WorldWideScience

Sample records for weaknesses threats strengths

  1. Strengths, Weaknesses, Opportunities and Threats

    NARCIS (Netherlands)

    Bull, J.W.; Jobstvogt, N.; Böhnke-Henrichs, A.; Mascarenhas, A.; Sitas, N.; Baulcomb, C.; Lambini, C.K.; Rawlins, M.; Baral, H.; Zähringer, J.; Carter-Silk, E.; Balzan, M.V.; Kenter, J.O.; Häyhä, T.; Petz, K.; Koss, R.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an

  2. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, Joseph William; Jobstvogt, N.; Böhnke-Henrichs, A.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an assess...

  3. The future of Jungian analysis: strengths, weaknesses, opportunities, threats ('SWOT').

    Science.gov (United States)

    Samuels, Andrew

    2017-11-01

    Using a methodology derived from management and organizational studies, the author reviews the future of Jungian analysis. The methodology is termed SWOT - strengths, weaknesses, opportunities, threats. A selected list in each of these categories is presented. The author is transparent in allowing for the fact that the paper not only derives from a public lecture on the topic, but also retains the immediacy and the contrarian and opinionated style of such a lecture. © 2017, The Society of Analytical Psychology.

  4. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    Science.gov (United States)

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy.

  5. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  6. Strengths, weaknesses, opportunities and threats for HTR deployment in Europe

    International Nuclear Information System (INIS)

    Bredimas, Alexandre; Kugeler, Kurt; Fütterer, Michael A.

    2014-01-01

    High temperature nuclear reactors are a technology, of which early versions were demonstrated in the 1960s–1980s in Germany (AVR, THTR) and the United States (Peach Bottom, Fort St. Vrain). HTRs were initially designed for high temperature, high efficiency electricity generation but the technology, the market and the targeted applications have evolved since then to address industrial cogeneration and new operational conditions (in particular new safety regulations). This paper intends to analyse the latest status of HTR today, as regards their intrinsic strengths and weaknesses and their external context, whether positive (opportunities) or negative (threats). Different dimensions are covered by the analysis: technology status, results from R and D programmes (especially in Europe), competences and skills, licensing aspects, experience feedback from demonstrator operation (in particular in Germany), economic conditions and other non-technical aspects. Europe has a comprehensive experience in the field of HTR with capabilities in both pebble bed and prismatic designs (R and D, engineering, manufacturing, operation, dismantling, and the full fuel cycle). Europe is also a promising market for HTR as the process heat market is large with good industrial and cogeneration infrastructures. The analysis of the European situation is to a good deal indicative for the global potential of this technology

  7. Strengths Weaknesses Opportunities and Threats of Blended Learning: Students’ Perceptions

    Science.gov (United States)

    Hande, S

    2014-01-01

    Background: Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. Aim: The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. Subjects and Methods: It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students’ perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. Results: The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. Conclusions: The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach. PMID:24971204

  8. Strengths weaknesses opportunities and threats of blended learning: students' perceptions.

    Science.gov (United States)

    Hande, S

    2014-05-01

    Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students' perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach.

  9. European Marine Biodiversity Monitoring Networks: strengths, weaknesses, opportunities and threats

    Directory of Open Access Journals (Sweden)

    Joana Patrício

    2016-09-01

    Full Text Available By 2020, European Union Member States should achieve Good Environmental Status (GES for eleven environmental quality descriptors for their marine waters to fulfill the Marine Strategy Framework Directive (MSFD. By the end of 2015, in coordination with the Regional Seas Conventions, each EU Member States was required to develop a marine strategy for their waters, together with other countries within the same marine region or sub-region. Coherent monitoring programs, submitted in 2014, form a key component of this strategy, which then aimed to lead to a Program of Measures (submitted in 2015. The European DEVOTES FP7 project has produced and interrogated a catalogue of EU marine monitoring related to MSFD descriptors 1 (biological diversity, 2 (non-indigenous species, 4 (food webs and 6 (seafloor integrity. Here we detail the monitoring activity at the regional and sub-regional level for these descriptors, as well as for 11 biodiversity components, 22 habitats and the 37 anthropogenic pressures addressed. The metadata collated for existing European monitoring networks were subject to a SWOT (strengths, weaknesses, opportunities and threats analysis. This interrogation has indicated case studies to address the following questions: a what are the types of monitoring currently in place?; b who does what and how?; c is the monitoring fit-for-purpose for addressing the MSFD requirements?, and d what are the impediments to better monitoring (e.g. costs, shared responsibilities between countries, overlaps, co-ordination? We recommend the future means, to overcome the identified impediments and develop more robust monitoring strategies and as such the results are especially relevant to implementing coordinated monitoring networks throughout Europe, for marine policy makers, government agencies and regulatory bodies. It is emphasized that while many of the recommendations given here require better, more extensive and perhaps more costly monitoring, this is

  10. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    Science.gov (United States)

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  11. [A SWOT (strengths, weaknesses, opportunities, threats) analysis of the current immunization program in Zhejiang Province].

    Science.gov (United States)

    He, Han-Qing; Ling, Luo-Ya; Xu, Xu-Qing

    2009-02-01

    To know the status of Immunization program in Zhejiang Province. The investigation on immunization program in zhejiang province was conducted, and the SWOT analysis was corducted to make a comprehensive evaluation. 11 cities, 22 counties and 44 towns were investigated in this study, and the current immunization program in Zhejiang province were explored by SWOT analysis. The SWOT Matrix, includes SO (strength-opportunity), ST (strength-threat), WO (weakness-opportunity) and WT (weakness-threat) can apply to make optimal strategy for the development of expanded program on immunization.

  12. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    Science.gov (United States)

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record.

  13. SWOT analysis: strengths, weaknesses, opportunities and threats of the Israeli Smallpox Revaccination Program.

    Science.gov (United States)

    Huerta, Michael; Balicer, Ran D; Leventhal, Alex

    2003-01-01

    During September 2002, Israel began its current revaccination program against smallpox, targeting previously vaccinated "first responders" among medical and emergency workers. In order to identify the potential strengths and weaknesses of this program and the conditions under which critical decisions were reached, we conducted a SWOT analysis of the current Israeli revaccination program, designed to identify its intrinsic strengths and weaknesses, as well as opportunities for its success and threats against it. SWOT analysis--a practical tool for the study of public health policy decisions and the social and political contexts in which they are reached--revealed clear and substantial strengths and weaknesses of the current smallpox revaccination program, intrinsic to the vaccine itself. A number of threats were identified that may jeopardize the success of the current program, chief among them the appearance of severe complications of vaccination. Our finding of a lack of a generation of knowledge on smallpox vaccination highlights the need for improved physician education and dissipation of misconceptions that are prevalent in the public today.

  14. Phase Change Materials in Transparent Building Envelopes: A Strengths, Weakness, Opportunities and Threats (SWOT Analysis

    Directory of Open Access Journals (Sweden)

    Ilaria Vigna

    2018-01-01

    Full Text Available Building envelopes can play a crucial role in building improvement efficiency, and the adoption of Phase Change Materials (PCMs, coupled with transparent elements, may: (i allow a better control of the heat flows from/to the outdoor environment, (ii increase the exploitation of solar energy at a building scale and (iii modulate light transmission in order to prevent glare effects. Starting from a literature review, focused on experimental works, this research identifies the main possible integrations of PCMs in transparent/translucent building envelope components (in glazing, in shutters and in multilayer façade system in order to draw a global picture of the potential and limitations of these technologies. Transparent envelopes with PCMs have been classified from the simplest “zero” technology, which integrates the PCM in a double glass unit (DGU, to more complex solutions—with a different number of glass cavities (triple glazed unit TGU, different positions of the PCM layer (internal/external shutter, and in combination with other materials (TIM, aerogel, prismatic solar reflector, PCM curtain controlled by an electric pump. The results of the analysis have been summarised in a Strengths, Weakness, Opportunities and Threats (SWOT analysis table to underline the strengths and weaknesses of transparent building envelope components with PCMs, and to indicate opportunities and threats for future research and building applications.

  15. Nuclear reactor control with fuzzy logic approaches - strengths, weakness, opportunities, and threats

    International Nuclear Information System (INIS)

    Ruan, Da

    2004-01-01

    As part of the special track on 'Lessons learned from computational intelligence in nuclear applications' at the forthcoming FLINS 2004 conference on Applied Computational Intelligence (Blankenberge, Belgium, September 1-3, 2004), research experiences on fuzzy logic techniques in applications of nuclear reactor control operation are critically reviewed in this presentation. Assessment of four real fuzzy control applications at the MIT research reactor in the US, the FUGEN heavy water reactor in Japan, the BR1 research reactor in Belgium, and a TRIGA Mark III reactor in Mexico will be examined thought a SWOT analysis (strengths, weakness, opportunities, and threats). Special attention will be paid to the current cooperation between the Belgian Nuclear Research Centre (SCK-CEN) and the Mexican Nuclear Centre (ININ) on the fuzzy logic control for nuclear reactor control project under the partial support of the National Council for Science and Technology of Mexico (CONACYT). (Author)

  16. Cannabis social clubs in Belgium: organizational strengths and weaknesses, and threats to the model.

    Science.gov (United States)

    Decorte, Tom

    2015-02-01

    Cannabis Social Clubs (CSCs) are private organizations or clubs of users that produce cannabis for non-profit distribution to adult members to meet their personal needs without having to turn to the black market. CSCs can be found in many countries, but the term often covers very different empirical realities. Inspired by the Spanish CSCs and similarly taking advantage of a grey area in the Belgian cannabis legislation, Belgian cannabis activists set up the first Belgian CSC in 2006, and there are now at least 5 Belgian CSCs. The paper's main objective is to analyse the (internal) strengths and weaknesses and the (external) opportunities and threats of the model, as it exists today. The paper draws on a review of international literature and qualitative data on the Belgian cannabis social clubs. Field visits and interviews were conducted with each club. We analysed membership application forms, cultivation protocols and contracts with growers, cannabis ownership certificates of members, information leaflets, the clubs' websites, and all media articles and documentaries on the clubs in the Belgian media. The paper describes the membership criteria and house rules, the members' profile, the organization and protocols for cannabis production, the distribution of cannabis through 'exchange fairs', the administrative features of the clubs and their contacts with other CSCs and with local authorities, the drug sector and the media. Belgian CSCs seem not profit-driven, and operate as a system in which cannabis is not too easily available. The clubs have fairly direct control over the quality and the potency of the cannabis they distribute. The model offers important potential opportunities, in terms of economic advantages and monitoring consumption patterns. The main threats to Belgian CSCs consist of attempts to criminalize the model, the emergence of profit-driven clubs and systemic violence from criminal entrepreneurs. Weaknesses of the model relate to the unstable or

  17. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    Science.gov (United States)

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes. Copyright © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Health Care System in Sudan: Review and Analysis of Strength, Weakness, Opportunity, and Threats (SWOT Analysis

    Directory of Open Access Journals (Sweden)

    Ebrahim M. A. Ebrahim

    2017-04-01

    Full Text Available Background: The Republic of the Sudan located in north-east of Africa and is considered to be a lower-middle income country. The country has well established healthcare system with many drawbacks mainly due to economic and managerial reasons followed by prolonged political instability and sanctions. Objective: The aim of this study is to give an insight over the health services system in Sudan and to analyze the strength, weakness, opportunities, and threats (SWOT. Materials and Methods: The search was done from two electronic databases: MEDLINE/Pubmed and from public search engines: Google Scholar and Google with key Search words used mainly as “Healthcare system in Sudan“. Additionally, SWOT analysis of healthcare system in Sudan was carried out based on the Roemer's model of health service system. Results: The Sudanese healthcare system was analyzed for different components of the system: The system in Sudan has full package of strategic plans and policies be it in a long term or short. Despite this there is poor implementation and organization along with frail health information system. The main external factors that drawback the system is the overall economic instability which resulted in cutting of the health expenditure. Conclusion: The Sudan is a rich country in terms of natural resources and population. Its health service system has strengths and weaknesses. It needs to build on its qualified human work force, stress on its well-designed short and long-term strategies on health care system and the partnership with external funding institutions, while overcoming the challenges on creating the proper health information system, economic support system and centralization of health service and professionals.

  19. THE STRENGTHS, WEAKNESSES, OPPORTUNITIES, AND THREATS (SWOTs) ANALYSES OF THE EBOLA VIRUS – PAPER RETRACTED

    Science.gov (United States)

    Babalola, Michael Oluyemi

    2016-01-01

    Background: Owing to the extreme virulence and case fatality rate of ebola virus disease (EVD), there had been so much furore, panic and public health emergency about the possible pandemic from the recent West African outbreak of the disease, with attendant handful research, both in the past and most recently. The magnitude of the epidemic of ebola virus disease has prompted global interest and urgency in the discovery of measures to mitigate the impact of the disease. Researchers in the academia and the industry were pressured to only focus on the development of effective and safe ebola virus vaccines, without consideration of the other aspects to this virus, which may influence the success or otherwise of a potential vaccine. The objective of this review was to adopt the SWOT concept to elucidate the biological Strengths, Weaknesses, Opportunities, and Threats to Ebola virus as a pathogen, with a view to understanding and devising holistic strategies at combating and overcoming the scourge of EVD. Method: This systematic review and narrative synthesis utilized Medline, PubMed, Google and other databases to select about 150 publications on ebola and ebola virus disease using text word searches to generate the specific terms. Relevant publications were reviewed and compared, findings were synthesized using a narrative method and summarized qualitatively. Results: Some of the identified strengths of ebola virus include: Ebola virus is an RNA virus with inherent capability to mutate, reassort and recombine to generate mutant or reassortant virulent strains; Ebola virus has a broad cellular tropism; Natural Reservoir of ebola virus is unconfirmed but fruit bats, arthropods, and plants are hypothesized; Ebola virus primarily targets and selectively destroys the immune system; Ebola viruses possess accessory proteins that inhibits the host’ immune responses; Secreted glycoprotein (sGP), a truncated soluble protein that triggers immune activation and increased vascular

  20. THE STRENGTHS, WEAKNESSES, OPPORTUNITIES, AND THREATS (SWOTs) ANALYSES OF THE EBOLA VIRUS - PAPER RETRACTED.

    Science.gov (United States)

    Babalola, Michael Oluyemi

    2016-01-01

    Owing to the extreme virulence and case fatality rate of ebola virus disease (EVD), there had been so much furore, panic and public health emergency about the possible pandemic from the recent West African outbreak of the disease, with attendant handful research, both in the past and most recently. The magnitude of the epidemic of ebola virus disease has prompted global interest and urgency in the discovery of measures to mitigate the impact of the disease. Researchers in the academia and the industry were pressured to only focus on the development of effective and safe ebola virus vaccines, without consideration of the other aspects to this virus, which may influence the success or otherwise of a potential vaccine. The objective of this review was to adopt the SWOT concept to elucidate the biological Strengths, Weaknesses, Opportunities, and Threats to Ebola virus as a pathogen, with a view to understanding and devising holistic strategies at combating and overcoming the scourge of EVD. This systematic review and narrative synthesis utilized Medline, PubMed, Google and other databases to select about 150 publications on ebola and ebola virus disease using text word searches to generate the specific terms. Relevant publications were reviewed and compared, findings were synthesized using a narrative method and summarized qualitatively. Some of the identified strengths of ebola virus include: Ebola virus is an RNA virus with inherent capability to mutate, reassort and recombine to generate mutant or reassortant virulent strains; Ebola virus has a broad cellular tropism; Natural Reservoir of ebola virus is unconfirmed but fruit bats, arthropods, and plants are hypothesized; Ebola virus primarily targets and selectively destroys the immune system; Ebola viruses possess accessory proteins that inhibits the host' immune responses; Secreted glycoprotein (sGP), a truncated soluble protein that triggers immune activation and increased vascular permeability is uniquely

  1. Agricultural biogas plants – A systematic analysis of strengths, weaknesses, opportunities and threats

    International Nuclear Information System (INIS)

    Brudermann, Thomas; Mitterhuber, Corinna; Posch, Alfred

    2015-01-01

    In this paper, we discuss the prospects of agricultural biogas plants. We conducted an integrated SWOT–AHP analysis for such plants in Austria in order to identify strengths, weaknesses, opportunities and threats (SWOT factors), and to weight the factors identified based on expert judgments, calculated according to the Analytic Hierarchy Process (AHP) method. The results show that financial aspects are dominant in three of the four SWOT categories. Technological aspects and issues regarding utilization seem to play a relatively minor role. Factors that are not directly under the control of plant operators are currently perceived as crucial for the success of agricultural biogas plants. We conclude that such plants will only succeed in contributing to sustainable energy supply goals when economic and political conditions are favorable over the long term. - Highlights: • Integrated SWOT–AHP analysis for agricultural biogas plants in Austria. • Quantification of weighting factors based on expert judgments. • Financial aspects dominate over technological and environmental aspects. • Sophisticated and flexible subsidy schemes are crucial for the further diffusion of the technology

  2. Cogeneration in Mexico: Weaknesses, Threats, strengths and opportunities; Cogeneracion en Mexico: Debilidades, amenazas, fortalezas y oportunidades

    Energy Technology Data Exchange (ETDEWEB)

    Elizalde Baltierra, Alberto; Garcia Pelaez, Juan [Programa Universitario de Energia, UNAM (Mexico)

    1997-07-01

    In this paper the strategies are formulated and evaluated, taking into account the internal and external aspects of the cogeneration in Mexico that foment their development in the medium term (two or four years). In the formulation of strategies a matrix DAFO (Weaknesses, Threats, Strengths and Opportunities) is employed and in the evaluation is applied the procedure of analytical hierarchical structuring. The future on the cogeneration in the next years will depend on diverse factors, among which can be mentioned: the legal frame; the financial situation of the interested companies; the outsourcing of financing; the prices of the electricity and fuels, as well as their availability, among others. [Spanish] En este trabajo se formulan y evaluan estrategias que, tomando en cuenta los aspectos internos y externos de la cogeneracion en Mexico, fomenten su desarrollo en el mediano plazo (dos o cuatro anos). En la formulacion de estrategias se emplea la matriz DAFO (Debilidades, Amenazas, Fortalezas y Oportunidades) y en la evaluacion se aplica el procedimiento de jerarquizacion analitica. El futuro de la cogeneracion en los proximos anos dependera de diversos factores, entre los que se pueden mencionar: el marco legal; la situacion financiera de las empresas interesadas; las fuentes externas de financiamiento; los precios de la electricidad y de los combustibles, asi como su disponibilidad, entre otros.

  3. Strengths, Weaknesses, Opportunities and Threats: Computational Studies of Mn- and Fe-Catalyzed Epoxidations

    Directory of Open Access Journals (Sweden)

    Filipe Teixeira

    2016-12-01

    Full Text Available The importance of epoxides as synthetic intermediates in a number of highly added-value chemicals, as well as the search for novel and more sustainable chemical processes have brought considerable attention to the catalytic activity of manganese and iron complexes towards the epoxidation of alkenes using non-toxic terminal oxidants. Particular attention has been given to Mn(salen and Fe(porphyrin catalysts. While the former attain remarkable enantioselectivity towards the epoxidation of cis-alkenes, the latter also serve as an important model for the behavior of cytochrome P450, thus allowing the exploration of complex biological processes. In this review, a systematic survey of the bibliographical data for the theoretical studies on Mn- and Fe-catalyzed epoxidations is presented. The most interesting patterns and trends are reported and finally analyzed using an evaluation framework similar to the SWOT (Strengths, Weaknesses, Opportunities and Threats analysis performed in enterprise media, with the ultimate aim to provide an overview of current trends and areas for future exploration.

  4. Strengths, weaknesses, opportunities and threats of virtual team in Nigerian construction industry

    Directory of Open Access Journals (Sweden)

    Odubiyi Tawakalitu Bisola

    2016-12-01

    Full Text Available The rationale behind any construction project varies; it might be to achieve value, time, quality, cost or just satisfaction for the client. Irrespective of any or all of these reasons, the team members involved in conception, inception, construction and delivery of a project are aware that a good teamwork is of essence. This is in the context of growing needs of client and the ever-growing improvement in methods of project delivery as influenced by technology. This article looks into the team type in the Nigerian construction industry from the angle of a virtual team (VT using the mixed-method research design. VT is simply a type of team wherein the members operate from different geographical regions and function majorly with the aid of information and communications technology media. Data for the study were collected from relevant literature, interviews were conducted with 20 selected professionals in the construction industry and, thereafter, a questionnaire was drafted from the results of the interviews and administered to selected relevant professionals. The study revealed that communication among team members, flexibility of operation and decision making are usually the most influencing strengths of the VT, while some of its weaknesses are a need for special training, conflict among team members and client’s acceptance of team type. Reduction in time-to-market, collaboration ability of team members and delivery time of project were seen as opportunities, while recognized threats were members’ performance level and complexity of technical application. The study concludes that the success of the VT depends highly on exploiting the opportunities opened to it.

  5. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT).

    Science.gov (United States)

    von Kodolitsch, Yskert; Bernhardt, Alexander M; Robinson, Peter N; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-06-01

    It is the physicians' task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise "SO" maximizing strengths and opportunities, "WT" minimizing weaknesses and threats, "WO" minimizing weaknesses and maximizing opportunities, and "ST" maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching "SW" with "OT". As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies.

  6. Strengths, weaknesses, opportunities and threats – swot analysis regarding the romanian participation in euratom programmes on nuclear safety topic

    International Nuclear Information System (INIS)

    Apostol, M.; Constantin, M.; Diaconu, D.

    2013-01-01

    In the frame of FP7 - NEWLANCER project, SWOT analysis (Strengths, Weaknesses, Opportunities and Threats) was performed by each partner from New Member States (NMS) in order to provide valuable input for the development of policies aimed to increase the participation of the NMS in Euratom programmes on the following topics: Generation III and IV systems and materials, Nuclear safety, Radioprotection, Radioactive waste management, and Education and training. The final objective of SWOT analysis performed by National Expert Groups on Nuclear Safety (NS) topic was to propose strategies, in order to reduce the influence of identified negative factors and to enhance influence of identified positive factors, regarding Romanian participation in Euratom programmes. (authors)

  7. Analysis of strengths, weaknesses, opportunities, and threats in the development of a health technology assessment program in Turkey.

    Science.gov (United States)

    Kahveci, Rabia; Meads, Catherine

    2008-01-01

    The Turkish healthcare system is currently undergoing reform, and efficient use of resources has become a key factor in determining the allocation of resources. The objective of this study was to analyze strengths, weaknesses, opportunities, and threats (SWOT) in the development of a health technology assessment (HTA) program in Turkey. A SWOT analysis was performed using a literature review and interviews with key people in the Turkish Ministry of Health and Ministry of Labor and Social Security. Regarding recent reforms in health care, investments for information network and databank are the strengths, but the traditional "expert-based" decision making, poor availability of data, and poor quality of data could be seen as some of the weaknesses. Another major weakness is lack of general awareness of HTA. Increasing demand for transparency in decision making, demand for evidence, and demand for credibility by decision makers are some of the opportunities, and current healthcare reforms, i.e., restructuring of healthcare and general health insurance, could also be seen as major opportunities. These opportunities unfortunately could be threatened by lack of funding, and resources are challenged by large, recent national investments. There is a good opportunity for Turkey to use the skills in HTA currently being developed through activities in Europe and the Americas to assist in the development of a much more cost-effective and transparent healthcare system in Turkey.

  8. Strengths, Weaknesses, Opportunities and Threats: A SWOT analysis of the ecosystem services framework

    CSIR Research Space (South Africa)

    Bull, JW

    2016-02-01

    Full Text Available and external factors that influence uptake. Such an assessment could form the basis for improving ES thinking, further embedding it into environmental decisions and management. The Young Ecosystem Services Specialists (YESS) completed a Strengths...

  9. Application of strengths, weaknesses, opportunities and threats analysis in the development of a health technology assessment program.

