidemics as it invaded new areas, often enabled by rice culture and amplification in domesticated swine. Rift Valley fever virus (RVFV), another arbovirus that infects humans after amplification in domesticated animals, undergoes epizootic transmission during wet years following droughts. Warming of the Indian Ocean, linked to the El Niño-Southern Oscillation in the Pacific, leads to heavy rainfall in east Africa inundating surface pools and vertically infected mosquito eggs laid during previous seasons. Like WNV, JEV and RVFV could become epizootic and epidemic in the Americas if introduced unintentionally via commerce or intentionally for nefarious purposes. Climate warming also could facilitate the expansion of the distributions of many arboviruses, as documented for bluetongue viruses (BTV), major pathogens of ruminants. BTV, especially BTV-8

  12. Improving the lattice axial vector current

    International Nuclear Information System (INIS)

    Horsley, R.; Perlt, H.; Schiller, A.; Zanotti, J.M.

    2015-11-01

    For Wilson and clover fermions traditional formulations of the axial vector current do not respect the continuum Ward identity which relates the divergence of that current to the pseudoscalar density. Here we propose to use a point-split or one-link axial vector current whose divergence exactly satisfies a lattice Ward identity, involving the pseudoscalar density and a number of irrelevant operators. We check in one-loop lattice perturbation theory with SLiNC fermion and gauge plaquette action that this is indeed the case including order O(a) effects. Including these operators the axial Ward identity remains renormalisation invariant. First preliminary results of a nonperturbative check of the Ward identity are also presented.

  13. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  14. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  15. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  16. Vector grammars and PN machines

    Institute of Scientific and Technical Information of China (English)

    蒋昌俊

    1996-01-01

    The concept of vector grammars under the string semantic is introduced.The dass of vector grammars is given,which is similar to the dass of Chomsky grammars.The regular vector grammar is divided further.The strong and weak relation between the vector grammar and scalar grammar is discussed,so the spectrum system graph of scalar and vector grammars is made.The equivalent relation between the regular vector grammar and Petri nets (also called PN machine) is pointed.The hybrid PN machine is introduced,and its language is proved equivalent to the language of the context-free vector grammar.So the perfect relation structure between vector grammars and PN machines is formed.

  17. TANDI: threat assessment of network data and information

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  18. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  19. Vector-Borne Diseases - constant challenge for practicing veterinarians: recommendations from the CVBD World Forum

    Directory of Open Access Journals (Sweden)

    Baneth Gad

    2012-03-01

    Full Text Available Abstract The human-animal bond has been a fundamental feature of mankind's history for millennia. The first, and strongest of these, man's relationship with the dog, is believed to pre-date even agriculture, going back as far as 30,000 years. It remains at least as powerful today. Fed by the changing nature of the interactions between people and their dogs worldwide and the increasing tendency towards close domesticity, the health of dogs has never played a more important role in family life. Thanks to developments in scientific understanding and diagnostic techniques, as well as changing priorities of pet owners, veterinarians are now able, and indeed expected, to play a fundamental role in the prevention and treatment of canine disease, including canine vector-borne diseases (CVBDs. The CVBDs represent a varied and complex group of diseases, including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, ehrlichiosis, leishmaniosis, rickettsiosis and thelaziosis, with new syndromes being uncovered every year. Many of these diseases can cause serious, even life-threatening clinical conditions in dogs, with a number having zoonotic potential, affecting the human population. Today, CVBDs pose a growing global threat as they continue their spread far from their traditional geographical and temporal restraints as a result of changes in both climatic conditions and pet dog travel patterns, exposing new populations to previously unknown infectious agents and posing unprecedented challenges to veterinarians. In response to this growing threat, the CVBD World Forum, a multidisciplinary group of experts in CVBDs from around the world which meets on an annual basis, gathered in Nice (France in 2011 to share the latest research on CVBDs and discuss the best approaches to managing these diseases around the world. As a result of these discussions, we, the members of the CVBD Forum have developed the following recommendations to veterinarians

  20. Vehicle Based Vector Sensor

    Science.gov (United States)

    2015-09-28

    buoyant underwater vehicle with an interior space in which a length of said underwater vehicle is equal to one tenth of the acoustic wavelength...underwater vehicle with an interior space in which a length of said underwater vehicle is equal to one tenth of the acoustic wavelength; an...unmanned underwater vehicle that can function as an acoustic vector sensor. (2) Description of the Prior Art [0004] It is known that a propagating

  1. Reciprocity in Vector Acoustics

    Science.gov (United States)

    2017-03-01

    Green’s Theorem to the left hand side of Equation (3.2) converts it to a surface integral that vanishes for the impedance boundary conditions one...There are situations where this assumption does not hold, such as at boundaries between layers or in an inhomogeneous layer , because the density gradient...instead of requiring one model run for each source location. Application of the vector-scalar reciprocity principle is demonstrated with analytic

  2. Conservation priorities for Ethiopian sheep breeds combining threat status, breed merits and contributions to genetic diversity

    NARCIS (Netherlands)

    Gizaw, S.; Komen, J.; Windig, J.J.; Hanotte, O.; Arendonk, van J.A.M.

    2008-01-01

    Prioritizing livestock breeds for conservation needs to incorporate both genetic and non-genetic aspects important for the survival of the breeds. Here, we apply a maximum-utility-strategy to prioritize 14 traditional Ethiopian sheep breeds based on their threat status, contributions to farmer

  3. Mental set and creative thought in social conflict : Threat rigidity versus motivated focus

    NARCIS (Netherlands)

    De Dreu, Carsten K. W.; Nijstad, Bernard A.

    According to the traditional threat-rigidity reasoning, people in social conflict will be less flexible, less creative, more narrow-minded, and more rigid in their thinking when they adopt a conflict rather than a cooperation mental set. The authors propose and test an alternative, motivated focus

  4. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  5. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  6. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  7. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  8. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  9. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  10. Possible impact of rising sea levels on vector-borne infectious diseases

    Directory of Open Access Journals (Sweden)

    Surendran Sinnathamby N

    2011-01-01

    Full Text Available Abstract Background Vector-borne infectious diseases are a significant cause of human and animal mortality and morbidity. Modeling studies predict that changes in climate that accompany global warming will alter the transmission risk of many vector-borne infectious diseases in different parts of the world. Global warming will also raise sea levels, which will lead to an increase in saline and brackish water bodies in coastal areas. The potential impact of rising sea levels, as opposed to climate change, on the prevalence of vector-borne infectious diseases has hitherto been unrecognised. Presentation of the hypothesis Mosquito species possessing salinity-tolerant larvae and pupae, and capable of transmitting arboviruses and parasites are found in many parts of the world. An expansion of brackish and saline water bodies in coastal areas, associated with rising sea levels, can increase densities of salinity-tolerant vector mosquitoes and lead to the adaptation of freshwater vectors to breed in brackish and saline waters. The breeding of non-mosquito vectors may also be influenced by salinity changes in coastal habitats. Higher vector densities can increase transmission of vector-borne infectious diseases in coastal localities, which can then spread to other areas. Testing the hypothesis The demonstration of increases in vector populations and disease prevalence that is related to an expansion of brackish/saline water bodies in coastal areas will provide the necessary supportive evidence. However the implementation of specific vector and disease control measures to counter the threat will confound the expected findings. Implications of the hypothesis Rising sea levels can act synergistically with climate change and then interact in a complex manner with other environmental and socio-economic factors to generate a greater potential for the transmission of vector-borne infectious diseases. The resulting health impacts are likely to be particularly

  11. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  12. Large-scale production of lentiviral vector in a closed system hollow fiber bioreactor

    Directory of Open Access Journals (Sweden)

    Jonathan Sheu

    Full Text Available Lentiviral vectors are widely used in the field of gene therapy as an effective method for permanent gene delivery. While current methods of producing small scale vector batches for research purposes depend largely on culture flasks, the emergence and popularity of lentiviral vectors in translational, preclinical and clinical research has demanded their production on a much larger scale, a task that can be difficult to manage with the numbers of producer cell culture flasks required for large volumes of vector. To generate a large scale, partially closed system method for the manufacturing of clinical grade lentiviral vector suitable for the generation of induced pluripotent stem cells (iPSCs, we developed a method employing a hollow fiber bioreactor traditionally used for cell expansion. We have demonstrated the growth, transfection, and vector-producing capability of 293T producer cells in this system. Vector particle RNA titers after subsequent vector concentration yielded values comparable to lentiviral iPSC induction vector batches produced using traditional culture methods in 225 cm2 flasks (T225s and in 10-layer cell factories (CF10s, while yielding a volume nearly 145 times larger than the yield from a T225 flask and nearly three times larger than the yield from a CF10. Employing a closed system hollow fiber bioreactor for vector production offers the possibility of manufacturing large quantities of gene therapy vector while minimizing reagent usage, equipment footprint, and open system manipulation.

  13. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  14. TRADITIONAL CHINESE HERBAL MEDICINE

    NARCIS (Netherlands)

    ZHU, YP; WOERDENBAG, HJ

    1995-01-01

    Herbal medicine, acupuncture and moxibustion, and massage and the three major constituent parts of traditional Chinese medicine. Although acupuncture is well known in many Western countries, Chinese herbal medicine, the mos important part of traditional Chinese medicine, is less well known in the

  15. Traditional timber frames

    NARCIS (Netherlands)

    Jorissen, A.J.M.; Hamer, den J.; Leijten, A.J.M.; Salenikovich, A.

    2014-01-01

    Due to new possibilities traditional timber framing has become increasingly popular since the beginning of the 21e century. Although traditional timber framing has been used for centuries, the expected mechanical behaviour is not dealt with in great detail in building codes, guidelines or text

  16. Mosquitoes and Culicoides biting midges: vector range and the influence of climate change

    NARCIS (Netherlands)

    Elbers, A.R.W.; Koenraadt, C.J.M.; Meiswinkel, R.

    2015-01-01

    Vector-borne animal diseases pose a continuous and substantial threat to livestock economies around the globe. Increasing international travel, the globalisation of trade, and climate change are likely to play a progressively more important role in the introduction, establishment and spread of

  17. Hierarchal scalar and vector tetrahedra

    International Nuclear Information System (INIS)

    Webb, J.P.; Forghani, B.

    1993-01-01

    A new set of scalar and vector tetrahedral finite elements are presented. The elements are hierarchal, allowing mixing of polynomial orders; scalar orders up to 3 and vector orders up to 2 are defined. The vector elements impose tangential continuity on the field but not normal continuity, making them suitable for representing the vector electric or magnetic field. Further, the scalar and vector elements are such that they can easily be used in the same mesh, a requirement of many quasi-static formulations. Results are presented for two 50 Hz problems: the Bath Cube, and TEAM Problem 7

  18. Leishmaniasis vector behaviour in Kenya

    International Nuclear Information System (INIS)

    Mutinga, M.J.

    1980-01-01

    Leishmaniasis in Kenya exists in two forms: cutaneous and visceral. The vectors of visceral leishmaniasis have been the subject of investigation by various researchers since World War II, when the outbreak of the disease was first noticed. The vectors of cutaneous leishmaniasis were first worked on only a decade ago after the discovery of the disease focus in Mt. Elgon. The vector behaviour of these diseases, namely Phlebotomus pedifer, the vector of cutaneous leishmaniasis, and Phlebotomus martini, the vector of visceral leishmaniasis, are discussed in detail. P. pedifer has been found to breed and bite inside caves, whereas P. martini mainly bites inside houses. (author)

  19. Multivariate calibration with least-squares support vector machines.

    NARCIS (Netherlands)

    Thissen, U.M.J.; Ustun, B.; Melssen, W.J.; Buydens, L.M.C.

    2004-01-01

    This paper proposes the use of least-squares support vector machines (LS-SVMs) as a relatively new nonlinear multivariate calibration method, capable of dealing with ill-posed problems. LS-SVMs are an extension of "traditional" SVMs that have been introduced recently in the field of chemistry and

  20. The Vector Calculus Gap: Mathematics (Does Not Equal) Physics.

    Science.gov (United States)

    Dray, Tevian; Manogue, Corinne A.

    1999-01-01

    Discusses some of the differences between the ways mathematicians and physicists view vector calculus and the gap between the way this material is traditionally taught by mathematicians and the way physicists use it. Suggests some ways to narrow the gap. (Author/ASK)

  1. Foliar nutrient analysis of sugar maple decline: retrospective vector diagnosis

    Science.gov (United States)

    Victor R. Timmer; Yuanxin Teng

    1999-01-01

    Accuracy of traditional foiiar analysis of nutrient disorders in sugar maple (Acer saccharum Marsh) is limited by lack of validation and confounding by nutrient interactions. Vector nutrient diagnosis is relatively free of these problems. The technique is demonstrated retrospectively on four case studies. Diagnostic interpretations consistently...

  2. GenSVM: a generalized multiclass support vector machine

    NARCIS (Netherlands)

    G.J.J. van den Burg (Gertjan); P.J.F. Groenen (Patrick)

    2016-01-01

    textabstractTraditional extensions of the binary support vector machine (SVM) to multiclass problems are either heuristics or require solving a large dual optimization problem. Here, a generalized multiclass SVM is proposed called GenSVM. In this method classification boundaries for a K-class

  3. Scrub Typhus: An Emerging Threat

    Science.gov (United States)

    Chakraborty, Sayantani; Sarma, Nilendu

    2017-01-01

    Scrub typhus is caused by Orientia tsutsugamushi (formerly Rickettsia) and is transmitted to humans by an arthropod vector of the Trombiculidae family (Leptotrombidium deliense and L. akamushi). It is the most common re-emerging Rickettsial infection in India and many other South East Asian countries. In fact, scrub typhus is confined geographically to the Asia Pacific region, a billion people are at risk and nearly a million cases are reported every year. Scrub typhus appears particularly to be distributed in the tsutsugamushi triangle which is distributed over a very wide area of 13 million km2 bound by Japan in the east, through China, the Philippines, tropical Australia in the south, and west through India, Pakistan, possibly to Tibet to Afghanistan, and southern parts of the USSR in the north. Eschar is the characteristic lesion that starts as a vesicular lesion at the site of mite feeding. Later, an ulcer forms with black necrotic center and an erythematous border along with regional lymphadenopathy. Other features are fever, maculopapular rash starting from the trunk, and spreading to the limbs. It may affect the central nervous system, cardiovascular system, renal, respiratory, and gastrointestinal systems. Serious complication in the form of myocarditis, pneumonia, meningoencephalitis, acute renal failure, gastrointestinal bleeding, and even acute respiratory distress syndrome may develop. Tetracycline or chloramphenicol remains the main stay of therapy. PMID:28979009

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  5. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  6. Competence of Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus Mosquitoes as Zika Virus Vectors, China

    Science.gov (United States)

    Liu, Zhuanzhuan; Zhou, Tengfei; Lai, Zetian; Zhang, Zhenhong; Jia, Zhirong; Zhou, Guofa; Williams, Tricia; Xu, Jiabao; Gu, Jinbao; Zhou, Xiaohong; Lin, Lifeng; Yan, Guiyun

    2017-01-01

    In China, the prevention and control of Zika virus disease has been a public health threat since the first imported case was reported in February 2016. To determine the vector competence of potential vector mosquito species, we experimentally infected Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus mosquitoes and determined infection rates, dissemination rates, and transmission rates. We found the highest vector competence for the imported Zika virus in Ae. aegypti mosquitoes, some susceptibility of Ae. albopictus mosquitoes, but no transmission ability for Cx. quinquefasciatus mosquitoes. Considering that, in China, Ae. albopictus mosquitoes are widely distributed but Ae. aegypti mosquito distribution is limited, Ae. albopictus mosquitoes are a potential primary vector for Zika virus and should be targeted in vector control strategies. PMID:28430562

  7. Competence of Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus Mosquitoes as Zika Virus Vectors, China.

    Science.gov (United States)

    Liu, Zhuanzhuan; Zhou, Tengfei; Lai, Zetian; Zhang, Zhenhong; Jia, Zhirong; Zhou, Guofa; Williams, Tricia; Xu, Jiabao; Gu, Jinbao; Zhou, Xiaohong; Lin, Lifeng; Yan, Guiyun; Chen, Xiao-Guang

    2017-07-01

    In China, the prevention and control of Zika virus disease has been a public health threat since the first imported case was reported in February 2016. To determine the vector competence of potential vector mosquito species, we experimentally infected Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus mosquitoes and determined infection rates, dissemination rates, and transmission rates. We found the highest vector competence for the imported Zika virus in Ae. aegypti mosquitoes, some susceptibility of Ae. albopictus mosquitoes, but no transmission ability for Cx. quinquefasciatus mosquitoes. Considering that, in China, Ae. albopictus mosquitoes are widely distributed but Ae. aegypti mosquito distribution is limited, Ae. albopictus mosquitoes are a potential primary vector for Zika virus and should be targeted in vector control strategies.

  8. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  9. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  10. A Wavelet Kernel-Based Primal Twin Support Vector Machine for Economic Development Prediction

    Directory of Open Access Journals (Sweden)

    Fang Su

    2013-01-01

    Full Text Available Economic development forecasting allows planners to choose the right strategies for the future. This study is to propose economic development prediction method based on the wavelet kernel-based primal twin support vector machine algorithm. As gross domestic product (GDP is an important indicator to measure economic development, economic development prediction means GDP prediction in this study. The wavelet kernel-based primal twin support vector machine algorithm can solve two smaller sized quadratic programming problems instead of solving a large one as in the traditional support vector machine algorithm. Economic development data of Anhui province from 1992 to 2009 are used to study the prediction performance of the wavelet kernel-based primal twin support vector machine algorithm. The comparison of mean error of economic development prediction between wavelet kernel-based primal twin support vector machine and traditional support vector machine models trained by the training samples with the 3–5 dimensional input vectors, respectively, is given in this paper. The testing results show that the economic development prediction accuracy of the wavelet kernel-based primal twin support vector machine model is better than that of traditional support vector machine.

  11. Vector-borne diseases

    DEFF Research Database (Denmark)

    More, Simon J.; Bicout, Dominique; Bøtner, Anette

    2017-01-01

    After a request from the Europea n Commission, EFSA’s Panel on Animal Health and Welfaresummarised the main characteristics of 36 vector-borne disease s (VBDs) in 36 web-based storymaps.The risk of introduction in the EU through movement of livestock or pets was assessed for eac h of the36 VBDs......-agents for which the rate of introduction wasestimated to be very low, no further asse ssments were made. Due to the uncertainty related to someparameters used for the risk assessment or the instable or unpredictability disease situation in some ofthe source regions, it is recommended to update the assessment when...

  12. Scalar and vector Galileons

    International Nuclear Information System (INIS)

    Rodríguez, Yeinzon; Navarro, Andrés A.