    Science.gov (United States)

    Gibis, B; Artiles, J; Corabian, P; Meiesaar, K; Koppel, A; Jacobs, P; Serrano, P; Menon, D

    2001-10-01

    There has been recent interest in developing a health technology assessment (HTA) function in Estonia. A group of individuals knowledgeable about HTA in Canada, Germany, Romania and Spain, along with representatives of the University of Tartu, Estonia, was convened by the Institute of Health Economics in Edmonton, Canada, to consider options for such a function. In a one-day workshop strengths, weaknesses, opportunities and threats (SWOT) analyses of HTA were conducted, first at a 'global' level, and then of the Estonian situation. The 'global' SWOT analysis yielded a large number of items that pertain to institutionalized HTA in a generic sense, i.e. not based on any individual HTA agency. The 'Estonian' SWOT yielded a subset of items, which pertain to development of HTA in that country. Ten actionable steps were then developed on the basis of this subset, which could be used to initiate the creation of an HTA body in Estonia.

  10. Strengths, weaknesses, opportunities, threats.

    Science.gov (United States)

    2002-12-01

    Meeting fellow older people enthusiasts is always a pleasure and this month's encounters particularly so. The annual conference of the two RCN older people forums offered its usual blend of innovative ideas, stimulating debate, esoteric humour and a camaraderie shared with strangers as well as friends. Working with multidisciplinary colleagues on the West Midlands pilot development programme for leaders of older people services was equally inspiring. Despite the ongoing challenges of competing priorities, inadequate resources and ageist attitudes, committed teams around the UK are striving to offer high quality services to older people.

  11. Designing alternative strategies for the European industry according to its strength and weaknesses and taking into consideration the opportunities and threats of the PV market

    International Nuclear Information System (INIS)

    Viaud, M.; Despotou, E.; Latour, M.; Cameron, M.; Weiss, I.; Baumann, J.; Stierstorfer, J.; Gisler, R.

    2004-01-01

    The objectives were to generate a variety of strategies to identify alternative ways that the PV Sector can use its specific strengths to capitalize on opportunities or to avoid threats and to overcome its weaknesses. The so-called SWOT analysis provides a matrix illustrating how businesses can match the external opportunities and threats facing the sector with its internal strengths and weaknesses to yield in possible strategic alternatives. This method lends itself to brainstorming to create alternative strategies and actions, which might not otherwise be considered. In two working group meetings with participants from the PV industry, research and other stakeholders the SWOT were performed to result into implications for the PV sector. Through workshops the results will be discussed within an expert group and priorities for the future activities will be defined. The project is co-financed through the 6. Framework Programme of the EC. (authors)

  12. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study

    Directory of Open Access Journals (Sweden)

    Samreen Misbah

    2017-12-01

    Full Text Available Purpose The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT analysis of integrating the World Health Organization (WHO patient safety curriculum into undergraduate medical education in Pakistan. Methods A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Results Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. Conclusion The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  13. Strengths, weaknesses, opportunities, and threats analysis of integrating the World Health Organization patient safety curriculum into undergraduate medical education in Pakistan: a qualitative case study.

    Science.gov (United States)

    Misbah, Samreen; Mahboob, Usman

    2017-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of integrating the World Health Organization (WHO) patient safety curriculum into undergraduate medical education in Pakistan. A qualitative interpretive case study was conducted at Riphah International University, Islamabad, from October 2016 to June 2017. The study included 9 faculty members and 1 expert on patient safety. The interviews were audiotaped, and a thematic analysis of the transcripts was performed using NVivo software. Four themes were derived based on the need analysis model. The sub-themes derived from the collected data were arranged under the themes of strengths, weaknesses, opportunities, and threats, in accordance with the principles of SWOT analysis. The strengths identified were the need for a formal patient safety curriculum and its early integration into the undergraduate program. The weaknesses were faculty awareness and participation in development programs. The opportunities were an ongoing effort to develop an appropriate curriculum, to improve the current culture of healthcare, and to use the WHO curricular resource guide. The threats were attitudes towards patient safety in Pakistani culture, resistance to implementation from different levels, and the role of regulatory authorities. The theme of patient safety needs to be incorporated early into the formal medical education curriculum, with the main goals of striving to do no harm and seeing mistakes as opportunities to learn. Faculty development activities need to be organized, and faculty members should to be encouraged to participate in them. The lack of a patient safety culture was identified as the primary reason for resistance to this initiative at many levels. The WHO curriculum, amended according to local institutional culture, can be implemented appropriately with support from the corresponding regulatory bodies.

  14. SWOT analysis of Banff: strengths, weaknesses, opportunities and threats of the international Banff consensus process and classification system for renal allograft pathology.

    Science.gov (United States)

    Mengel, M; Sis, B; Halloran, P F

    2007-10-01

    The Banff process defined the diagnostic histologic lesions for renal allograft rejection and created a standardized classification system where none had existed. By correcting this deficit the process had universal impact on clinical practice and clinical and basic research. All trials of new drugs since the early 1990s benefited, because the Banff classification of lesions permitted the end point of biopsy-proven rejection. The Banff process has strengths, weaknesses, opportunities and threats (SWOT). The strength is its self-organizing group structure to create consensus. Consensus does not mean correctness: defining consensus is essential if a widely held view is to be proved wrong. The weaknesses of the Banff process are the absence of an independent external standard to test the classification; and its almost exclusive reliance on histopathology, which has inherent limitations in intra- and interobserver reproducibility, particularly at the interface between borderline and rejection, is exactly where clinicians demand precision. The opportunity lies in the new technology such as transcriptomics, which can form an external standard and can be incorporated into a new classification combining the elegance of histopathology and the objectivity of transcriptomics. The threat is the degree to which the renal transplant community will participate in and support this process.

  15. Strategic analyses in nursing schools: attracting, educating, and graduating more nursing students: part I--strengths, weaknesses, opportunities, and threats analysis.

    Science.gov (United States)

    Crow, Stephen M; Hartman, Sandra J; Mahesh, Sathiadev; McLendon, Christy L; Henson, Steve W; Jacques, Paul

    2008-01-01

    The shortage of nurses in the United States remains a persistent problem. Faced with this reality, nursing programs in colleges and universities continue to struggle to expand enrollment levels to meet the spiraling demand. This research uses familiar tools in strategic management: the strengths, weaknesses, opportunities, and threats (SWOT) analysis and stakeholder analysis as initial steps to draw more students to the profession of nursing. In a 2-round modified Delphi survey, chief administrators of schools of nursing identify the main SWOT of schools of nursing and the important internal and external stakeholders that influence nursing school success. The authors of the research suggest ways to use that knowledge to increase the enrollment level of nursing students. Part I of this research focuses on the SWOT analyses.

  16. Applicability of SWOT analysis for measuring quality of public oral health services as perceived by adult patients in Finland. Strengths, weaknesses, opportunities and threats.

    Science.gov (United States)

    Toivanen, T; Lahti, S; Leino-Kilpi, H

    1999-10-01

    To determine the applicability of SWOT analysis for measuring the quality of public oral health services from the adult client's perspective. Data were collected using a structured questionnaire developed in an earlier study. The study group consisted of all adult (over 18 years of age) clients (n = 256) using public municipal oral health services in Kirkkonummi, Finland, during 2 weeks in 1995. Before treatment, patients filled out a questionnaire that measured the importance of their expectations in different aspects of oral care. After the appointment, they filled out a similar questionnaire that measured the enactment of these expectations in the treatment situation. The response rate was 51%. The difference between subjective importance and enactment of expectations was tested by Wilcoxon's signed rank test. Results were interpreted using both a conventional analysis of "expectation enacted or not" and SWOT analysis, which is used in strategic planning to identify areas of strengths (S), weaknesses (W), opportunities (O) and threats (T) in an organisation. In 28 statements out of 35, the two analyses revealed similar interpretations. In most areas the patient-perceived quality of the services was good. Weaknesses were found in the following areas: communicating to patients the causes and risk of developing oral diseases, informing them about different treatment possibilities, and including patients in decision-making when choosing restorative materials. SWOT analysis provided more structured interpretation of the results, and can be more easily transferred to development of services.

  17. A Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis on the clinical utility of sperm DNA fragmentation testing in specific male infertility scenarios.

    Science.gov (United States)

    Esteves, Sandro C; Agarwal, Ashok; Cho, Chak-Lam; Majzoub, Ahmad

    2017-09-01

    Sperm DNA fragmentation (SDF) is recognized as a leading cause of male infertility because it can impair the paternal genome through distinct pathophysiological mechanisms. Current evidence supports SDF as a major factor in the pathophysiology of several conditions, including varicocele, unexplained infertility, assisted reproductive technology failure, and environmental lifestyle factors, although the mechanisms involved have not been fully described yet. Measurement of the levels of DNA fragmentation in semen provides valuable information on the integrity of paternal chromatin and may guide therapeutic strategies. A recently published clinical practice guideline (CPG) highlighted how to use the information provided by SDF testing in daily practice, which triggered a series of commentaries by leading infertility experts. These commentaries contained an abundance of information and conflicting views about the clinical utility of SDF testing, which underline the complex nature of SDF. A search of papers published in response to the CPG entitled "Clinical utility of sperm DNA fragmentation testing: practice recommendations based on clinical scenarios" was performed within the Translational Andrology and Urology ( TAU ) website (http://tau.amegroups.com/). The start and end dates for the search were May 2017 and August 2017, respectively. Each commentary meeting our inclusion criteria was rated as "supportive without reservation", "supportive with reservation", "not supportive" or "neutral". We recorded whether articles discussed either SDF characteristics as a laboratory test method or clinical scenarios, or both. Subsequently, we extracted the particulars from each commentary and utilized the 'Strengths-Weaknesses-Opportunities-Threats' (SWOT) analysis to understand the perceived advantages and drawbacks of SDF as a specialized sperm function method in clinical practice. Fifty-eight fertility experts from six continents and twenty-two countries contributed

  18. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    Science.gov (United States)

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  19. Strengths only or strengths and relative weaknesses? A preliminary study.

    Science.gov (United States)

    Rust, Teri; Diessner, Rhett; Reade, Lindsay

    2009-10-01

    Does working on developing character strengths and relative character weaknesses cause lower life satisfaction than working on developing character strengths only? The present study provides a preliminary answer. After 76 college students completed the Values in Action Inventory of Strengths (C. Peterson & M. E. P. Seligman, 2004), the authors randomly assigned them to work on 2 character strengths or on 1 character strength and 1 relative weakness. Combined, these groups showed significant gains on the Satisfaction With Life Scale (E. Diener, R. A. Emmons, R. J. Larsen, & S. Griffin, 1985), compared with a 32-student no-treatment group. However, there was no significant difference in gain scores between the 2-strengths group and the 1-character-strength-and-1-relative-character-weakness group. The authors discuss how focusing on relative character weaknesses (along with strengths) does not diminish-and may assist in increasing-life satisfaction.

  20. The strengths, weaknesses, opportunities, and threats (SWOTs ...

    African Journals Online (AJOL)

    The magnitude of the epidemic of ebola virus disease has prompted global ... opportunities for Ebola virus; Use of dogs in hunting predisposes man and ... global spread; Possible mechanical transmission by arthropod vectors; No vaccines or ...

  1. Strengths Weaknesses Opportunities and Threats of Blended ...

    African Journals Online (AJOL)

    students more and that facilitated a more interactive classroom environment. .... link: The evaluation of an innovative and interactive CME program, poster abstracts. ... Picciano A. Blending with purpose: The multimodal model. J Res Cent Educ ...

  2. Compressive strength of brick masonry made with weak mortars

    DEFF Research Database (Denmark)

    Pedersen, Erik Steen; Hansen, Klavs Feilberg

    2013-01-01

    in the joint will ensure a certain level of load-carrying capacity. This is due to the interaction between compression in the weak mortar and tension in the adjacent bricks. This paper proposes an expression for the compressive strength of masonry made with weak lime mortars (fm... of masonry depends only on the strength of the bricks. A compression failure in masonry made with weak mortars occurs as a tension failure in the bricks, as they seek to prevent the mortar from being pressed out of the joints. The expression is derived by assuming hydrostatic pressure in the mortar joints......, which is the most unfavourable stress distribution with respect to tensile stresses in bricks. The expression is compared with the results of compression tests of masonry made with weak mortars. It can take into account bricks with arbitrary dimensions as well as perforated bricks. For a stronger mortar...

  3. A Central Amygdala CRF Circuit Facilitates Learning about Weak Threats.

    Science.gov (United States)

    Sanford, Christina A; Soden, Marta E; Baird, Madison A; Miller, Samara M; Schulkin, Jay; Palmiter, Richard D; Clark, Michael; Zweifel, Larry S

    2017-01-04

    Fear is a graded central motive state ranging from mild to intense. As threat intensity increases, fear transitions from discriminative to generalized. The circuit mechanisms that process threats of different intensity are not well resolved. Here, we isolate a unique population of locally projecting neurons in the central nucleus of the amygdala (CeA) that produce the neuropeptide corticotropin-releasing factor (CRF). CRF-producing neurons and CRF in the CeA are required for discriminative fear, but both are dispensable for generalized fear at high US intensities. Consistent with a role in discriminative fear, CRF neurons undergo plasticity following threat conditioning and selectively respond to threat-predictive cues. We further show that excitability of genetically isolated CRF-receptive (CRFR1) neurons in the CeA is potently enhanced by CRF and that CRFR1 signaling in the CeA is critical for discriminative fear. These findings demonstrate a novel CRF gain-control circuit and show separable pathways for graded fear processing. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    Science.gov (United States)

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  5. Weak and Failing States: Evolving Security Threats and U.S. Policy

    National Research Council Canada - National Science Library

    Wyler, Liana S

    2008-01-01

    .... national security goal since the end of the Cold War. Numerous U.S. government documents point to several threats emanating from states that are variously described as weak, fragile, vulnerable, failing, precarious, failed, in crisis, or collapsed...

  6. Major strengths and weaknesses of the lod score method.

    Science.gov (United States)

    Ott, J

    2001-01-01

    Strengths and weaknesses of the lod score method for human genetic linkage analysis are discussed. The main weakness is its requirement for the specification of a detailed inheritance model for the trait. Various strengths are identified. For example, the lod score (likelihood) method has optimality properties when the trait to be studied is known to follow a Mendelian mode of inheritance. The ELOD is a useful measure for information content of the data. The lod score method can emulate various "nonparametric" methods, and this emulation is equivalent to the nonparametric methods. Finally, the possibility of building errors into the analysis will prove to be essential for the large amount of linkage and disequilibrium data expected in the near future.

  7. Flowchart-format emergency operating procedures-strengths and weaknesses

    International Nuclear Information System (INIS)

    Barnes, V.E.; Bongarra, J.P. Jr.

    1989-01-01

    An increasing number of nuclear power plant licensees are converting their text-format emergency operating procedures (EOPs) to flowcharts. Findings of a recent study of the flowchart-format EOPs indicate that the flowchart format appears to solve several significant usability problems associated with text-format EOPs, but also introduces other types of usability concerns. This paper discusses some of the strengths and weaknesses of the flowchart format for presenting EOPs

  8. Governance Strengths and Weaknesses to implement the Marine Strategy Framework Directive in European Waters

    DEFF Research Database (Denmark)

    Freire-Gibb, L. Carlos; Koss, Rebecca; Piotr, Margonski

    2014-01-01

    addresses the Strengths, Weakness, Opportunities and Threats (SWOT) of the current European marine governance structures and its relationship to implement the MSFD. Results of the SWOT analysis were acquired through a combination of approaches with MSFD experts and stakeholders including: 30 face......-to-face interviews, an online survey with 264 stakeholder respondents and focus groups within each European marine region. The SWOT analysis concurrently identifies common strengths and weakness and key governance issues for implementing the MSFD for European marine regions. This paper forms one assessment within...... the governance component of the Options for Delivering Ecosystem Based Marine Management (ODEMM) project and presents timely issues that can be of benefit to national and European Union policy makers....

  9. [Strength and weaknesses of the German digital health economy].

    Science.gov (United States)

    Leppert, Florian; Gerlach, Jan; Ostwald, Dennis A; Greiner, Wolfgang

    2017-07-26

    There are high expectations from digitalization of health care, ehealth and telemedicine. Nevertheless, the diffusion of these services falls short of expectations. This study analyses the strength and weaknesses of the German digital health economy. Thereby, we specially focus on small and medium-sized enterprises (SME). The study is based on a literature review, interviews of experts and a workshop. The digital health economy is influenced by a heterogeneous environment with both promotive and obstructive factors. One of the largest weaknesses results from a lack of business models. There is a lack of possibilities of reimbursement by the Statutory Health Insurance (SHI). In addition, private users only have a small willingness to pay for digital services. The large number of regulations makes the implementation even harder, especially for SMEs. Thus, the current environment hampers fast diffusion of digital services in the German health care market. © Georg Thieme Verlag KG Stuttgart · New York.

  10. Nuclear emergency plans in France. Strengths and weaknesses. Report 2016

    International Nuclear Information System (INIS)

    Boilley, David; Josset, Mylene

    2016-01-01

    This report first presents nuclear emergency plans in France (specific intervention plans, action at the municipal level, creation of a national plan, planning of the post-accidental phase, integration of the international and cross-border dimension. Then, it analyses strengths and weaknesses of these plans. It outlines the necessity to take the most severe accident scenarios into account (issue of selection of reference accidents, necessity of reviewing emergency planning areas, and assessment of the number of inhabitants about French nuclear installations). It proposes a review of measures of protection of populations (information, sheltering, iodine-based prophylaxis, evacuation, food control and restrictions, protection of human resources, cross-border problems). It discusses how to put an end to the emergency situation, and the assessment and collaboration on emergency plans. The next part proposes an analysis of noticed strengths and weaknesses in some PPIs (specific intervention plans) in terms of text accessibility, of description of the site and of its environment, of intervention area, of operational measures, and of preparation to the post-accidental phase

  11. Unified programs nationally? Strengths and weaknesses of the learning standards

    Directory of Open Access Journals (Sweden)

    Ignacio Polo Martínez

    2014-06-01

    Full Text Available The inclusion of measurable learning standards as an element of the curriculum has definitely opened the door to the connection between the curriculum and external assessments. Since its origin, the potential impact of that element in improving our educational system has been defended and criticized. The truth is that in our country, though all regions are based on the same Royal Decree of core curriculum, and therefore the same reference for the evaluation, curriculum that ultimately applies to students ( teaching-learning- assessment from the different regions can have significant differences . This article proposes, from the analysis of various research , training programs, the plan of action for inspection and the author's own experience in processes of curriculum specifications , assess the potential strengths and weaknesses of the learning standards.

  12. Strengths and Weaknesses of the Current Dental Hygiene Educational System.

    Science.gov (United States)

    Theile, Cheryl Westphal

    2017-09-01

    The state of the dental hygiene educational system in the United States is evolving. The numbers of programs, extent of curricula, and diversity of students, faculty, and practice settings vary significantly across the country. New trends in workforce utilization and delivery models are challenging current educational foundations and mandating an interprofessional approach to both the education and practice of dental hygienists. This article presents an overview of the current state of dental hygiene education to create a baseline for discussion of desired educational models for 2040. The strengths and weaknesses are defined to motivate change. Limitations of the current two-year associate degree are emphasized, along with the need to add expanded content and development of new skills. The developing non-traditional practice settings bring both a challenge to dental hygiene education and a promise of increasing potential in primary care interprofessional settings for the 21 st century. This article was written as part of the project "Advancing Dental Education in the 21 st Century."

  13. [Archaeology and criminology--Strengths and weaknesses of interdisciplinary cooperation].

    Science.gov (United States)

    Bachhiesl, Christian

    2015-01-01

    Interdisciplinary cooperation of archaeology and criminology is often focussed on the scientific methods applied in both fields of knowledge. In combination with the humanistic methods traditionally used in archaeology, the finding of facts can be enormously increased and the subsequent hermeneutic deduction of human behaviour in the past can take place on a more solid basis. Thus, interdisciplinary cooperation offers direct and indirect advantages. But it can also cause epistemological problems, if the weaknesses and limits of one method are to be corrected by applying methods used in other disciplines. This may result in the application of methods unsuitable for the problem to be investigated so that, in a way, the methodological and epistemological weaknesses of two disciplines potentiate each other. An example of this effect is the quantification of qualia. These epistemological reflections are compared with the interdisciplinary approach using the concrete case of the "Eulau Crime Scene".

  14. [Strengths, weaknesses, and opportunities of French research in trophic ecology].

    Science.gov (United States)

    Perga, Marie-Élodie; Danger, Michael; Dubois, Stanislas; Fritch, Clémentine; Gaucherel, Cédric; Hubas, Cedric; Jabot, Franck; Lacroix, Gérard; Lefebvre, Sébastien; Marmonier, Pierre; Bec, Alexandre

    2018-05-30

    The French National Institute of Ecology and Environment (INEE) aims at fostering pluridisciplinarity in Environmental Science and, for that purpose, funds ex muros research groups (GDR) on thematic topics. Trophic ecology has been identified as a scientific field in ecology that would greatly benefit from such networking activity, as being profoundly scattered. This has motivated the seeding of a GDR, entitled "GRET". The contours of the GRET's action, and its ability to fill these gaps within trophic ecology at the French national scale, will depend on the causes of this relative scattering. This study relied on a nationally broadcasted poll aiming at characterizing the field of trophic ecology in France. Amongst all the unique individuals that fulfilled the poll, over 300 belonged at least partly to the field of trophic ecology. The sample included all French public research institutes and career stages. Three main disruptions within the community of scientist in trophic ecology were identified. The first highlighted the lack of interfaces between microbial and trophic ecology. The second evidenced that research questions were strongly linked to single study fields or ecosystem type. Last, research activities are still quite restricted to the ecosystem boundaries. All three rupture points limit the conceptual and applied progression in the field of trophic ecology. Here we show that most of the disruptions within French Trophic Ecology are culturally inherited, rather than motivated by scientific reasons or justified by socio-economic stakes. Comparison with the current literature confirms that these disruptions are not necessarily typical of the French research landscape, but instead echo the general weaknesses of the international research in ecology. Thereby, communication and networking actions within and toward the community of trophic ecologists, as planned within the GRET's objectives, should contribute to fill these gaps, by reintegrating microbes within

  15. Analisis Internal Perusahaan (Strength & Weakness), Menggunakan konsep ‘Resource-Based View of the Firm’ dengan Kerangka VRIO

    OpenAIRE

    Son Wandrial

    2011-01-01

    Problems in the company's internal environmental analysis is to determine the strengths and weaknesses (internal resources), we did not have reasonable grounds to determine whether the company's internal resources as a strength or weakness. Before we can determine whether a resource can be categorized as strengths or weaknesses, we must have a certain criteria so that appropriate resources are said to be a strength or weakness

  16. Analisis Internal Perusahaan (Strength & Weakness, Menggunakan konsep ‘Resource-Based View of the Firm’ dengan Kerangka VRIO

    Directory of Open Access Journals (Sweden)

    Son Wandrial

    2011-11-01

    Full Text Available Problems in the company's internal environmental analysis is to determine the strengths and weaknesses (internal resources, we did not have reasonable grounds to determine whether the company's internal resources as a strength or weakness. Before we can determine whether a resource can be categorized as strengths or weaknesses, we must have a certain criteria so that appropriate resources are said to be a strength or weakness

  17. Duration dependence test for rational speculative bubble: the strength and weakness

    OpenAIRE

    Ahmad, Mahyudin

    2012-01-01

    This review highlights the strength and weakness of duration dependence test used by Mokhtar, Nassir and Hassan (2006) to detect the rational speculative bubble in the Malaysian stock market. It is found that despite the test’s strength over the other tests, it is however sensitive to different specifications and therefore may produce contrasting results.

  18. Separate and interactive contributions of weak inhibitory control and threat sensitivity to prediction of suicide risk.