    2017-01-01

    An alternative for the construction of fundamental theories is the introduction of Galileons. These are fields whose action leads to non higher than second-order equations of motion. As this is a necessary but not sufficient condition to make the Hamiltonian bounded from below, as long as the action is not degenerate, the Galileon construction is a way to avoid pathologies both at the classical and quantum levels. Galileon actions are, therefore, of great interest in many branches of physics, specially in high energy physics and cosmology. This proceedings contribution presents the generalities of the construction of both scalar and vector Galileons following two different but complimentary routes. (paper)

  13. Vectors to success

    International Nuclear Information System (INIS)

    Otsason, J.

    1998-01-01

    The Vector Pipeline project linking the Chicago supply hub to markets in eastern Canada, the northeastern U.S. and the Mid-Atlantic states, is described. Subsidiary objectives of the promoters are to match market timing to upstream pipelines and market requirements, and to provide low cost expandability to complement upstream expandability. The presentation includes description of the project, costs, leased facilities, rates and tariffs, right of way considerations, storage facilities and a project schedule. Construction is to begin in March 1999 and the line should be in service in November 1999

  14. Traditional medicine and genomics

    Directory of Open Access Journals (Sweden)

    Kalpana Joshi

    2010-01-01

    Full Text Available ′Omics′ developments in the form of genomics, proteomics and metabolomics have increased the impetus of traditional medicine research. Studies exploring the genomic, proteomic and metabolomic basis of human constitutional types based on Ayurveda and other systems of oriental medicine are becoming popular. Such studies remain important to developing better understanding of human variations and individual differences. Countries like India, Korea, China and Japan are investing in research on evidence-based traditional medicines and scientific validation of fundamental principles. This review provides an account of studies addressing relationships between traditional medicine and genomics.

  15. Traditional medicine and genomics.

    Science.gov (United States)

    Joshi, Kalpana; Ghodke, Yogita; Shintre, Pooja

    2010-01-01

    'Omics' developments in the form of genomics, proteomics and metabolomics have increased the impetus of traditional medicine research. Studies exploring the genomic, proteomic and metabolomic basis of human constitutional types based on Ayurveda and other systems of oriental medicine are becoming popular. Such studies remain important to developing better understanding of human variations and individual differences. Countries like India, Korea, China and Japan are investing in research on evidence-based traditional medicines and scientific validation of fundamental principles. This review provides an account of studies addressing relationships between traditional medicine and genomics.

  16. Phytoplasmas-The "Crouching Tiger" Threat of Australian Plant Pathology.

    Science.gov (United States)

    Liu, Jian; Gopurenko, David; Fletcher, Murray J; Johnson, Anne C; Gurr, Geoff M

    2017-01-01

    Phytoplasmas are insect-vectored bacteria that cause disease in a wide range of plant species. The increasing availability of molecular DNA analyses, expertise and additional methods in recent years has led to a proliferation of discoveries of phytoplasma-plant host associations and in the numbers of taxonomic groupings for phytoplasmas. The widespread use of common names based on the diseases with which they are associated, as well as separate phenetic and taxonomic systems for classifying phytoplasmas based on variation at the 16S rRNA-encoding gene, complicates interpretation of the literature. We explore this issue and related trends through a focus on Australian pathosystems, providing the first comprehensive compilation of information for this continent, covering the phytoplasmas, host plants, vectors and diseases. Of the 33 16Sr groups reported internationally, only groups I, II, III, X, XI and XII have been recorded in Australia and this highlights the need for ongoing biosecurity measures to prevent the introduction of additional pathogen groups. Many of the phytoplasmas reported in Australia have not been sufficiently well studied to assign them to 16Sr groups so it is likely that unrecognized groups and sub-groups are present. Wide host plant ranges are apparent among well studied phytoplasmas, with multiple crop and non-crop species infected by some. Disease management is further complicated by the fact that putative vectors have been identified for few phytoplasmas, especially in Australia. Despite rapid progress in recent years using molecular approaches, phytoplasmas remain the least well studied group of plant pathogens, making them a "crouching tiger" disease threat.

  17. Assessing the threat of chikungunya virus emergence in Australia.

    Science.gov (United States)

    Viennet, Elvina; Knope, Katrina; Faddy, Helen M; Williams, Craig R; Harley, David

    2013-06-30

    Chikungunya virus (CHIKV) is a major threat to Australia given the distribution of competent vectors, and the large number of travellers returning from endemic regions. We describe current knowledge of CHIKV importations into Australia, and quantify reported viraemic cases, with the aim of facilitating the formulation of public health policy and ensuring maintenance of blood safety. Cases reported to the National Notifiable Disease Surveillance System (NNDSS) from 2002 to 2012 were analysed by place, month of acquisition, and place of residence. Rates of chikungunya importation were estimated based on reported cases and on the numbers of short-term movements. Between 2002 and 2012, there were 168 cases of chikungunya virus (CHIKV) imported into Australia. Victoria and New South Wales had the largest number of notifications. The main sources were Indonesia, India and Malaysia. The number of cases increased from 2008 to reach a peak in 2010 (n=64; 40%). Although Indonesia accounted for the majority of CHIKV notifications in Australia, travel from India had the highest CHIKV importation rate (number of imported cases per 100,000 travellers). The Australian population is increasingly at risk from CHIKV. Arrivals from endemic countries have increased concurrently with vector incursions via imported goods, as well as via local movement from the Torres Strait to North Queensland ports. An outbreak of CHIKV could have a significant impact on health, the safety of the blood supply and on tourism. Case and vector surveillance as well as population health responses are crucial for minimising any potential impact of CHIKV establishment in Australia. This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney General

  18. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  19. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  20. Vector-vector production in photon-photon interactions

    International Nuclear Information System (INIS)

    Ronan, M.T.

    1988-01-01

    Measurements of exclusive untagged /rho/ 0 /rho/ 0 , /rho//phi/, K/sup *//bar K//sup */, and /rho/ω production and tagged /rho/ 0 /rho/ 0 production in photon-photon interactions by the TPC/Two-Gamma experiment are reviewed. Comparisons to the results of other experiments and to models of vector-vector production are made. Fits to the data following a four quark model prescription for vector meson pair production are also presented. 10 refs., 9 figs

  1. Vector control in leishmaniasis.

    Science.gov (United States)

    Kishore, K; Kumar, V; Kesari, S; Dinesh, D S; Kumar, A J; Das, P; Bhattacharya, S K

    2006-03-01

    Indoor residual spraying is a simple and cost effective method of controlling endophilic vectors and DDT remains the insecticide of choice for the control of leishmaniasis. However resistance to insecticide is likely to become more widespread in the population especially in those areas in which insecticide has been used for years. In this context use of slow release emulsified suspension (SRES) may be the best substitute. In this review spraying frequencies of DDT and new schedule of spray have been discussed. Role of biological control and environment management in the control of leishmaniasis has been emphasized. Allethrin (coil) 0.1 and 1.6 per cent prallethrin (liquid) have been found to be effective repellents against Phlebotomus argentipes, the vector of Indian kalaazar. Insecticide impregnated bednets is another area which requires further research on priority basis for the control of leishmaniasis. Role of satellite remote sensing for early prediction of disease by identifying the sandflygenic conditions cannot be undermined. In future synthetic pheromons can be exploited in the control of leishmaniasis.

  2. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  3. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  4. Experimental demonstration of vector E x vector B plasma divertor

    International Nuclear Information System (INIS)

    Strait, E.J.; Kerst, D.W.; Sprott, J.C.

    1977-01-01

    The vector E x vector B drift due to an applied radial electric field in a tokamak with poloidal divertor can speed the flow of plasma out of the scrape-off region, and provide a means of externally controlling the flow rate and thus the width of the density fall-off. An experiment in the Wisconsin levitated toroidal octupole, using vector E x vector B drifts alone, demonstrates divertor-like behavior, including 70% reduction of plasma density near the wall and 40% reduction of plasma flux to the wall, with no adverse effects on confinement of the main plasma

  5. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  6. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  7. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  8. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  9. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  10. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  11. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  12. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  13. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  14. Video Vectorization via Tetrahedral Remeshing.

    Science.gov (United States)

    Wang, Chuan; Zhu, Jie; Guo, Yanwen; Wang, Wenping

    2017-02-09

    We present a video vectorization method that generates a video in vector representation from an input video in raster representation. A vector-based video representation offers the benefits of vector graphics, such as compactness and scalability. The vector video we generate is represented by a simplified tetrahedral control mesh over the spatial-temporal video volume, with color attributes defined at the mesh vertices. We present novel techniques for simplification and subdivision of a tetrahedral mesh to achieve high simplification ratio while preserving features and ensuring color fidelity. From an input raster video, our method is capable of generating a compact video in vector representation that allows a faithful reconstruction with low reconstruction errors.

  15. Hyperbolic-symmetry vector fields.

    Science.gov (United States)

    Gao, Xu-Zhen; Pan, Yue; Cai, Meng-Qiang; Li, Yongnan; Tu, Chenghou; Wang, Hui-Tian

    2015-12-14

    We present and construct a new kind of orthogonal coordinate system, hyperbolic coordinate system. We present and design a new kind of local linearly polarized vector fields, which is defined as the hyperbolic-symmetry vector fields because the points with the same polarization form a series of hyperbolae. We experimentally demonstrate the generation of such a kind of hyperbolic-symmetry vector optical fields. In particular, we also study the modified hyperbolic-symmetry vector optical fields with the twofold and fourfold symmetric states of polarization when introducing the mirror symmetry. The tight focusing behaviors of these vector fields are also investigated. In addition, we also fabricate micro-structures on the K9 glass surfaces by several tightly focused (modified) hyperbolic-symmetry vector fields patterns, which demonstrate that the simulated tightly focused fields are in good agreement with the fabricated micro-structures.

  16. Extended vector-tensor theories

    Energy Technology Data Exchange (ETDEWEB)

    Kimura, Rampei; Naruko, Atsushi; Yoshida, Daisuke, E-mail: rampei@th.phys.titech.ac.jp, E-mail: naruko@th.phys.titech.ac.jp, E-mail: yoshida@th.phys.titech.ac.jp [Department of Physics, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan)

    2017-01-01

    Recently, several extensions of massive vector theory in curved space-time have been proposed in many literatures. In this paper, we consider the most general vector-tensor theories that contain up to two derivatives with respect to metric and vector field. By imposing a degeneracy condition of the Lagrangian in the context of ADM decomposition of space-time to eliminate an unwanted mode, we construct a new class of massive vector theories where five degrees of freedom can propagate, corresponding to three for massive vector modes and two for massless tensor modes. We find that the generalized Proca and the beyond generalized Proca theories up to the quartic Lagrangian, which should be included in this formulation, are degenerate theories even in curved space-time. Finally, introducing new metric and vector field transformations, we investigate the properties of thus obtained theories under such transformations.

  17. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  18. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  19. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  20. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  1. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  2. Optimality Conditions in Vector Optimization

    CERN Document Server

    Jiménez, Manuel Arana; Lizana, Antonio Rufián

    2011-01-01

    Vector optimization is continuously needed in several science fields, particularly in economy, business, engineering, physics and mathematics. The evolution of these fields depends, in part, on the improvements in vector optimization in mathematical programming. The aim of this Ebook is to present the latest developments in vector optimization. The contributions have been written by some of the most eminent researchers in this field of mathematical programming. The Ebook is considered essential for researchers and students in this field.

  3. Symmetric vectors and algebraic classification

    International Nuclear Information System (INIS)

    Leibowitz, E.

    1980-01-01

    The concept of symmetric vector field in Riemannian manifolds, which arises in the study of relativistic cosmological models, is analyzed. Symmetric vectors are tied up with the algebraic properties of the manifold curvature. A procedure for generating a congruence of symmetric fields out of a given pair is outlined. The case of a three-dimensional manifold of constant curvature (''isotropic universe'') is studied in detail, with all its symmetric vector fields being explicitly constructed

  4. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  5. Vector continued fractions using a generalized inverse

    International Nuclear Information System (INIS)

    Haydock, Roger; Nex, C M M; Wexler, Geoffrey

    2004-01-01

    A real vector space combined with an inverse (involution) for vectors is sufficient to define a vector continued fraction whose parameters consist of vector shifts and changes of scale. The choice of sign for different components of the vector inverse permits construction of vector analogues of the Jacobi continued fraction. These vector Jacobi fractions are related to vector and scalar-valued polynomial functions of the vectors, which satisfy recurrence relations similar to those of orthogonal polynomials. The vector Jacobi fraction has strong convergence properties which are demonstrated analytically, and illustrated numerically

  6. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  7. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  8. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  9. Chameleon vector bosons

    International Nuclear Information System (INIS)

    Nelson, Ann E.; Walsh, Jonathan

    2008-01-01

    We show that for a force mediated by a vector particle coupled to a conserved U(1) charge, the apparent range and strength can depend on the size and density of the source, and the proximity to other sources. This chameleon effect is due to screening from a light charged scalar. Such screening can weaken astrophysical constraints on new gauge bosons. As an example we consider the constraints on chameleonic gauged B-L. We show that although Casimir measurements greatly constrain any B-L force much stronger than gravity with range longer than 0.1 μm, there remains an experimental window for a long-range chameleonic B-L force. Such a force could be much stronger than gravity, and long or infinite range in vacuum, but have an effective range near the surface of the earth which is less than a micron.

  10. Architecture and Vector Control

    DEFF Research Database (Denmark)

    von Seidlein, Lorenz; Knols, Bart GJ; Kirby, Matthew

    2012-01-01

    , closing of eaves and insecticide treated bednets. All of these interventions have an effect on the indoor climate. Temperature, humidity and airflow are critical for a comfortable climate. Air-conditioning and fans allow us to control indoor climate, but many people in Africa and Asia who carry the brunt...... of vector-borne diseases have no access to electricity. Many houses in the hot, humid regions of Asia have adapted to the environment, they are built of porous materials and are elevated on stilts features which allow a comfortable climate even in the presence of bednets and screens. In contrast, many...... buildings in Africa and Asia in respect to their indoor climate characteristics and finally, show how state-of-the-art 3D modelling can predict climate characteristics and help to optimize buildings....

  11. Covariant Lyapunov vectors

    International Nuclear Information System (INIS)

    Ginelli, Francesco; Politi, Antonio; Chaté, Hugues; Livi, Roberto

    2013-01-01

    Recent years have witnessed a growing interest in covariant Lyapunov vectors (CLVs) which span local intrinsic directions in the phase space of chaotic systems. Here, we review the basic results of ergodic theory, with a specific reference to the implications of Oseledets’ theorem for the properties of the CLVs. We then present a detailed description of a ‘dynamical’ algorithm to compute the CLVs and show that it generically converges exponentially in time. We also discuss its numerical performance and compare it with other algorithms presented in the literature. We finally illustrate how CLVs can be used to quantify deviations from hyperbolicity with reference to a dissipative system (a chain of Hénon maps) and a Hamiltonian model (a Fermi–Pasta–Ulam chain). This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘Lyapunov analysis: from dynamical systems theory to applications’. (paper)

  12. KASTAMONU TRADITIONAL WOMEN CLOTHES

    Directory of Open Access Journals (Sweden)

    E.Elhan ÖZUS

    2015-08-01

    Full Text Available Clothing is a unique dressing style of a community, a period or a profession. In clothing there is social status and difference principle rather than fashion. In this context, the society created a clothing style in line with its own customs, traditions and social structure. One of the features separating societies from each other and indicating their cultural and social classes is the clothing style. As it is known, traditional Turkish clothes reflecting the characteristics of Turkish society is our most beautiful heritage from past to present. From this heritage there are several examples of women's clothes c arried to present. When these examples are examined, it is possible to see the taste, the way of understanding art, joy and the lifestyle of the history. These garments are also the documents outlining the taste and grace of Turkish people. In the present study, traditional Kastamonu women's clothing, that has an important place in traditional cultural clothes of Anatolia, is investigated . The method of the present research is primarily defined as the examination of the written sources. The study is complet ed with the observations and examinations made in Kastamonu. According to the findings of the study, traditional Kastamonu women's clothing are examined and adapted to todays’ clothing.

  13. Traditional Chinese Biotechnology

    Science.gov (United States)

    Xu, Yan; Wang, Dong; Fan, Wen Lai; Mu, Xiao Qing; Chen, Jian

    The earliest industrial biotechnology originated in ancient China and developed into a vibrant industry in traditional Chinese liquor, rice wine, soy sauce, and vinegar. It is now a significant component of the Chinese economy valued annually at about 150 billion RMB. Although the production methods had existed and remained basically unchanged for centuries, modern developments in biotechnology and related fields in the last decades have greatly impacted on these industries and led to numerous technological innovations. In this chapter, the main biochemical processes and related technological innovations in traditional Chinese biotechnology are illustrated with recent advances in functional microbiology, microbial ecology, solid-state fermentation, enzymology, chemistry of impact flavor compounds, and improvements made to relevant traditional industrial facilities. Recent biotechnological advances in making Chinese liquor, rice wine, soy sauce, and vinegar are reviewed.

  14. Population pressures: threat to democracy.

    Science.gov (United States)

    1992-06-01

    The desire for political freedom and representative government is spreading throughout the world. The stability of democratic bodies is dependent on wise leaders, foreign aid, and slowing population growth. Rapid population growth strains political institutions and increases pressure on services. A Population Crisis Committee study found that only a few democratic countries with serious demographic pressures remained stable. The most stable countries were ones with lower levels of population pressure. Most of the 31 unstable countries were in Africa and in a band stretching from the Middle East to South Asia, and almost all had serious demographic pressures. Only 5 stable countries had high or very high demographic pressures. Since countries in the world are interdependent, population pressures have adverse consequences everywhere. Population pressures in the developing world are considered enhanced by the rapid growth of cities. Both the developed and the developing world face the problems of clogged highways, loss of wilderness, polluted lakes and streams, and stifling smog and acid rain conditions. The sociopolitical implications of demographic changes vary from country to country, but rapid growth and maldistribution of population strains existing political, social, and economic structures and relations between nations. Urban areas are the arena for clashes of cultures, competition for scarce housing and jobs, the breakdown of traditional family and social structures, and juxtapositions of extreme wealth next to extreme poverty. The growth of independent nation states since the 1940s has not allowed much time for development of effective political institutions. There are many obstacles to national unity and popular political participation. The potential for political instability is correlated with a number of factors: large youth populations in overcrowded cities with too high expectations and limited opportunities, diverse and intense ethnic and religious

  15. Healthier Traditional Food

    OpenAIRE

    Edward F. Millen

    2017-01-01

    The study of traditional food and healthy eating habits has been one of the fast growing areas. All humans, both men and women, require food for their survival. However, both men and women indulge in food as if it were their sole purpose of existence. Hence, eating disorders are common among men and women. Then media has played an effective role not only in establishing faulty standards for traditional healthy food but also it has highlighted the importance of healthy eating. It has brought t...