    Science.gov (United States)

    Venables, Noah C; Sellbom, Martin; Sourander, Andre; Kendler, Kenneth S; Joiner, Thomas E; Drislane, Laura E; Sillanmäki, Lauri; Elonheimo, Henrik; Parkkola, Kai; Multimaki, Petteri; Patrick, Christopher J

    2015-04-30

    Biobehavioral dispositions can serve as valuable referents for biologically oriented research on core processes with relevance to many psychiatric conditions. The present study examined two such dispositional variables-weak response inhibition (or disinhibition; INH-) and threat sensitivity (or fearfulness; THT+)-as predictors of the serious transdiagnostic problem of suicide risk in two samples: male and female outpatients from a U.S. clinic (N=1078), and a population-based male military cohort from Finland (N=3855). INH- and THT+ were operationalized through scores on scale measures of disinhibition and fear/fearlessness, known to be related to DSM-defined clinical conditions and brain biomarkers. Suicide risk was assessed by clinician ratings (clinic sample) and questionnaires (both samples). Across samples and alternative suicide indices, INH- and THT+ each contributed uniquely to prediction of suicide risk-beyond internalizing and externalizing problems in the case of the clinic sample where diagnostic data were available. Further, in both samples, INH- and THT+ interactively predicted suicide risk, with individuals scoring concurrently high on both dispositions exhibiting markedly augmented risk. Findings demonstrate that dispositional constructs of INH- and THT+ are predictive of suicide risk, and hold potential as referents for biological research on suicidal behavior. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  19. The strength-of-weak-ties perspective on creativity: a comprehensive examination and extension.

    Science.gov (United States)

    Baer, Markus

    2010-05-01

    Disentangling the effects of weak ties on creativity, the present study separated, both theoretically and empirically, the effects of the size and strength of actors' idea networks and examined their joint impact while simultaneously considering the separate, moderating role of network diversity. I hypothesized that idea networks of optimal size and weak strength were more likely to boost creativity when they afforded actors access to a wide range of different social circles. In addition, I examined whether the joint effects of network size, strength, and diversity on creativity were further qualified by the openness to experience personality dimension. As expected, results indicated that actors were most creative when they maintained idea networks of optimal size, weak strength, and high diversity and when they scored high on the openness dimension. The implications of these results are discussed. PsycINFO Database Record (c) 2010 APA, all rights reserved.

  20. Internationally Adopted Children in the Early School Years: Relative Strengths and Weaknesses in Language Abilities

    Science.gov (United States)

    Glennen, Sharon

    2015-01-01

    Purpose: This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Method: Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second…

  1. Memory Profiles in Children with Mild Intellectual Disabilities: Strengths and Weaknesses

    Science.gov (United States)

    Van der Molen, Mariet J.; Van Luit, Johannes E. H.; Jongmans, Marian J.; Van der Molen, Maurits W.

    2009-01-01

    Strengths and weaknesses in short-term memory (STM) and working memory (WM) were identified in children with mild intellectual disabilities (MID) by comparing their performance to typically developing children matched on chronological age (CA children) and to younger typically developing children with similar mental capacities (MA children).…

  2. Comparing Three Patterns of Strengths and Weaknesses Models for the Identification of Specific Learning Disabilities

    Science.gov (United States)

    Miller, Daniel C.; Maricle, Denise E.; Jones, Alicia M.

    2016-01-01

    Processing Strengths and Weaknesses (PSW) models have been proposed as a method for identifying specific learning disabilities. Three PSW models were examined for their ability to predict expert identified specific learning disabilities cases. The Dual Discrepancy/Consistency Model (DD/C; Flanagan, Ortiz, & Alfonso, 2013) as operationalized by…

  3. The Ambivalence of Strengths and Weaknesses of E-Learning Educational Services

    Directory of Open Access Journals (Sweden)

    Venera Mihaela Cojocariu

    2016-08-01

    Full Text Available This paper represents a thorough phase in the effort to identify and assort the strengths and weaknesses of e-learning educational services. This paper reviews a synthesis of the assessments on the e-learning educational services through a survey of the specialized literature from 2000 to 2012 in order to identify the strengths and weaknesses of e-learning educational services which were reported during the past decade. The steps of our approach are the following: 1. The identification of a large number of specialized studies that analyze the above mentioned issue; 2. A basic theoretical review of the research from the perspective of identifying the strengths and weaknesses of the e-learning educational services and some of their implications on the intellectual development of the beneficiaries; 3. A descriptive statistical data analysis which is carried out in order to extract information about strengths and weaknesses relevant to the literature taken into consideration; 4. Results classification and interpretation; 5. Formulating practical suggestions for the notion of e-learning educational services considering the development of studies on the impact of their use on the intellectual development of the beneficiaries. The study results highlighted that strengths and weaknesses are not 'pure', but ambivalent, simultaneously incorporating meanings and limits with different weights. A predictive model of future e-learning educational services can be designed on the basis of the results obtained in the research. This predictive model is based on a pedagogical concept that takes into account the ambivalence of the higher indices which have been identified.

  4. Internationally adopted children in the early school years: relative strengths and weaknesses in language abilities.

    Science.gov (United States)

    Glennen, Sharon

    2015-01-01

    This study aimed to determine the relative strengths and weaknesses in language and verbal short-term memory abilities of school-age children who were adopted from Eastern Europe. Children adopted between 1;0 and 4;11 (years;months) of age were assessed with the Clinical Evaluation of Language Fundamentals-Preschool, Second Edition (CELF-P2) and the Clinical Evaluation of Language Fundamentals, Fourth Edition (CELF-4) at age 5 and ages 6-7. Language composites and subtests were compared across time. All CELF-P2 and CELF-4 mean scores fell in the average range. Receptive composites were 102.74 and 103.86, and expressive composites were 100.58 and 98.42, at age 5 and ages 6-7, respectively. Age of adoption did not correlate to test scores. At ages 6-7, receptive language, sentence formulation, and vocabulary were areas of strength, with subtest scores significantly better than test norms. Verbal short-term memory and expressive grammar subtest scores were within the average range but significantly worse than test norms. A high percentage of children scored 1 standard deviation below the mean on these 2 subtests (27.3%-34.1%). Eastern European adoptees had average scores on a variety of language tests. Vocabulary was a relative strength; enriching the environment substantially improved this language area. Verbal short-term memory and expressive grammar were relative weaknesses. Children learning a language later in life may have difficulty with verbal short-term memory, which leads to weaknesses in expressive syntax and grammar.

  5. Long-term monitoring of river basins: strengths and weaknesses, opportunities and threats

    Science.gov (United States)

    Howden, N. J. K.; Burt, T. P.

    2016-12-01

    In a world where equilibrium is more and more uncommon, monitoring is an essential way to discover whether undesirable change is taking place. Monitoring requires a deliberate plan of action: the regular collection and processing of information. Long-term data reveal important patterns, allowing trends, cycles, and rare events to be identified. This is particularly important for complex systems where signals may be subtle and slow to emerge. Moreover, very long data sets are essential to test hypotheses undreamt of at the time the monitoring was started. This overview includes long time series from UK river basins showing how hydrology and water quality have changed over time - and continue to change. An important conclusion is the long time frame of system recovery, well beyond the normal lifetime of individual governments or research grants. At a time of increasing hydroclimatic variability, long time series remain crucially important; in particular, continuity of observations is vital at key benchmark sites.

  6. Strengths-weaknesses-opportunities-threats (Swot) of wave energy industry in Portugal

    International Nuclear Information System (INIS)

    La regina, Veronica; Neumann, Frank; Russell, Iain; Sarmento, Antonio J. N. A.

    2006-01-01

    Energy policy-makers in countries are facing the daunting challenge of achieving energy security environmental protection and economic efficie16ncy. Renewable are considered by many policy-makers to contribute to improving energy security and protecting the environment. On an average cost basis, some renewables in the best locations are still not competitive. Supportive policies are still needed to encourage the further development and deployment especially of 'new' renewables in energy markets. Wave energy (WE) is front-runner of Marine Renewable Energies, as its technologies are not yet mature for a complete commercial status. Thus, a new a potential wave energy industry requires strong policy support from all stakeholders involved in it. We, like most other forms of renewable energy (RE), has a significant potential to mitigate global climate change, address regional and local environmental concerne, reduce poverty and increase energy security. The challenge is to provide the right policy frameworks and financial tools that will enable RE to achieve its market potential and move from marginal significance for the energy supply into the mainstream. Policy-makers thus have a mandate to take action and, since most of the capital for these green-actions will not come from public treasuries, most of these actions will need to focus on creating enabling frameworks and finance mechanisms for technology R and D, commercialisation and investment. For this form of RE to achieve its market potential, policy frameworks and financial instruments are necessary that give financiers the necessary assurance and incentives to shift investment away from oil technologies to large-scale investment in a clean energy systems. The paper assesses how Portugal should result attractive for wave energy industry according with geographical position, wave motions' power and policies' ability to attract finance. It describes present financing instruments for wave energy plant development and explains the barriers and financing gaps that today make it difficult to raise capital for WE. Recommendations are proposed for both policymakers and financial institutions.(Author)

  7. THE STRENGTHS, WEAKNESSES, OPPORTUNITIES, AND THREATS (SWOTs) ANALYSES OF THE EBOLA VIRUS ? PAPER RETRACTED

    OpenAIRE

    Babalola, Michael Oluyemi

    2016-01-01

    Background: Owing to the extreme virulence and case fatality rate of ebola virus disease (EVD), there had been so much furore, panic and public health emergency about the possible pandemic from the recent West African outbreak of the disease, with attendant handful research, both in the past and most recently. The magnitude of the epidemic of ebola virus disease has prompted global interest and urgency in the discovery of measures to mitigate the impact of the disease. Researchers in the acad...

  8. Strengths and Weaknesses of McNamara's Evolutionary Psychological Model of Dreaming

    Directory of Open Access Journals (Sweden)

    Sandra Olliges

    2010-10-01

    Full Text Available This article includes a brief overview of McNamara's (2004 evolutionary model of dreaming. The strengths and weaknesses of this model are then evaluated in terms of its consonance with measurable neurological and biological properties of dreaming, its fit within the tenets of evolutionary theories of dreams, and its alignment with evolutionary concepts of cooperation and spirituality. McNamara's model focuses primarily on dreaming that occurs during rapid eye movement (REM sleep; therefore this article also focuses on REM dreaming.

  9. Strength and Weakness of Crisis Management in Hormozgan Medical University’s Hospitals

    Directory of Open Access Journals (Sweden)

    Zahra Mastane

    2012-02-01

    Full Text Available Background & Objective: Various communities continuously try to manage the unexpected events. In this regard, hospitals with providing timely health care services has transformed to the most pragmatic unit of health system. Planning and preparation of them should be strategic policy of health system. This paper aimed to investigate the strength and weakness of crisis management in training hospitals of Hormozgan University of Medical Sciences. Materials & Methods: This is descriptive-analytic research. Research statistical population includes managers, nursing directors, financial directors and masters of crises committee of hospitals, totally 34 persons. Data collected with questionnaire in 8 domains and demographic information. Questionnaire was validated and reliabled. Collected data entered to SPSS and analyzed by descriptive & inferential statistics. Results: Preparedness Rate of Hospitals encounters Unexpected Events was average (50%. Preparedness rate in managerial policies (44.1%, structural and non-structural stability (41.2% and register & informed (47% domains were in average level. In this regard HEICS (32.3%, maneuvers (55.9% and use of relative technologies were in very low grade. Between preparedness rate with crises committee function, training and maneuvers there were meaningful relations (P<0.05. Conclusion: Suitable crises management will be feasible by documented planning, preparing intra and extra organizational relations, reinforcing human resources with organizing, delivering of training and durational maneuvers to them. Keywords: Strength, Weakness, Crisis, Crisis Management Type of Article: Original Article

  10. Biotic indices for assessing the status of coastal waters: a review of strengths and weaknesses.

    Science.gov (United States)

    Martínez-Crego, Begoña; Alcoverro, Teresa; Romero, Javier

    2010-05-01

    Biotic indices have become key assessment tools in most recent national and trans-national policies aimed at improving the quality of coastal waters and the integrity of their associated ecosystems. In this study we analyzed 90 published biotic indices, classified them into four types, and analyzed the strengths and weaknesses of each type in relation to the requirements of these policies. We identified three main type-specific weaknesses. First, the problems of applicability, due to practical and conceptual difficulties, which affect most indices related to ecosystem function. Second, the failure of many indices based on structural attributes of the community (e.g. taxonomic composition) to link deterioration with causative stressors, or to provide an early-detection capacity. Third, the poor relevance to the ecological integrity of indices based on attributes at the sub-individual level (e.g. multi-biomarkers). Additionally, most indices still fail on two further aspects: the broad-scale applicability and the definition of reference conditions. Nowadays, the most promising approach seems to be the aggregation of indices with complementary strengths, and obtained from different biological communities.

  11. Motivated Implicit Theories of Personality: My Weaknesses Will Go Away, but My Strengths Are Here to Stay.

    Science.gov (United States)

    Steimer, Andreas; Mata, André

    2016-04-01

    Across six studies, this research found consistent evidence for motivated implicit theories about personality malleability: People perceive their weaknesses as more malleable than their strengths. Moreover, motivation also influences how people see themselves in the future, such that they expect their present strengths to remain constant, but they expect their present weaknesses to improve in the future. Several additional findings suggest the motivational nature of these effects: The difference in perceived malleability for strengths versus weaknesses was only observed for the self, not for other people. When the desirability of possessing a certain trait was manipulated, that trait was perceived to be more malleable when it was depicted as undesirable. And these different beliefs that people have about how malleable their traits are, and how they will develop in the future, were associated with their desire for change, which is higher for weaknesses versus strengths. © 2016 by the Society for Personality and Social Psychology, Inc.

  12. COMPARATIVE ANALISYS BETWEEN THE OBJECTIVE AND THE SUBJECTIVE QUALITY OF LIFE APPROACH - STRENGTHS AND WEAKNESSES

    Directory of Open Access Journals (Sweden)

    Constantinescu Mihaela

    2011-12-01

    Full Text Available Quality of Life (QOL can be defined as the degree in which the objective needs of an individual are satisfied in relation with the subjective perspective of his well-being. Thus, there are two different approaches in QOL evaluation: the objective approach (which analyzes the quality of life through economic indicators and the subjective approach (which evaluates quality through the individuals opinion and actions. There isn't a widely accepted view referring to the use of one of those two QOL approaches, each having a series of strengths and weaknesses. This paper presents a comparative analysis of the advantages and disadvantages brought by these two approaches in QOL studies. The objective analysis has a series of strengths (among which we mention the fact that allows valide comparisons and the fact that doesn't depend on individuals perception, but has also a series of weaknesses, starting with the dependence on statistical data, which in many cases has incomplete registrations,and ending with the fact that doesn't reflect the real value of the well-being perceived by population. The motives for which the QOL subjective approach is promoted, therefore its strenghts, refer to the fact that it reflects important experiences for each individual and the fact that it reveals how macroeconomic policies satify the individual's needs. Certainly, this type of QOL analysis has also some weaknesses, like the lack of validity and accuracy in the data collected through surveys. Considering all the above, there is a conclusion with a wide aplication in the present context of the economy: we can't make a clear delineation between the two QOL approaches, moreover we can state the fact that the is a strong correlation between those two. Thus, the most precise systems of quality of life evaluation are those which use both objective, and subjective indicators, reaching a high level of aggregation at the national and international level.

  13. Animal Study Registries: Results from a Stakeholder Analysis on Potential Strengths, Weaknesses, Facilitators, and Barriers.

    Science.gov (United States)

    Wieschowski, Susanne; Silva, Diego S; Strech, Daniel

    2016-11-01

    Publication bias in animal research, its extent, its predictors, and its potential countermeasures are increasingly discussed. Recent reports and conferences highlight the potential strengths of animal study registries (ASRs) in this regard. Others have warned that prospective registration of animal studies could diminish creativity, add administrative burdens, and complicate intellectual property issues in translational research. A literature review and 21 international key-informant interviews were conducted and thematically analyzed to develop a comprehensive matrix of main- and subcategories for potential ASR-related strengths, weaknesses, facilitators, and barriers (SWFBs). We identified 130 potential SWFBs. All stakeholder groups agreed that ASRs could in various ways improve the quality and refinement of animal studies while allowing their number to be reduced, as well as supporting meta-research on animal studies. However, all stakeholder groups also highlighted the potential for theft of ideas, higher administrative burdens, and reduced creativity and serendipity in animal studies. Much more detailed reasoning was captured in the interviews than is currently found in the literature, providing a comprehensive account of the issues and arguments around ASRs. All stakeholder groups highlighted compelling potential strengths of ASRs. Although substantial weaknesses and implementation barriers were highlighted as well, different governance measures might help to minimize or even eliminate their impact. Such measures might include confidentiality time frames for accessing prospectively registered protocols, harmonized reporting requirements across ASRs, ethics reviews, lab notebooks, and journal submissions. The comprehensive information gathered in this study could help to guide a more evidence-based debate and to design pilot tests for ASRs.

  14. Animal Study Registries: Results from a Stakeholder Analysis on Potential Strengths, Weaknesses, Facilitators, and Barriers.

    Directory of Open Access Journals (Sweden)

    Susanne Wieschowski

    2016-11-01

    Full Text Available Publication bias in animal research, its extent, its predictors, and its potential countermeasures are increasingly discussed. Recent reports and conferences highlight the potential strengths of animal study registries (ASRs in this regard. Others have warned that prospective registration of animal studies could diminish creativity, add administrative burdens, and complicate intellectual property issues in translational research. A literature review and 21 international key-informant interviews were conducted and thematically analyzed to develop a comprehensive matrix of main- and subcategories for potential ASR-related strengths, weaknesses, facilitators, and barriers (SWFBs. We identified 130 potential SWFBs. All stakeholder groups agreed that ASRs could in various ways improve the quality and refinement of animal studies while allowing their number to be reduced, as well as supporting meta-research on animal studies. However, all stakeholder groups also highlighted the potential for theft of ideas, higher administrative burdens, and reduced creativity and serendipity in animal studies. Much more detailed reasoning was captured in the interviews than is currently found in the literature, providing a comprehensive account of the issues and arguments around ASRs. All stakeholder groups highlighted compelling potential strengths of ASRs. Although substantial weaknesses and implementation barriers were highlighted as well, different governance measures might help to minimize or even eliminate their impact. Such measures might include confidentiality time frames for accessing prospectively registered protocols, harmonized reporting requirements across ASRs, ethics reviews, lab notebooks, and journal submissions. The comprehensive information gathered in this study could help to guide a more evidence-based debate and to design pilot tests for ASRs.

  15. Patients’ perspectives on antenatal group consultations: Identifying communicative strengths and weaknesses

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    Introduction and objectives: The doctor-patient dyad has constituted the main paradigmatic relationship in Western medicine, and provided a central focus for health communication research and clinical teaching endeavors. With new technologies, other constellations are enabled, such as patient......-patient communication, which is increasingly taking place in online patient communities. One novel offline setting which can support patient-patient communication is the group consultation where an individual healthcare professional and a group of patients engage. The purpose of this study is to investigate how patient......-patient communication unfolds in a group consultation with a midwife in order to identify its communicative strengths and weaknesses. Methods: Using a sequential multi-methods design, we performed eight individual interviews with pregnant women from a Danish antenatal clinic about their experiences of two group...

  16. 3D printing from MRI Data: Harnessing strengths and minimizing weaknesses.

    Science.gov (United States)

    Ripley, Beth; Levin, Dmitry; Kelil, Tatiana; Hermsen, Joshua L; Kim, Sooah; Maki, Jeffrey H; Wilson, Gregory J

    2017-03-01

    3D printing facilitates the creation of accurate physical models of patient-specific anatomy from medical imaging datasets. While the majority of models to date are created from computed tomography (CT) data, there is increasing interest in creating models from other datasets, such as ultrasound and magnetic resonance imaging (MRI). MRI, in particular, holds great potential for 3D printing, given its excellent tissue characterization and lack of ionizing radiation. There are, however, challenges to 3D printing from MRI data as well. Here we review the basics of 3D printing, explore the current strengths and weaknesses of printing from MRI data as they pertain to model accuracy, and discuss considerations in the design of MRI sequences for 3D printing. Finally, we explore the future of 3D printing and MRI, including creative applications and new materials. 5 J. Magn. Reson. Imaging 2017;45:635-645. © 2016 International Society for Magnetic Resonance in Medicine.

  17. Methods, strengths, weaknesses, and limitations of bioequivalence tests with special regard to immunosuppressive drugs.

    Science.gov (United States)

    van Gelder, Teun; Gabardi, Steven

    2013-08-01

    Within the field of solid organ transplantation, the patents for a number of immunosuppressive drugs have expired in the last few years. Tacrolimus, cyclosporine, and mycophenolate mofetil are now available as generic drugs. In some countries, the market penetration of these generic formulations is as high as 70%, whereas in some other countries, this figure is below 10%. Several professional societies have published position papers on the risks and benefits of generic substitution of immunosuppressive drugs. It often appears that transplant professionals are not fully aware of the requirements for registration of generic drugs. This article describes the registration requirements with a focus on bioequivalence testing, the strengths and weaknesses in this process, and the differences between Europe and the US. © 2013 The Authors Transplant International © 2013 European Society for Organ Transplantation. Published by Blackwell Publishing Ltd.

  18. Turning a weakness into a strength. A smart external energy policy for Europe

    International Nuclear Information System (INIS)

    Coby van der, Linde

    2008-01-01

    Energy policy objectives and the suitability of traditional instruments to achieve them are currently under review. The main goals are to improve the balance among the three priorities of energy policy-making, to make a transition to both a more sustainable energy mix and, at the same time, improve the security of that mix during the transition to it. As this policy will only produce result in the longer term, an alternative in EU external energy policy-making should be found to coercing reluctant members states into accepting the usually top down, generic approach of the EU and into giving up competencies that serve national interests. This pragmatic route to policy-making could be to explore a path that turns EU weakness in the foreign and energy policy sphere into strengths by the smart use of diversity, asymmetry and subsidiarity in a bottom up, more tailor-made approach

  19. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses

    Directory of Open Access Journals (Sweden)

    María Cónsul-Giribet

    2014-10-01

    Full Text Available OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups.METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class with three years of professional experience. The data were collected through a questionnaire and discussion groups.RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice.CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life.

  20. Evidences on weaknesses and strengths from health financing after decentralization: lessons from Latin American countries.

    Science.gov (United States)

    Arredondo, Armando; Orozco, Emanuel; De Icaza, Esteban

    2005-01-01

    The main objective was to identify trends and evidence on health financing after health care decentralization. Evaluative research with a before-after design integrating qualitative and quantitative analysis. Taking into account feasibility, political and technical criteria, three Latin American countries were selected as study populations: Mexico, Nicaragua and Peru. The methodology had two main phases. In the first phase, the study referred to secondary sources of data and documents to obtain information about the following variables: type of decentralization implemented, source of finance, funds of financing, providers, final use of resources and mechanisms for resource allocation. In the second phase, the study referred to primary data collected in a survey of key personnel from the health sectors of each country. The trends and evidence reported in all five financing indicators may identify major weaknesses and strengths in health financing. Weaknesses: a lack of human resources trained in health economics who can implement changes, a lack of financial resource independence between the local and central levels, the negative behavior of the main macro-economic variables, and the difficulty in developing new financing alternatives. Strengths: the sharing between the central level and local levels of responsibility for financing health services, the implementation of new organizational structures for the follow-up of financial changes at the local level, the development and implementation of new financial allocation mechanisms taking as a basis the efficiency and equity principles, new technique of a per-capita adjustment factor corrected at the local health needs, and the increase of financing contributions from households and local levels of government.

  1. Identifying and Analyzing Internal Strengths and Weaknesses of Shohada and Razi Hospitals

    Directory of Open Access Journals (Sweden)

    Friba Mirzamohamadi-Teimorloue

    2016-12-01

    Full Text Available Background and Objectives: Assessment of the internal environment involves evaluating the situation of an organization, its performance measurement, identifying the problems and its potentials. If this evaluation is performed appropriately, then the organization can have access to an accurate and complete image of the existing situation which will assist the organization in providing a proper prospect and plan an effective and efficient strategy. The purpose of this research was analyzing the internal environment, identifying the weaknesses and the strengths of the organization. Material and Methods: This was a cross sectional and descriptive study which was carried out as a survey. The sample size of this survey was formed by 260 employees holding a bachelor’s degree or higher. The data were collected by distributing questionnaires among the members of the sample group. The different components of Weisbord model included setting goals, structure, leadership, communications, reward, useful mechanism (co-ordination, and the attitude towards change. The data were analyzed by SPSS software and statistical tests. Results: The findings of this study showed that the components of goal setting and communications have a lot of strong points at both Shohada and Razi Hospitals. Regarding the components of leadership, structure, and the attitude towards change, more attention is needed by the managers of these hospitals. The reward component is actually one of the weak points in both centers. Useful mechanism component is the weak point of Razi hospital. Conclusion: Considering the findings of this survey, both Shohada and Razi hospitals are in a desirable and positive condition in all of the components except for the component of reward. Hence, conducting periodical surveys for a better understanding of the organization, making right decisions and promoting the efficiency of the employees are recommended.

  2. Study skills and habits in Shiraz dental students; strengths and weaknesses.

    Science.gov (United States)

    Zarshenas, Ladan; Danaei, Shahla Momeni; Mazarei, Elham; Zarif Najafi, Hooman; Shakour, Mahsa

    2014-01-01

    The dental students, the same as other students, during their academic courses are required to learn a wide range of scientific subjects. Obviously, choosing the inappropriate method of study leads to confuse and disenchantment of students and it causes wasting of their energy. The purpose of this study was to assess the existing strengths and weaknesses of the skills and study habits in Dental Students of Shiraz University of Medical Sciences in 2009-10. In this cross-sectional study, all of the dental students (n = 274), who studied at the time of study at all levels in the academic year of 2009-10, were selected by the census. Data were collected by using the Huston University questionnaire consisted of two parts of demographic questions and 64 specific areas of study skills in eight domains of time management, concentration/memory, study aids/note taking, test strategies, information processing, motivation, self-assessment/reading, and writing skills. Following the retranslation of the questionnaire, the validity was confirmed by using the content validity method. The reliability was obtained by using the Cronbach's Alpha of 0.92. The data were analyzed with SPSS software version 17 and using analytical statistic tests. Students who have previously participated in the study skills workshops had stronger skills in comparison with the students who had not participated in these workshops. Time management skills (P = 0.04), motivation (P = 0.0001) and information processing (P = 0.03) in students with professional status were in a more favorable position and showed significant differences in terms of educational levels. The study skills mean score of the students living in student housings in comparison with the other students were significantly higher (P = 0.04). Marital status showed no significant differences in reading skills. The review of study skills in the undergraduate and post-graduate dental students indicated that the residents had higher reading skills

  3. Strengths and weaknesses of the school mediation from the perspective of students in secondary education

    Directory of Open Access Journals (Sweden)

    Laura García Raga

    2016-06-01

    Full Text Available In this paper we present a study to know the valuation of school mediation as an educational strategy taking into account the views of students in five schools in secondary Valencia, where the formal mediation process has been active for at least two years. It also seeks to identify the strengths and weaknesses identified.To achieve the objectives it has collected information from 593 students through an ad hoc difference between issues that all students must answer questionnaire; questions addressed only the students who have gone to mediation service; and finally issues to respond only the students who have acted as mediators.Through descriptive exploratory study conducted, is highlighted as a result the great general agreement exists on the part of students participating in valuing very positively to mediation, particularly their impact on conflict resolution and prevention of serious and violent situations. On the other hand, as for improvement, poor training in mediation and little relation to those benefits linked with faculty is detected, since mediation seems so positively influence the teaching faculty teaching in the classroom and in the relationships between students and faculty. In conclusion, the study shows that school mediation is considered advantageous for students and an opportunity that helps them manage their own conflicts, although there are aspects that should work towards the educational potential of school mediation in the improving coexistence and configuration of democratic citizenship.

  4. Examining the global health arena: strengths and weaknesses of a convention approach to global health challenges.

    Science.gov (United States)

    Haffeld, Just Balstad; Siem, Harald; Røttingen, John-Arne

    2010-01-01

    The article comprises a conceptual framework to analyze the strengths and weaknesses of a global health convention. The analyses are inspired by Lawrence Gostin's suggested Framework Convention on Global Health. The analytical model takes a starting-point in events tentatively following a logic sequence: Input (global health funding), Processes (coordination, cooperation, accountability, allocation of aid), Output (definition of basic survival needs), Outcome (access to health services), and Impact (health for all). It then examines to what degree binding international regulations can create order in such a sequence of events. We conclude that a global health convention could be an appropriate instrument to deal with some of the problems of global health. We also show that some of the tasks preceding a convention approach might be to muster international support for supra-national health regulations, negotiate compromises between existing stakeholders in the global health arena, and to utilize WHO as a platform for further discussions on a global health convention. © 2010 American Society of Law, Medicine & Ethics, Inc.

  5. Can stereotype threat affect motor performance in the absence of explicit monitoring processes? Evidence using a strength task.

    Science.gov (United States)

    Chalabaev, Aïna; Brisswalter, Jeanick; Radel, Rémi; Coombes, Stephen A; Easthope, Christopher; Clément-Guillotin, Corentin

    2013-04-01

    Previous evidence shows that stereotype threat impairs complex motor skills through increased conscious monitoring of task performance. Given that one-step motor skills may not be susceptible to these processes, we examined whether performance on a simple strength task may be reduced under stereotype threat. Forty females and males performed maximum voluntary contractions under stereotypical or nullified-stereotype conditions. Results showed that the velocity of force production within the first milliseconds of the contraction decreased in females when the negative stereotype was induced, whereas maximal force did not change. In males, the stereotype induction only increased maximal force. These findings suggest that stereotype threat may impair motor skills in the absence of explicit monitoring processes, by influencing the planning stage of force production.

  6. Research reveals co-ordination and collaboration strengths and weaknesses in population education.

    Science.gov (United States)

    1991-01-01

    The strengths and weaknesses of population education programs in Sri Lanka, Nepal, and the Maldives, based on descriptive research studies, are identified. The research topics were devised at a Subregional Meeting on Joint Research studies in Population Education for South Asia Subregion in 1990, as well as motivational strategies for promoting the small family norm in Bangladesh and Pakistan. Results were presented at a 1991 meeting held in UNESCO PROAP. The results were that 3 very different collaborative modalities operate in these countries. Sri Lanka had a formal national population committee for coordinating functions. The Maldives had no national formal structures, but there were linkages between population programs. Nepal had a formal structure but had failures in coordination. The Sri Lanka Population Committee, which began in 1972, established population education when the entire educational system was being reformed. The curriculum development committee consisted of representatives from a variety of disciplines and worked as a cohesive unit. As a consequence, junior secondary schools taught population education in such courses as social studies and science. Regional departments of education provided inservice training to the junior secondary school teachers. At the policy level, the education plan of 1972/73-77 was implemented within the National 5 Year Plan and the Population Committee functioned under a senior government Minister, which provided greater credibility and implementation. It also ensured linkage with other departments, agencies, and development programs. In the Maldives, the linkage was between the Population Education Program of the Educational Development Center (EDC) and the Allied Health Service Training Center's (AHSTC) child-spacing program. The small scale size may be a factor in the coordination and resource sharing and effective linkages without a formal national committee umbrella. The weakness was in multiplicity of effort

  7. Validation of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors Questionnaire in Hong Kong

    Science.gov (United States)

    Lai, Kelly Y. C.; Leung, Patrick W. L.; Luk, Ernest S. L.; Wong, Ann S. Y.; Law, Lawrence S. C.; Ho, Karen K. Y.

    2013-01-01

    Objective: Unlike rating scales that focus on the severity of ADHD symptoms, the Strengths and Weaknesses of ADHD-Symptoms and Normal-Behaviors (SWAN) rating scale is phrased in neutral or positive terms for carers to compare the index child's behaviors with that of their peers. This study explores its psychometric properties when applied to…

  8. Macroeconomics of Natural Disasters: Strengths and Weaknesses of Meta-Analysis Versus Review of Literature.

    Science.gov (United States)

    A G van Bergeijk, Peter; Lazzaroni, Sara

    2015-06-01

    We use the case of the macroeconomic impact of natural disasters to analyze strengths and weaknesses of meta-analysis in an emerging research field. Macroeconomists have published on this issue since 2002 (we identified 60 studies to date). The results of the studies are contradictory and therefore the need to synthesize the available research is evident. Meta-analysis is a useful method in this field. An important aim of our article is to show how one can use the identified methodological characteristics to better understand the robustness and importance of new findings. To provide a comparative perspective, we contrast our meta-analysis and its findings with the major influential research synthesis in the field: the IPCC's 2012 special report Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation. We show that the IPCC could have been more confident about the negative economic impact of disasters and more transparent on inclusion and qualification of studies, if it had been complemented by a meta-analysis. Our meta-analysis shows that, controlling for modeling strategies and data set, the impact of disasters is significantly negative. The evidence is strongest for direct costs studies where we see no difference between our larger sample and the studies included in the IPCC report. Direct cost studies and indirect cost studies differ significantly, both in terms of the confidence that can be attached to a negative impact of natural disasters and in terms of the sources of heterogeneity of the findings reported in the primary studies. © 2015 Society for Risk Analysis.

  9. A new strength assessment to evaluate the association between muscle weakness and gait pathology in children with cerebral palsy.

    Directory of Open Access Journals (Sweden)

    Marije Goudriaan

    Full Text Available The main goal of this validation study was to evaluate whether lower limb muscle weakness and plantar flexor rate of force development (RFD related to altered gait parameters in children with cerebral palsy (CP, when weakness was assessed with maximal voluntary isometric contractions (MVICs in a gait related test position. As a subgoal, we analyzed intra- and intertester reliability of this new strength measurement method.Part 1 -Intra- and intertester reliability were determined with the intra-class correlation coefficient (ICC2,1 in 10 typical developing (TD children (age: 5-15. We collected MVICs in four lower limb muscle groups to define maximum joint torques, as well as plantar flexor RFD. Part 2 -Validity of the strength assessment was explored by analyzing the relations of lower limb joint torques and RFD to a series of kinematic- and kinetic gait features, the GDI (gait deviation index, and the GDI-kinetic in 23 children with CP (GMFCS I-II; age: 5-15 and 23 TD children (age: 5-15 with Spearman's rank correlation coefficients.Part 1 -The best reliability was found for the torque data (Nm, with the highest ICC2,1 (0.951 for knee extension strength (inter and the lowest (0.693 for dorsiflexion strength (intra. For plantar flexor RFD, the most reliable window size was 300 milliseconds (ICC2,1: 0.828 (inter and 0.692 (intra. Part 2 -The children with CP were significantly weaker than the TD children (p <0.001. Weakness of the dorsiflexors and plantar flexors associated with delayed and decreased knee flexion angle during swing, respectively. No other significant correlations were found.While our new strength assessment was reliable, intra-joint correlations between weakness, RFD, and gait deviations were low. However, we found inter-joint associations, reflected by a strong association between plantar- and dorsiflexor weakness, and decreased and delayed knee flexion angle during swing.

  10. Strengths and weaknesses of parent–staff communication in the NICU: a survey assessment

    Science.gov (United States)

    2013-01-01

    Background Parents of infants hospitalized in the neonatal intensive care unit (NICU) find themselves in a situation of emotional strain. Communication in the NICU presents special challenges due to parental stress and the complexity of the highly technologized environment. Parents’ need for communication may not always be met by the NICU staff. This study aimed to describe strengths and weaknesses of parent–nurse and parent–doctor communication in a large level III NICU in Sweden in order to improve our understanding of parents’ communication needs. Methods Parents were asked to complete a survey consisting of sixteen questions about their experiences of communication with nurses and doctors in the NICU. In each question the parents evaluated some aspect of communication on a five- or six-point Likert scale. They also had the opportunity on each question to comment on their experiences in their own words. Data were analyzed using IBM SPSS Statistics 20.0 and qualitative manifest content analysis. Results 270 parents (71.4%) completed the survey. Parents generally rated communication with the staff in the NICU positively and appreciated having received emotional support and regular information about their child´s care. Although a large majority of the parents were satisfied with their communication with doctors and nurses, only about half of the parents felt the nurses and doctors understood their emotional situation very well. Some parents would have desired easier access to conversations with doctors and wanted medical information to be given directly by doctors rather than by nurses. Parents’ communication with the staff was hampered when many different nurses were involved in caring for the infant or when the transfer of information in connection with shift changes or between the maternity ward and NICU was poor. Parents also desired to be present during doctors’ rounds on their infant. Conclusions Training both doctors and nurses in communication

  11. Evaluation of the strengths and weaknesses of community-based education from the viewpoint of students

    Directory of Open Access Journals (Sweden)

    SEDIGHEH MOKHTARPOUR

    2016-10-01

    Full Text Available Introduction: Responsive medicine is an appropriate training method which trains the graduates who can act effectively in initial and secondary aspects of health issues in the society. Methods: This was a cross-sectional descriptive-analytic study which was done using quantitative method. The target population of this study was all the students of the Nutrition and Health School of Shiraz University of Medical Sciences. The sample was randomly selected in this study and 75 students were selected based on the methodologist’s comments and similar studies and randomnumber table from a list obtained from the school’s department of education. This questionnaire was a researcher-made one which consisted of 23 questions in 2 sections with 21 closedended questions and 2 open-ended questions; 70 questionnaires were completed correctly. The closed-ended questions had 4 aspects (completely agree to completely disagree answered in 5-point Likert scale type. Its face validity was confirmed by 4 faculty members. The construct validity of the questionnaire was analyzed by factor analysis test and its reliability was assessed by a pilot on 20 students with a Cronbach’s alpha of 0.85. The data were analyzed using descriptive statistical tests (mean, standard deviation, … and the Pearson coefficient (p<0.001. Results: The results of this study showed that the maximum mean score was 3.58±0.65 which was related to the context of these courses and the minimum mean was 2.66±1.14 which was related to the logbook implementation. The 2 open-ended questions indicated that the most important strengths were the use of logbooks as a guide and determining the minimum training; of the weaknesses was the mismatch between the theoretical education and the practical activities. Also, developing the minimum training that an expert should know and using the common topics related to theoretical education were the most important points mentioned by the respondents

  12. Stakeholders' views on the strengths and weaknesses of maternal care financing and its reform in Georgia.

    Science.gov (United States)

    Shengelia, Lela; Pavlova, Milena; Groot, Wim

    2017-08-08

    The improvement of maternal health has been one of the aims of the health financing reforms in Georgia. Public-private relationships are the most notable part of the reform. This study aimed to assess the strengths and weakness of the maternal care financing in Georgia in terms of adequacy and effects. A qualitative design was used to explore the opinions of key stakeholders about the adequacy of maternal care financing and financial protection of pregnant women in Georgia. Women who had used maternal care during the past 4 years along with health care providers, policy makers, and representatives of international partner organizations and national professional body were the respondents in this study. Six focus group discussions to collect data from women and 15 face-to-face in-depth interviews to collect data from the other stakeholders were conducted. Each focus group discussion consisted of 7-8 women. Two focus group discussions were carried out at each of the target settings (i.e. Tbilisi, Imereti and Adjara). Women were selected in each location through the hospital registry and snowballing method. The evidence shows that there is a consensus among maternal care stakeholder groups on the influence of the healthcare financing reforms on maternal health. Specifically, the privatization of the maternal care services has had positive effects because it significantly improved the environment and technical capacity of the maternity houses. Also, in contrast to other former-soviet republics, there are no informal payments anymore for maternal care in Georgia. However the privatization, which was done without strict regulation, negatively influenced the reform process and provided the possibility to private providers to manipulate the formal user fees in maternal care. Stakeholders also indicated that the UHC programs implemented at the last stage of the healthcare financing reform as well as other state maternal health programs protect women from catastrophic health

  13. Nine years of publications on strengths and weaknesses of Family Physician Program in rural area of Iran: A systematic review

    Directory of Open Access Journals (Sweden)

    Saber Azami-Aghdash

    2016-12-01

    Full Text Available Introduction: One of the most important duties of a family physician is to provide primary health care. This is completely considered in the Family Physician Program for a target population. The aim of this study was to systematically review the Family Physician and Referral System strength and weakness in rural area of Iran. Methods: In this systematic review, Scientific Information Database (SID, Science Direct, and PubMed databases were searched and Google search engine was employed using key words such as family medicine, family physician, and referral system for the period of January 2005 to June 2013, both in English and Persian. For identifying duplicated references, Endnote Software was used and for summarizing results of fully assessed articles extraction table was employed. Results: Strengths and weaknesses of Family Physician Program and referral system in rural areas of Iran were extracted from 28 studies. In total, 115 weaknesses (3.96 per study and 103 strengths (3.55 per study were obtained. Content analysis was used and 218 items were summarized into 29 items. Strengths of Family Physician Program were: access of villagers to health services, filling health document for clients, improving services for pregnant mothers, and family planning; while its obvious weaknesses included repeated unnecessary referral of clients as well as lack of providing job stability. Conclusion: Results of studies conducted in Iran showed that Family Physician and Referral System in rural area of Iran could not be successful enough and has many shortcomings. Therefore, a growing body of effective changes must be made for a better performance and to obtain better outcomes.

  14. A review on weaknesses and strengths of delivering Mehr housing project in terms of achieving economical goals

    Directory of Open Access Journals (Sweden)

    Ali Karshenasan

    2013-09-01

    Full Text Available Housing is one of the most important sections of development in a country and its economic importance has put it in the center of attention. It can cause rise and depression of habitation by its extended economic aspects. Mehr Housing plan is a state run housing project in most cities started 2007 in Iran to protect and provide cheap housing for poor people and young couples. Mehr housing project by its large scale and wide dimensions can affect the society’s economy. Therefore, to investigate weaknesses and strengths of this project in terms of economic and applying necessary reformation can increase the success probability of this project. For this purpose, this study assess the weaknesses and strengths of Mehr housing of province of Khorram Abad in Iran for achieving economic goals and also presents solutions to better access to these goals. Time scope of the present study is 6 months of 2011 and the second 3 months of 2012. The methodology is applicable in terms of goal and is descriptive survey in terms of nature. In this study, a combined method of interviewing to experts and distributing a questionnaire among the applicants of Mehr housing has been used for data collecting. Among strengths of Khorram Abad in economic section, employment and urban landfill pattern reformation can be implied. In addition, among weaknesses of this project are lack of proper first design and technical justification of the project and use of only 2 shabby fabrics.

  15. Hamstring and Quadriceps Isokinetic Strength Deficits Are Weak Risk Factors for Hamstring Strain Injuries: A 4-Year Cohort Study.

    Science.gov (United States)

    van Dyk, Nicol; Bahr, Roald; Whiteley, Rodney; Tol, Johannes L; Kumar, Bhavesh D; Hamilton, Bruce; Farooq, Abdulaziz; Witvrouw, Erik

    2016-07-01

    A hamstring strain injury (HSI) has become the most common noncontact injury in soccer. Isokinetic muscle strength deficits are considered a risk factor for HSIs. However, underpowered studies with small sample sizes unable to determine small associations have led to inconclusive results regarding the role of isokinetic strength and strength testing in HSIs. To examine whether differences in isokinetic strength measures of knee flexion and extension represent risk factors for hamstring injuries in a large cohort of professional soccer players in an adequately powered study design. Cohort study; Level of evidence, 2. A total of 614 professional soccer players from 14 teams underwent isokinetic strength testing during preseason screening. Testing consisted of concentric knee flexion and extension at 60 deg/s and 300 deg/s and eccentric knee extension at 60 deg/s. A clustered multiple logistic regression analysis was used to identify variables associated with the risk of HSIs. Receiver operating characteristic (ROC) curves were calculated to determine sensitivity and specificity. Of the 614 players, 190 suffered an HSI during the 4 seasons. Quadriceps concentric strength at 60 deg/s (odds ratio [OR], 1.41; 95% CI, 1.03-1.92; P = .03) and hamstring eccentric strength at 60 deg/s (OR, 1.37; 95% CI, 1.01-1.85; P = .04) adjusted for bodyweight were independently associated with the risk of injuries. The absolute differences between the injured and uninjured players were 6.9 N·m and 9.1 N·m, with small effect sizes (d hamstring eccentric strength, respectively, indicating a failed combined sensitivity and specificity of the 2 strength variables identified in the logistic regression models. This study identified small absolute strength differences and a wide overlap of the absolute strength measurements at the group level. The small associations between lower hamstring eccentric strength and lower quadriceps concentric strength with HSIs can only be considered as weak

  16. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    International Nuclear Information System (INIS)

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development

  17. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  18. The strength of the rotating Presidency is that it keeps the Presidency weak

    DEFF Research Database (Denmark)

    Beach, Derek

    One of the most important justifications for the adoption of the Treaty of Lisbon was that the introduction of a fixed President of the European Council would result in a more efficient Europe. During the negotiations serious attempts were made to strengthen the Presidency at the Council of Minis...... fashion to all, and finds, formulates and brokers acceptable compromises. Acceptable is not the same as being neutral, and an instrumental leader can exploit its position for private gains, but it cannot be too blatant as it is in more hegemonic forms of leadership....... of Ministers level, including proposals to allow the European Council President to chair the General Affairs Council. Underlying these reform efforts is the argument that the Presidency as an institution is unable to supply effective leadership, and in particular that smaller member states are manifestly...... that while the powers possessed by the Presidency are relatively weak, it is the very weakness of the Presidency that makes it an effective leader. Drawing upon recent advances in the study of informal norms in the Council and leadership theories, this paper first discusses what types of leadership...

  19. The Strength of Weak Ties in MBA Job Search: A Within–Person Test

    Directory of Open Access Journals (Sweden)

    Jason Greenberg

    2016-05-01

    Full Text Available Whether and how social ties create value has inspired substantial research in organizational theory, sociology, and economics. Scholars generally believe that social ties impact labor market outcomes. Two explanatory mechanisms have been identified, emphasizing access to better job offers in pecuniary terms and the efficacy of non-redundant information. The evidence informing each theory, however, has been inconsistent and circumstantial. We test predictions from both models using a rich set of job search data collected from an MBA student population, including detailed information about search channels and characteristics of job offers. Importantly, we can compare offers made to the same student derived via different search channels while accounting for industry, function, and non-pecuniary characteristics. We find that contrary to conventional wisdom, search through social networks typically results in job offers with lower total compensation (-17 percent for referrals through strong ties and -16 percent for referrals via weak ties vs. formal search. However, our models also show that students are considerably more likely to accept offers derived via weak ties. They do so because they are perceived to have greater growth potential and other non-pecuniary value. On balance, our tests are consistent with Granovetter’s argument that networks provide value by facilitating access to information that is otherwise difficult to obtain, rather than providing greater pecuniary compensation.

  20. Identifying strengths and weaknesses of Quality Management Unit University of Sumatera Utara software using SCAMPI C

    Science.gov (United States)

    Gunawan, D.; Amalia, A.; Rahmat, R. F.; Muchtar, M. A.; Siregar, I.

    2018-02-01

    Identification of software maturity level is a technique to determine the quality of the software. By identifying the software maturity level, the weaknesses of the software can be observed. As a result, the recommendations might be a reference for future software maintenance and development. This paper discusses the software Capability Level (CL) with case studies on Quality Management Unit (Unit Manajemen Mutu) University of Sumatera Utara (UMM-USU). This research utilized Standard CMMI Appraisal Method for Process Improvement class C (SCAMPI C) model with continuous representation. This model focuses on activities for developing quality products and services. The observation is done in three process areas, such as Project Planning (PP), Project Monitoring and Control (PMC), and Requirements Management (REQM). According to the measurement of software capability level for UMM-USU software, turns out that the capability level for the observed process area is in the range of CL1 and CL2. Planning Project (PP) is the only process area which reaches capability level 2, meanwhile, PMC and REQM are still in CL 1 or in performed level. This research reveals several weaknesses of existing UMM-USU software. Therefore, this study proposes several recommendations for UMM-USU to improve capability level for observed process areas.