  16. Community detection in complex networks using proximate support vector clustering

    Science.gov (United States)

    Wang, Feifan; Zhang, Baihai; Chai, Senchun; Xia, Yuanqing

    2018-03-01

    Community structure, one of the most attention attracting properties in complex networks, has been a cornerstone in advances of various scientific branches. A number of tools have been involved in recent studies concentrating on the community detection algorithms. In this paper, we propose a support vector clustering method based on a proximity graph, owing to which the introduced algorithm surpasses the traditional support vector approach both in accuracy and complexity. Results of extensive experiments undertaken on computer generated networks and real world data sets illustrate competent performances in comparison with the other counterparts.

  17. Co-occurrence of viruses and mosquitoes at the vectors' optimal climate range: An underestimated risk to temperate regions?

    Science.gov (United States)

    Blagrove, Marcus S C; Caminade, Cyril; Waldmann, Elisabeth; Sutton, Elizabeth R; Wardeh, Maya; Baylis, Matthew

    2017-06-01

    Mosquito-borne viruses have been estimated to cause over 100 million cases of human disease annually. Many methodologies have been developed to help identify areas most at risk from transmission of these viruses. However, generally, these methodologies focus predominantly on the effects of climate on either the vectors or the pathogens they spread, and do not consider the dynamic interaction between the optimal conditions for both vector and virus. Here, we use a new approach that considers the complex interplay between the optimal temperature for virus transmission, and the optimal climate for the mosquito vectors. Using published geolocated data we identified temperature and rainfall ranges in which a number of mosquito vectors have been observed to co-occur with West Nile virus, dengue virus or chikungunya virus. We then investigated whether the optimal climate for co-occurrence of vector and virus varies between "warmer" and "cooler" adapted vectors for the same virus. We found that different mosquito vectors co-occur with the same virus at different temperatures, despite significant overlap in vector temperature ranges. Specifically, we found that co-occurrence correlates with the optimal climatic conditions for the respective vector; cooler-adapted mosquitoes tend to co-occur with the same virus in cooler conditions than their warmer-adapted counterparts. We conclude that mosquitoes appear to be most able to transmit virus in the mosquitoes' optimal climate range, and hypothesise that this may be due to proportionally over-extended vector longevity, and other increased fitness attributes, within this optimal range. These results suggest that the threat posed by vector-competent mosquito species indigenous to temperate regions may have been underestimated, whilst the threat arising from invasive tropical vectors moving to cooler temperate regions may be overestimated.

  18. Simplified Representation of Vector Fields

    NARCIS (Netherlands)

    Telea, Alexandru; Wijk, Jarke J. van

    1999-01-01

    Vector field visualization remains a difficult task. Although many local and global visualization methods for vector fields such as flow data exist, they usually require extensive user experience on setting the visualization parameters in order to produce images communicating the desired insight. We

  19. Estimation of Motion Vector Fields

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    1993-01-01

    This paper presents an approach to the estimation of 2-D motion vector fields from time varying image sequences. We use a piecewise smooth model based on coupled vector/binary Markov random fields. We find the maximum a posteriori solution by simulated annealing. The algorithm generate sample...... fields by means of stochastic relaxation implemented via the Gibbs sampler....

  20. GPU Accelerated Vector Median Filter

    Science.gov (United States)

    Aras, Rifat; Shen, Yuzhong

    2011-01-01

    Noise reduction is an important step for most image processing tasks. For three channel color images, a widely used technique is vector median filter in which color values of pixels are treated as 3-component vectors. Vector median filters are computationally expensive; for a window size of n x n, each of the n(sup 2) vectors has to be compared with other n(sup 2) - 1 vectors in distances. General purpose computation on graphics processing units (GPUs) is the paradigm of utilizing high-performance many-core GPU architectures for computation tasks that are normally handled by CPUs. In this work. NVIDIA's Compute Unified Device Architecture (CUDA) paradigm is used to accelerate vector median filtering. which has to the best of our knowledge never been done before. The performance of GPU accelerated vector median filter is compared to that of the CPU and MPI-based versions for different image and window sizes, Initial findings of the study showed 100x improvement of performance of vector median filter implementation on GPUs over CPU implementations and further speed-up is expected after more extensive optimizations of the GPU algorithm .

  1. Archimedeanization of ordered vector spaces

    OpenAIRE

    Emelyanov, Eduard Yu.

    2014-01-01

    In the case of an ordered vector space with an order unit, the Archimedeanization method has been developed recently by V.I Paulsen and M. Tomforde. We present a general version of the Archimedeanization which covers arbitrary ordered vector spaces.

  2. Noodles, traditionally and today

    Directory of Open Access Journals (Sweden)

    Na Zhang

    2016-09-01

    Full Text Available Chinese noodles originated in the Han dynasty, which has more than 4,000 years of history. There are many stories about the origin of noodles. To a certain extent, noodles also reflect the cultural traditions and customs of China, which essentially means “human nature” and “worldly common sense”. There are thousands of varieties of noodles in China, according to the classification of the shape of noodles, seasoning gravy, cooking craft, and so on. Many noodles have local characteristics. Noodles are accepted by people from all over the world. The industrial revolution and the development of the food industry realized the transition from a traditional handicraft industry to mass production using machinery. In addition, the invention of instant noodles and their mass production also greatly changed the noodle industry. In essence, noodles are a kind of cereal food, which is the main body of the traditional Chinese diet. It is the main source of energy for Chinese people and the most economical energy food. Adhering to the principle of “making cereal food the main food”, is to maintain our Chinese good diet tradition, which can avoid the disadvantages of a high energy, high fat, and low carbohydrate diet, and promote health. The importance of the status of noodles in the dietary structure of residents in our country and the health impact should not be ignored.

  3. Traditional Cherokee Food.

    Science.gov (United States)

    Hendrix, Janey B.

    A collection for children and teachers of traditional Cherokee recipes emphasizes the art, rather than the science, of cooking. The hand-printed, illustrated format is designed to communicate the feeling of Cherokee history and culture and to encourage readers to collect and add family recipes. The cookbook could be used as a starting point for…

  4. Modern vs. Traditional.

    Science.gov (United States)

    Zhenhui, Rao

    1999-01-01

    This article discusses traditional methods, such as the grammar-translation, and modern methods, the communicative approach, for teaching English-as-a-foreign-language in China. The relationship between linguistic accuracy and communicative competence, student-centered orientation, and the role of the teacher are highlighted. (Author/VWL)

  5. Non-Traditional Wraps

    Science.gov (United States)

    Owens, Buffy

    2009-01-01

    This article presents a recipe for non-traditional wraps. In this article, the author describes how adults and children can help with the recipe and the skills involved with this recipe. The bigger role that children can play in the making of the item the more they are apt to try new things and appreciate the texture and taste.

  6. Making Tradition Healthy

    Centers for Disease Control (CDC) Podcasts

    2007-11-01

    In this podcast, a Latina nutrition educator shows how a community worked with local farmers to grow produce traditionally enjoyed by Hispanic/Latinos.  Created: 11/1/2007 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 11/10/2007.

  7. Accountable care organizations and radiology: threat or opportunity?

    Science.gov (United States)

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  8. Sensitivity towards fear of electric shock in passive threat situations.

    Science.gov (United States)

    Ring, Patrick; Kaernbach, Christian

    2015-01-01

    Human judgment and decision-making (JDM) requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs) in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  9. The Financial Arm Of The FARC: A Threat Finance Perspective

    Directory of Open Access Journals (Sweden)

    Thomas Cook

    2011-01-01

    Full Text Available The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in order to fund its community reinvestment programs, engage in large scale military buildup, and buy political support throughout the region. The exploration of the financial side of the FARC adds to our understanding of how insurgencies become successful. Based on open source information, Threat Finance and financial investigative techniques are underutilized in foreign policy, law enforcement, and intelligence. The critical role played by financing in the rise of the FARC suggests that Threat Finance efforts can be most effective when used to track terrorist and criminal networks. American law enforcement and intelligence agencies should be given bigger budgets and tasked earlier to shut down or disrupt financial networks of foreign insurgencies, such as the FARC.

  10. Sensitivity towards fear of electric shock in passive threat situations.

    Directory of Open Access Journals (Sweden)

    Patrick Ring

    Full Text Available Human judgment and decision-making (JDM requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  11. Vector superconductivity in cosmic strings

    International Nuclear Information System (INIS)

    Dvali, G.R.; Mahajan, S.M.

    1992-03-01

    We argue that in most realistic cases, the usual Witten-type bosonic superconductivity of the cosmic string is automatically (independent of the existence of superconducting currents) accompanied by the condensation of charged gauge vector bosons in the core giving rise to a new vector type superconductivity. The value of the charged vector condensate is related with the charged scalar expectation value, and vanishes only if the latter goes to zero. The mechanism for the proposed vector superconductivity, differing fundamentally from those in the literature, is delineated using the simplest realistic example of the two Higgs doublet standard model interacting with the extra cosmic string. It is shown that for a wide range of parameters, for which the string becomes scalarly superconducting, W boson condensates (the sources of vector superconductivity) are necessarily excited. (author). 14 refs

  12. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  13. Challenging tradition in Nigeria.

    Science.gov (United States)

    Supriya, K E

    1991-01-01

    In Nigeria since 1987, the National Association of Nigeria Nurses and Midwives (NSNNM) has used traditional medial and traditional health care workers to curtail the practice of female circumcision. Other harmful traditions are being changed also, such as early marriage, taboos of pregnancy and childbirth, and scarification. 30,000 member of NANNM are involved in this effort to halt the harmful practices themselves and to change community opinion. The program involved national and state level workshops on harmful health consequences of traditional practices and instruction on how to conduct focus group discussions to assess women's beliefs and practices. The focus groups were found to be a particularly successful method of opening up discussion of taboo topics and expressing deep emotions. The response to the knowledge that circumcision was not necessary was rage and anger, which was channeled into advocacy roles or change in the practice. The result was the channeled into advocacy roles for change in the practice. The result was the development of books, leaflets and videos. One community group designed a dress with a decorative motif of tatoos and bodily cuts to symbolize circumcision and scarring. Plays and songs were written and performed. Artists provided models of female genitalia both before and after circumcision. The campaign has been successful in bringing this issue to the public attention in prominent ways, such a national television, health talk shows, and women;s magazines. One of the most important results of the effort has been the demonstration that culture and tradition can be changed from within, rather than from outside imposition of values and beliefs.

  14. The threat of male-to-female erotic transference.

    Science.gov (United States)

    Celenza, Andrea

    2006-01-01

    Vignettes from an ongoing psychoanalysis with a patient, Michael, are presented to illustrate the various dimensions of the erotic transference at different phases of the treatment. The relation to power, the experience and expression of aggression, how these may be organized by gender, and the female analyst's countertransference are discussed as potentially fostering or inhibitory in the development of an erotic transference. Traditional sociocultural gender stereotypes kept alive in fantasy can cause female analysts to subtly foreclose the impending threat of an intense erotic transference with male analysands due to a fear of outwardly directed male aggression. It is suggested that the maternal/containing transference can be unconsciously fostered by both analyst and analysand to defensively avoid expression of the aggressivized erotic transference in its full intensity. Similarities and differences in cases of sexual boundary violations with opposite-gender pairings are discussed.

  15. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  16. Medicinal Herbs in Iranian Traditional Medicine for Learning and Memory

    OpenAIRE

    Shojaii, Asie; Ghods, Roshanak; Fard, Mehri Abdollahi

    2016-01-01

    Background: A few factors such as age, stress, and emotions may lead to impaired learning, memory loss, amnesia, and dementia or threats like schizophrenia and Alzheimer?s disease (AD). Iranian traditional medicine (ITM) recommends some herbs and herbal preparations for the treatment or prevention of CNS problems. Methods: In this study, scientific evidence related to the effectiveness of ITM herbal medicine on memory, learning and AD is reviewed. The scientific evidence of plant efficacy was...

  17. Exotic mosquito threats require strategic surveillance and response planning.

    Science.gov (United States)

    Webb, Cameron E; Doggett, Stephen L

    2016-12-14

    Mosquito-borne diseases caused by endemic pathogens such as Ross River, Barmah Forest and Murray Valley encephalitis viruses are an annual concern in New South Wales (NSW), Australia. More than a dozen mosquito species have been implicated in the transmission of these pathogens, with each mosquito occupying a specialised ecological niche that influences their habitat associations, host feeding preferences and the environmental drivers of their abundance. The NSW Arbovirus Surveillance and Mosquito Monitoring Program provides an early warning system for potential outbreaks of mosquito-borne disease by tracking annual activity of these mosquitoes and their associated pathogens. Although the program will effectively track changes in local mosquito populations that may increase with a changing climate, urbanisation and wetland rehabilitation, it will be less effective with current surveillance methodologies at detecting or monitoring changes in exotic mosquito threats, where different surveillance strategies need to be used. Exotic container-inhabiting mosquitoes such as Aedes aegypti and Ae. albopictus pose a threat to NSW because they are nuisance-biting pests and vectors of pathogens such as dengue, chikungunya and Zika viruses. International movement of humans and their belongings have spread these mosquitoes to many regions of the world. In recent years, these two mosquitoes have been detected by the Australian Government Department of Agriculture and Water Resources at local airports and seaports. To target the detection of these exotic mosquitoes, new trapping technologies and networks of surveillance locations are required. Additionally, incursions of these mosquitoes into urban areas of the state will require strategic responses to minimise substantial public health and economic burdens to local communities.

  18. The strengths, weaknesses, opportunities, and threats (SWOTs ...

    African Journals Online (AJOL)

    The magnitude of the epidemic of ebola virus disease has prompted global ... opportunities for Ebola virus; Use of dogs in hunting predisposes man and ... global spread; Possible mechanical transmission by arthropod vectors; No vaccines or ...

  19. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  20. SWOT analysis and revelation in traditional Chinese medicine internationalization.

    Science.gov (United States)

    Tang, Haitao; Huang, Wenlong; Ma, Jimei; Liu, Li

    2018-01-01

    Traditional Chinese medicine (TCM) is currently the best-preserved and most influential traditional medical system with the largest number of users worldwide. In recent years, the trend of TCM adoption has increased greatly, but the process of TCM internationalization has suffered from a series of setbacks for both internal and external reasons. Thus, the process of TCM internationalization faces formidable challenges, although it also has favourable opportunities. Using SWOT analysis, this paper investigates the strengths, weaknesses, opportunities and threats for TCM. These findings can serve as references for TCM enterprises with global ambitions.

  1. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  2. Energy and non-traditional security (NTS) in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  3. Towards an integrated approach in surveillance of vector-borne diseases in Europe

    Science.gov (United States)

    2011-01-01

    Vector borne disease (VBD) emergence is a complex and dynamic process. Interactions between multiple disciplines and responsible health and environmental authorities are often needed for an effective early warning, surveillance and control of vectors and the diseases they transmit. To fully appreciate this complexity, integrated knowledge about the human and the vector population is desirable. In the current paper, important parameters and terms of both public health and medical entomology are defined in order to establish a common language that facilitates collaboration between the two disciplines. Special focus is put on the different VBD contexts with respect to the current presence or absence of the disease, the pathogen and the vector in a given location. Depending on the context, whether a VBD is endemic or not, surveillance activities are required to assess disease burden or threat, respectively. Following a decision for action, surveillance activities continue to assess trends. PMID:21967706

  4. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  5. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  6. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  7. Enhancing poxvirus vectors vaccine immunogenicity.

    Science.gov (United States)

    García-Arriaza, Juan; Esteban, Mariano

    2014-01-01

    Attenuated recombinant poxvirus vectors expressing heterologous antigens from pathogens are currently at various stages in clinical trials with the aim to establish their efficacy. This is because these vectors have shown excellent safety profiles, significant immunogenicity against foreign expressed antigens and are able to induce protective immune responses. In view of the limited efficacy triggered by some poxvirus strains used in clinical trials (i.e, ALVAC in the RV144 phase III clinical trial for HIV), and of the restrictive replication capacity of the highly attenuated vectors like MVA and NYVAC, there is a consensus that further improvements of these vectors should be pursuit. In this review we considered several strategies that are currently being implemented, as well as new approaches, to improve the immunogenicity of the poxvirus vectors. This includes heterologous prime/boost protocols, use of co-stimulatory molecules, deletion of viral immunomodulatory genes still present in the poxvirus genome, enhancing virus promoter strength, enhancing vector replication capacity, optimizing expression of foreign heterologous sequences, and the combined use of adjuvants. An optimized poxvirus vector triggering long-lasting immunity with a high protective efficacy against a selective disease should be sought.

  8. Stable piecewise polynomial vector fields

    Directory of Open Access Journals (Sweden)

    Claudio Pessoa

    2012-09-01

    Full Text Available Let $N={y>0}$ and $S={y<0}$ be the semi-planes of $mathbb{R}^2$ having as common boundary the line $D={y=0}$. Let $X$ and $Y$ be polynomial vector fields defined in $N$ and $S$, respectively, leading to a discontinuous piecewise polynomial vector field $Z=(X,Y$. This work pursues the stability and the transition analysis of solutions of $Z$ between $N$ and $S$, started by Filippov (1988 and Kozlova (1984 and reformulated by Sotomayor-Teixeira (1995 in terms of the regularization method. This method consists in analyzing a one parameter family of continuous vector fields $Z_{epsilon}$, defined by averaging $X$ and $Y$. This family approaches $Z$ when the parameter goes to zero. The results of Sotomayor-Teixeira and Sotomayor-Machado (2002 providing conditions on $(X,Y$ for the regularized vector fields to be structurally stable on planar compact connected regions are extended to discontinuous piecewise polynomial vector fields on $mathbb{R}^2$. Pertinent genericity results for vector fields satisfying the above stability conditions are also extended to the present case. A procedure for the study of discontinuous piecewise vector fields at infinity through a compactification is proposed here.

  9. Chikungunya Virus–Vector Interactions

    Directory of Open Access Journals (Sweden)

    Lark L. Coffey

    2014-11-01

    Full Text Available Chikungunya virus (CHIKV is a mosquito-borne alphavirus that causes chikungunya fever, a severe, debilitating disease that often produces chronic arthralgia. Since 2004, CHIKV has emerged in Africa, Indian Ocean islands, Asia, Europe, and the Americas, causing millions of human infections. Central to understanding CHIKV emergence is knowledge of the natural ecology of transmission and vector infection dynamics. This review presents current understanding of CHIKV infection dynamics in mosquito vectors and its relationship to human disease emergence. The following topics are reviewed: CHIKV infection and vector life history traits including transmission cycles, genetic origins, distribution, emergence and spread, dispersal, vector competence, vector immunity and microbial interactions, and co-infection by CHIKV and other arboviruses. The genetics of vector susceptibility and host range changes, population heterogeneity and selection for the fittest viral genomes, dual host cycling and its impact on CHIKV adaptation, viral bottlenecks and intrahost diversity, and adaptive constraints on CHIKV evolution are also discussed. The potential for CHIKV re-emergence and expansion into new areas and prospects for prevention via vector control are also briefly reviewed.