  1. Support network for families of children and adolescents with visual impairment: strengths and weaknesses.

    Science.gov (United States)

    Barbieri, Mayara Caroline; Broekman, Gabriela Van Der Zwaan; Souza, Renata Olzon Dionysio de; Lima, Regina Aparecida Garcia de; Wernet, Monika; Dupas, Giselle

    2016-10-01

    This study aimed to understand the interactions established between social support networks and families that have children and adolescents with visual impairment, in two different cities in the state of Sao Paulo, Brazil. This was a qualitative, descriptive study with symbolic interactionism as a theoretical framework. A genogram, ecomap and semi-structured interviews with 18 families were used. The method adopted for data analysis was narrative analysis. Two themes were found: potentials derived from the relationship with the support network, and, counterpoints in the support network. The family members accessed other members of their own family, friends, spiritual and cultural activities, health services, government institutions, and philanthropic organizations as support networks. The weakness in health services support is an obstacle to comprehensive healthcare for children and adolescents living in city A. In city B, other possibilities exist because it has a reference service. Despite the weaknesses in the support network in both cities, the family articulates and develops a foundation so that they can provide the best situation possible for their child or adolescent. It is up to health professionals to provide support to families and empower them to care for their members.

  2. Turning Weaknesses into Strengths: Nordic Tourism, Potentials for Growth and Major Challenges

    Directory of Open Access Journals (Sweden)

    Ruhet Genc

    2010-03-01

    Full Text Available Nordic region is a geographical area which is characterized by a combination of nature, culture, history and technology and regarded as a common entity in political, economical and historical sense. Although rich in its resources, Nordic tourism has not actualized its potential in full. The present paper aims to identify weaknesses of the region, to outline a new set of directions for improving Nordic tourism and to delineate major challenges. Its geographical and natural beauties, cultural characteristics, technological advancement and policy development are identified as assets for tourism advancement in the region. Winter tourism, adventure tourism, nature-based tourism and cultural tourism are demonstrated as potential routes of growth. Marketing strategies and changing trends are discussed as major challenges, with suggestions for implementation.

  3. A thematic analysis of the strengths and weaknesses of manufacturers' submissions to the NICE Single Technology Assessment (STA) process.

    Science.gov (United States)

    Carroll, Christopher; Kaltenthaler, Eva; FitzGerald, Patrick; Boland, Angela; Dickson, Rumona

    2011-10-01

    The NICE Single Technology Appraisal (STA) process in the UK has been underway for five years. Evidence Review Groups (ERGs) critically appraise submissions from manufacturers on the clinical and cost effectiveness of new technologies. This study analysed the ERGs' assessment of the strengths and weaknesses of 30 manufacturers' submissions to the STA process. Thematic analysis was performed on the textual descriptions of the strengths and weakness of manufacturer submissions, as outlined by the ERGs in their reports. Various themes emerged from the data. These themes related to the processes applied in the submissions; the content of the submission (e.g. the amount and quality of evidence); the reporting of the submissions' review and analysis processes; the reliability and validity of the submissions' findings; and how far the submission had satisfied the STA process objectives. STA submissions could be improved if attention were paid to transparency in the reporting, conduct and justification of review and modelling processes and analyses, as well as greater robustness in the choice of data and closer adherence to the scope or decision problem. Where this adherence is not possible, more detailed justification of the choice of evidence or data is required. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  4. Socio-cognitive understanding: a strength or weakness in Down's syndrome?

    Science.gov (United States)

    Wishart, J G

    2007-12-01

    Social understanding is often thought to be relatively 'protected' in children with Down's syndrome (DS) and to underlie the outgoing personality characteristically attributed to them. This paper draws together findings from our studies of behaviours during object concept testing, generally considered a theoretically 'pure' measure of early cognitive ability, and from more recent work focusing on two key socio-cognitive skills: recognising facial expressions of emotion and collaborative learning. Age range of children studied was 4 months to 18 years. Using standardised hiding tasks, object concept ability was assessed cross-sectionally and longitudinally in children with DS and in age- or stage-matched typically developing (TD) children. Stability of cognitive advances was assessed and similarities/differences in developmental pathways explored. In the emotion recognition studies, the ability to distinguish six primary emotions was measured, with performance compared with that of developmentally-matched TD children and age-matched children with intellectual disabilities of similar severity but differing aetiology [non-specific intellectual disability (NSID) or fragile X syndrome (FXS)]. In the collaborative learning study, the impact on sorting skills of working with a peer on a conceptually related task was measured, with outcomes compared in DS, NSID and TD child pairings. Evidence of counterproductive, socially-based strategies being inappropriately applied by children with DS in learning contexts was found in both the object concept and collaborative learning studies, along with inefficient use of current cognitive and linguistic abilities. Emotion recognition weaknesses were also identified, although deficits were relative rather than absolute and individual variability was marked. In line with emerging evidence from other research teams, findings suggest possible difficulties in some core aspects of interpersonal functioning in DS, with both qualitative and

  5. Nuclear structure properties and stellar weak rates for 76Se: Unblocking of the Gamow Teller strength

    Science.gov (United States)

    Nabi, Jameel-Un; Ishfaq, Mavra; Böyükata, Mahmut; Riaz, Muhammad

    2017-10-01

    At finite temperatures (≥ 107K), 76Se is abundant in the core of massive stars and electron capture on 76Se has a consequential role to play in the dynamics of core-collapse. The present work may be classified into two main categories. In the first phase we study the nuclear structure properties of 76Se using the interacting boson model-1 (IBM-1). The IBM-1 investigations include the energy levels, B (E 2) values and the prediction of the geometry. We performed the extended consistent-Q formalism (ECQF) calculation and later the triaxial formalism calculation (constructed by adding the cubic term to the ECQF). The geometry of 76Se can be envisioned within the formalism of the potential energy surface based on the classical limit of IBM-1 model. In the second phase, we reconfirm the unblocking of the Gamow-Teller (GT) strength in 76Se (a test case for nuclei having N > 40 and Z fashion. Results are compared with experimental data and previous calculations. The calculated GT distribution fulfills the Ikeda sum rule. Rates for β-delayed neutrons and emission probabilities are also calculated. Our study suggests that at high stellar temperatures and low densities, the β+-decay on 76Se should not be neglected and needs to be taken into consideration along with electron capture rates for simulation of presupernova evolution of massive stars.

  6. Understanding banking regulatory and market framework in South Africa including the perceived strength, weaknesses, opportunities and threats

    Directory of Open Access Journals (Sweden)

    Tankiso Moloi

    2014-08-01

    Full Text Available Following the global financial crisis of 2007, the manner in which banks conduct their business became the subject of interest to authorities. In South Africa, most analysts argued that the financial system was insulated by the prudent regulatory system. This paper reviewed the banking regulation and market framework applicable in the South African context. In reviewing regulation and banking market framework, it was found that the principal legal instrument which seeks to achieve credibility, stability and economic growth, is the Banks Act, No. 94 of 1990 (the Banks Act. Considering the applicable regulation, the paper concluded that South Africa has a developed and well regulated banking system which compares favourably with regulatory environment applied by the developed countries. It was, however; cautioned that further regulation such as the recently announced ‘Twin Peaks’ approach to financial regulation could result in unintended consequences, such as driving a larger share of activity into the shadow banking sector.

  7. From strengths to weaknesses: Guiding students in their development of oral skills

    Directory of Open Access Journals (Sweden)

    Ariza Ariza Aleida

    2003-08-01

    Full Text Available This article intends to report on a small research project carried out with a group of adult EFL learners at the National University extension program, in Bogotá. Founded on a needs analysis process, some activities based on students’ strengths were proposed and developed in order to meet the students’ main need: oral skills. The proposal was implemented and evaluated revealing oral portfolios and debates as useful tools in the development of oral proficiency as well as support in students’ self-regulation processes. Key words: Adult Second Language Acquisition-Methodology-Evaluation, English- Teaching-Evaluation, Oral Communication-Teaching-Methodology, Teaching Adults- Programs El objetivo del presente artículo es dar a conocer un proyecto de investigación a pequeña escala, desarrollado con un grupo de estudiantes adultos de inglés como lengua extranjera en la Unidad de Extensión de la Universidad Nacional de Colombia, en Bogotá. A partir de un proceso de análisis de necesidades, se plantearon y desarrollaron algunas actividades basadas en las fortalezas de los estudiantes con miras a suplir la principal necesidad de los estudiantes: las habilidades orales. La implementación y evaluación de la propuesta mostró que los portafolios y los debates son herramientas claves en el desarrollo de la proficiencia así como en el apoyo de los procesos de autorregulación de los estudiantes. Palabras claves: Adquisición de una segunda lengua-Metodología-Evaluación, Inglés-Enseñanza-Evaluación, Comunicación oral-Enseñanza-Metodología, Educación de adultos-Programas

  8. The students' voice: Strengths and weaknesses of an undergraduate medical curriculum in a developing country, a qualitative study

    Directory of Open Access Journals (Sweden)

    Wickramasinghe Ruwan

    2011-07-01

    Full Text Available Abstract Background In medical education, feedback from students' is essential in course evaluation and development. Students at Faculty of Medicine, University of Colombo, Sri Lanka complete a five year medical curriculum comprising of five different streams. We aimed to evaluate the five year medical curriculum at the Faculty of Medicine, University of Colombo, Sri Lanka. Methods A qualitative research was conducted among recent graduates of the faculty. Students' opinions on strengths and weaknesses of the curriculum were collected via questionnaires, which were analysed and classified into common themes. A focus group discussion (FGD based on these themes was conducted among two student groups, each comprising of a facilitator, two observers and nine students selected as a representative sample from questionnaire respondents. FGDs were conducted using a semi-structured set of open-ended questions to guide participants and maintain consistency between groups. The FGD evaluated the reasons behind students' perceptions, attitudes, emotions and perceived solution. Verbal and non-verbal responses were transcribed and analysed. Results Questionnaire response rate was 82% (153/186. Students highlighted 68 and 135 different responses on strengths and weaknesses respectively. After analysis of both questionnaire and FGD results the following themes emerged: a well organized module system, increased frequency of assessments, a good variety in clinical appointments, lack of specific objectives and assessments at clinical appointments, community and behavioural sciences streams beneficial but too much time allocation, lengthy duration of course, inadequate knowledge provided on pharmacology and pathology. Conclusion We demonstrate how a brief qualitative method could be efficiently used to evaluate a curriculum spanning a considerable length of time. This method provided an insight into the students' attitudes and perceptions of the present faculty

  9. The ICMJE Recommendations and pharmaceutical marketing--strengths, weaknesses and the unsolved problem of attribution in publication ethics.

    Science.gov (United States)

    Matheson, Alastair

    2016-04-04

    The International Committee of Medical Journal Editors (ICMJE) Recommendations set ethical and editorial standards for article publication in most leading medical journals. Here, I examine the strengths and weaknesses of the Recommendations in the prevention of commercial bias in industry-financed journal literature, on three levels - scholarly discourse, article content, and article attribution. With respect to overall discourse, the most important measures in the ICMJE Recommendations are for enforcing clinical trial registration and controlling duplicate publication. With respect to article content, the ICMJE promotes stringent author accountability and adherence to established reporting standards. However, the ICMJE accepts the use of commercial editorial teams to produce manuscripts, which is a potential source of bias, and accepts private company ownership and analysis of clinical trial data. New ICMJE guidance on data sharing will address but not eliminate problems of commercial data access. With respect to attribution, the Recommendations oppose guest authorship and encourage clear documentation of author contributions. However, they exclude writers from coauthorship; provide no specific advice on the attribution of commercial literature, for instance with respect to company authorship, author sequence or prominent commercial labeling; and endorse the use of fine print and euphemism. The ICMJE requires detailed author interest disclosures, but overlooks the interests of non-authors and companies, and does not recommend that interests most salient to the publication are highlighted. Together, these weaknesses facilitate "advocacy"-based marketing, in which literature planned, financed and produced by companies is fronted by academics, enabling commercial messages to be presented to customers by their respected clinical peers rather than companies themselves. The ICMJE Recommendations set important research and reporting standards, without which commercial

  10. Health care system in Sudan: review and analysis of Strength ...

    African Journals Online (AJOL)

    Health care system in Sudan: review and analysis of Strength, Weakness, Opportunity, and Threats (SWOT Analysis). Ebrahim M.A. Ebrahim, Luam Ghebrehiwot, Tasneem Abdalgfar, Muhammad Hanafiah Juni ...

  11. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    Science.gov (United States)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different

  12. ScienceToGo.org: The Strengths and Weaknesses of Communicating Climate Change through Mass Transit Advertising Spaces

    Science.gov (United States)

    Lustick, D. S.; Lohmeier, J.; Chen, R. F.; Wilson, R.; Rabkin, D.; Thompson, S. R.

    2016-02-01

    Engaging urban populations with climate change science is a difficult challenge since cities can seem so removed from the `natural environment.' However, mass transit provides an inherent means of communicating environmental messages with a cross section of the urban population. The Out of Home Media (OHM) spaces found on platforms and inside train cars provide a potentially effective means of bringing informal science learning opportunities directly to an underserved STEM audience. Our team felt that any messaging curriculum for a coastal urban subway system must complement the scary reality of the impacts of a changing climate (i.e. rising sea levels) with current examples of how the city is preparing for a more sustainable future. Urban areas such as Boston must develop adaptation and mitigation strategies that will help them not only survive, but thrive in a changing environment. In 2013-14, ScienceToGo.org ran a series of 12 engaging posters and placards staring `Ozzie the Ostrich' on the Massachusetts Bay Transit Authority's Red and Orange subway lines targeting an audience of more than 400,000 riders per day. The 12 month curriculum was divided into three phases: reality, relevance, and hope. During the presentation, we will present the results of our quasi-experimental research which identifies, quantifies, and explains the observed impacts of the campaign on adult riders. The strengths and weaknesses of the communication strategy will be discussed. Finally, we will conclude with some recommendations for how this work could improve and inform other urban informal science learning initiatives.

  13. Strengths and Weaknesses of Clinical Education from the Viewpoints of Nursing and Midwifery Students in Shahrekord University of Medical Sciences, Shahrekord, Iran

    Directory of Open Access Journals (Sweden)

    M Delaram

    2012-07-01

    Full Text Available

    Background and Objectives: The viewpoints of students as basic elements of education, can improve the process of education. Thus this study was designed to detect the Strengths and weaknesses of clinical education from the viewpoints of nursing and midwifery students.

     

    Methods: In this cross–sectional study, 150 senior nursing and midwifery students in Shahrekord University of Medical Sciences were asked about the strengths and weaknesses of clinical education using a questionnaire. The questionnaire consisted of three sections including demographic characteristics, and the strengths and weaknesses of clinical education which was prepared based on five areas of the aims and educational programs, contact to students, educational environment, supervision and evaluation. Data analysis was done using t-test and Pearson's correlation coefficients and the value of p<0.05 was considered as significant.

     

    Results: The most important strengths points of clinical education included: considering the prerequisite of clinical education (79.7%, clarifying the students tasks (72.5%, on-time presence of trainers (88.7% and trainees (84.2%, providing opportunities of patient care for students (68.5%, good relationship between educational supervisor and the students (56.5%, students' library use in hospital (62.5% and taking practical exams at the end of each clinical education (58.5%. failing to ask students' views in planning the training program (84.9%, lack of congruence between the educational aims and personnel expectations (74.6%, stressful conditions for students (76.8%, lack of student support by personnel (85.5%, failing to use teaching aids (91.2% and lack of supervising in clinical education (69%, were among the most important weaknesses of clinical education.

  14. Hamstring and Quadriceps Isokinetic Strength Deficits Are Weak Risk Factors for Hamstring Strain Injuries: A 4-Year Cohort Study

    NARCIS (Netherlands)

    van Dyk, Nicol; Bahr, Roald; Whiteley, Rodney; Tol, Johannes L.; Kumar, Bhavesh D.; Hamilton, Bruce; Farooq, Abdulaziz; Witvrouw, Erik

    2016-01-01

    A hamstring strain injury (HSI) has become the most common noncontact injury in soccer. Isokinetic muscle strength deficits are considered a risk factor for HSIs. However, underpowered studies with small sample sizes unable to determine small associations have led to inconclusive results regarding

  15. Strengths and weaknesses of working with the Global Trigger Tool method for retrospective record review: focus group interviews with team members.

    Science.gov (United States)

    Schildmeijer, Kristina; Nilsson, Lena; Perk, Joep; Arestedt, Kristofer; Nilsson, Gunilla

    2013-09-24

    The aim was to describe the strengths and weaknesses, from team member perspectives, of working with the Global Trigger Tool (GTT) method of retrospective record review to identify adverse events causing patient harm. A qualitative, descriptive approach with focus group interviews using content analysis. 5 Swedish hospitals in 2011. 5 GTT teams, with 5 physicians and 11 registered nurses. 5 focus group interviews were carried out with the five teams. Interviews were taped and transcribed verbatim. 8 categories emerged relating to the strengths and weaknesses of the GTT method. The categories found were: Usefulness of the GTT, Application of the GTT, Triggers, Preventability of harm, Team composition, Team tasks, Team members' knowledge development and Documentation. Gradually, changes in the methodology were made by the teams, for example, the teams reported how the registered nurses divided up the charts into two sets, each being read respectively. The teams described the method as important and well functioning. Not only the most important, but also the most difficult, was the task of bringing the results back to the clinic. The teams found it easier to discuss findings at their own clinics. The GTT method functions well for identifying adverse events and is strengthened by its adaptability to different specialties. However, small, gradual methodological changes together with continuingly developed expertise and adaption to looking at harm from a patient's perspective may contribute to large differences in assessment over time.

  16. Measuring Post-transfusion Recovery and Survival of Red Blood Cells: Strengths and Weaknesses of Chromium-51 Labeling and Alternative Methods

    Directory of Open Access Journals (Sweden)

    Camille Roussel

    2018-05-01

    Full Text Available The proportion of transfused red blood cells (RBCs that remain in circulation is an important surrogate marker of transfusion efficacy and contributes to predict the potential benefit of a transfusion process. Over the last 50 years, most of the transfusion recovery data were generated by chromium-51 (51Cr-labeling studies and were predominantly performed to validate new storage systems and new processes to prepare RBC concentrates. As a consequence, our understanding of transfusion efficacy is strongly dependent on the strengths and weaknesses of 51Cr labeling in particular. Other methods such as antigen mismatch or biotin-based labeling can bring relevant information, for example, on the long-term survival of transfused RBC. These radioactivity-free methods can be used in patients including from vulnerable groups. We provide an overview of the methods used to measure transfusion recovery in humans, compare their strengths and weaknesses, and discuss their potential limitations. Also, based on our understanding of the spleen-specific filtration of damaged RBC and historical transfusion recovery data, we propose that RBC deformability and morphology are storage lesion markers that could become useful predictors of transfusion recovery. Transfusion recovery can and should be accurately explored by more than one method. Technical optimization and clarification of concepts is still needed in this important field of transfusion and physiology.

  17. Tissue-engineering with muscle fiber fragments improves the strength of a weak abdominal wall in rats

    DEFF Research Database (Denmark)

    Jangö, Hanna; Gräs, Søren; Christensen, Lise

    2017-01-01

    INTRODUCTION AND HYPOTHESIS: Alternative approaches to reinforce the native tissue in patients with pelvic organ prolapse (POP) are needed to improve surgical outcome. Our aims were to develop a weakened abdominal wall in a rat model to mimic the weakened vaginal wall in women with POP and then e...... showed a significantly higher strength than the group with MPEG-PLGA alone (p = 0.034). CONCLUSION: Tissue-engineering with MFFs seeded on a scaffold of biodegradable MPEG-PLGA might be an interesting adjunct to future POP repair.......INTRODUCTION AND HYPOTHESIS: Alternative approaches to reinforce the native tissue in patients with pelvic organ prolapse (POP) are needed to improve surgical outcome. Our aims were to develop a weakened abdominal wall in a rat model to mimic the weakened vaginal wall in women with POP...

  18. Performance of the Antiretroviral Treatment Program in Ethiopia, 2005-2015: strengths and weaknesses toward ending AIDS.

    Science.gov (United States)

    Assefa, Yibeltal; Gilks, Charles F; Lynen, Lutgarde; Williams, Owain; Hill, Peter S; Tolera, Taye; Malvia, Alankar; Van Damme, Wim

    2017-07-01

    Ethiopia is one of the countries which has scaled up antiretroviral treatment (ART) over the past decade. This study reviews the performance of the ART program in Ethiopia during the past decade, and identifies successes and weaknesses toward ending AIDS in the country. A review and synthesis of data was conducted using multiple data sources: reports from all health facilities in Ethiopia to the Federal Ministry of Health, HIV/AIDS estimates and projections, and retrospective cohort and cross-sectional studies conducted between 2005/6 and 2014/15. The ART program has been successful over several critical areas: (1) ART coverage improved from 4% to 54%; (2) the median CD4 count/mm 3 at the time of ART initiation increased from 125 in 2005/6 to 231 in 2012/13; (3) retention in care after 12 months on ART has increased from 82% to 92%. In spite of these successes, important challenges also remain: (1) ART coverage is not equitable: among regions (5.6%-93%), between children (25%) and adults (60%), and between female (54%) and male patients (69%); (2) retention in care is variable among regions (83%-94%); and, (3) the shift to second-line ART is slow and low (0·58%). The findings suggest that the ART program should sustain the successes and reflect on the shortcomings toward the goal of ending AIDS. It is important to capitalize on and calibrate the interventions and approaches utilized to scale up ART in the past. Analysis of the treatment cascade, in order to pinpoint the gaps and identify appropriate solutions, is commendable in this regard. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  19. Review and analysis of strengths and weaknesses of agro-ecosystem models for simulating C and N fluxes.

    Science.gov (United States)

    Brilli, Lorenzo; Bechini, Luca; Bindi, Marco; Carozzi, Marco; Cavalli, Daniele; Conant, Richard; Dorich, Cristopher D; Doro, Luca; Ehrhardt, Fiona; Farina, Roberta; Ferrise, Roberto; Fitton, Nuala; Francaviglia, Rosa; Grace, Peter; Iocola, Ileana; Klumpp, Katja; Léonard, Joël; Martin, Raphaël; Massad, Raia Silvia; Recous, Sylvie; Seddaiu, Giovanna; Sharp, Joanna; Smith, Pete; Smith, Ward N; Soussana, Jean-Francois; Bellocchi, Gianni

    2017-11-15

    Biogeochemical simulation models are important tools for describing and quantifying the contribution of agricultural systems to C sequestration and GHG source/sink status. The abundance of simulation tools developed over recent decades, however, creates a difficulty because predictions from different models show large variability. Discrepancies between the conclusions of different modelling studies are often ascribed to differences in the physical and biogeochemical processes incorporated in equations of C and N cycles and their interactions. Here we review the literature to determine the state-of-the-art in modelling agricultural (crop and grassland) systems. In order to carry out this study, we selected the range of biogeochemical models used by the CN-MIP consortium of FACCE-JPI (http://www.faccejpi.com): APSIM, CERES-EGC, DayCent, DNDC, DSSAT, EPIC, PaSim, RothC and STICS. In our analysis, these models were assessed for the quality and comprehensiveness of underlying processes related to pedo-climatic conditions and management practices, but also with respect to time and space of application, and for their accuracy in multiple contexts. Overall, it emerged that there is a possible impact of ill-defined pedo-climatic conditions in the unsatisfactory performance of the models (46.2%), followed by limitations in the algorithms simulating the effects of management practices (33.1%). The multiplicity of scales in both time and space is a fundamental feature, which explains the remaining weaknesses (i.e. 20.7%). Innovative aspects have been identified for future development of C and N models. They include the explicit representation of soil microbial biomass to drive soil organic matter turnover, the effect of N shortage on SOM decomposition, the improvements related to the production and consumption of gases and an adequate simulations of gas transport in soil. On these bases, the assessment of trends and gaps in the modelling approaches currently employed to

  20. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    Science.gov (United States)

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2012-01-01

    Objective: To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method: Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3…

  1. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    Science.gov (United States)

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  2. El portafolio digital como herramienta didáctica: una evaluación crítica de fortalezas y debilidades = The digital portfolio as a teaching tool: a critical evaluation of its strengths and weaknesses

    Directory of Open Access Journals (Sweden)

    Olga Moreno-Fernández

    2017-01-01

    Full Text Available Resumen: Se presenta un estudio exploratorio sobre el uso del portafolio digital como herramienta educativa. La experiencia se centró en valorar las debilidades, amenazas, fortalezas y oportunidades de esta herramienta a partir de las apreciaciones de los participantes. De igual modo, se pretende conocer hasta qué punto su utilización potencia habilidades y competencias relevantes en el Espacio Europeo de Educación Superior, tanto a nivel individual como grupal. Para ello, se llevó a cabo un estudio de naturaleza descriptiva a través de la técnica de la encuesta (cuestionario. Los resultados muestran que se trata de una herramienta de aprendizaje valorada positivamente que favorece cuestiones como la accesibilidad al aprendizaje cooperativo o el ahorro económico y medioambiental. A partir de estas valoraciones concluimos que el portafolio digital contribuye al proceso de enseñanza-aprendizaje, favoreciendo que el alumnado sea consciente de éste, y acercándole progresivamente a un aprendizaje más autónomo y responsable.Abstract: An exploratory study on the use of the digital portfolio as an educational tool is presented. The experience focused on assessing the weaknesses, threats, strengths and opportunities of this tool based on the participants' assessments. Likewise, it seeks to know to what extent its use enhances skills and competences relevant in the European Higher Education Area, both individually and as a group. To do this, we conducted a study of descriptive nature through technical survey (questionnaire. The results show that this is a positively valued learning tool that favors issues such as accessibility to cooperative learning or economic and environmental cost savings without printing paper. We conclude therefore that the digital portfolio contributes to the process of teaching and learning, encouraging the students to be aware of this, and progressively bringing you to a more autonomous and responsible learning.

  3. The strengths and weaknesses in verbal short-term memory and visual working memory in children with hearing impairment and additional language learning difficulties.

    Science.gov (United States)

    Willis, Suzi; Goldbart, Juliet; Stansfield, Jois

    2014-07-01

    To compare verbal short-term memory and visual working memory abilities of six children with congenital hearing-impairment identified as having significant language learning difficulties with normative data from typically hearing children using standardized memory assessments. Six children with hearing loss aged 8-15 years were assessed on measures of verbal short-term memory (Non-word and word recall) and visual working memory annually over a two year period. All children had cognitive abilities within normal limits and used spoken language as the primary mode of communication. The language assessment scores at the beginning of the study revealed that all six participants exhibited delays of two years or more on standardized assessments of receptive and expressive vocabulary and spoken language. The children with hearing-impairment scores were significantly higher on the non-word recall task than the "real" word recall task. They also exhibited significantly higher scores on visual working memory than those of the age-matched sample from the standardized memory assessment. Each of the six participants in this study displayed the same pattern of strengths and weaknesses in verbal short-term memory and visual working memory despite their very different chronological ages. The children's poor ability to recall single syllable words in relation to non-words is a clinical indicator of their difficulties in verbal short-term memory. However, the children with hearing-impairment do not display generalized processing difficulties and indeed demonstrate strengths in visual working memory. The poor ability to recall words, in combination with difficulties with early word learning may be indicators of children with hearing-impairment who will struggle to develop spoken language equal to that of their normally hearing peers. This early identification has the potential to allow for target specific intervention that may remediate their difficulties. Copyright © 2014. Published

  4. Strengths, Opportunities, Aspirations, and Results: An Emerging Approach to Organization Development

    Science.gov (United States)

    Zarestky, Jill; Cole, Catherine S.

    2017-01-01

    Organization development (OD) interventions have typically relied on the strengths, weaknesses, opportunities, and threats (SWOT) framework for strategic planning. The strengths, opportunities, aspirations, and results (SOAR) framework is a relatively new innovation in OD that may serve as a viable alternative to SWOT for those who wish to apply…

  5. Clinical utility of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-behaviors questionnaire (SWAN when compared with DISC-IV

    Directory of Open Access Journals (Sweden)

    Chan GFC

    2014-08-01

    Full Text Available Grace Fong-Chun Chan,1 Kelly Yee-Ching Lai,2 Ernest Siu-Luen Luk,3 Se-Fong Hung,2 Patrick Wing-Leung Leung4 1Department of Psychiatry, Alice Ho Miu Ling Nethersole Hospital, 2Department of Psychiatry, The Chinese University of Hong Kong, 3Private practice, 4Clinical and Health Psychology Centre, Department of Psychology, The Chinese University of Hong Kong, Hong Kong Special Administrative Region Background: Attention-deficit/hyperactivity disorder (ADHD is a common and impairing child and adolescent psychiatric disorder. Early identification and prompt treatment are essential. Rating scales are commonly used by clinicians and researchers to assess ADHD children. Objective: In the current study, we aimed to examine the clinical utility of the Chinese version of the Strengths and Weaknesses of ADHD Symptoms and Normal Behaviors (SWAN questionnaire. We validated its subscale scores against the Diagnostic Interview Schedule for Children Version IV (DISC-IV and looked into its ability to identify ADHD in a psychiatric clinic setting. We also tested age and gender effects on SWAN scores. Specific subscale cutoff scores of SWAN were subsequently determined.Method: A total of 290 children aged 6–12 years old studying in local mainstream primary schools were recruited from a clinic setting and interviewed with the parent version of DISC-IV. Their parents and teachers completed the corresponding version of SWAN.Results: Both parent and teacher versions of SWAN were found to have good concurrent validity with DISC-IV. It could identify ADHD well in a clinic sample. Gender-specific cutoff scores were determined. Sensitivities and specificities were found to be satisfactory. SWAN was also found to perform equally well in identifying ADHD in those with and without comorbid Autistic Spectrum Disorder.Conclusion: SWAN was proven to be a useful tool to aid the assessment of ADHD in a clinic sample. Keywords: ADHD, SWAN, DISC-IV, validity

  6. Measuring outcomes in adult spinal deformity surgery: a systematic review to identify current strengths, weaknesses and gaps in patient-reported outcome measures.

    Science.gov (United States)

    Faraj, Sayf S A; van Hooff, Miranda L; Holewijn, Roderick M; Polly, David W; Haanstra, Tsjitske M; de Kleuver, Marinus

    2017-08-01

    Adult spinal deformity (ASD) causes severe disability, reduces overall quality of life, and results in a substantial societal burden of disease. As healthcare is becoming more value based, and to facilitate global benchmarking, it is critical to identify and standardize patient-reported outcome measures (PROMs). This study aims to identify the current strengths, weaknesses, and gaps in PROMs used for ASD. Studies were included following a systematic search in multiple bibliographic databases between 2000 and 2015. PROMs were extracted and linked to the outcome domains of WHO's International Classification of Functioning and Health (ICF) framework. Subsequently, the clinimetric quality of identified PROMs was evaluated. The literature search identified 144 papers that met the inclusion criteria, and nine frequently used PROMs were identified. These covered 29 ICF outcome domains, which could be grouped into three of the four main ICF chapters: body function (n = 7), activity and participation (n = 19), environmental factors (n = 3), and body structure (n = 0). A low quantity (n = 3) of papers was identified that studied the clinimetric quality of PROMs. The Scoliosis Research Society (SRS)-22 has the highest level of clinimetric quality for ASD. Outcome domains related to mobility and pain were well represented. We identified a gap in current outcome measures regarding neurological and pulmonary function. In addition, no outcome domains were measured in the ICF chapter body structure. These results will serve as a foundation for the process of seeking international consensus on a standard set of outcome domains, accompanied PROMs and contributing factors to be used in future clinical trials and spine registries.

  7. La formación actual del médico: fortalezas y debilidades The current training of doctors: strengths and weaknesses

    Directory of Open Access Journals (Sweden)

    X. Clèries

    2009-03-01

    Full Text Available Las “Jornadas estatales de estudio y debate sobre el futuro de la formación integral del médico ¿bioingeniería o medicina?” que se realizaron en Barcelona el 8 y 9 de febrero de 2008 fueron el marco para que un grupo de trabajo abordara el tema de las fortalezas y debilidades de la formación actual del médico. Las principales aportaciones se estructuraron en los tres niveles educativos siguientes: pregrado, posgrado y formación continuada. Se destacó la necesidad de una formación integral y psicosocial en la enseñanza de pregrado, la conveniencia de una estructuración troncal de la formación de posgrado para conseguir una mayor transversalidad de la competencia del médico y la contextualización de la formación continuada en el desarrollo profesional de cada médico. El predominio de los conocimientos biomédicos y tecnológicos en la formación actual del médico contrastan con las demandas de carácter psicosocial de una gran parte de la población en el sistema sanitario.The “National Conference for study and debate on the future of the integral training of doctors: bioengineering or medicine?” that were realized in Barcelona on February 8-9th, 2008 it was the context so that a work group was carried out on the topic about strengths and weaknesses of the current training of physicians. The main contributions were structured around three educational levels: undergraduate, postgraduate and continuing education. In the undergraduate level was emphasized the need to achieve an integral and psychosocial education. The postgraduate education should have a core subject in order to acquire a better global understanding of doctors' competences. Continuing medical education in the context of professional development of every physician. The predominance of the biomedical and technological knowledge in the current training of doctors contrasts with psychosocial demands of the population of healthcare system.

  8. Exploring the Strengths and Limits of Strong and Weak Sustainability Indicators: A Case Study of the Assessment of China’s Megacities with EF and GPI

    Directory of Open Access Journals (Sweden)

    Lu Huang

    2018-01-01

    Full Text Available The perspective of strong/weak sustainability has a great impact on sustainability assessment. In this study, two most widely used indices, Ecological Footprint (EF and Genuine Progress Indicator (GPI for strong and weak sustainability assessment, were employed to evaluate the sustainability of China’s ten megacities between 1978 and 2015. The results showed that the ecological footprint had been enlarged in the past twenty years; while the genuine economic welfare started to increase since 2005. The cities of Xi’an, Chengdu, Chongqing, and Shanghai met the threshold of below 2.5 global hectares for EF/capita, and over 3000 dollars/capita (in 2010 US$ for GPI/capita. By analyzing and comparing the characteristics, the processes and results, and the complementary features of evaluation methods of EF and GPI, the research suggested that: (1 Strong and weak sustainability indicators, with their own pros/cons in sustainability assessment, should be used carefully; (2 Weak sustainability indicators could be analyzed from the perspective of strong sustainability; (3 Strong sustainability indicators need to be developed urgently. The results in this study could guide the selection of sustainability indicators, and help interpret the results of sustainability assessment.

  9. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  10. The Armored Brigade Combat Team (ABCT) in the Future: An Assessment of Capabilities Against the Hybrid Threat in the Future Operational Environment

    Science.gov (United States)

    2013-06-13

    requirements, followed by a tactical case study assessment, and a strengths, weaknesses, opportunities, and threats ( SWOT ) analysis of the BCTs against a...strategic and operational deployment. This information further developed the case study SWOT analysis of the BCTs against a hybrid threat. The SWOT ...a SWOT analysis . The next section addressed is the analysis . The analysis is comprised of the strategic capabilities assessment and the tactical

  11. Strength of Weak Ties,” Neighborhood Ethnic Heterogeneity, and Depressive Symptoms among Adults: A Multilevel Analysis of Korean General Social Survey (KGSS 2012

    Directory of Open Access Journals (Sweden)

    Harris Hyun-soo Kim

    2017-06-01

    Full Text Available A substantial body of research, based largely on North American and European contexts, demonstrates that social networks play a critical role in protecting and promoting mental, as well as physical, health. The purpose of this study is to examine how “weak” and “strong” network relations are differentially related to individual mental health (depressive symptoms based on a nationally representative sample of South Korean adults. Using multilevel analysis, the current research also investigates the extent to which contextual or neighborhood-level factors moderate the associations between depression and social network. Findings show that regular interaction with weaker ties (acquaintances, neighbors, coworkers, etc. are associated with better mental health. The number of strong ties (family members and friends, on the other hand, is not a significant predictor of psychological distress. In addition, a cross-level interaction term is observed: The negative relationship between weak ties and depressive symptoms is diminished in neighborhoods with more foreign-born residents or immigrants. General implications beyond the empirical case under investigation are discussed, as to why weak ties can be “strong” in relation to mental health and how this phenomenon can vary according to residential characteristics such as ethnic heterogeneity.

  12. Weak currents

    International Nuclear Information System (INIS)

    Leite Lopes, J.

    1976-01-01

    A survey of the fundamental ideas on weak currents such as CVC and PCAC and a presentation of the Cabibbo current and the neutral weak currents according to the Salam-Weinberg model and the Glashow-Iliopoulos-Miami model are given [fr

  13. Weak decays

    International Nuclear Information System (INIS)

    Wojcicki, S.

    1978-11-01

    Lectures are given on weak decays from a phenomenological point of view, emphasizing new results and ideas and the relation of recent results to the new standard theoretical model. The general framework within which the weak decay is viewed and relevant fundamental questions, weak decays of noncharmed hadrons, decays of muons and the tau, and the decays of charmed particles are covered. Limitation is made to the discussion of those topics that either have received recent experimental attention or are relevant to the new physics. (JFP) 178 references

  14. Weak interactions

    International Nuclear Information System (INIS)

    Ogava, S.; Savada, S.; Nakagava, M.

    1983-01-01

    The problem of the use of weak interaction laws to study models of elementary particles is discussed. The most typical examples of weak interaction is beta-decay of nucleons and muons. Beta-interaction is presented by quark currents in the form of universal interaction of the V-A type. Universality of weak interactions is well confirmed using as examples e- and μ-channels of pion decay. Hypothesis on partial preservation of axial current is applicable to the analysis of processes with pion participation. In the framework of the model with four flavours lepton decays of hadrons are considered. Weak interaction without lepton participation are also considered. Properties of neutral currents are described briefly

  15. Weak interactions

    International Nuclear Information System (INIS)

    Chanda, R.

    1981-01-01

    The theoretical and experimental evidences to form a basis for Lagrangian Quantum field theory for Weak Interactions are discussed. In this context, gauge invariance aspects of such interactions are showed. (L.C.) [pt

  16. Ose evaluation of delay systems in a high threat environment

    International Nuclear Information System (INIS)

    Rich, B.L.; Cook, B.G.

    1988-01-01

    The Office of Security Evaluations (OSE) has in place an Evaluation Program to assist the Department of Energy (DOE) Headquarters and operations office managers by assessing specific elements of protection programs and informing the managers of common strengths and weaknesses of these elements. This information is provided so that sufficient and cost effective protection programs are maintained or enhanced. The subject of this paper is the evaluation of delay systems in the high-threat environment defined for sensitive DOE security interests such as special nuclear materials, nuclear weapons, and related classified devices and information

  17. Strengths and weaknesses in the supply of school food resulting from the procurement of family farm produce in a municipality in Brazil.

    Science.gov (United States)

    Soares, Panmela; Martinelli, Suellen Secchi; Melgarejo, Leonardo; Davó-Blanes, Mari Carmen; Cavalli, Suzi Barletto

    2015-06-01

    The objective of this study was to assess compliance with school food programme recommendations for the procurement of family farm produce. This study consists of an exploratory descriptive study utilising a qualitative approach based on semistructured interviews with key informants in a municipality in the State of Santa Catarina in Brazil. Study participants were managers and staff of the school food programme and department of agriculture, and representatives of a farmers' organisation. The produce delivery and demand fulfilment stages of the procurement process were carried out in accordance with the recommendations. However, nonconformities occurred in the elaboration of the public call for proposals, elaboration of the sales proposal, and fulfilment of produce quality standards. It was observed that having a diverse range of suppliers and the exchange of produce by the cooperative with neighbouring municipalities helped to maintain a regular supply of produce. The elaboration of menus contributed to planning agricultural production. However, agricultural production was not mapped before elaborating the menus in this case study and an agricultural reform settlement was left out of the programme. A number of weaknesses in the programme were identified which need to be overcome in order to promote local family farming and improve the quality of school food in the municipality.

  18. The strengths and weaknesses of the transformational change management process in the South African department of correctional services: A critical analysis

    Directory of Open Access Journals (Sweden)

    Mbongeni A. Mdletye

    2014-12-01

    Full Text Available Change management research has become a critical focus area for change scholars because of the low success rate in change implementation. This exposition of how the transformational change process has been managed at the Department of Correctional Service was meant to show managers, particularly in the said department, that unless managers pay serious attention to certain critical aspects which must form part of the change management process, no real change would be attained. This becomes critical if one considers that there is still a long way to go in the process of transformation to the philosophy of rehbilitation, namely transforming correctional centres to effective institutions of offender rehabilitation. There is currently limited literature on organisational change approaches that are people-oriented. The available literature seems to focus more on the technical aspects (hard issues such as structures, systems and practices in terms of change management at the expense of people issues (soft issues such as the human factors. It has been argued that the neglect of people issues in the management of organisational change processes is responsible for the high failure rate in change implementation. For purposes of contextualising transformational change management within the setting of the Department of Correctional Services, an extensive literature study was undertaken. This was followed by an empirical analysis of data collected through survey questionnaires from correctional officials and offenders respectively. The research established that there were strong and weak points in the DCS transformational change management process from the perspective of both research participants.

  19. Characterizing the Long-Term PM2.5 Concentration-Response Function: Comparing the Strengths and Weaknesses of Research Synthesis Approaches.

    Science.gov (United States)

    Fann, Neal; Gilmore, Elisabeth A; Walker, Katherine

    2016-09-01

    The magnitude, shape, and degree of certainty in the association between long-term population exposure to ambient fine particulate matter (PM2.5 ) and the risk of premature death is one of the most intensely studied issues in environmental health. For regulatory risk analysis, this relationship is described quantitatively by a concentration-response (C-R) function that relates exposure to ambient concentrations with the risk of premature mortality. Four data synthesis techniques develop the basis for, and derive, this function: systematic review, expert judgment elicitation, quantitative meta-analysis, and integrated exposure-response (IER) assessment. As part of an academic workshop aiming to guide the use of research synthesis approaches, we developed criteria with which to evaluate and select among the approaches for their ability to inform policy choices. These criteria include the quality and extent of scientific support for the method, its transparency and verifiability, its suitability to the policy problem, and the time and resources required for its application. We find that these research methods are both complementary and interdependent. A systematic review of the multidisciplinary evidence is a starting point for all methods, providing the broad conceptual basis for the nature, plausibility, and strength of the associations between PM exposure and adverse health effects. Further, for a data-rich application like PM2.5 and premature mortality, all three quantitative approaches can produce estimates that are suitable for regulatory and benefit analysis. However, when fewer data are available, more resource-intensive approaches such as expert elicitation may be more important for understanding what scientists know, where they agree or disagree, and what they believe to be the most important areas of uncertainty. Whether implicitly or explicitly, all require considerable judgment by scientists. Finding ways for all these methods to acknowledge

  20. Nuclear beta decay and the weak interaction

    International Nuclear Information System (INIS)

    Kean, D.C.

    1975-11-01

    Short notes are presented on various aspects of nuclear beta decay and weak interactions including: super-allowed transitions, parity violation, interaction strengths, coupling constants, and the current-current formalism of weak interaction. (R.L.)

  1. Weak interactions

    International Nuclear Information System (INIS)

    Bjorken, J.D.

    1978-01-01

    Weak interactions are studied from a phenomenological point of view, by using a minimal number of theoretical hypotheses. Charged-current phenomenology, and then neutral-current phenomenology are discussed. This all is described in terms of a global SU(2) symmetry plus an electromagnetic correction. The intermediate-boson hypothesis is introduced and lower bounds on the range of the weak force are inferred. This phenomenology does not yet reconstruct all the predictions of the conventional SU(2)xU(1) gauge theory. To do that requires an additional assumption of restoration of SU(2) symmetry at asymptotic energies

  2. A Partial Swot Analysis of the Turkish Bank Call Centers: The Actual and the Assumed Weaknesses

    OpenAIRE

    ÖZKAN, Ahmet Hakan

    2014-01-01

    The bank call centers of Turkey are seen as a tool of perceiving the threats and evaluating opportunities in the SWOT analysis. By the way they are evaluated as a factor of strength. However, the weaknesses of the call centers which must be taken into account in a SWOT analysis, are so various that they cannot be ignored. The weaknesses of the call centers are elaborated with this research. The ways the call centers harm the corporations or the ways they might harm are revised.

  3. Weak interaction rates

    International Nuclear Information System (INIS)

    Sugarbaker, E.

    1995-01-01

    I review available techniques for extraction of weak interaction rates in nuclei. The case for using hadron charge exchange reactions to estimate such rates is presented and contrasted with alternate methods. Limitations of the (p,n) reaction as a probe of Gamow-Teller strength are considered. Review of recent comparisons between beta-decay studies and (p,n) is made, leading to cautious optimism regarding the final usefulness of (p,n)- derived GT strengths to the field of astrophysics. copyright 1995 American Institute of Physics

  4. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  5. Weak relativity

    CERN Document Server

    Selleri, Franco

    2015-01-01

    Weak Relativity is an equivalent theory to Special Relativity according to Reichenbach’s definition, where the parameter epsilon equals to 0. It formulates a Neo-Lorentzian approach by replacing the Lorentz transformations with a new set named “Inertial Transformations”, thus explaining the Sagnac effect, the twin paradox and the trip from the future to the past in an easy and elegant way. The cosmic microwave background is suggested as a possible privileged reference system. Most importantly, being a theory based on experimental proofs, rather than mutual consensus, it offers a physical description of reality independent of the human observation.

  6. The Audience of One: In Weakness, Strength.

    Science.gov (United States)

    Seymour, Thom

    1981-01-01

    Two approaches to the teaching of composition at the college level have evolved: concern with correctness and concern with expression. If the place of the audience in written communication is emphasized, it will be easier to make students see the difference between self-expression and self-indulgence. (MLW)

  7. Vocational training in Tunisia Strengths and weaknesses

    OpenAIRE

    bouoiyour, jamal

    2009-01-01

    This paper offers an analysis of institutional aspects of professional training in Tunisia. We describe briefly the genesis of this system and pointed out that Tunisia in spite of remarkable progress, suffers from some problems related to the low and partial integration of the professional training system in the general system of training. In a more precise way, the implement of professional training turns out incapable to anticipate future professions. Furthermore, when certain professions a...

  8. VVER-1000: considering its strengths and weaknesses

    International Nuclear Information System (INIS)

    Laaksonen, J.

    1994-01-01

    The safety of currently operating VVER-1000 reactors is examined. The factors considered are deviations in operation, inherent safety, safety system design, protection against internal and external hazards, equipment quality, the approach to plant operations and the safety culture. On the basis of this evaluation it is concluded that the overall safety of a VVER-1000 cannot be at the level of a modern Western PWR though there is no sound basis to make a quantitative comparison. Many of the concerns raised are being adequately addressed in the Czech Temelin which is currently under construction and in new designs which are still at the drawing board stage. Extensive back fitting programmes are planned or underway in operating plants. The creation of independent responsible operating organizations, powerful regulation and an improved economic situation are advanced as necessary criteria for real improvements in safety. (UK)

  9. Facebook in teaching: strengths and weaknesses

    OpenAIRE

    González Ramírez, María Reyes; Gascó Gascó, José Luis; Llopis Taverner, Juan

    2015-01-01

    Purpose – The use of online social networks has experienced a vertiginous increase in the last few years, and young people appear as the key players in this trend. Immersed, educated and raised in the middle of technology, the new student generation is one of digital natives. Instead, lecturers are digital immigrants, but the authors have the responsibility to turn a technology which can be a distraction into a teaching tool. Facebook is an example of Web 2.0 technology that owns a huge poten...

  10. Strengths and weaStrengths and Weaknesses of Ola Rotim's ...

    African Journals Online (AJOL)

    Besides using the play to address Nigeria's numerous problems at independence, Rotimi also brings in a lot of changes in the original Greek play. He dispenses with the chorus, in their place; he relies on the narrator and chiefs of Kutuje. He replaces Greek chants with African songs; he employs proverbs, riddles and other ...

  11. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  12. Electromagnetic current in weak interactions

    International Nuclear Information System (INIS)

    Ma, E.