  10. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  11. TimesVector: a vectorized clustering approach to the analysis of time series transcriptome data from multiple phenotypes.

    Science.gov (United States)

    Jung, Inuk; Jo, Kyuri; Kang, Hyejin; Ahn, Hongryul; Yu, Youngjae; Kim, Sun

    2017-12-01

    Identifying biologically meaningful gene expression patterns from time series gene expression data is important to understand the underlying biological mechanisms. To identify significantly perturbed gene sets between different phenotypes, analysis of time series transcriptome data requires consideration of time and sample dimensions. Thus, the analysis of such time series data seeks to search gene sets that exhibit similar or different expression patterns between two or more sample conditions, constituting the three-dimensional data, i.e. gene-time-condition. Computational complexity for analyzing such data is very high, compared to the already difficult NP-hard two dimensional biclustering algorithms. Because of this challenge, traditional time series clustering algorithms are designed to capture co-expressed genes with similar expression pattern in two sample conditions. We present a triclustering algorithm, TimesVector, specifically designed for clustering three-dimensional time series data to capture distinctively similar or different gene expression patterns between two or more sample conditions. TimesVector identifies clusters with distinctive expression patterns in three steps: (i) dimension reduction and clustering of time-condition concatenated vectors, (ii) post-processing clusters for detecting similar and distinct expression patterns and (iii) rescuing genes from unclassified clusters. Using four sets of time series gene expression data, generated by both microarray and high throughput sequencing platforms, we demonstrated that TimesVector successfully detected biologically meaningful clusters of high quality. TimesVector improved the clustering quality compared to existing triclustering tools and only TimesVector detected clusters with differential expression patterns across conditions successfully. The TimesVector software is available at http://biohealth.snu.ac.kr/software/TimesVector/. sunkim.bioinfo@snu.ac.kr. Supplementary data are available at

  12. Violation of vector dominance in the vector manifestation

    International Nuclear Information System (INIS)

    Sasaki, Chihiro

    2003-01-01

    The vector manifestation (VM) is a new pattern for realizing the chiral symmetry in QCD. In the VM, the massless vector meson becomes the chiral partner of pion at the critical point, in contrast with the restoration based on the linear sigma model. Including the intrinsic temperature dependences of the parameters of the hidden local symmetry (HLS) Lagrangian determined from the underlying QCD through the Wilsonian matching together with the hadronic thermal corrections, we present a new prediction of the VM on the direct photon-π-π coupling which measures the validity of the vector dominance (VD) of the electromagnetic form factor of the pion. We find that the VD is largely violated at the critical temperature, which indicates that the assumption of the VD made in several analysis on the dilepton spectra in hot matter may need to be weakened for consistently including the effect of the dropping mass of the vector meson. (author)

  13. Support vector machine for diagnosis cancer disease: A comparative study

    Directory of Open Access Journals (Sweden)

    Nasser H. Sweilam

    2010-12-01

    Full Text Available Support vector machine has become an increasingly popular tool for machine learning tasks involving classification, regression or novelty detection. Training a support vector machine requires the solution of a very large quadratic programming problem. Traditional optimization methods cannot be directly applied due to memory restrictions. Up to now, several approaches exist for circumventing the above shortcomings and work well. Another learning algorithm, particle swarm optimization, Quantum-behave Particle Swarm for training SVM is introduced. Another approach named least square support vector machine (LSSVM and active set strategy are introduced. The obtained results by these methods are tested on a breast cancer dataset and compared with the exact solution model problem.

  14. Measuring magnetic field vector by stimulated Raman transitions

    International Nuclear Information System (INIS)

    Wang, Wenli; Wei, Rong; Lin, Jinda; Wang, Yuzhu; Dong, Richang; Zou, Fan; Chen, Tingting

    2016-01-01

    We present a method for measuring the magnetic field vector in an atomic fountain by probing the line strength of stimulated Raman transitions. The relative line strength for a Λ-type level system with an existing magnetic field is theoretically analyzed. The magnetic field vector measured by our proposed method is consistent well with that by the traditional bias magnetic field method with an axial resolution of 6.1 mrad and a radial resolution of 0.16 rad. Dependences of the Raman transitions on laser polarization schemes are also analyzed. Our method offers the potential advantages for magnetic field measurement without requiring additional bias fields, beyond the limitation of magnetic field intensity, and extending the spatial measurement range. The proposed method can be widely used for measuring magnetic field vector in other precision measurement fields.

  15. Sadum: Traditional and Contemporary

    Directory of Open Access Journals (Sweden)

    Ratna Panggabean

    2009-07-01

    Full Text Available Sadum is one of the traditional cloths of the Batak people in North Sumatra. It is woven on a back strap loom with supplementary weft technique. Sadum is a warp faced weaving made of cotton and beads woven into the cloth. Ritually it is used as a shoulder cloth, gifts exchanges, and in dances. It also bears the symbol of good tidings and blessings for the receiver. The cloth has change during times in technique, color, patterns, as well as in functions. But the use as a ritual cloth stays the same. The basic weaving techniques and equipments used to create it hasn’t change, but its material and added techniques has made this cloth become more rich in color, pattern, and texture. Most changes began when the Europeans came to Indonesia and introduced new material such as synthetic fibers and colors. In the 70s traditional cloth of Indonesia got its boost when the government declared batik as Indonesian national attire. This encourages other traditional weavings to develop into contemporary clothing. Later, new techniques and material were introduced to the Sadum weavings including embroidery, silk and golden threads which were never used before.

  16. Participatory action research designs in applied disability and rehabilitation science: protecting against threats to social validity.

    Science.gov (United States)

    Seekins, Tom; White, Glen W

    2013-01-01

    Researchers and disability advocates have been debating consumer involvement in disability and rehabilitation science since at least 1972. Despite the length of this debate, much confusion remains. Consumer involvement may represent a spirit of democracy or even empowerment, but as a tool of science, it is necessary to understand how to judge its application. To realize consumer involvement as a design element in science, researchers need a framework for understanding how it can contribute to the scientific process. The thesis of this article is that a primary scientific function of consumer involvement is to reduce threats to the social validity of research, the extent to which those expected to use or benefit from research products judge them as useful and actually use them. Social validity has traditionally not been treated with the same rigor as concerns for internal and external validity. This article presents a framework that describes 7 threats to social validity and explains how 15 forms of consumer involvement protect against those threats. We also suggest procedures for reporting and reviewing consumer involvement in proposals and manuscripts. This framework offers tools familiar to all scientists for identifying threats to the quality of research, and for judging the effectiveness of strategies for protecting against those threats. It may also enhance the standing of consumer involvement strategies as tools for protecting research quality by organizing them in a way that allows for systematic criticism of their effectiveness and subsequent improvement. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  17. On the Witt vector Frobenius

    DEFF Research Database (Denmark)

    Davis, Christopher James; Kedlaya, Kiran

    2014-01-01

    We study the kernel and cokernel of the Frobenius map on the p-typical Witt vectors of a commutative ring, not necessarily of characteristic p. We give many equivalent conditions to surjectivity of the Frobenius map on both finite and infinite length Witt vectors. In particular, surjectivity...... on finite Witt vectors turns out to be stable under certain integral extensions; this provides a clean formulation of a strong generalization of Faltings’s almost purity theorem from p-adic Hodge theory, incorporating recent improvements by Kedlaya–Liu and by Scholze....

  18. Vector boson scattering at CLIC

    Energy Technology Data Exchange (ETDEWEB)

    Kilian, Wolfgang; Fleper, Christian [Department Physik, Universitaet Siegen, 57068 Siegen (Germany); Reuter, Juergen [DESY Theory Group, 22603 Hamburg (Germany); Sekulla, Marco [Institut fuer Theoretische Physik, Karlsruher Institut fuer Technologie, 76131 Karlsruhe (Germany)

    2016-07-01

    Linear colliders operating in a range of multiple TeV are able to investigate the details of vector boson scattering and electroweak symmetry breaking. We calculate cross sections with the Monte Carlo generator WHIZARD for vector boson scattering processes at the future linear e{sup +} e{sup -} collider CLIC. By finding suitable cuts, the vector boson scattering signal processes are isolated from the background. Finally, we are able to determine exclusion sensitivities on the non-Standard Model parameters of the relevant dimension eight operators.

  19. Vector control of induction machines

    CERN Document Server

    Robyns, Benoit

    2012-01-01

    After a brief introduction to the main law of physics and fundamental concepts inherent in electromechanical conversion, ""Vector Control of Induction Machines"" introduces the standard mathematical models for induction machines - whichever rotor technology is used - as well as several squirrel-cage induction machine vector-control strategies. The use of causal ordering graphs allows systematization of the design stage, as well as standardization of the structure of control devices. ""Vector Control of Induction Machines"" suggests a unique approach aimed at reducing parameter sensitivity for

  20. Vectors of rickettsiae in Africa.

    Science.gov (United States)

    Bitam, Idir

    2012-12-01

    Vector-borne diseases are caused by parasites, bacteria, or viruses transmitted by the bites of hematophagous arthropods. In Africa, there has been a recent emergence of new diseases and the re-emergence of existing diseases, usually with changes in disease epidemiology (e.g., geographical distribution, prevalence, and pathogenicity). In Africa, rickettsioses are recognized as important emerging vector-borne infections in humans. Rickettsial diseases are transmitted by different types of arthropods, ticks, fleas, lice, and mites. This review will examine the roles of these different arthropod vectors and their geographical distributions. Copyright © 2012 Elsevier GmbH. All rights reserved.

  1. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    OpenAIRE

    Aaron Zimba; Zhaoshun Wang; Hongsong Chen

    2018-01-01

    The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes...

  2. Vector manifestation and violation of vector dominance in hot matter

    International Nuclear Information System (INIS)

    Harada, Masayasu; Sasaki, Chihiro

    2004-01-01

    We show the details of the calculation of the hadronic thermal corrections to the two-point functions in the effective field theory of QCD for pions and vector mesons based on the hidden local symmetry (HLS) in hot matter using the background field gauge. We study the temperature dependence of the pion velocity in the low-temperature region determined from the hadronic thermal corrections, and show that, due to the presence of the dynamical vector meson, the pion velocity is smaller than the speed of the light already at one-loop level, in contrast to the result obtained in the ordinary chiral perturbation theory including only the pion at one-loop. Including the intrinsic temperature dependences of the parameters of the HLS Lagrangian determined from the underlying QCD through the Wilsonian matching, we show how the vector manifestation (VM), in which the massless vector meson becomes the chiral partner of pion, is realized at the critical temperature. We present a new prediction of the VM on the direct photon-π-π coupling which measures the validity of the vector dominance (VD) of the electromagnetic form factor of the pion: we find that the VD is largely violated at the critical temperature, which indicates that the assumption of the VD made in several analyses on the dilepton spectra in hot matter may need to be weakened for consistently including the effect of the dropping mass of the vector meson

  3. Vector independent transmission of the vector-borne bluetongue virus.

    Science.gov (United States)

    van der Sluijs, Mirjam Tineke Willemijn; de Smit, Abraham J; Moormann, Rob J M

    2016-01-01

    Bluetongue is an economically important disease of ruminants. The causative agent, Bluetongue virus (BTV), is mainly transmitted by insect vectors. This review focuses on vector-free BTV transmission, and its epizootic and economic consequences. Vector-free transmission can either be vertical, from dam to fetus, or horizontal via direct contract. For several BTV-serotypes, vertical (transplacental) transmission has been described, resulting in severe congenital malformations. Transplacental transmission had been mainly associated with live vaccine strains. Yet, the European BTV-8 strain demonstrated a high incidence of transplacental transmission in natural circumstances. The relevance of transplacental transmission for the epizootiology is considered limited, especially in enzootic areas. However, transplacental transmission can have a substantial economic impact due to the loss of progeny. Inactivated vaccines have demonstrated to prevent transplacental transmission. Vector-free horizontal transmission has also been demonstrated. Since direct horizontal transmission requires close contact of animals, it is considered only relevant for within-farm spreading of BTV. The genetic determinants which enable vector-free transmission are present in virus strains circulating in the field. More research into the genetic changes which enable vector-free transmission is essential to better evaluate the risks associated with outbreaks of new BTV serotypes and to design more appropriate control measures.

  4. CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2016-06-01

    Full Text Available The author briefly tries to bring to the attention of those interested the complex issue developed globally on cyber risks, threats and vulnerabilities reaching to the "cyber warfare" with direct involvement of some state actors. Some means and vectors of attack are presented, as well as countermeasures to protect the individual users, companies, governmental and military structures. In the end, the article presents the situation in Romania with respect to some measures already taken and others that will be probably taken in the future, particularly in the legislative and administrative sector regarding cyber protection.

  5. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  6. Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats

    OpenAIRE

    Sandberg, Jarkko

    2015-01-01

    The primary purpose of this study is to determine how suitable human risk management con- trols are against corporate espionage. Information risks are ascending problem with corpora- tions all over the world. Cyber attacks are commonplace, and the attackers are often trying to compromise valuable data assets. These malicious targeted attacks are bypassing traditional information security controls; therefore, organizations are endangered by these threats. Since the traditional information secu...

  7. Vectorization at the KENO-IV code

    International Nuclear Information System (INIS)

    Asai, K.; Higuchi, K.; Katakura, J.

    1986-01-01

    The multigroup criticality safety code KENO-IV has been vectorized and tested on the FACOM VP-100 vector processor. At first, the vectorized KENO-IV on a scalar processor was slower than the original one by a factor of 1.4 because of the overhead introduced by vectorization. Making modifications of algorithms and techniques for vectorization, the vectorized version has become faster than the original one by a factor of 1.4 on the vector processor. For further speedup of the code, some improvements on compiler and hardware, especially on addition of Monte Carlo pipelines to the vector processor, are discussed

  8. Zika, chikungunya and dengue: the causes and threats of new and re-emerging arboviral diseases.

    Science.gov (United States)

    Paixão, Enny S; Teixeira, Maria Gloria; Rodrigues, Laura C

    2018-01-01

    The recent emergence and re-emergence of viral infections transmitted by vectors-Zika, chikungunya, dengue, Japanese encephalitis, West Nile, yellow fever and others-is a cause for international concern. Using as examples Zika, chikungunya and dengue, we summarise current knowledge on characteristics of the viruses and their transmission, clinical features, laboratory diagnosis, burden, history, possible causes of the spread and the expectation for future epidemics. Arboviruses are transmitted by mosquitoes, are of difficult diagnosis, can have surprising clinical complications and cause severe burden. The current situation is complex, because there is no vaccine for Zika and chikungunya and no specific treatment for the three arboviruses. Vector control is the only comprehensive solution available now and this remains a challenge because up to now this has not been very effective. Until we develop new technologies of control mosquito populations, the globalised and urbanised world we live in will remain vulnerable to the threat of successive arbovirus epidemics.

  9. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  10. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  11. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  12. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  13. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  14. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  15. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  16. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  17. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  18. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic

  19. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  20. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Wilders established the Party for Freedom (PVV), in 2005 with a strong anti-immigration agenda. The party believes Judeo-Christian and humanist ...Allied administration of post-WWI Europe. Right-wing movements of the 60’s and 80’s were a response to an existential threat during the Cold War rather

  1. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  2. Model reduction methods for vector autoregressive processes

    CERN Document Server

    Brüggemann, Ralf

    2004-01-01

    1. 1 Objective of the Study Vector autoregressive (VAR) models have become one of the dominant research tools in the analysis of macroeconomic time series during the last two decades. The great success of this modeling class started with Sims' (1980) critique of the traditional simultaneous equation models (SEM). Sims criticized the use of 'too many incredible restrictions' based on 'supposed a priori knowledge' in large scale macroeconometric models which were popular at that time. Therefore, he advo­ cated largely unrestricted reduced form multivariate time series models, unrestricted VAR models in particular. Ever since his influential paper these models have been employed extensively to characterize the underlying dynamics in systems of time series. In particular, tools to summarize the dynamic interaction between the system variables, such as impulse response analysis or forecast error variance decompo­ sitions, have been developed over the years. The econometrics of VAR models and related quantities i...

  3. Introduction to matrices and vectors

    CERN Document Server

    Schwartz, Jacob T

    2001-01-01

    In this concise undergraduate text, the first three chapters present the basics of matrices - in later chapters the author shows how to use vectors and matrices to solve systems of linear equations. 1961 edition.

  4. GRE Enzymes for Vector Analysis

    Data.gov (United States)

    U.S. Environmental Protection Agency — Microbial enzyme data that were collected during the 2004-2006 EMAP-GRE program. These data were then used by Moorhead et al (2016) in their ecoenzyme vector...

  5. Scanning vector Hall probe microscopy

    International Nuclear Information System (INIS)

    Cambel, V.; Gregusova, D.; Fedor, J.; Kudela, R.; Bending, S.J.

    2004-01-01

    We have developed a scanning vector Hall probe microscope for mapping magnetic field vector over magnetic samples. The microscope is based on a micromachined Hall sensor and the cryostat with scanning system. The vector Hall sensor active area is ∼5x5 μm 2 . It is realized by patterning three Hall probes on the tilted faces of GaAs pyramids. Data from these 'tilted' Hall probes are used to reconstruct the full magnetic field vector. The scanning area of the microscope is 5x5 mm 2 , space resolution 2.5 μm, field resolution ∼1 μT Hz -1/2 at temperatures 10-300 K

  6. 3D vector flow imaging

    DEFF Research Database (Denmark)

    Pihl, Michael Johannes

    The main purpose of this PhD project is to develop an ultrasonic method for 3D vector flow imaging. The motivation is to advance the field of velocity estimation in ultrasound, which plays an important role in the clinic. The velocity of blood has components in all three spatial dimensions, yet...... are (vx, vy, vz) = (-0.03, 95, 1.0) ± (9, 6, 1) cm/s compared with the expected (0, 96, 0) cm/s. Afterwards, 3D vector flow images from a cross-sectional plane of the vessel are presented. The out of plane velocities exhibit the expected 2D circular-symmetric parabolic shape. The experimental results...... verify that the 3D TO method estimates the complete 3D velocity vectors, and that the method is suitable for 3D vector flow imaging....

  7. 3-D Vector Flow Imaging

    DEFF Research Database (Denmark)

    Holbek, Simon

    , if this significant reduction in the element count can still provide precise and robust 3-D vector flow estimates in a plane. The study concludes that the RC array is capable of estimating precise 3-D vector flow both in a plane and in a volume, despite the low channel count. However, some inherent new challenges...... ultrasonic vector flow estimation and bring it a step closer to a clinical application. A method for high frame rate 3-D vector flow estimation in a plane using the transverse oscillation method combined with a 1024 channel 2-D matrix array is presented. The proposed method is validated both through phantom...... hampers the task of real-time processing. In a second study, some of the issue with the 2-D matrix array are solved by introducing a 2-D row-column (RC) addressing array with only 62 + 62 elements. It is investigated both through simulations and via experimental setups in various flow conditions...