    1983-01-01

    In gauge models which unify weak and electromagnetic interactions, the weak neutral-current interaction also involves the electromagnetic current. The exact nature of such a component can be explored using e + e - experimental data. In recent years, the existence of a new component of the weak interaction has become firmly established, i.e., the neutral-current interaction. As such, it competes with the electromagnetic interaction whenever the particles involved are also charged, but at a very much lower rate because its effective strength is so small. Hence neutrino processes are best for the detection of the neutral-current interaction. However, in any gauge model which unifies weak and electromagnetic interactions, the weak neutral-current interaction also involves the electromagnetic current

  13. Round table: moderated by Marco Bersanelli and François Bouchet - What next? science objectives and required observations: Objective: Open discussion of what are the strengths and weaknesses of possible future experiments, complementarity, what is our target science for the M5 proposal and what is the best strategy to get it

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    Round table: moderated by Marco Bersanelli and François Bouchet - What next? science objectives and required observations: Objective: Open discussion of what are the strengths and weaknesses of possible future experiments, complementarity, what is our target science for the M5 proposal and what is the best strategy to get it

  14. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  15. Reconstructing weak values without weak measurements

    International Nuclear Information System (INIS)

    Johansen, Lars M.

    2007-01-01

    I propose a scheme for reconstructing the weak value of an observable without the need for weak measurements. The post-selection in weak measurements is replaced by an initial projector measurement. The observable can be measured using any form of interaction, including projective measurements. The reconstruction is effected by measuring the change in the expectation value of the observable due to the projector measurement. The weak value may take nonclassical values if the projector measurement disturbs the expectation value of the observable

  16. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  17. Quantum discord with weak measurements

    International Nuclear Information System (INIS)

    Singh, Uttam; Pati, Arun Kumar

    2014-01-01

    Weak measurements cause small change to quantum states, thereby opening up the possibility of new ways of manipulating and controlling quantum systems. We ask, can weak measurements reveal more quantum correlation in a composite quantum state? We prove that the weak measurement induced quantum discord, called as the “super quantum discord”, is always larger than the quantum discord captured by the strong measurement. Moreover, we prove the monotonicity of the super quantum discord as a function of the measurement strength and in the limit of strong projective measurement the super quantum discord becomes the normal quantum discord. We find that unlike the normal discord, for pure entangled states, the super quantum discord can exceed the quantum entanglement. Our results provide new insights on the nature of quantum correlation and suggest that the notion of quantum correlation is not only observer dependent but also depends on how weakly one perturbs the composite system. We illustrate the key results for pure as well as mixed entangled states. -- Highlights: •Introduced the role of weak measurements in quantifying quantum correlation. •We have introduced the notion of the super quantum discord (SQD). •For pure entangled state, we show that the SQD exceeds the entanglement entropy. •This shows that quantum correlation depends not only on observer but also on measurement strength

  18. Merits of using color and shape differentiation to improve the speed and accuracy of drug strength identification on over-the-counter medicines by laypeople.

    Science.gov (United States)

    Hellier, Elizabeth; Tucker, Mike; Kenny, Natalie; Rowntree, Anna; Edworthy, Judy

    2010-09-01

    This study aimed to examine the utility of using color and shape to differentiate drug strength information on over-the-counter medicine packages. Medication errors are an important threat to patient safety, and confusions between drug strengths are a significant source of medication error. A visual search paradigm required laypeople to search for medicine packages of a particular strength from among distracter packages of different strengths, and measures of reaction time and error were recorded. Using color to differentiate drug strength information conferred an advantage on search times and accuracy. Shape differentiation did not improve search times and had only a weak effect on search accuracy. Using color to differentiate drug strength information improves drug strength identification performance. Color differentiation of drug strength information may be a useful way of reducing medication errors and improving patient safety.

  19. Robust weak measurements on finite samples

    International Nuclear Information System (INIS)

    Tollaksen, Jeff

    2007-01-01

    A new weak measurement procedure is introduced for finite samples which yields accurate weak values that are outside the range of eigenvalues and which do not require an exponentially rare ensemble. This procedure provides a unique advantage in the amplification of small nonrandom signals by minimizing uncertainties in determining the weak value and by minimizing sample size. This procedure can also extend the strength of the coupling between the system and measuring device to a new regime

  20. Spin effects in the weak interaction

    International Nuclear Information System (INIS)

    Freedman, S.J.; Chicago Univ., IL; Chicago Univ., IL

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon

  1. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  2. A weak balance: the contribution of muscle weakness to postural instability and falls.

    NARCIS (Netherlands)

    Horlings, G.C.; Engelen, B.G.M. van; Allum, J.H.J.; Bloem, B.R.

    2008-01-01

    Muscle strength is a potentially important factor contributing to postural control. In this article, we consider the influence of muscle weakness on postural instability and falling. We searched the literature for research evaluating muscle weakness as a risk factor for falls in community-dwelling

  3. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  4. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  5. Weakly clopen functions

    International Nuclear Information System (INIS)

    Son, Mi Jung; Park, Jin Han; Lim, Ki Moon

    2007-01-01

    We introduce a new class of functions called weakly clopen function which includes the class of almost clopen functions due to Ekici [Ekici E. Generalization of perfectly continuous, regular set-connected and clopen functions. Acta Math Hungar 2005;107:193-206] and is included in the class of weakly continuous functions due to Levine [Levine N. A decomposition of continuity in topological spaces. Am Math Mon 1961;68:44-6]. Some characterizations and several properties concerning weakly clopenness are obtained. Furthermore, relationships among weak clopenness, almost clopenness, clopenness and weak continuity are investigated

  6. Weak value controversy

    Science.gov (United States)

    Vaidman, L.

    2017-10-01

    Recent controversy regarding the meaning and usefulness of weak values is reviewed. It is argued that in spite of recent statistical arguments by Ferrie and Combes, experiments with anomalous weak values provide useful amplification techniques for precision measurements of small effects in many realistic situations. The statistical nature of weak values is questioned. Although measuring weak values requires an ensemble, it is argued that the weak value, similarly to an eigenvalue, is a property of a single pre- and post-selected quantum system. This article is part of the themed issue `Second quantum revolution: foundational questions'.

  7. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  8. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available Reference Inadequate or weak contract management, fuzzy focus [16, 30, 50, 58, 62, 64] Inadequate process (“how”) e.g. inadequate planning [16, 17, 30, 36, 57] Poor management of contractors and lack of governance [16, 17, 30, 46, 61, 64, 71... decision-making cycles, lack of proper programme management and disempowered outsource programme team members. Threats in the outsourcing process and the management of the outsourcing contract may result in poor management of contractors, a lack...

  9. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  10. Qubit state tomography in a superconducting circuit via weak measurements

    Science.gov (United States)

    Qin, Lupei; Xu, Luting; Feng, Wei; Li, Xin-Qi

    2017-03-01

    In this work we present a study on a new scheme for measuring the qubit state in a circuit quantum electrodynamics (QED) system, based on weak measurement and the concept of weak value. To be applicable under generic parameter conditions, our formulation and analysis are carried out for finite-strength weak measurement, and in particular beyond the bad-cavity and weak-response limits. The proposed study is accessible to present state-of-the-art circuit QED experiments.

  11. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  12. Second class weak currents

    International Nuclear Information System (INIS)

    Delorme, J.

    1978-01-01

    The definition and general properties of weak second class currents are recalled and various detection possibilities briefly reviewed. It is shown that the existing data on nuclear beta decay can be consistently analysed in terms of a phenomenological model. Their implication on the fundamental structure of weak interactions is discussed [fr

  13. Weak C* Hopf Symmetry

    OpenAIRE

    Rehren, K. -H.

    1996-01-01

    Weak C* Hopf algebras can act as global symmetries in low-dimensional quantum field theories, when braid group statistics prevents group symmetries. Possibilities to construct field algebras with weak C* Hopf symmetry from a given theory of local observables are discussed.

  14. Bagging Weak Predictors

    DEFF Research Database (Denmark)

    Lukas, Manuel; Hillebrand, Eric

    Relations between economic variables can often not be exploited for forecasting, suggesting that predictors are weak in the sense that estimation uncertainty is larger than bias from ignoring the relation. In this paper, we propose a novel bagging predictor designed for such weak predictor variab...

  15. How weak is the subduction zone interface?

    NARCIS (Netherlands)

    Duarte, João C.; Schellart, Wouter P.; Cruden, Alexander R.

    2015-01-01

    Several lines of evidence suggest that subduction zones are weak and that the unique availability of water on Earth is a critical factor in the weakening process. We have evaluated the strength of subduction zone interfaces using two approaches: (i) from empirical relationships between shear stress

  16. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    In 1945 the United Nations was founded with one major goal in mind, and I quote, 'to save succeeding generations from the scourge of war.' The founders noted that twice in the 20th Century major wars had brought 'untold sorrow to mankind.' Since its founding, 191 nations have joined the UN. We have no other place where all nations can work together for peace, a place where we can use verbal conflict rather than armed conflict to solve problems. And often, the UN, with US support, has provided armed force to help ensure the peace. The entire planet now faces global challenges including ensuring bio-diversity and ending the destruction of thousands of species; reversing the depletion of fishing stocks; controlling ocean dumping; preventing ozone depletion; halting global warming; controlling and eliminating terrorism and weapons of mass destruction; fighting pandemic diseases; ending the tragedy of crushing poverty and lack of clean drinking water; and addressing crises arising from failed States. No nation or even a small group of nations can succeed in addressing these issues alone. The United Nations is based on political insights that have led to successful governance principles and enhanced the wealth of nations. These values include market freedoms, religious liberty, an independent judiciary, government transparency and accountability, democracy, and a high level of respect for civil liberties and human rights. They have evolved into nearly universal goals and norms. The countries that have adhered to these principles are the most secure and healthy. The United Nations is guided by such countries, and simultaneously provides the only viable forum for the expression of the aspirations of the poor and the weak. The establishment of international norms of conduct is where idealism informs realism. We are called to nothing less than moral leadership. When moral leadership is coupled with power, it galvanizes the world. Moral leadership requires living up to one

  17. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  18. Electro-weak theory

    International Nuclear Information System (INIS)

    Deshpande, N.G.

    1980-01-01

    By electro-weak theory is meant the unified field theory that describes both weak and electro-magnetic interactions. The development of a unified electro-weak theory is certainly the most dramatic achievement in theoretical physics to occur in the second half of this century. It puts weak interactions on the same sound theoretical footing as quantum elecrodynamics. Many theorists have contributed to this development, which culminated in the works of Glashow, Weinberg and Salam, who were jointly awarded the 1979 Nobel Prize in physics. Some of the important ideas that contributed to this development are the theory of beta decay formulated by Fermi, Parity violation suggested by Lee and Yang, and incorporated into immensely successful V-A theory of weak interactions by Sudarshan and Marshak. At the same time ideas of gauge invariance were applied to weak interaction by Schwinger, Bludman and Glashow. Weinberg and Salam then went one step further and wrote a theory that is renormalizable, i.e., all higher order corrections are finite, no mean feat for a quantum field theory. The theory had to await the development of the quark model of hadrons for its completion. A description of the electro-weak theory is given

  19. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  20. Weak interactions with nuclei

    International Nuclear Information System (INIS)

    Walecka, J.D.

    1983-01-01

    Nuclei provide systems where the strong, electomagnetic, and weak interactions are all present. The current picture of the strong interactions is based on quarks and quantum chromodynamics (QCD). The symmetry structure of this theory is SU(3)/sub C/ x SU(2)/sub W/ x U(1)/sub W/. The electroweak interactions in nuclei can be used to probe this structure. Semileptonic weak interactions are considered. The processes under consideration include beta decay, neutrino scattering and weak neutral-current interactions. The starting point in the analysis is the effective Lagrangian of the Standard Model

  1. History of Weak Interactions

    Science.gov (United States)

    Lee, T. D.

    1970-07-01

    While the phenomenon of beta-decay was discovered near the end of the last century, the notion that the weak interaction forms a separate field of physical forces evolved rather gradually. This became clear only after the experimental discoveries of other weak reactions such as muon-decay, muon-capture, etc., and the theoretical observation that all these reactions can be described by approximately the same coupling constant, thus giving rise to the notion of a universal weak interaction. Only then did one slowly recognize that the weak interaction force forms an independent field, perhaps on the same footing as the gravitational force, the electromagnetic force, and the strong nuclear and sub-nuclear forces.

  2. Hunting the weak bosons

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    The possibility of the production of weak bosons in the proton-antiproton colliding beam facilities which are currently being developed, is discussed. The production, decay and predicted properties of these particles are described. (W.D.L.).

  3. Charged weak currents

    International Nuclear Information System (INIS)

    Turlay, R.

    1979-01-01

    In this review of charged weak currents I shall concentrate on inclusive high energy neutrino physics. There are surely still things to learn from the low energy weak interaction but I will not discuss it here. Furthermore B. Tallini will discuss the hadronic final state of neutrino interactions. Since the Tokyo conference a few experimental results have appeared on charged current interaction, I will present them and will also comment on important topics which have been published during the last past year. (orig.)

  4. Weakly oval electron lense

    International Nuclear Information System (INIS)

    Daumenov, T.D.; Alizarovskaya, I.M.; Khizirova, M.A.

    2001-01-01

    The method of the weakly oval electrical field getting generated by the axially-symmetrical field is shown. Such system may be designed with help of the cylindric form coaxial electrodes with the built-in quadrupole duplet. The singularity of the indicated weakly oval lense consists of that it provides the conducting both mechanical and electronic adjustment. Such lense can be useful for elimination of the near-axis astigmatism in the electron-optical system

  5. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  6. The Food Security of Ukraine: Status, Threats, Prospects

    Directory of Open Access Journals (Sweden)

    Rudnichenko Yevhenii M.

    2017-08-01

    Full Text Available The article analyzes the existing approaches to the normative treatment of the category of «food security». An author’s own definition of the concept of «food security» has been proposed, which must be understood as the status of provision to society foods of adequate quality and sufficient quantity. An author’s own approach as to the feasibility of applying qualitative parameters for food security assessment and a critical attitude to quantitative indicators has been formulated. The Food security index and the Ukrainian rating for 2012-2016 with emphasizing the negative tendencies and developments have been provided. The article also provides a detailed characterization of the main indicators of Ukraine’s food security in 2016 by the three directions, which are: financial accessibility of foods; physical accessibility of foods; food quality and safety. Strengths and weaknesses of Ukraine’s food security and the main threats to food security were determined, the main prospects were allocated.

  7. Nuclear Weak Rates and Detailed Balance in Stellar Conditions

    Energy Technology Data Exchange (ETDEWEB)

    Misch, G. Wendell, E-mail: wendell@sjtu.edu, E-mail: wendell.misch@gmail.com [Department of Physics and Astronomy, Shanghai Jiao Tong University, 800 Dong Chuan Road, Shanghai 200240 (China)

    2017-07-20

    Detailed balance is often invoked in discussions of nuclear weak transitions in astrophysical environments. Satisfaction of detailed balance is rightly touted as a virtue of some methods of computing nuclear transition strengths, but I argue that it need not necessarily be strictly obeyed in astrophysical environments, especially when the environment is far from weak equilibrium. I present the results of shell model calculations of nuclear weak strengths in both charged-current and neutral-current channels at astrophysical temperatures, finding some violation of detailed balance. I show that a slight modification of the technique to strictly obey detailed balance has little effect on the reaction rates associated with these strengths under most conditions, though at high temperature the modified technique in fact misses some important strength. I comment on the relationship between detailed balance and weak equilibrium in astrophysical conditions.

  8. Dark-Matter Particles without Weak-Scale Masses or Weak Interactions

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kumar, Jason

    2008-01-01

    We propose that dark matter is composed of particles that naturally have the correct thermal relic density, but have neither weak-scale masses nor weak interactions. These models emerge naturally from gauge-mediated supersymmetry breaking, where they elegantly solve the dark-matter problem. The framework accommodates single or multiple component dark matter, dark-matter masses from 10 MeV to 10 TeV, and interaction strengths from gravitational to strong. These candidates enhance many direct and indirect signals relative to weakly interacting massive particles and have qualitatively new implications for dark-matter searches and cosmological implications for colliders

  9. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  10. Weak interactions of the b quark

    International Nuclear Information System (INIS)

    Branco, G.C.; Mohapatra, R.N.

    1978-01-01

    In weak-interaction models with two charged W bosons of comparable mass, there exists a novel possibility for the weak interactions of the b quark, in which the (u-barb)/sub R/ current occurs with maximal strength. It is noted that multimuon production in e + e - annihilation at above Q 2 > or approx. = (12 GeV) 2 will distinguish this scheme from the conventional one. We also present a Higgs system that leads naturally to this type of coupling, in a class of gauge models

  11. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  12. Weak interactions in astrophysics and cosmology

    International Nuclear Information System (INIS)

    Taylor, R.J.

    1977-01-01

    There ar many problems in astrophysics and cosmology in which the form of the weak interactions, their strength or the number of weakly interacting particles, is very important. It is possible that astronomical observations may give some information about the weak interactions. In the conventional hot big bang cosmological theory the number of leptons with associated neutrinos influences the speed of expansion of the Universe and the chemical composition of pre-galactic matter. The strength of the weak interaction, as exemplified by the half-life of the neutron, has a similar effect. In addition, the form of the weak interactions will determine how effectively neutrino viscosity can smooth out irregularities in the early Universe. Because neutrinos have a very long mean free path, they can escape from the central region of stars whereas photons can only escape from the surface. In late stages of stellar evolution, neutrino luminosity is often believed to be much greater than photon luminosity. This can both accelerate the cooling of dying stars and influence the stages of stellar evolution leading to the onset of supernova explosions. In pre-super-novae it is even possible that very dense stellar cores can be opaque to neutrinos and that the absorption or scattering of neutrinos can cause the explosion. These results depend crucially on the form of the weak interactions, with the discovery of neutral currents being very important. Until the solar neutrino experiment has been reconciled with theory, the possible role of uncertainties in the weak interactions cannot be ignored. (author)

  13. Importance of weak minerals on earthquake mechanics

    Science.gov (United States)

    Kaneki, S.; Hirono, T.

    2017-12-01

    The role of weak minerals such as smectite and talc on earthquake mechanics is one of the important issues, and has been debated for recent several decades. Traditionally weak minerals in fault have been reported to weaken fault strength causing from its low frictional resistance. Furthermore, velocity-strengthening behavior of such weak mineral (talc) is considered to responsible for fault creep (aseismic slip) in the San Andreas fault. In contrast, recent studies reported that large amount of weak smectite in the Japan Trench could facilitate gigantic seismic slip during the 2011 Tohoku-oki earthquake. To investigate the role of weak minerals on rupture propagation process and magnitude of slip, we focus on the frictional properties of carbonaceous materials (CMs), which is the representative weak materials widely distributed in and around the convergent boundaries. Field observation and geochemical analyses revealed that graphitized CMs-layer is distributed along the slip surface of a fossil plate-subduction fault. Laboratory friction experiments demonstrated that pure quartz, bulk mixtures with bituminous coal (1 wt.%), and quartz with layered coal samples exhibited almost similar frictional properties (initial, yield, and dynamic friction). However, mixtures of quartz (99 wt.%) and layered graphite (1 wt.%) showed significantly lower initial and yield friction coefficient (0.31 and 0.50, respectively). Furthermore, the stress ratio S, defined as (yield stress-initial stress)/(initial stress-dynamic stress), increased in layered graphite samples (1.97) compared to quartz samples (0.14). Similar trend was observed in smectite-rich fault gouge. By referring the reported results of dynamic rupture propagation simulation using S ratio of 1.4 (typical value for the Japan Trench) and 2.0 (this study), we confirmed that higher S ratio results in smaller slip distance by approximately 20 %. On the basis of these results, we could conclude that weak minerals have lower

  14. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  15. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  16. Weak radiative hyperon decays

    International Nuclear Information System (INIS)

    Roberts, B.L.; Booth, E.C.; Gall, K.P.; McIntyre, E.K.; Miller, J.P.; Whitehouse, D.A.; Bassalleck, B.; Hall, J.R.; Larson, K.D.; Wolfe, D.M.; Fickinger, W.J.; Robinson, D.K.; Hallin, A.L.; Hasinoff, M.D.; Measday, D.F.; Noble, A.J.; Waltham, C.E.; Hessey, N.P.; Lowe, J.; Horvath, D.; Salomon, M.

    1990-01-01

    New measurements of the Σ + and Λ weak radiative decays are discussed. The hyperons were produced at rest by the reaction K - p → Yπ where Y = Σ + or Λ. The monoenergetic pion was used to tag the hyperon production, and the branching ratios were determined from the relative amplitudes of Σ + → pγ to Σ + → pπ 0 and Λ → nγ to Λ → nπ 0 . The photons from weak radiative decays and from π 0 decays were detected with modular NaI arrays. (orig.)

  17. Startpoints via weak contractions

    OpenAIRE

    Agyingi, Collins Amburo; Gaba, Yaé Ulrich

    2018-01-01

    Startpoints (resp. endpoints) can be defined as "oriented fixed points". They arise naturally in the study of fixed for multi-valued maps defined on quasi-metric spaces. In this article, we give a new result in the startpoint theory for quasi-pseudometric spaces. The result we present is obtained via a generalized weakly contractive set-valued map.

  18. Weakly Coretractable Modules

    Science.gov (United States)

    Hadi, Inaam M. A.; Al-aeashi, Shukur N.

    2018-05-01

    If R is a ring with identity and M is a unitary right R-module. Here we introduce the class of weakly coretractable module. Some basic properties are investigated and some relationships between these modules and other related one are introduced.

  19. Support mechanisms for renewable energies, their strengths and weaknesses

    International Nuclear Information System (INIS)

    Percebois, Jacques

    2014-01-01

    There is an on-going debate in France over whether or not it is better to stay with the System actually in place to promote renewable energy penetration, notably wind and solar photovoltaic power in the overall energy mix. This System is one of guaranteed prices with compulsory purchase (feed-in tariffs, FIT); but it is increasingly called into question because of the perverse impacts that have become evident. (author)

  20. The current training of doctors: strengths and weaknesses

    OpenAIRE

    Clèries, X.; Martín-Zurro, A.

    2009-01-01

    Las “Jornadas estatales de estudio y debate sobre el futuro de la formación integral del médico ¿bioingeniería o medicina?” que se realizaron en Barcelona el 8 y 9 de febrero de 2008 fueron el marco para que un grupo de trabajo abordara el tema de las fortalezas y debilidades de la formación actual del médico. Las principales aportaciones se estructuraron en los tres niveles educativos siguientes: pregrado, posgrado y formación continuada. Se destacó la necesidad de una formación integral y p...

  1. Tu(r)ning weakness to strength: Mechanomutable bioinspired materials

    Science.gov (United States)

    2017-04-03

    building blocks," Philosophical Magazine Letters, Vol. 94, 592-600, 2014. • A.K. Nair, A. Gautieri, M.J. Buehler,"Role of intrafibrillar collagen...release. 4 • S. Cranford, N. Pugno, M.J. Buehler, "Silk and Web Synergy: The Merging of Material and Structural Performance," in: Biotechnology of

  2. Mathematical Strengths and Weaknesses of Preservice Agricultural Education Teachers

    Science.gov (United States)

    Stripling, Christopher T.; Roberts, T. Grady; Stephens, Carrie A.

    2014-01-01

    The purpose of this study was to describe the mathematics ability of preservice agricultural education teachers related to each of the National Council of Teachers of Mathematics (NCTM) content/process areas and their corresponding sub-standards that are cross-referenced with the National Agriculture, Food and Natural Resources Career Cluster…

  3. Conventional cable testing methods: strengths, weaknesses and possibilities

    International Nuclear Information System (INIS)

    Reynolds, P.H.

    1988-01-01

    The paper reviews the major conventional methods that can be used to test power plant cables. It assesses their usefulness in diagnosing the condition of the insulation of the cable and then proposes some possible directions for innovation. The methods examined are dc insulation resistance measurement, ac signal injection for continuous monitoring and fault location, and the ac measurement of capacitance and loss angle. Specific subjects considered are the effects of temperature, cable construction and installation, and the validity of insulation resistance or loss angle measurement. The innovative proposals refer to the use of automation in the measurement and of computer-based Expert Systems for the evaluation of the results

  4. Strengths and Weaknesses of Different Approaches of IDP

    DEFF Research Database (Denmark)

    Brunsgaard, Camilla

    The build environment in Europe will in the near future meet large challenges in reducing the energy consumption and environmental impact. With the EU Energy Performance of Buildings Directive (EPBD) new buildings and renovation projects need to improve the energy performance which also includes ...