  8. Transcriptional Silencing of Retroviral Vectors

    DEFF Research Database (Denmark)

    Lund, Anders Henrik; Duch, M.; Pedersen, F.S.

    1996-01-01

    . Extinction of long-term vector expression has been observed after implantation of transduced hematopoietic cells as well as fibroblasts, myoblasts and hepatocytes. Here we review the influence of vector structure, integration site and cell type on transcriptional silencing. While down-regulation of proviral...... transcription is known from a number of cellular and animal models, major insight has been gained from studies in the germ line and embryonal cells of the mouse. Key elements for the transfer and expression of retroviral vectors, such as the viral transcriptional enhancer and the binding site for the t......RNA primer for reverse transcription may have a major influence on transcriptional silencing. Alterations of these elements of the vector backbone as well as the use of internal promoter elements from housekeeping genes may contribute to reduce transcriptional silencing. The use of cell culture and animal...

  9. High Accuracy Vector Helium Magnetometer

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed HAVHM instrument is a laser-pumped helium magnetometer with both triaxial vector and omnidirectional scalar measurement capabilities in a single...

  10. An exotic composite vector boson

    International Nuclear Information System (INIS)

    Akama, Keiichi; Hattori, Takashi; Yasue, Masaki.

    1990-08-01

    An exotic composite vector boson, V, is introduced in two dynamical models of composite quarks, leptons, W and Z. One is based on four Fermi interactions, in which composite vector bosons are regarded as fermion-antifermion bound states and the other is based on the confining SU(2) L gauge model, in which they are given by scalar-antiscalar bound states. Both approaches describe the same effective interactions for the sector of composite quarks, leptons, W, Z, γ and V. (author)

  11. Hepatitis C Virus in North Africa: An Emerging Threat

    Directory of Open Access Journals (Sweden)

    Mohamed A. Daw

    2016-01-01

    Full Text Available Hepatitis C virus is a major public health threat associated with serious clinical consequences worldwide. North Africa is a unique region composed of seven countries that vary considerably in the predisposing factors to microbial diseases both historically and at the present time. The dynamics of HCV in the region are not well documented. The data are both limited and controversial in most of the countries in the region. In North Africa, the epidemiology of HCV is disparate and understanding it has been hampered by regional “epidemiological homogeneity” concepts. As the dynamics of HCV vary from country to country, context-specific research is needed. In this review, we assess studies performed in each country in the general populations as well as among blood donors and groups exposed to the HCV infection. The reported prevalence of HCV ranges from 0.6% to 8.4% in the Maghreb countries and is predominated by genotype 1. In the Nile valley region, it ranges from 2.2% to 18.9% and is dominated by genotype 4. In North African countries, HCV seems to be a serious problem that is driven by different vectors even in different geographical locations within the same country. Efforts should be combined at both the national and regional levels to implement efficient preventive and treatment strategies.

  12. Cyber threat impact assessment and analysis for space vehicle architectures

    Science.gov (United States)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  13. Traditional sorghum beer "ikigage"

    OpenAIRE

    Lyumugabe Loshima, François

    2010-01-01

    Samples of traditional sorghum beer Ikigage was collected in the southern province of Rwanda and analyzed for microbiological and physico-chemical contents. Ikigage contained total aerobic mesophilic bacteria (33.55 x 106 cfu/ml), yeast (10.15 x 106 cfu/ml), lactic acid bacteria (35.35 x 104 cfu/ml), moulds (4.12 x 104 cfu/ml), E. coli (21.90 x 103 cfu/ml), fecal streptococci (22.50 x 103 cfu/ml), Staphylococcus aureus (16.02 x 103 cfu/ml), total coliform (32.30 x 103 cfu/ml), eth...

  14. In the Dirac tradition

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1988-04-15

    It was Paul Dirac who cast quantum mechanics into the form we now use, and many generations of theoreticians openly acknowledge his influence on their thinking. When Dirac died in 1984, St. John's College, Cambridge, his base for most of his lifetime, instituted an annual lecture in his memory at Cambridge. The first lecture, in 1986, attracted two heavyweights - Richard Feynman and Steven Weinberg. Far from using the lectures as a platform for their own work, in the Dirac tradition they presented stimulating material on deep underlying questions.

  15. In the Dirac tradition

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    It was Paul Dirac who cast quantum mechanics into the form we now use, and many generations of theoreticians openly acknowledge his influence on their thinking. When Dirac died in 1984, St. John's College, Cambridge, his base for most of his lifetime, instituted an annual lecture in his memory at Cambridge. The first lecture, in 1986, attracted two heavyweights - Richard Feynman and Steven Weinberg. Far from using the lectures as a platform for their own work, in the Dirac tradition they presented stimulating material on deep underlying questions

  16. Vectoring of parallel synthetic jets

    Science.gov (United States)

    Berk, Tim; Ganapathisubramani, Bharathram; Gomit, Guillaume

    2015-11-01

    A pair of parallel synthetic jets can be vectored by applying a phase difference between the two driving signals. The resulting jet can be merged or bifurcated and either vectored towards the actuator leading in phase or the actuator lagging in phase. In the present study, the influence of phase difference and Strouhal number on the vectoring behaviour is examined experimentally. Phase-locked vorticity fields, measured using Particle Image Velocimetry (PIV), are used to track vortex pairs. The physical mechanisms that explain the diversity in vectoring behaviour are observed based on the vortex trajectories. For a fixed phase difference, the vectoring behaviour is shown to be primarily influenced by pinch-off time of vortex rings generated by the synthetic jets. Beyond a certain formation number, the pinch-off timescale becomes invariant. In this region, the vectoring behaviour is determined by the distance between subsequent vortex rings. We acknowledge the financial support from the European Research Council (ERC grant agreement no. 277472).

  17. Versatile generation of optical vector fields and vector beams using a non-interferometric approach.

    Science.gov (United States)

    Tripathi, Santosh; Toussaint, Kimani C

    2012-05-07

    We present a versatile, non-interferometric method for generating vector fields and vector beams which can produce all the states of polarization represented on a higher-order Poincaré sphere. The versatility and non-interferometric nature of this method is expected to enable exploration of various exotic properties of vector fields and vector beams. To illustrate this, we study the propagation properties of some vector fields and find that, in general, propagation alters both their intensity and polarization distribution, and more interestingly, converts some vector fields into vector beams. In the article, we also suggest a modified Jones vector formalism to represent vector fields and vector beams.

  18. Improvement of vector compensation method for vehicle magnetic distortion field

    Energy Technology Data Exchange (ETDEWEB)

    Pang, Hongfeng, E-mail: panghongfeng@126.com; Zhang, Qi; Li, Ji; Luo, Shitu; Chen, Dixiang; Pan, Mengchun; Luo, Feilu

    2014-03-15

    Magnetic distortions such as eddy-current field and low frequency magnetic field have not been considered in vector compensation methods. A new compensation method is proposed to suppress these magnetic distortions and improve compensation performance, in which the magnetic distortions related to measurement vectors and time are considered. The experimental system mainly consists of a three-axis fluxgate magnetometer (DM-050), an underwater vehicle and a proton magnetometer, in which the scalar value of magnetic field is obtained with the proton magnetometer and considered to be the true value. Comparing with traditional compensation methods, experimental results show that the magnetic distortions can be further reduced by two times. After compensation, error intensity and RMS error are reduced from 11684.013 nT and 7794.604 nT to 16.219 nT and 5.907 nT respectively. It suggests an effective way to improve the compensation performance of magnetic distortions. - Highlights: • A new vector compensation method is proposed for vehicle magnetic distortion. • The proposed model not only includes magnetometer error but also considers magnetic distortion. • Compensation parameters are computed directly by solving nonlinear equations. • Compared with traditional methods, the proposed method is not related with rotation angle rate. • Error intensity and RMS error can be reduced to 1/2 of the error with traditional methods.

  19. Improvement of vector compensation method for vehicle magnetic distortion field

    International Nuclear Information System (INIS)

    Pang, Hongfeng; Zhang, Qi; Li, Ji; Luo, Shitu; Chen, Dixiang; Pan, Mengchun; Luo, Feilu

    2014-01-01

    Magnetic distortions such as eddy-current field and low frequency magnetic field have not been considered in vector compensation methods. A new compensation method is proposed to suppress these magnetic distortions and improve compensation performance, in which the magnetic distortions related to measurement vectors and time are considered. The experimental system mainly consists of a three-axis fluxgate magnetometer (DM-050), an underwater vehicle and a proton magnetometer, in which the scalar value of magnetic field is obtained with the proton magnetometer and considered to be the true value. Comparing with traditional compensation methods, experimental results show that the magnetic distortions can be further reduced by two times. After compensation, error intensity and RMS error are reduced from 11684.013 nT and 7794.604 nT to 16.219 nT and 5.907 nT respectively. It suggests an effective way to improve the compensation performance of magnetic distortions. - Highlights: • A new vector compensation method is proposed for vehicle magnetic distortion. • The proposed model not only includes magnetometer error but also considers magnetic distortion. • Compensation parameters are computed directly by solving nonlinear equations. • Compared with traditional methods, the proposed method is not related with rotation angle rate. • Error intensity and RMS error can be reduced to 1/2 of the error with traditional methods

  20. Scaffolding vector representations for student learning inside a physics game

    Science.gov (United States)

    D'Angelo, Cynthia

    Vectors and vector addition are difficult concepts for many introductory physics students and traditional instruction does not usually sufficiently address these difficulties. Vectors play a major role in most topics in introductory physics and without a complete understanding of them many students are unable to make sense of the physics topics covered in their classes. Video games present a unique opportunity to help students develop an intuitive understanding of motion, forces, and vectors while immersed in an enjoyable and interactive environment. This study examines two dimensions of design decisions to help students learn while playing a physics-based game. The representational complexity dimension looked at two ways of presenting dynamic information about the velocity of the game object on the screen. The scaffolding context dimension looked at two different contexts for presenting vector addition problems that were related to the game. While all students made significant learning games from the pre to the post test, there were virtually no differences between students along the representational complexity dimension and small differences between students along the scaffolding context dimension. A context that directly connects to students' game playing experience was in most cases more productive to learning than an abstract context.

  1. Bearing estimation with acoustic vector-sensor arrays

    International Nuclear Information System (INIS)

    Hawkes, M.; Nehorai, A.

    1996-01-01

    We consider direction-of-arrival (DOA) estimation using arrays of acoustic vector sensors in free space, and derive expressions for the Cramacute er-Rao bound on the DOA parameters when there is a single source. The vector-sensor array is seen to have improved performance over the traditional scalar-sensor (pressure-sensor) array for two distinct reasons: its elements have an inherent directional sensitivity and the array makes a greater number of measurements. The improvement is greatest for small array apertures and low signal-to-noise ratios. Examination of the conventional beamforming and Capon DOA estimators shows that vector-sensor arrays can completely resolve the bearing, even with a linear array, and can remove the ambiguities associated with spatial undersampling. We also propose and analyze a diversely-oriented array of velocity sensors that possesses some of the advantages of the vector-sensor array without the increase in hardware and computation. In addition, in certain scenarios it can avoid problems with spatially correlated noise that the vector-sensor array may suffer. copyright 1996 American Institute of Physics

  2. Product Quality Modelling Based on Incremental Support Vector Machine

    International Nuclear Information System (INIS)

    Wang, J; Zhang, W; Qin, B; Shi, W

    2012-01-01

    Incremental Support vector machine (ISVM) is a new learning method developed in recent years based on the foundations of statistical learning theory. It is suitable for the problem of sequentially arriving field data and has been widely used for product quality prediction and production process optimization. However, the traditional ISVM learning does not consider the quality of the incremental data which may contain noise and redundant data; it will affect the learning speed and accuracy to a great extent. In order to improve SVM training speed and accuracy, a modified incremental support vector machine (MISVM) is proposed in this paper. Firstly, the margin vectors are extracted according to the Karush-Kuhn-Tucker (KKT) condition; then the distance from the margin vectors to the final decision hyperplane is calculated to evaluate the importance of margin vectors, where the margin vectors are removed while their distance exceed the specified value; finally, the original SVs and remaining margin vectors are used to update the SVM. The proposed MISVM can not only eliminate the unimportant samples such as noise samples, but also can preserve the important samples. The MISVM has been experimented on two public data and one field data of zinc coating weight in strip hot-dip galvanizing, and the results shows that the proposed method can improve the prediction accuracy and the training speed effectively. Furthermore, it can provide the necessary decision supports and analysis tools for auto control of product quality, and also can extend to other process industries, such as chemical process and manufacturing process.

  3. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  4. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  5. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  6. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  7. Decays of the vector glueball

    Science.gov (United States)

    Giacosa, Francesco; Sammet, Julia; Janowski, Stanislaus

    2017-06-01

    We calculate two- and three-body decays of the (lightest) vector glueball into (pseudo)scalar, (axial-)vector, as well as pseudovector and excited vector mesons in the framework of a model of QCD. While absolute values of widths cannot be predicted because the corresponding coupling constants are unknown, some interesting branching ratios can be evaluated by setting the mass of the yet hypothetical vector glueball to 3.8 GeV as predicted by quenched lattice QCD. We find that the decay mode ω π π should be one of the largest (both through the decay chain O →b1π →ω π π and through the direct coupling O →ω π π ). Similarly, the (direct and indirect) decay into π K K*(892 ) is sizable. Moreover, the decays into ρ π and K*(892 )K are, although subleading, possible and could play a role in explaining the ρ π puzzle of the charmonium state ψ (2 S ) thanks to a (small) mixing with the vector glueball. The vector glueball can be directly formed at the ongoing BESIII experiment as well as at the future PANDA experiment at the FAIR facility. If the width is sufficiently small (≲100 MeV ) it should not escape future detection. It should be stressed that the employed model is based on some inputs and simplifying assumptions: the value of glueball mass (at present, the quenched lattice value is used), the lack of mixing of the glueball with other quarkonium states, and the use of few interaction terms. It then represents a first step toward the identification of the main decay channels of the vector glueball, but shall be improved when corresponding experimental candidates and/or new lattice results will be available.

  8. Vector-model-supported approach in prostate plan optimization

    International Nuclear Information System (INIS)

    Liu, Eva Sau Fan; Wu, Vincent Wing Cheung; Harris, Benjamin; Lehman, Margot; Pryor, David; Chan, Lawrence Wing Chi

    2017-01-01

    Lengthy time consumed in traditional manual plan optimization can limit the use of step-and-shoot intensity-modulated radiotherapy/volumetric-modulated radiotherapy (S&S IMRT/VMAT). A vector model base, retrieving similar radiotherapy cases, was developed with respect to the structural and physiologic features extracted from the Digital Imaging and Communications in Medicine (DICOM) files. Planning parameters were retrieved from the selected similar reference case and applied to the test case to bypass the gradual adjustment of planning parameters. Therefore, the planning time spent on the traditional trial-and-error manual optimization approach in the beginning of optimization could be reduced. Each S&S IMRT/VMAT prostate reference database comprised 100 previously treated cases. Prostate cases were replanned with both traditional optimization and vector-model-supported optimization based on the oncologists' clinical dose prescriptions. A total of 360 plans, which consisted of 30 cases of S&S IMRT, 30 cases of 1-arc VMAT, and 30 cases of 2-arc VMAT plans including first optimization and final optimization with/without vector-model-supported optimization, were compared using the 2-sided t-test and paired Wilcoxon signed rank test, with a significance level of 0.05 and a false discovery rate of less than 0.05. For S&S IMRT, 1-arc VMAT, and 2-arc VMAT prostate plans, there was a significant reduction in the planning time and iteration with vector-model-supported optimization by almost 50%. When the first optimization plans were compared, 2-arc VMAT prostate plans had better plan quality than 1-arc VMAT plans. The volume receiving 35 Gy in the femoral head for 2-arc VMAT plans was reduced with the vector-model-supported optimization compared with the traditional manual optimization approach. Otherwise, the quality of plans from both approaches was comparable. Vector-model-supported optimization was shown to offer much shortened planning time and iteration

  9. Vector-model-supported approach in prostate plan optimization

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Eva Sau Fan [Department of Radiation Oncology, Princess Alexandra Hospital, Brisbane (Australia); Department of Health Technology and Informatics, The Hong Kong Polytechnic University (Hong Kong); Wu, Vincent Wing Cheung [Department of Health Technology and Informatics, The Hong Kong Polytechnic University (Hong Kong); Harris, Benjamin [Department of Radiation Oncology, Princess Alexandra Hospital, Brisbane (Australia); Lehman, Margot; Pryor, David [Department of Radiation Oncology, Princess Alexandra Hospital, Brisbane (Australia); School of Medicine, University of Queensland (Australia); Chan, Lawrence Wing Chi, E-mail: wing.chi.chan@polyu.edu.hk [Department of Health Technology and Informatics, The Hong Kong Polytechnic University (Hong Kong)

    2017-07-01

    Lengthy time consumed in traditional manual plan optimization can limit the use of step-and-shoot intensity-modulated radiotherapy/volumetric-modulated radiotherapy (S&S IMRT/VMAT). A vector model base, retrieving similar radiotherapy cases, was developed with respect to the structural and physiologic features extracted from the Digital Imaging and Communications in Medicine (DICOM) files. Planning parameters were retrieved from the selected similar reference case and applied to the test case to bypass the gradual adjustment of planning parameters. Therefore, the planning time spent on the traditional trial-and-error manual optimization approach in the beginning of optimization could be reduced. Each S&S IMRT/VMAT prostate reference database comprised 100 previously treated cases. Prostate cases were replanned with both traditional optimization and vector-model-supported optimization based on the oncologists' clinical dose prescriptions. A total of 360 plans, which consisted of 30 cases of S&S IMRT, 30 cases of 1-arc VMAT, and 30 cases of 2-arc VMAT plans including first optimization and final optimization with/without vector-model-supported optimization, were compared using the 2-sided t-test and paired Wilcoxon signed rank test, with a significance level of 0.05 and a false discovery rate of less than 0.05. For S&S IMRT, 1-arc VMAT, and 2-arc VMAT prostate plans, there was a significant reduction in the planning time and iteration with vector-model-supported optimization by almost 50%. When the first optimization plans were compared, 2-arc VMAT prostate plans had better plan quality than 1-arc VMAT plans. The volume receiving 35 Gy in the femoral head for 2-arc VMAT plans was reduced with the vector-model-supported optimization compared with the traditional manual optimization approach. Otherwise, the quality of plans from both approaches was comparable. Vector-model-supported optimization was shown to offer much shortened planning time and iteration

  10. Local Patch Vectors Encoded by Fisher Vectors for Image Classification

    Directory of Open Access Journals (Sweden)

    Shuangshuang Chen

    2018-02-01

    Full Text Available The objective of this work is image classification, whose purpose is to group images into corresponding semantic categories. Four contributions are made as follows: (i For computational simplicity and efficiency, we directly adopt raw image patch vectors as local descriptors encoded by Fisher vector (FV subsequently; (ii For obtaining representative local features within the FV encoding framework, we compare and analyze three typical sampling strategies: random sampling, saliency-based sampling and dense sampling; (iii In order to embed both global and local spatial information into local features, we construct an improved spatial geometry structure which shows good performance; (iv For reducing the storage and CPU costs of high dimensional vectors, we adopt a new feature selection method based on supervised mutual information (MI, which chooses features by an importance sorting algorithm. We report experimental results on dataset STL-10. It shows very promising performance with this simple and efficient framework compared to conventional methods.

  11. Non-Replicating Adenovirus-Vectored Anthrax Vaccine

    International Nuclear Information System (INIS)

    Van Kampen, K. R.; Zhang, J.; Jex, E.; Tang, D. C.

    2007-01-01

    As bioterrorism is emerging as a national threat, it is urgent to develop a new generation of anthrax vaccines that can be rapidly produced and mass administered in an emergency setting. We have demonstrated that protective immunity against anthrax spores could be elicited in mice by intranasal administration of a non-replicating human adenovirus serotype 5 (Ad5)-derived vector encoding Bacillus anthracis protective antigen (PA) in a single-dose regimen. The potency of an Ad5 vector encoding PA was remarkably enhanced by codon optimization of the PA gene to match the tRNA pool found in human cells. This nasal vaccine can be mass-administered by non-medical personnel during a bioterrorist attack. In addition, replication-competent adenovirus (RCA)-free Ad5-vectored anthrax vaccines can be mass produced in PER.C6 cells in serum-free wave bioreactors and purified by column chromatography to meet a surge in demand. The non-replicating nature of this new generation of anthrax vaccine ensures an excellent safety profile for vaccines and the environment.(author)

  12. A Sequential Multiplicative Extended Kalman Filter for Attitude Estimation Using Vector Observations

    Science.gov (United States)

    Qin, Fangjun; Jiang, Sai; Zha, Feng

    2018-01-01

    In this paper, a sequential multiplicative extended Kalman filter (SMEKF) is proposed for attitude estimation using vector observations. In the proposed SMEKF, each of the vector observations is processed sequentially to update the attitude, which can make the measurement model linearization more accurate for the next vector observation. This is the main difference to Murrell’s variation of the MEKF, which does not update the attitude estimate during the sequential procedure. Meanwhile, the covariance is updated after all the vector observations have been processed, which is used to account for the special characteristics of the reset operation necessary for the attitude update. This is the main difference to the traditional sequential EKF, which updates the state covariance at each step of the sequential procedure. The numerical simulation study demonstrates that the proposed SMEKF has more consistent and accurate performance in a wide range of initial estimate errors compared to the MEKF and its traditional sequential forms. PMID:29751538

  13. A Sequential Multiplicative Extended Kalman Filter for Attitude Estimation Using Vector Observations

    Directory of Open Access Journals (Sweden)

    Fangjun Qin

    2018-05-01

    Full Text Available In this paper, a sequential multiplicative extended Kalman filter (SMEKF is proposed for attitude estimation using vector observations. In the proposed SMEKF, each of the vector observations is processed sequentially to update the attitude, which can make the measurement model linearization more accurate for the next vector observation. This is the main difference to Murrell’s variation of the MEKF, which does not update the attitude estimate during the sequential procedure. Meanwhile, the covariance is updated after all the vector observations have been processed, which is used to account for the special characteristics of the reset operation necessary for the attitude update. This is the main difference to the traditional sequential EKF, which updates the state covariance at each step of the sequential procedure. The numerical simulation study demonstrates that the proposed SMEKF has more consistent and accurate performance in a wide range of initial estimate errors compared to the MEKF and its traditional sequential forms.

  14. Non-traditional inheritance

    International Nuclear Information System (INIS)

    Hall, J.G.

    1992-01-01

    In the last few years, several non-traditional forms of inheritance have been recognized. These include mosaicism, cytoplasmic inheritance, uniparental disomy, imprinting, amplification/anticipation, and somatic recombination. Genomic imprinting (GI) is the dependence of the phenotype on the sex of the transmitting parent. GI in humans seems to involve growth, behaviour, and survival in utero. The detailed mechanism of genomic imprinting is not known, but it seems that some process is involved in turning a gene off; this probably involves two genes, one of which produces a product that turns a gene off, and the gene that is itself turned off. The process of imprinting (turning off) may be associated with methylation. Erasure of imprinting can occur, and seems to be associated with meiosis. 10 refs

  15. Learning with LOGO: Logo and Vectors.

    Science.gov (United States)

    Lough, Tom; Tipps, Steve

    1986-01-01

    This is the first of a two-part series on the general concept of vector space. Provides tool procedures to allow investigation of vector properties, vector addition and subtraction, and X and Y components. Lists several sources of additional vector ideas. (JM)

  16. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  17. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  18. Current nuclear threats and possible responses

    Science.gov (United States)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  19. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  20. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  1. Elliptic-symmetry vector optical fields.

    Science.gov (United States)

    Pan, Yue; Li, Yongnan; Li, Si-Min; Ren, Zhi-Cheng; Kong, Ling-Jun; Tu, Chenghou; Wang, Hui-Tian

    2014-08-11

    We present in principle and demonstrate experimentally a new kind of vector fields: elliptic-symmetry vector optical fields. This is a significant development in vector fields, as this breaks the cylindrical symmetry and enriches the family of vector fields. Due to the presence of an additional degrees of freedom, which is the interval between the foci in the elliptic coordinate system, the elliptic-symmetry vector fields are more flexible than the cylindrical vector fields for controlling the spatial structure of polarization and for engineering the focusing fields. The elliptic-symmetry vector fields can find many specific applications from optical trapping to optical machining and so on.

  2. A generalized nonlocal vector calculus

    Science.gov (United States)

    Alali, Bacim; Liu, Kuo; Gunzburger, Max

    2015-10-01

    A nonlocal vector calculus was introduced in Du et al. (Math Model Meth Appl Sci 23:493-540, 2013) that has proved useful for the analysis of the peridynamics model of nonlocal mechanics and nonlocal diffusion models. A formulation is developed that provides a more general setting for the nonlocal vector calculus that is independent of particular nonlocal models. It is shown that general nonlocal calculus operators are integral operators with specific integral kernels. General nonlocal calculus properties are developed, including nonlocal integration by parts formula and Green's identities. The nonlocal vector calculus introduced in Du et al. (Math Model Meth Appl Sci 23:493-540, 2013) is shown to be recoverable from the general formulation as a special example. This special nonlocal vector calculus is used to reformulate the peridynamics equation of motion in terms of the nonlocal gradient operator and its adjoint. A new example of nonlocal vector calculus operators is introduced, which shows the potential use of the general formulation for general nonlocal models.

  3. Generalized Selection Weighted Vector Filters

    Directory of Open Access Journals (Sweden)

    Rastislav Lukac

    2004-09-01

    Full Text Available This paper introduces a class of nonlinear multichannel filters capable of removing impulsive noise in color images. The here-proposed generalized selection weighted vector filter class constitutes a powerful filtering framework for multichannel signal processing. Previously defined multichannel filters such as vector median filter, basic vector directional filter, directional-distance filter, weighted vector median filters, and weighted vector directional filters are treated from a global viewpoint using the proposed framework. Robust order-statistic concepts and increased degree of freedom in filter design make the proposed method attractive for a variety of applications. Introduced multichannel sigmoidal adaptation of the filter parameters and its modifications allow to accommodate the filter parameters to varying signal and noise statistics. Simulation studies reported in this paper indicate that the proposed filter class is computationally attractive, yields excellent performance, and is able to preserve fine details and color information while efficiently suppressing impulsive noise. This paper is an extended version of the paper by Lukac et al. presented at the 2003 IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing (NSIP '03 in Grado, Italy.

  4. Smart Grid Security: Threats, Challenges, and Solutions

    OpenAIRE

    Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj

    2016-01-01

    The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quanti...

  5. THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT

    Science.gov (United States)

    2016-04-01

    Putin’s intent. What we can do is learn from his actions, and what we see suggests growing Russian capabilities, significant military modernization...AU/ACSC/POWELL, N/AY16 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT...The methodology focuses on Russian capability, capacity, and intention to threaten NATO members’ existence. While Russia does possess nuclear weapons

  6. Hollow Threats: Why Coercive Diplomacy Fails

    Science.gov (United States)

    2015-06-01

    brand this as selection bias, the study of coercion has neglected the cumulative factor and is therefore worth bringing into the spotlight. As this...ended. Therefore, the Somali factions had both the luxury and foreknowledge to wait until the menace decreased and the costs increased (as...observation, was a trip wire. Since the luxury of hindsight demonstrates that Assad did use WMD and since that part of the deterrent threat was

  7. Water Privatization: A Threat to Human Rights?

    OpenAIRE

    Pavelich, Kelly

    2017-01-01

    In developing countries, women often have responsibilities that are water dependent, such as collecting water and tending to the sick (Sewpaul, 2008: 45) As unpolluted water supplies diminish, these tasks become increasingly difficult to accomplish. Women face greater threats to their security as they are forced to walk farther, occasionally into dangerous areas, and lose several hours of their day, potentially reducing the household income and resulting in missed economic opportunities (Sewp...

  8. Zika Virus: An Emerging Worldwide Threat

    OpenAIRE

    Irfan A. Rather; Jameel B. Lone; Vivek K. Bajpai; Woon K. Paek; Jeongheui Lim

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is bei...

  9. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available Reference Inadequate or weak contract management, fuzzy focus [16, 30, 50, 58, 62, 64] Inadequate process (“how”) e.g. inadequate planning [16, 17, 30, 36, 57] Poor management of contractors and lack of governance [16, 17, 30, 46, 61, 64, 71... decision-making cycles, lack of proper programme management and disempowered outsource programme team members. Threats in the outsourcing process and the management of the outsourcing contract may result in poor management of contractors, a lack...

  10. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  11. Maritime Threat Detection using Plan Recognition

    Science.gov (United States)

    2012-11-01

    operate in close proximity to large but much less maneuverable vessels. Various approaches for automated threat and anomaly detection have been...version space techniques, and other closed -world reasoning algorithms, while probabilistic algorithms include those that use stochastic grammars and...differ along many dimensions, such as their agent relation (e.g., keyhole , intention, adversarial), what they infer (e.g., action, plan, goal

  12. Date Sensitive Computing Problems: Understanding the Threat

    Science.gov (United States)

    1998-08-29

    equipment on Earth.3 It can also interfere with electromagnetic signals from such devices as cell phones, radio, televison , and radar. By itself, the ...spacecraft. Debris from impacted satellites will add to the existing orbital debris problem, and could eventually cause damage to other satellites...Date Sensitive Computing Problems Understanding the Threat Aug. 17, 1998 Revised Aug. 29, 1998 Prepared by: The National Crisis Response

  13. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  14. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  15. Vector control programs in Saint Johns County, Florida and Guayas, Ecuador: successes and barriers to integrated vector management.

    Science.gov (United States)

    Naranjo, Diana P; Qualls, Whitney A; Jurado, Hugo; Perez, Juan C; Xue, Rui-De; Gomez, Eduardo; Beier, John C

    2014-07-02

    Vector-borne diseases (VBDs) and mosquito control programs (MCPs) diverge in settings and countries, and lead control specialists need to be aware of the most effective control strategies. Integrated Vector Management (IVM) strategies, once implemented in MCPs, aim to reduce cost and optimize protection of the populations against VBDs. This study presents a strengths, weaknesses, opportunities, and threats (SWOT) analysis to compare IVM strategies used by MCPs in Saint Johns County, Florida and Guayas, Ecuador. This research evaluates MCPs strategies to improve vector control activities. Methods included descriptive findings of the MCP operations. Information was obtained from vector control specialists, directors, and residents through field trips, surveys, and questionnaires. Evaluations of the strategies and assets of the control programs where obtained through SWOT analysis and within an IVM approach. Organizationally, the Floridian MCP is a tax-based District able to make decisions independently from county government officials, with the oversight of an elected board of commissioners. The Guayas program is directed by the country government and assessed by non-governmental organizations like the World health Organization. Operationally, the Floridian MCP conducts entomological surveillance and the Ecuadorian MCP focuses on epidemiological monitoring of human disease cases. Strengths of both MCPs were their community participation and educational programs. Weaknesses for both MCPs included limitations in budgets and technical capabilities. Opportunities, for both MCPs, are additional funding and partnerships with private, non-governmental, and governmental organizations. Threats experienced by both MCPs included political constraints and changes in the social and ecological environment that affect mosquito densities and control efforts. IVM pillars for policy making were used to compare the information among the programs. Differences included how the Ecuadorian

  16. Vector control programs in Saint Johns County, Florida and Guayas, Ecuador: successes and barriers to integrated vector management

    Science.gov (United States)

    2014-01-01

    Background Vector-borne diseases (VBDs) and mosquito control programs (MCPs) diverge in settings and countries, and lead control specialists need to be aware of the most effective control strategies. Integrated Vector Management (IVM) strategies, once implemented in MCPs, aim to reduce cost and optimize protection of the populations against VBDs. This study presents a strengths, weaknesses, opportunities, and threats (SWOT) analysis to compare IVM strategies used by MCPs in Saint Johns County, Florida and Guayas, Ecuador. This research evaluates MCPs strategies to improve vector control activities. Methods Methods included descriptive findings of the MCP operations. Information was obtained from vector control specialists, directors, and residents through field trips, surveys, and questionnaires. Evaluations of the strategies and assets of the control programs where obtained through SWOT analysis and within an IVM approach. Results Organizationally, the Floridian MCP is a tax-based District able to make decisions independently from county government officials, with the oversight of an elected board of commissioners. The Guayas program is directed by the country government and assessed by non-governmental organizations like the World health Organization. Operationally, the Floridian MCP conducts entomological surveillance and the Ecuadorian MCP focuses on epidemiological monitoring of human disease cases. Strengths of both MCPs were their community participation and educational programs. Weaknesses for both MCPs included limitations in budgets and technical capabilities. Opportunities, for both MCPs, are additional funding and partnerships with private, non-governmental, and governmental organizations. Threats experienced by both MCPs included political constraints and changes in the social and ecological environment that affect mosquito densities and control efforts. IVM pillars for policy making were used to compare the information among the programs. Differences

  17. The impact of threat and cognitive stress on speech motor control in people who stutter.

    Science.gov (United States)

    Lieshout, Pascal van; Ben-David, Boaz; Lipski, Melinda; Namasivayam, Aravind

    2014-06-01

    In the present study, an Emotional Stroop and Classical Stroop task were used to separate the effect of threat content and cognitive stress from the phonetic features of words on motor preparation and execution processes. A group of 10 people who stutter (PWS) and 10 matched people who do not stutter (PNS) repeated colour names for threat content words and neutral words, as well as for traditional Stroop stimuli. Data collection included speech acoustics and movement data from upper lip and lower lip using 3D EMA. PWS in both tasks were slower to respond and showed smaller upper lip movement ranges than PNS. For the Emotional Stroop task only, PWS were found to show larger inter-lip phase differences compared to PNS. General threat words were executed with faster lower lip movements (larger range and shorter duration) in both groups, but only PWS showed a change in upper lip movements. For stutter specific threat words, both groups showed a more variable lip coordination pattern, but only PWS showed a delay in reaction time compared to neutral words. Individual stuttered words showed no effects. Both groups showed a classical Stroop interference effect in reaction time but no changes in motor variables. This study shows differential motor responses in PWS compared to controls for specific threat words. Cognitive stress was not found to affect stuttering individuals differently than controls or that its impact spreads to motor execution processes. After reading this article, the reader will be able to: (1) discuss the importance of understanding how threat content influences speech motor control in people who stutter and non-stuttering speakers; (2) discuss the need to use tasks like the Emotional Stroop and Regular Stroop to separate phonetic (word-bound) based impact on fluency from other factors in people who stutter; and (3) describe the role of anxiety and cognitive stress on speech motor processes. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  19. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  20. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  1. Toddlers’ Duration of Attention towards Putative Threat

    Science.gov (United States)

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  2. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  3. Development of a NEW Vector Magnetograph at Marshall Space Flight Center

    Science.gov (United States)

    West, Edward; Hagyard, Mona; Gary, Allen; Smith, James; Adams, Mitzi; Rose, M. Franklin (Technical Monitor)

    2001-01-01

    This paper will describe the Experimental Vector Magnetograph that has been developed at the Marshall Space Flight Center (MSFC). This instrument was designed to improve linear polarization measurements by replacing electro-optic and rotating waveplate modulators with a rotating linear analyzer. Our paper will describe the motivation for developing this magnetograph, compare this instrument with traditional magnetograph designs, and present a comparison of the data acquired by this instrument and original MSFC vector magnetograph.

  4. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  5. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  6. Business continuity 2014: From traditional to integrated Business Continuity Management.

    Science.gov (United States)

    Ee, Henry

    As global change continues to generate new challenges and potential threats to businesses, traditional business continuity management (BCM) slowly reveals its limitations and weak points to ensuring 'business resiliency' today. Consequently, BCM professionals also face the challenge of re-evaluating traditional concepts and introducing new strategies and industry best practices. This paper points to why traditional BCM is no longer sufficient in terms of enabling businesses to survive in today's high-risk environment. It also looks into some of the misconceptions about BCM and other stumbling blocks to establishing effective BCM today. Most importantly, however, this paper provides tips based on the Business Continuity Institute's (BCI) Good Practices Guideline (GPG) and the latest international BCM standard ISO 22301 on how to overcome the issues and challenges presented.

  7. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  8. Potential impact of climate change on emerging vector-borne and other infections in the UK.

    Science.gov (United States)

    Baylis, Matthew

    2017-12-05

    Climate is one of several causes of disease emergence. Although half or more of infectious diseases are affected by climate it appears to be a relatively infrequent cause of human disease emergence. Climate mostly affects diseases caused by pathogens that spend part of their lifecycle outside of the host, exposed to the environment. The most important routes of transmission of climate sensitive diseases are by arthropod (insect and tick) vectors, in water and in food. Given the sensitivity of many diseases to climate, it is very likely that at least some will respond to future climate change. In the case of vector-borne diseases this response will include spread to new areas. Several vector-borne diseases have emerged in Europe in recent years; these include vivax malaria, West Nile fever, dengue fever, Chikungunya fever, leishmaniasis, Lyme disease and tick-borne encephalitis. The vectors of these diseases are mosquitoes, sand flies and ticks. The UK has endemic mosquito species capable of transmitting malaria and probably other pathogens, and ticks that transmit Lyme disease. The UK is also threatened by invasive mosquito species known to be able to transmit West Nile, dengue, chikungunya and Zika, and sand flies that spread leishmaniasis. Warmer temperatures in the future will increase the suitability of the UK's climate for these invasive species, and increase the risk that they may spread disease. While much attention is on invasive species, it is important to recognize the threat presented by native species too. Proposed actions to reduce the future impact of emerging vector-borne diseases in the UK include insect control activity at points of entry of vehicles and certain goods, wider surveillance for mosquitoes and sand flies, research into the threat posed by native species, increased awareness of the medical profession of the threat posed by specific diseases, regular risk assessments, and increased preparedness for the occurrence of a disease emergency.

  9. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  11. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  12. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  13. Toward lattice fractional vector calculus

    Science.gov (United States)

    Tarasov, Vasily E.

    2014-09-01

    An analog of fractional vector calculus for physical lattice models is suggested. We use an approach based on the models of three-dimensional lattices with long-range inter-particle interactions. The lattice analogs of fractional partial derivatives are represented by kernels of lattice long-range interactions, where the Fourier series transformations of these kernels have a power-law form with respect to wave vector components. In the continuum limit, these lattice partial derivatives give derivatives of non-integer order with respect to coordinates. In the three-dimensional description of the non-local continuum, the fractional differential operators have the form of fractional partial derivatives of the Riesz type. As examples of the applications of the suggested lattice fractional vector calculus, we give lattice models with long-range interactions for the fractional Maxwell equations of non-local continuous media and for the fractional generalization of the Mindlin and Aifantis continuum models of gradient elasticity.

  14. Gauge Theories of Vector Particles

    Science.gov (United States)

    Glashow, S. L.; Gell-Mann, M.

    1961-04-24

    The possibility of generalizing the Yang-Mills trick is examined. Thus we seek theories of vector bosons invariant under continuous groups of coordinate-dependent linear transformations. All such theories may be expressed as superpositions of certain "simple" theories; we show that each "simple theory is associated with a simple Lie algebra. We may introduce mass terms for the vector bosons at the price of destroying the gauge-invariance for coordinate-dependent gauge functions. The theories corresponding to three particular simple Lie algebras - those which admit precisely two commuting quantum numbers - are examined in some detail as examples. One of them might play a role in the physics of the strong interactions if there is an underlying super-symmetry, transcending charge independence, that is badly broken. The intermediate vector boson theory of weak interactions is discussed also. The so-called "schizon" model cannot be made to conform to the requirements of partial gauge-invariance.

  15. Search for intermediate vector bosons

    International Nuclear Information System (INIS)

    Cline, D.B.; Rubbia, C.; van der Meer, S.

    1982-01-01

    Over the past 15 years a new class of unified theories has been developed to describe the forces acting between elementary particles. The most successful of the new theories establishes a link between electromagnetism and the weak force. A crucial prediction of this unified electroweak theory is the existence of three massive particles called intermediate vector bosons. If these intermediate vector bosons exist and if they have properties attributed to them by electroweak theory, they should soon be detected, as the world's first particle accelerator with enough energy to create such particles has recently been completed at the European Organization for Nuclear Research (CERN) in Geneva. The accelerator has been converted to a colliding beam machine in which protons and antiprotons collide head on. According to electroweak theory, intermediate vector bosons can be created in proton-antiproton collisions. (SC)

  16. Search for intermediate vector bosons

    International Nuclear Information System (INIS)

    Klajn, D.B.; Rubbia, K.; Meer, S.

    1983-01-01

    Problem of registration and search for intermediate vector bosons is discussed. According to weak-current theory there are three intermediate vector bosons with +1(W + )-1(W - ) and zero (Z 0 ) electric charges. It was suggested to conduct the investigation into particles in 1976 by cline, Rubbia and Makintair using proton-antiproton beams. Major difficulties of the experiment are related to the necessity of formation of sufficient amount of antiparticles and the method of antiproton beam ''cooling'' for the purpose of reduction of its random movements. The stochastic method was suggested by van der Meer in 1968 as one of possible cooling methods. Several large detectors were designed for searching intermediate vector bosons

  17. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  18. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  19. Synthetic Aperture Vector Flow Imaging

    DEFF Research Database (Denmark)

    Villagómez Hoyos, Carlos Armando

    The main objective of this project was to continue the development of a synthetic aperture vector flow estimator. This type of estimator is capable of overcoming two of the major limitations in conventional ultrasound systems: 1) the inability to scan large region of interest with high temporal......, this thesis showed that novel information can be obtained with vector velocity methods providing quantitative estimates of blood flow and insight into the complexity of the hemodynamics dynamics. This could give the clinician a new tool in assessment and treatment of a broad range of diseases....

  20. Vector mesons and chiral symmetry

    International Nuclear Information System (INIS)

    Ecker, G.

    1989-01-01

    The ambiguities in the off-shell behaviour of spin-1 exchange can be resolved to O(p 4 ) in the chiral low-energy expansion if the asymptotic behaviour of QCD is properly incorporated. As a consequence, the chiral version of vector (and axial-vector) meson dominance is model independent. Additional high-energy constraints motivated by QCD determine the V,A resonance couplings uniquely. In particular, QCD in its effective chiral realization sucessfully predicts Γ(ρ→2π). 10 refs. (Author)

  1. Topological vector spaces and distributions

    CERN Document Server

    Horvath, John

    2012-01-01

    ""The most readable introduction to the theory of vector spaces available in English and possibly any other language.""-J. L. B. Cooper, MathSciNet ReviewMathematically rigorous but user-friendly, this classic treatise discusses major modern contributions to the field of topological vector spaces. The self-contained treatment includes complete proofs for all necessary results from algebra and topology. Suitable for undergraduate mathematics majors with a background in advanced calculus, this volume will also assist professional mathematicians, physicists, and engineers.The precise exposition o

  2. Learning with Support Vector Machines

    CERN Document Server

    Campbell, Colin

    2010-01-01

    Support Vectors Machines have become a well established tool within machine learning. They work well in practice and have now been used across a wide range of applications from recognizing hand-written digits, to face identification, text categorisation, bioinformatics, and database marketing. In this book we give an introductory overview of this subject. We start with a simple Support Vector Machine for performing binary classification before considering multi-class classification and learning in the presence of noise. We show that this framework can be extended to many other scenarios such a

  3. Generation of arbitrary vector beams

    Science.gov (United States)

    Perez-Garcia, Benjamin; López-Mariscal, Carlos; Hernandez-Aranda, Raul I.; Gutiérrez-Vega, Julio C.

    2017-08-01

    Optical vector beams arise from point to point spatial variations of the electric component of an electromagnetic field over the transverse plane. In this work, we present a novel experimental technique to generate arbitrary vec- tor beams, and provide sufficient evidence to validate their state of polarization. This technique takes advantage of the capability of a Spatial Light Modulator to simultaneously generate two components of an electromagnetic field by halving the screen of the device and subsequently recombining them in a Sagnac interferometer. Our experimental results show the versatility and robustness of this technique for the generation of vector beams.

  4. A Novel Rotor and Stator Magnetic Fields Direct-Orthogonalized Vector Control Scheme for the PMSM Servo System

    Directory of Open Access Journals (Sweden)

    Shi-Xiong Zhang

    2014-02-01

    Full Text Available Permanent Magnet Synchronous motor (PMSM has received widespread acceptance in recent years. In this paper, a new rotor and stator Magnetic Fields Direct-Orthogonalized Vector Control (MFDOVC scheme is proposed for PMSM servo system. This method simplified the complex calculation of traditional vector control, a part of the system resource is economized. At the same time, through the simulation illustration validation, the performance of PMSM servo system with the proposed MFDOVC scheme can achieve the same with the complex traditional vector control method, but much simpler calculation is implemented using the proposed method.

  5. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  6. An integrated approach to adapt physical protection to the new terrorism threats

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Braun, C.; Bunn, G.

    2002-01-01

    Full text: New terrorism (NT) differs significantly from the traditional form of terrorism insofar as it has the capability to: train and deploy suicide commandos; use sophisticated logistics; implement transnational terrorist operations; infiltrate security and diplomatic communities; and commit acts of mass disturbance and mass killings. NT does not engage in negotiations: it does not discriminate in its attacks between children, adult civilians or military personnel; and it is willing to deploy weapons of mass destruction. These characteristics require that the conventional approach to physical protection of installations dealing with nuclear and other radioactive materials (e.g., Design Basis Threat (DBT)) be adapted accordingly. This integrated approach should encompass: at the international level: revised legally binding conventions and recommendations which are more specific than current versions, providing practically applicable advice reflecting the new threat scenarios; at the national level: introducing an element of transparency for validating the national threat perception and supra-national review of the effectiveness of the counteractions taken such as regulatory approaches implementing these international agreements; at the operational level: enhancing security-related co-operation at the command and control level between the on-site security forces at nuclear installations, the response force, police and the military, as well as upgrading of the force-on-force training; and at the research level: R and D in physical protection technology and practices to keep abreast of the threats posed by the NT. (author)

  7. A review of the ever increasing threat to European crayfish from non-indigenous crayfish species

    Directory of Open Access Journals (Sweden)

    D.M. Holdich

    2009-01-01

    Full Text Available Non-indigenous crayfish species (NICS in Europe now outnumber indigenous crayfish species (ICS 2:1, and it has been predicted that they may dominate completely in the next few decades unless something is done to protect them. Of the ten NICS introduced at least nine have become established in areas occupied by four of the five ICS. A decline in stocks of ICS has been recorded in many countries in the face of increasing populations of NICS. Most European countries retain at least one ICS but all are under threat from habitat loss, deteriorating water quality, overfishing, climate change, and most importantly from NICS and crayfish plague. The threat to ICS is so great in some countries that “ark”sanctuary sites are being established.The three most widely-spread NICS are the North American species: Pacifastacus leniusculus, Orconectes limosus and Procambarus clarkii. These can be considered as “Old NICS”, which were introduced before 1975, compared with the “New NICS”, which were introduced after 1980, such as the North American species: Orconectes immunis, Orconectes juvenilis, Orconectes virilis, Procambarus sp. and Procambarus acutus; and the Australian species: Cherax destructor and Cherax quadricarinatus, all of which have much narrower ranges in Europe. The North American species are potentially capable of acting as vectors of crayfish plague. Outbreaks of this disease occur regularly where there are high concentrations of vectors.In addition to the NICS currently established in the wild, a further threat exists through the aquarium trade, where many American and Australian species are available via the internet and in aquarist centres. Owners of such species may discard them into the freshwater environment when they grow too big as with some Cherax spp. and Orconectes spp., or multiply too frequently as with Procambarus sp. (a parthenogenetic species. A conceptual model is presented as a possible way forward for protecting the

  8. Traditional Medicine in Developing Countries

    DEFF Research Database (Denmark)

    Thorsen, Rikke Stamp

    or spiritual healer and self-treatment with herbal medicine or medicinal plants. Reliance on traditional medicine varies between countries and rural and urban areas, but is reported to be as high as 80% in some developing countries. Increased realization of the continued importance of traditional medicine has......People use traditional medicine to meet their health care needs in developing countries and medical pluralism persists worldwide despite increased access to allopathic medicine. Traditional medicine includes a variety of treatment opportunities, among others, consultation with a traditional healer...... led to the formulation of policies on the integration of traditional medicine into public health care. Local level integration is already taking place as people use multiple treatments when experiencing illness. Research on local level use of traditional medicine for health care, in particular the use...

  9. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  10. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  11. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  12. Scalar Calibration of Vector Magnetometers

    DEFF Research Database (Denmark)

    Merayo, José M.G.; Brauer, Peter; Primdahl, Fritz

    2000-01-01

    The calibration parameters of a vector magnetometer are estimated only by the use of a scalar reference magnetometer. The method presented in this paper differs from those previously reported in its linearized parametrization. This allows the determination of three offsets or signals in the absence...

  13. Parallel Sparse Matrix - Vector Product

    DEFF Research Database (Denmark)

    Alexandersen, Joe; Lazarov, Boyan Stefanov; Dammann, Bernd

    This technical report contains a case study of a sparse matrix-vector product routine, implemented for parallel execution on a compute cluster with both pure MPI and hybrid MPI-OpenMP solutions. C++ classes for sparse data types were developed and the report shows how these class can be used...

  14. Reference vectors in economic choice

    Directory of Open Access Journals (Sweden)

    Teycir Abdelghani GOUCHA

    2013-07-01

    Full Text Available In this paper the introduction of notion of reference vector paves the way for a combination of classical and social approaches in the framework of referential preferences given by matrix groups. It is shown that individual demand issue from rational decision does not depend on that reference.

  15. The consequences of poor vectorization

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    This talk briefly discusses the vectorization problem and how it impacts scientific and engineering systems. A simple cost model of designing such system in context of different phases of software lifetime is considered. Finally a concept for scalable solution is presented.

  16. The Large Vector Multiplet Action

    OpenAIRE

    Ryb, Itai

    2007-01-01

    We discuss possible actions for the d=2, N=(2,2) large vector multiplet that gauges isometries of generalized Kahler geometries. We explore two scenarios that allow us to write kinetic and superpotential terms for the scalar field-strengths, and write kinetic terms for the spinor invariants that can introduce topological terms for the connections.

  17. Portfolio Analysis for Vector Calculus

    Science.gov (United States)

    Kaplan, Samuel R.

    2015-01-01

    Classic stock portfolio analysis provides an applied context for Lagrange multipliers that undergraduate students appreciate. Although modern methods of portfolio analysis are beyond the scope of vector calculus, classic methods reinforce the utility of this material. This paper discusses how to introduce classic stock portfolio analysis in a…

  18. Vector ecology of equine piroplasmosis

    Science.gov (United States)

    Equine piroplasmosis (EP) is a disease of equidae including horses, donkeys, mules and zebras caused by either of two protozoan parasites, Theileria equi or Babesia caballi. These parasites are biologically transmitted between hosts via tick-vectors and although they have inherent differences, they ...

  19. Vector-meson dominance revisited

    Directory of Open Access Journals (Sweden)

    Terschlüsen Carla

    2012-12-01

    Full Text Available The interaction of mesons with electromagnetism is often well described by the concept of vector-meson dominance (VMD. However, there are also examples where VMD fails. A simple chiral Lagrangian for pions, rho and omega mesons is presented which can account for the respective agreement and disagreement between VMD and phenomenology in the sector of light mesons.

  20. Vector fields on nonorientable surfaces

    Directory of Open Access Journals (Sweden)

    Ilie Barza

    2003-01-01

    X, and the space of vector fields on X are proved by using a symmetrisation process. An example related to the normal derivative on the border of the Möbius strip supports the nontriviality of the concepts introduced in this paper.

  1. Distribution amplitudes of vector mesons

    Energy Technology Data Exchange (ETDEWEB)

    Braun, V.M. [Regensburg Univ. (Germany). Inst. fuer Theoretische Physik; Broemmel, D. [Deutsches Elektronen-Synchrotron, Hamburg (Germany); Goeckeler, M. [Regensburg Univ. (DE). Inst. fuer Theoretische Physik] (and others)

    2007-11-15

    Results are presented for the lowest moment of the distribution amplitude for the K{sup *} vector meson. Both longitudinal and transverse moments are investigated. We use two flavours of O(a) improved Wilson fermions, together with a non-perturbative renormalisation of the matrix element. (orig.)

  2. The Impact of Hybrid Warfare on Traditional Operational Rationale : D-Day’s Demise

    NARCIS (Netherlands)

    Mark Roorda; Jelle van Haaster

    2016-01-01

    In this article we will describe how certain non-traditional means and methods could be used to undermine a military’s capacity to respond effectively to an emerging threat. We will do so by focussing on the Netherlands and showing how some of its specific (non-military) vulnerabilities may be

  3. Vectors and Rotations in 3-Dimensions: Vector Algebra for the C++ Programmer

    Science.gov (United States)

    2016-12-01

    release; distribution is unlimited. 1. Introduction This report describes 2 C++ classes: a Vector class for performing vector algebra in 3-dimensional...ARL-TR-7894•DEC 2016 US Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier...Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier Survivability/Lethality

  4. Deep neural mapping support vector machines.

    Science.gov (United States)

    Li, Yujian; Zhang, Ting

    2017-09-01

    The choice of kernel has an important effect on the performance of a support vector machine (SVM). The effect could be reduced by NEUROSVM, an architecture using multilayer perceptron for feature extraction and SVM for classification. In binary classification, a general linear kernel NEUROSVM can be theoretically simplified as an input layer, many hidden layers, and an SVM output layer. As a feature extractor, the sub-network composed of the input and hidden layers is first trained together with a virtual ordinary output layer by backpropagation, then with the output of its last hidden layer taken as input of the SVM classifier for further training separately. By taking the sub-network as a kernel mapping from the original input space into a feature space, we present a novel model, called deep neural mapping support vector machine (DNMSVM), from the viewpoint of deep learning. This model is also a new and general kernel learning method, where the kernel mapping is indeed an explicit function expressed as a sub-network, different from an implicit function induced by a kernel function traditionally. Moreover, we exploit a two-stage procedure of contrastive divergence learning and gradient descent for DNMSVM to jointly training an adaptive kernel mapping instead of a kernel function, without requirement of kernel tricks. As a whole of the sub-network and the SVM classifier, the joint training of DNMSVM is done by using gradient descent to optimize the objective function with the sub-network layer-wise pre-trained via contrastive divergence learning of restricted Boltzmann machines. Compared to the separate training of NEUROSVM, the joint training is a new algorithm for DNMSVM to have advantages over NEUROSVM. Experimental results show that DNMSVM can outperform NEUROSVM and RBFSVM (i.e., SVM with the kernel of radial basis function), demonstrating its effectiveness. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  6. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  7. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  8. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  9. The Hausa Lexicographic Tradition

    Directory of Open Access Journals (Sweden)

    Roxana Ma Newman

    2011-10-01

    Full Text Available

    Abstract: Hausa, a major language of West Africa, is one of the most widely studied languagesof Sub-Saharan Africa. It has a rich lexicographic tradition dating back some two centuries. Sincethe first major vocabulary published in 1843 up to the present time, almost 60 lexicographic works— dictionaries, vocabularies, glossaries — have been published, in a range of metalanguages, fromEnglish to Hausa itself. This article traces the historical development of the major studies accordingto their type and function as general reference works, specialized works, pedagogical works, andterminological works. For each work, there is a general discussion of its size, accuracy of the phonological,lexical, and grammatical information, and the adequacy of its definitions and illustrativematerial. A complete list of the lexicographic works is included.

    Keywords: ARABIC, BILINGUAL LEXICOGRAPHY, DIALECTAL VARIANTS, DICTIONARIES,ENGLISH, ETYMOLOGIES, FRENCH, GERMAN, GLOSSARIES, GRAMMATICALCATEGORIES, HAUSA, LANGUAGE LEARNING, LOANWORDS, NEOLOGISMS, NIGER,NIGERIA, ORTHOGRAPHY, PHONETIC TRANSCRIPTION, PHONOLOGY, RUSSIAN, STANDARDDIALECT, STANDARDIZATION, TERMINOLOGY, VOCABULARIES, WEST AFRICA.

    Opsomming: Die leksikografiese tradisie in Hausa. Hausa, 'n belangrike taal vanWes-Afrika, is een van die tale van Afrika suid van die Sahara wat die wydste bestudeer word. Dithet 'n ryk leksikografiese tradisie wat ongeveer twee eeue oud is. Van die eerste groot woordeboekwat in 1843 gepubliseer is tot die hede is ongeveer 60 leksikografiese werke — woordeboeke,naamlyste, woordelyste — gepubliseer in 'n reeks metatale van Engels tot Hausa self. Hierdie artikelgaan die historiese ontwikkeling van die groter studies aan die hand van hulle tipe en funksieas algemene naslaanwerke, gespesialiseerde werke, opvoedkundige werke, en terminologiesewerke na. Vir elke werk is daar 'n algemene bespreking oor sy grootte, akkuraatheid van die fonologiese,leksikale en

  10. Monitoring by Use of Clusters of Sensor-Data Vectors

    Science.gov (United States)

    Iverson, David L.

    2007-01-01

    The inductive monitoring system (IMS) is a system of computer hardware and software for automated monitoring of the performance, operational condition, physical integrity, and other aspects of the health of a complex engineering system (e.g., an industrial process line or a spacecraft). The input to the IMS consists of streams of digitized readings from sensors in the monitored system. The IMS determines the type and amount of any deviation of the monitored system from a nominal or normal ( healthy ) condition on the basis of a comparison between (1) vectors constructed from the incoming sensor data and (2) corresponding vectors in a database of nominal or normal behavior. The term inductive reflects the use of a process reminiscent of traditional mathematical induction to learn about normal operation and build the nominal-condition database. The IMS offers two major advantages over prior computational monitoring systems: The computational burden of the IMS is significantly smaller, and there is no need for abnormal-condition sensor data for training the IMS to recognize abnormal conditions. The figure schematically depicts the relationships among the computational processes effected by the IMS. Training sensor data are gathered during normal operation of the monitored system, detailed computational simulation of operation of the monitored system, or both. The training data are formed into vectors that are used to generate the database. The vectors in the database are clustered into regions that represent normal or nominal operation. Once the database has been generated, the IMS compares the vectors of incoming sensor data with vectors representative of the clusters. The monitored system is deemed to be operating normally or abnormally, depending on whether the vector of incoming sensor data is or is not, respectively, sufficiently close to one of the clusters. For this purpose, a distance between two vectors is calculated by a suitable metric (e.g., Euclidean

  11. Emotional Valence, Arousal, and Threat Ratings of 160 Chinese Words among Adolescents.

    Science.gov (United States)

    Ho, Samuel M Y; Mak, Christine W Y; Yeung, Dannii; Duan, Wenjie; Tang, Sandy; Yeung, June C; Ching, Rita

    2015-01-01

    This study was conducted to provide ratings of valence/pleasantness, arousal/excitement, and threat/potential harm for 160 Chinese words. The emotional valence classification (positive, negative, or neutral) of all of the words corresponded to that of the equivalent English language words. More than 90% of the participants, junior high school students aged between 12 and 17 years, understood the words. The participants were from both mainland China and Hong Kong, thus the words can be applied to adolescents familiar with either simplified (e.g. in mainland China) or traditional Chinese (e.g. in Hong Kong) with a junior secondary school education or higher. We also established eight words with negative valence, high threat, and high arousal ratings to facilitate future research, especially on attentional and memory biases among individuals prone to anxiety. Thus, the new emotional word list provides a useful source of information for affective research in the Chinese language.

  12. Threat of Deportation as Proximal Social Determinant of Mental Health Amongst Migrant Workers.

    Science.gov (United States)

    Harrigan, Nicholas M; Koh, Chiu Yee; Amirrudin, Amirah

    2017-06-01

    While migration health studies traditionally focused on socioeconomic determinants of health, an emerging body of literature is exploring migration status as a proximate cause of health outcomes. Study 1 is a path analysis of the predictors of mental health amongst 582 documented migrant workers in Singapore, and shows that threat of deportation is one of the most important proximate social determinants of predicted mental illness, and a mediator of the impact of workplace conflict on mental health. Study 2 is a qualitative study of the narratives of 149 migrant workers who were in workplace conflict with their employers, and demonstrates that workers believed threats were used as a negotiating strategy during workplace conflicts. Findings suggest that migration status places workers who come into workplace conflict with their employers at heightened risk of mental illness because migration status can be used as a tool by employers in workplace negotiations.

  13. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  14. Biological Control Strategies for Mosquito Vectors of Arboviruses.

    Science.gov (United States)

    Huang, Yan-Jang S; Higgs, Stephen; Vanlandingham, Dana L

    2017-02-10

    Historically, biological control utilizes predatory species and pathogenic microorganisms to reduce the population of mosquitoes as disease vectors. This is particularly important for the control of mosquito-borne arboviruses, which normally do not have specific antiviral therapies available. Although development of resistance is likely, the advantages of biological control are that the resources used are typically biodegradable and ecologically friendly. Over the past decade, the advancement of molecular biology has enabled optimization by the manipulation of genetic materials associated with biological control agents. Two significant advancements are the discovery of cytoplasmic incompatibility induced by Wolbachia bacteria, which has enhanced replacement programs, and the introduction of dominant lethal genes into local mosquito populations through the release of genetically modified mosquitoes. As various arboviruses continue to be significant public health threats, biological control strategies have evolved to be more diverse and become critical tools to reduce the disease burden of arboviruses.

  15. Biological Control Strategies for Mosquito Vectors of Arboviruses

    Directory of Open Access Journals (Sweden)

    Yan-Jang S. Huang

    2017-02-01

    Full Text Available Historically, biological control utilizes predatory species and pathogenic microorganisms to reduce the population of mosquitoes as disease vectors. This is particularly important for the control of mosquito-borne arboviruses, which normally do not have specific antiviral therapies available. Although development of resistance is likely, the advantages of biological control are that the resources used are typically biodegradable and ecologically friendly. Over the past decade, the advancement of molecular biology has enabled optimization by the manipulation of genetic materials associated with biological control agents. Two significant advancements are the discovery of cytoplasmic incompatibility induced by Wolbachia bacteria, which has enhanced replacement programs, and the introduction of dominant lethal genes into local mosquito populations through the release of genetically modified mosquitoes. As various arboviruses continue to be significant public health threats, biological control strategies have evolved to be more diverse and become critical tools to reduce the disease burden of arboviruses.

  16. Nonseparable closed vector subspaces of separable topological vector spaces

    Czech Academy of Sciences Publication Activity Database

    Kąkol, Jerzy; Leiderman, A. G.; Morris, S. A.

    2017-01-01

    Roč. 182, č. 1 (2017), s. 39-47 ISSN 0026-9255 R&D Projects: GA ČR GF16-34860L Institutional support: RVO:67985840 Keywords : locally convex topological vector space * separable topological space Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.716, year: 2016 https://link.springer.com/article/10.1007%2Fs00605-016-0876-2

  17. High-Resolution WRF Forecasts of Lightning Threat

    Science.gov (United States)

    Goodman, S. J.; McCaul, E. W., Jr.; LaCasse, K.

    2007-01-01

    Tropical Rainfall Measuring Mission (TRMM)lightning and precipitation observations have confirmed the existence of a robust relationship between lightning flash rates and the amount of large precipitating ice hydrometeors in storms. This relationship is exploited, in conjunction with the capabilities of the Weather Research and Forecast (WRF) model, to forecast the threat of lightning from convective storms using the output fields from the model forecasts. The simulated vertical flux of graupel at -15C is used in this study as a proxy for charge separation processes and their associated lightning risk. Initial experiments using 6-h simulations are conducted for a number of case studies for which three-dimensional lightning validation data from the North Alabama Lightning Mapping Array are available. The WRF has been initialized on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity and reflectivity fields, and METAR and ACARS data. An array of subjective and objective statistical metrics is employed to document the utility of the WRF forecasts. The simulation results are also compared to other more traditional means of forecasting convective storms, such as those based on inspection of the convective available potential energy field.

  18. Status threat, not economic hardship, explains the 2016 presidential vote.

    Science.gov (United States)

    Mutz, Diana C

    2018-05-08

    This study evaluates evidence pertaining to popular narratives explaining the American public's support for Donald J. Trump in the 2016 presidential election. First, using unique representative probability samples of the American public, tracking the same individuals from 2012 to 2016, I examine the "left behind" thesis (that is, the theory that those who lost jobs or experienced stagnant wages due to the loss of manufacturing jobs punished the incumbent party for their economic misfortunes). Second, I consider the possibility that status threat felt by the dwindling proportion of traditionally high-status Americans (i.e., whites, Christians, and men) as well as by those who perceive America's global dominance as threatened combined to increase support for the candidate who emphasized reestablishing status hierarchies of the past. Results do not support an interpretation of the election based on pocketbook economic concerns. Instead, the shorter relative distance of people's own views from the Republican candidate on trade and China corresponded to greater mass support for Trump in 2016 relative to Mitt Romney in 2012. Candidate preferences in 2016 reflected increasing anxiety among high-status groups rather than complaints about past treatment among low-status groups. Both growing domestic racial diversity and globalization contributed to a sense that white Americans are under siege by these engines of change. Copyright © 2018 the Author(s). Published by PNAS.

  19. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  20. Religion, group threat and sacred values

    Directory of Open Access Journals (Sweden)

    Hammad Sheikh

    2012-03-01

    Full Text Available Sacred or protected values have important influences on decision making, particularly in the context of intergroup disputes. Thus far, we know little about the process of a value becoming sacred or why one person may be more likely than another to hold a sacred value. We present evidence that participation in religious ritual and perceived threat to the group lead people to be more likely to consider preferences as protected or sacred values. Specifically, three studies carried out with Americans and Palestinians show: (a that the more people participate in religious ritual the more likely they are to report a preference to be a sacred value (Studies 1--3; (b that people claim more sacred values when they are reminded of religious ritual (Study 2; and (c that the effect of religious ritual on the likelihood of holding a sacred value is amplified by the perception of high threat to the in-group (Study 3. We discuss implications of these findings for understanding intergroup conflicts, and suggest avenues for future research into the emergence and spread of sacred values.

  1. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  2. Initial perspectives on process threat management

    International Nuclear Information System (INIS)

    Whiteley, James R. Rob; Mannan, M. Sam

    2004-01-01

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this 'inside the gate' response as process threat management. The authors have initiated a joint industry/academia study to address: - the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and; - identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study

  3. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  4. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  5. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  6. Energy Systems in the Era of Energy Vectors A Key to Define, Analyze and Design Energy Systems Beyond Fossil Fuels

    CERN Document Server

    Orecchini, Fabio

    2012-01-01

    What lies beyond the era of fossil fuels? While most answers focus on different primary energy resources, Energy Systems in the Era of Energy Vectors provides a completely new approach. Instead of providing a traditional consumption analysis of classical primary energy resources such as oil, coal, nuclear power and gas, Energy Systems in the Era of Energy Vectors describes and assesses energy technologies, markets and future strategies, focusing on their capacity to produce, exchange, and use energy vectors. Special attention is given to the renewable energy resources available in different areas of the world and made exploitable by the integration of energy vectors in the global energy system. Clear definitions of energy vectors and energy systems are used as the basis for a complete explanation and assessment of up-to-date, available technologies for energy resources, transport and storage systems, conversion and use. The energy vectors scheme allows the potential realisation of a worldwide sustainable ener...

  7. Vectorization with SIMD extensions speeds up reconstruction in electron tomography.

    Science.gov (United States)

    Agulleiro, J I; Garzón, E M; García, I; Fernández, J J

    2010-06-01

    Electron tomography allows structural studies of cellular structures at molecular detail. Large 3D reconstructions are needed to meet the resolution requirements. The processing time to compute these large volumes may be considerable and so, high performance computing techniques have been used traditionally. This work presents a vector approach to tomographic reconstruction that relies on the exploitation of the SIMD extensions available in modern processors in combination to other single processor optimization techniques. This approach succeeds in producing full resolution tomograms with an important reduction in processing time, as evaluated with the most common reconstruction algorithms, namely WBP and SIRT. The main advantage stems from the fact that this approach is to be run on standard computers without the need of specialized hardware, which facilitates the development, use and management of programs. Future trends in processor design open excellent opportunities for vector processing with processor's SIMD extensions in the field of 3D electron microscopy.

  8. Reception of the Istrian musical tradition(s

    Directory of Open Access Journals (Sweden)

    Marušić Dario

    2007-01-01

    Full Text Available The successive colonization of Istria with culturally differentiated populations, and peripheral position of the peninsula regarding both the Latin and Slav worlds, has conditioned interesting phenomena which defines the traditional life of the province. On the spiritual level it is primarily reflected in two cultural dimensions: the language and traditional music.

  9. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  10. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  11. Transversals of Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    Dias, Kealey

    Vector fields in the complex plane are defined by assigning the vector determined by the value P(z) to each point z in the complex plane, where P is a polynomial of one complex variable. We consider special families of so-called rotated vector fields that are determined by a polynomial multiplied...... by rotational constants. Transversals are a certain class of curves for such a family of vector fields that represent the bifurcation states for this family of vector fields. More specifically, transversals are curves that coincide with a homoclinic separatrix for some rotation of the vector field. Given...... a concrete polynomial, it seems to take quite a bit of work to prove that it is generic, i.e. structurally stable. This has been done for a special class of degree d polynomial vector fields having simple equilibrium points at the d roots of unity, d odd. In proving that such vector fields are generic...

  12. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  13. Problems of vector Lagrangians in field theories

    International Nuclear Information System (INIS)

    Krivsky, I.Yu.; Simulik, V.M.

    1997-01-01

    A vector Lagrange approach to the Dirac spinor field and the relationship between the vector Lagrangians for the spinor and electromagnetic fields are considered. A vector Lagrange approach for the system of interacting electromagnetic B=(B μ υ)=(E-bar,H-bar) and spinor Ψ fields is constructed. New Lagrangians (scalar and vector) for electromagnetic field in terms of field strengths are found. The foundations of two new QED models are formulated

  14. Lentiviral vectors in cancer immunotherapy.

    Science.gov (United States)

    Oldham, Robyn Aa; Berinstein, Elliot M; Medin, Jeffrey A

    2015-01-01

    Basic science advances in cancer immunotherapy have resulted in various treatments that have recently shown success in the clinic. Many of these therapies require the insertion of genes into cells to directly kill them or to redirect the host's cells to induce potent immune responses. Other analogous therapies work by modifying effector cells for improved targeting and enhanced killing of tumor cells. Initial studies done using γ-retroviruses were promising, but safety concerns centered on the potential for insertional mutagenesis have highlighted the desire to develop other options for gene delivery. Lentiviral vectors (LVs) have been identified as potentially more effective and safer alternative delivery vehicles. LVs are now in use in clinical trials for many different types of inherited and acquired disorders, including cancer. This review will discuss current knowledge of LVs and the applications of this viral vector-based delivery vehicle to cancer immunotherapy.

  15. Travel and disease vector ticks.

    Science.gov (United States)

    McGarry, John W

    2011-03-01

    There are approximately twenty species of hard (ixodid) ticks worldwide that frequently affect human populations, many of which are associated with serious, sometimes fatal disease(s). When a tick travel souvenir is presented in the clinic, the risk must be immediately assessed by identifying the tick in question, ascertaining its disease vector status and determining if there has been the opportunity for the transfer of potential pathogens. This short review on identification of disease vector ticks and aspects of blood feeding and disease transmission includes the results of an examination of 59 specimens removed from UK domestic travellers and international travellers between 2002 and 2010. Sixteen tick species belonging to six genera were recorded and almost all showed evidence of blood feeding, which appears to contradict the view that because of their size, adult ticks are found early and therefore present an insignificant risk. Copyright © 2011 Elsevier Ltd. All rights reserved.

  16. Disease Vector Ecology Profile: Ecuador

    Science.gov (United States)

    1998-12-01

    years occurred in Peru in the northern departments bordering Ecuador in 1992-1994. Sylvatic plague is endemic in the southern provinces of Loja and... Ecuador ) Micrurus bocourti (Pacific lowlands of western Ecuador ) Micrurus catamayensis (Catamayo Valley, Loja Province) Micrurus dumerilii spp...Disease Vector Ecology Profile Ecuador -~· ""’ -.. ~ """ Defense Pest Management Information Analysis Center’ Armed Forces Pest Management

  17. Plebotomine Vectors of Human Disease.

    Science.gov (United States)

    1984-12-30

    incriminated as vectors of Leishmania mexicana among rodents and/or humans from Mexico to the Amazon Basin. Specimens referable to L. olmeca olmeca...in the format similar to that given for the species group baityi included in this report. Additional phlebotomines from Tanzania, Brazil, Peru and...species group baityi included in this report. Additional phlebotomines from Tanzania, Brazil, Peru and Venezuela were slide-mounted and added to the

  18. Characterizing Convexity of Games using Marginal Vectors

    NARCIS (Netherlands)

    van Velzen, S.; Hamers, H.J.M.; Norde, H.W.

    2003-01-01

    In this paper we study the relation between convexity of TU games and marginal vectors.We show that if specfic marginal vectors are core elements, then the game is convex.We characterize sets of marginal vectors satisfying this property, and we derive the formula for the minimum number of marginal

  19. Herbivore arthropods benefit from vectoring plant viruses

    NARCIS (Netherlands)

    Belliure, B.; Janssen, A.; Maris, P.C.; Peters, D.; Sabelis, M.W.

    2005-01-01

    Plants infected with pathogens often attract the pathogens' vectors, but it is not clear if this is advantageous to the vectors. We therefore quantified the direct and indirect (through the host plant) effects of a pathogen on its vector. A positive direct effect of the plant-pathogenic Tomato

  20. Vector fields and gravity on the lattice

    International Nuclear Information System (INIS)

    Khatsymovsky, V.M.

    1988-01-01

    The problem of discretization of vector field on Regge lattice is considered. Our approach is based on geometrical interpretation of the vector field as the field of infinitesimal coordinate transformation. A discrete version of the vector field action is obtained as a particular case of the continuum action, and it is shown to have the true continuum limit