  5. Finnish vocational education and training in comparison: Strengths and weaknesses

    Directory of Open Access Journals (Sweden)

    Maarit Virolainen

    2014-12-01

    Full Text Available The study investigates how the Finnish model of providing initial vocational education and training (IVET has succeeded in terms of enhancing educational progress and employability. A relatively high level of participation in IVET makes the Finnish model distinctive from those of three other Nordic countries: Denmark, Norway and Sweden. All four Nordic countries have wellorganised labour markets and universal types of welfare states. Priority is given to goals related to equal opportunities and social inclusion. At the same time, these countries have different models of IVET. While the study compares the Finnish model of organising IVET to those of other Nordic countries, it also examines the German and UK models, which represent differing societal approaches to IVET. The differences in the outcomes of the IVET systems are described and analysed through reviewing secondary data provided by Eurydice and Eurostat, along with country reports produced in a Nordic comparative project, Nord-VET.

  6. Precision cosmology with weak gravitational lensing

    Science.gov (United States)

    Hearin, Andrew P.

    In recent years, cosmological science has developed a highly predictive model for the universe on large scales that is in quantitative agreement with a wide range of astronomical observations. While the number and diversity of successes of this model provide great confidence that our general picture of cosmology is correct, numerous puzzles remain. In this dissertation, I analyze the potential of planned and near future galaxy surveys to provide new understanding of several unanswered questions in cosmology, and address some of the leading challenges to this observational program. In particular, I study an emerging technique called cosmic shear, the weak gravitational lensing produced by large scale structure. I focus on developing strategies to optimally use the cosmic shear signal observed in galaxy imaging surveys to uncover the physics of dark energy and the early universe. In chapter 1 I give an overview of a few unsolved mysteries in cosmology and I motivate weak lensing as a cosmological probe. I discuss the use of weak lensing as a test of general relativity in chapter 2 and assess the threat to such tests presented by our uncertainty in the physics of galaxy formation. Interpreting the cosmic shear signal requires knowledge of the redshift distribution of the lensed galaxies. This redshift distribution will be significantly uncertain since it must be determined photometrically. In chapter 3 I investigate the influence of photometric redshift errors on our ability to constrain dark energy models with weak lensing. The ability to study dark energy with cosmic shear is also limited by the imprecision in our understanding of the physics of gravitational collapse. In chapter 4 I present the stringent calibration requirements on this source of uncertainty. I study the potential of weak lensing to resolve a debate over a long-standing anomaly in CMB measurements in chapter 5. Finally, in chapter 6 I summarize my findings and conclude with a brief discussion of my

  7. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  8. Weak layer fracture: facets and depth hoar

    Directory of Open Access Journals (Sweden)

    I. Reiweger

    2013-09-01

    Full Text Available Understanding failure initiation within weak snow layers is essential for modeling and predicting dry-snow slab avalanches. We therefore performed laboratory experiments with snow samples containing a weak layer consisting of either faceted crystals or depth hoar. During these experiments the samples were loaded with different loading rates and at various tilt angles until fracture. The strength of the samples decreased with increasing loading rate and increasing tilt angle. Additionally, we took pictures of the side of four samples with a high-speed video camera and calculated the displacement using a particle image velocimetry (PIV algorithm. The fracture process within the weak layer could thus be observed in detail. Catastrophic failure started due to a shear fracture just above the interface between the depth hoar layer and the underlying crust.

  9. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  10. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  11. Introduction to weak interactions

    International Nuclear Information System (INIS)

    Leite Lopes, J.

    An account is first given of the electromagnetic interactions of complex, scalar, vector and spinor fields. It is shown that the electromagnetic field may be considered as a gauge field. Yang-Mills fields and the field theory invariant with respect to the non-Abelian gauge transformation group are then described. The construction, owing to this invariance principle, of conserved isospin currents associated with gauge fields is also demonstrated. This is followed by a historical survey of the development of the weak interaction theory, established at first to describe beta disintegration processes by analogy with electrodynamics. The various stages are mentioned from the discovery of principles and rules and violation of principles, such as those of invariance with respect to spatial reflection and charge conjugation to the formulation of the effective current-current Lagrangian and research on the structure of weak currents [fr

  12. Weak states and security

    OpenAIRE

    Rakipi, Albert

    2006-01-01

    Cataloged from PDF version of article. Although the weak 1 failing states have often been deseribed as the single most important problem for the international order s ince the en d of Cold W ar (F .Fukuyaına 2004:92) several dimensions of this phenomenon still remain unexplored. While this phenomenon has been present in the international politics even earlier, only the post Cold W ar period accentuated its relationship with security issues. Following the Cold W ar' s "peacef...

  13. Composite weak bosons

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  14. Survival and weak chaos.

    Science.gov (United States)

    Nee, Sean

    2018-05-01

    Survival analysis in biology and reliability theory in engineering concern the dynamical functioning of bio/electro/mechanical units. Here we incorporate effects of chaotic dynamics into the classical theory. Dynamical systems theory now distinguishes strong and weak chaos. Strong chaos generates Type II survivorship curves entirely as a result of the internal operation of the system, without any age-independent, external, random forces of mortality. Weak chaos exhibits (a) intermittency and (b) Type III survivorship, defined as a decreasing per capita mortality rate: engineering explicitly defines this pattern of decreasing hazard as 'infant mortality'. Weak chaos generates two phenomena from the normal functioning of the same system. First, infant mortality- sensu engineering-without any external explanatory factors, such as manufacturing defects, which is followed by increased average longevity of survivors. Second, sudden failure of units during their normal period of operation, before the onset of age-dependent mortality arising from senescence. The relevance of these phenomena encompasses, for example: no-fault-found failure of electronic devices; high rates of human early spontaneous miscarriage/abortion; runaway pacemakers; sudden cardiac death in young adults; bipolar disorder; and epilepsy.

  15. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  16. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  17. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  18. Hypernuclear weak decay puzzle

    International Nuclear Information System (INIS)

    Barbero, C.; Horvat, D.; Narancic, Z.; Krmpotic, F.; Kuo, T.T.S.; Tadic, D.

    2002-01-01

    A general shell model formalism for the nonmesonic weak decay of the hypernuclei has been developed. It involves a partial wave expansion of the emitted nucleon waves, preserves naturally the antisymmetrization between the escaping particles and the residual core, and contains as a particular case the weak Λ-core coupling formalism. The extreme particle-hole model and the quasiparticle Tamm-Dancoff approximation are explicitly worked out. It is shown that the nuclear structure manifests itself basically through the Pauli principle, and a very simple expression is derived for the neutron- and proton-induced decays rates Γ n and Γ p , which does not involve the spectroscopic factors. We use the standard strangeness-changing weak ΛN→NN transition potential which comprises the exchange of the complete pseudoscalar and vector meson octets (π,η,K,ρ,ω,K * ), taking into account some important parity-violating transition operators that are systematically omitted in the literature. The interplay between different mesons in the decay of Λ 12 C is carefully analyzed. With the commonly used parametrization in the one-meson-exchange model (OMEM), the calculated rate Γ NM =Γ n +Γ p is of the order of the free Λ decay rate Γ 0 (Γ NM th congruent with Γ 0 ) and is consistent with experiments. Yet the measurements of Γ n/p =Γ n /Γ p and of Γ p are not well accounted for by the theory (Γ n/p th p th > or approx. 0.60Γ 0 ). It is suggested that, unless additional degrees of freedom are incorporated, the OMEM parameters should be radically modified

  19. Measurement of weak radioactivity

    CERN Document Server

    Theodorsson , P

    1996-01-01

    This book is intended for scientists engaged in the measurement of weak alpha, beta, and gamma active samples; in health physics, environmental control, nuclear geophysics, tracer work, radiocarbon dating etc. It describes the underlying principles of radiation measurement and the detectors used. It also covers the sources of background, analyzes their effect on the detector and discusses economic ways to reduce the background. The most important types of low-level counting systems and the measurement of some of the more important radioisotopes are described here. In cases where more than one type can be used, the selection of the most suitable system is shown.

  20. On Weak Markov's Principle

    DEFF Research Database (Denmark)

    Kohlenbach, Ulrich Wilhelm

    2002-01-01

    We show that the so-called weak Markov's principle (WMP) which states that every pseudo-positive real number is positive is underivable in E-HA + AC. Since allows one to formalize (atl eastl arge parts of) Bishop's constructive mathematics, this makes it unlikely that WMP can be proved within...... the framework of Bishop-style mathematics (which has been open for about 20 years). The underivability even holds if the ine.ective schema of full comprehension (in all types) for negated formulas (in particular for -free formulas) is added, which allows one to derive the law of excluded middle...

  1. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  2. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  3. Weakly Supervised Dictionary Learning

    Science.gov (United States)

    You, Zeyu; Raich, Raviv; Fern, Xiaoli Z.; Kim, Jinsub

    2018-05-01

    We present a probabilistic modeling and inference framework for discriminative analysis dictionary learning under a weak supervision setting. Dictionary learning approaches have been widely used for tasks such as low-level signal denoising and restoration as well as high-level classification tasks, which can be applied to audio and image analysis. Synthesis dictionary learning aims at jointly learning a dictionary and corresponding sparse coefficients to provide accurate data representation. This approach is useful for denoising and signal restoration, but may lead to sub-optimal classification performance. By contrast, analysis dictionary learning provides a transform that maps data to a sparse discriminative representation suitable for classification. We consider the problem of analysis dictionary learning for time-series data under a weak supervision setting in which signals are assigned with a global label instead of an instantaneous label signal. We propose a discriminative probabilistic model that incorporates both label information and sparsity constraints on the underlying latent instantaneous label signal using cardinality control. We present the expectation maximization (EM) procedure for maximum likelihood estimation (MLE) of the proposed model. To facilitate a computationally efficient E-step, we propose both a chain and a novel tree graph reformulation of the graphical model. The performance of the proposed model is demonstrated on both synthetic and real-world data.

  4. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  5. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  6. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  7. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  8. Fortalezas y debilidades del programa para la detección y el control del cáncer cervicouterino: Evaluación cualitativa en San Luis Potosí, México Strengths and weaknesses of a cervical cancer detection and control program: a qualitative evaluation in San Luis Potosi, Mexico

    Directory of Open Access Journals (Sweden)

    Luz María Tejada-Tayabas

    2012-08-01

    Full Text Available Objetivo: Identificar, desde la perspectiva del personal de salud, las fortalezas y debilidades del programa para la detección y el control del cáncer cervicouterino mediante una evaluación cualitativa, en tres centros de salud de San Luis Potosí, México, entre agosto de 2008 y noviembre de 2009. Métodos: Se realizó una evaluación cualitativa. En el estudio participaron nueve prestadores de servicios, seleccionados mediante muestreo por conveniencia, bajo el criterio de participación voluntaria. Inicialmente se obtuvo información de los centros de salud para conocer las características y el contexto en que opera el programa; posteriormente, a los nueve informantes se les realizaron 18 entrevistas semiestructuradas para indagar su perspectiva. Se empleó un análisis de contenido dirigido. Resultados: Las fortalezas referidas por el personal son el carácter gratuito del programa, la disponibilidad de recursos materiales, así como algunas estrategias que facilitan la captación de mujeres y su acceso al cribado. Las principales debilidades son las limitaciones de recursos humanos y en la estructura física, la ineficiente organización de actividades, la deficiente capacidad técnica del personal y las limitadas acciones de promoción, así como las dificultades en el seguimiento de las mujeres con resultados positivos. Conclusiones: Este estudio muestra la necesidad de incrementar los recursos humanos, realizar cambios en la normatividad y reorganizar las acciones del programa en algunos centros de salud, para garantizar la calidad del servicio y satisfacer los requerimientos de las mujeres, y así favorecer la cobertura en todas sus acciones.Objective: To identify, from the perspective of the health staff, the strengths and weaknesses of the program for the detection and control of cervical cancer through a qualitative assessment implemented in three health centers in the city of San Luis Potosi, Mexico, from August 2008 to November

  9. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  10. THE MAKE BREAK TEST AS A DIAGNOSTIC-TOOL IN FUNCTIONAL WEAKNESS

    NARCIS (Netherlands)

    VANDERPLOEG, RJO; OOSTERHUIS, HJGH

    Strength was measured in four major muscle groups with a hand-held dynamometer. The "make" and "break" technique was used with and without encouragement, and fatiguability was tested in patients with organic weakness and patients with functional weakness. Patients with functional weakness could be

  11. Identifying Weak Ties from Publicly Available Social Media Data in an Event

    DEFF Research Database (Denmark)

    Prakash Gupta, Jayesh; Menon, Karan; Kärkkäinen, Hannu

    2016-01-01

    The concept of weak ties was introduced by Granovetter through the seminal paper titled "Strength of weak ties". Since then the role of weak ties in general and their specific role as occupying the structural hole has been explored in many different fields. In this study, we identify actual or po...

  12. Weak-interaction rates in stellar conditions

    Science.gov (United States)

    Sarriguren, Pedro

    2018-05-01

    Weak-interaction rates, including β-decay and electron captures, are studied in several mass regions at various densities and temperatures of astrophysical interest. In particular, we study odd-A nuclei in the pf-shell region, which are involved in presupernova formations. Weak rates are relevant to understand the late stages of the stellar evolution, as well as the nucleosynthesis of heavy nuclei. The nuclear structure involved in the weak processes is studied within a quasiparticle proton-neutron random-phase approximation with residual interactions in both particle-hole and particle-particle channels on top of a deformed Skyrme Hartree-Fock mean field with pairing correlations. First, the energy distributions of the Gamow-Teller strength are discussed and compared with the available experimental information, measured under terrestrial conditions from charge-exchange reactions. Then, the sensitivity of the weak-interaction rates to both astrophysical densities and temperatures is studied. Special attention is paid to the relative contribution to these rates of thermally populated excited states in the decaying nucleus and to the electron captures from the degenerate electron plasma.

  13. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  14. Strong mobility in weakly disordered systems

    Energy Technology Data Exchange (ETDEWEB)

    Ben-naim, Eli [Los Alamos National Laboratory; Krapivsky, Pavel [BOSTON UNIV

    2009-01-01

    We study transport of interacting particles in weakly disordered media. Our one-dimensional system includes (i) disorder, the hopping rate governing the movement of a particle between two neighboring lattice sites is inhomogeneous, and (ii) hard core interaction, the maximum occupancy at each site is one particle. We find that over a substantial regime, the root-mean-square displacement of a particle s grows superdiffusively with time t, {sigma}{approx}({epsilon}t){sup 2/3}, where {epsilon} is the disorder strength. Without disorder the particle displacement is subdiffusive, {sigma} {approx}t{sup 1/4}, and therefore disorder strongly enhances particle mobility. We explain this effect using scaling arguments, and verify the theoretical predictions through numerical simulations. Also, the simulations show that regardless of disorder strength, disorder leads to stronger mobility over an intermediate time regime.

  15. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  16. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  17. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  18. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  19. A collapse pressure prediction model for horizontal shale gas wells with multiple weak planes

    Directory of Open Access Journals (Sweden)

    Ping Chen

    2015-01-01

    Full Text Available Since collapse of horizontal wellbore through long brittle shale interval is a major problem, the occurrence characteristics of weak planes were analyzed according to outcrop, core, and SEM and FMI data of shale rocks. A strength analysis method was developed for shale rocks with multiple weak planes based on weak-plane strength theory. An analysis was also conducted of the strength characteristics of shale rocks with uniform distribution of multiple weak planes. A collapse pressure prediction model for horizontal wells in shale formation with multiple weak planes was established, which takes into consideration the occurrence of each weak plane, wellbore stress condition, borehole azimuth, and in-situ stress azimuth. Finally, a case study of a horizontal shale gas well in southern Sichuan Basin was conducted. The results show that the intersection angle between the shale bedding plane and the structural fracture is generally large (nearly orthogonal; with the increase of weak plane number, the strength of rock mass declines sharply and is more heavily influenced by weak planes; when there are more than four weak planes, the rock strength tends to be isotropic and the whole strength of rock mass is greatly weakened, significantly increasing the risk of wellbore collapse. With the increase of weak plane number, the drilling fluid density (collapse pressure to keep borehole stability goes up gradually. For instance, the collapse pressure is 1.04 g/cm3 when there are no weak planes, and 1.55 g/cm3 when there is one weak plane, and 1.84 g/cm3 when there are two weak planes. The collapse pressure prediction model for horizontal wells proposed in this paper presented results in better agreement with those in actual situation. This model, more accurate and practical than traditional models, can effectively improve the accuracy of wellbore collapse pressure prediction of horizontal shale gas wells.

  20. Standard and Null Weak Values

    OpenAIRE

    Zilberberg, Oded; Romito, Alessandro; Gefen, Yuval

    2013-01-01

    Weak value (WV) is a quantum mechanical measurement protocol, proposed by Aharonov, Albert, and Vaidman. It consists of a weak measurement, which is weighed in, conditional on the outcome of a later, strong measurement. Here we define another two-step measurement protocol, null weak value (NVW), and point out its advantages as compared to WV. We present two alternative derivations of NWVs and compare them to the corresponding derivations of WVs.

  1. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  2. Weak openness and almost openness

    Directory of Open Access Journals (Sweden)

    David A. Rose

    1984-01-01

    Full Text Available Weak openness and almost openness for arbitrary functions between topological spaces are defined as duals to the weak continuity of Levine and the almost continuity of Husain respectively. Independence of these two openness conditions is noted and comparison is made between these and the almost openness of Singal and Singal. Some results dual to those known for weak continuity and almost continuity are obtained. Nearly almost openness is defined and used to obtain an improved link from weak continuity to almost continuity.

  3. Strengths and threats regarding the patient’s safety: nursing professionals’ opinion Fortalezas y amenazas en torno a la seguridad del paciente según la opinión de los profesionales de enfermería Fortalezas e ameaças em torno da segurança do paciente segundo a opinião dos profissionais de enfermagem

    Directory of Open Access Journals (Sweden)

    Ángel Alfredo Martínez Ques

    2010-06-01

    Full Text Available The aim of this research is to know the barriers and opportunities that nursing professionals detect in their clinical practice in order to develop the culture of patient safety and to identify future research lines. This qualitative study is based on the DELPHI method, with a group of 19 nursing professionals from education and care practice, involving both primary and specialized care. Weaknesses and threats revolve around five categories: profession, organization and infrastructure; indicators; communication and safety culture; and safety training. Opportunities to improve safety cover six categories: organizational change; promotion of the safety culture, professional training and development; relationship with the patients; research; and strategic planning. Work is needed to improve safety and nursing should be ready to assume this leadership.El objetivo de este estudio es conocer las barreras y oportunidades que los profesionales de enfermería detectan en su práctica clínica para el pleno desarrollo de la cultura de la seguridad del paciente e identificar posibles líneas de investigación futuras. Se trata de un estudio cualitativo basado en la técnica Delphi modificada sobre un grupo compuesto por 19 profesionales de enfermería del ámbito docente y asistencial, tanto de atención primaria como especializada. Se encontró que las debilidades y amenazas giran alrededor de cinco categorías: profesión; organización e infraestructura; indicadores; comunicación y cultura de seguridad; y, formación en seguridad. Las oportunidades para mejorar la seguridad comprenden seis categorías: cambio organizacional; fomento de la cultura de seguridad, formación y desarrollo profesional; relación con los pacientes, investigación; y, planificación estratégica. Se concluye que existe la necesidad de trabajar para mejorar la seguridad y que la enfermería debe asumir ese liderazgo.O objetivo deste estudo é conhecer as barreiras e

  4. Weak measurements and quantum weak values for NOON states

    Science.gov (United States)

    Rosales-Zárate, L.; Opanchuk, B.; Reid, M. D.

    2018-03-01

    Quantum weak values arise when the mean outcome of a weak measurement made on certain preselected and postselected quantum systems goes beyond the eigenvalue range for a quantum observable. Here, we propose how to determine quantum weak values for superpositions of states with a macroscopically or mesoscopically distinct mode number, that might be realized as two-mode Bose-Einstein condensate or photonic NOON states. Specifically, we give a model for a weak measurement of the Schwinger spin of a two-mode NOON state, for arbitrary N . The weak measurement arises from a nondestructive measurement of the two-mode occupation number difference, which for atomic NOON states might be realized via phase contrast imaging and the ac Stark effect using an optical meter prepared in a coherent state. The meter-system coupling results in an entangled cat-state. By subsequently evolving the system under the action of a nonlinear Josephson Hamiltonian, we show how postselection leads to quantum weak values, for arbitrary N . Since the weak measurement can be shown to be minimally invasive, the weak values provide a useful strategy for a Leggett-Garg test of N -scopic realism.

  5. Critical potentials, leptons, and weak currents

    International Nuclear Information System (INIS)

    Smith, P.F.; Lewin, J.D.

    1977-12-01

    A theoretical study is made of the interaction of very strong localised electromagnetic potentials with charged leptons, and with the vacuum state. The principal objective is to investigate the phenomena which occur when the potential reaches or exceeds the critical value at which bound levels are drawn into the lower continuum. The behaviour of bound and continuum solutions of the Dirac equation for the specific model of a short range potential well in an arbitrarily large bounded volume is examined in detail. Vacuum polarisation effects are computed by summation over the infinite set of single particle levels, and special attention is given to the behaviour of the overall charge distribution as the potential strength increases through the critical value. The most significant features of the results are (a) the formation of highly localised electron or muon bound states, (b) similar critical potential strengths for electrons and muons, and (c) redefinition of the vacuum by one charge unit at the critical potential. These features are analogous to some properties of leptonic and hadronic weak currents, and the hypothesis is proposed that strong short range potentials may provide a possible mediating mechanism for the weak interaction and also a lepton confinement mechanism within the structure of hadrons. (author)

  6. Attitude Strength.

    Science.gov (United States)

    Howe, Lauren C; Krosnick, Jon A

    2017-01-03

    Attitude strength has been the focus of a huge volume of research in psychology and related sciences for decades. The insights offered by this literature have tremendous value for understanding attitude functioning and structure and for the effective application of the attitude concept in applied settings. This is the first Annual Review of Psychology article on the topic, and it offers a review of theory and evidence regarding one of the most researched strength-related attitude features: attitude importance. Personal importance is attached to an attitude when the attitude is perceived to be relevant to self-interest, social identification with reference groups or reference individuals, and values. Attaching personal importance to an attitude causes crystallizing of attitudes (via enhanced resistance to change), effortful gathering and processing of relevant information, accumulation of a large store of well-organized relevant information in long-term memory, enhanced attitude extremity and accessibility, enhanced attitude impact on the regulation of interpersonal attraction, energizing of emotional reactions, and enhanced impact of attitudes on behavioral intentions and action. Thus, important attitudes are real and consequential psychological forces, and their study offers opportunities for addressing behavioral change.

  7. Corium crust strength measurements

    Energy Technology Data Exchange (ETDEWEB)

    Lomperski, S. [Argonne National Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439-4840 (United States)], E-mail: lomperski@anl.gov; Farmer, M.T. [Argonne National Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439-4840 (United States)], E-mail: farmer@anl.gov

    2009-11-15

    Corium strength is of interest in the context of a severe reactor accident in which molten core material melts through the reactor vessel and collects on the containment basemat. Some accident management strategies involve pouring water over the melt to solidify it and halt corium/concrete interactions. The effectiveness of this method could be influenced by the strength of the corium crust at the interface between the melt and coolant. A strong, coherent crust anchored to the containment walls could allow the yet-molten corium to fall away from the crust as it erodes the basemat, thereby thermally decoupling the melt from the coolant and sharply reducing the cooling rate. This paper presents a diverse collection of measurements of the mechanical strength of corium. The data is based on load tests of corium samples in three different contexts: (1) small blocks cut from the debris of the large-scale MACE experiments, (2) 30 cm-diameter, 75 kg ingots produced by SSWICS quench tests, and (3) high temperature crusts loaded during large-scale corium/concrete interaction (CCI) tests. In every case the corium consisted of varying proportions of UO{sub 2}, ZrO{sub 2}, and the constituents of concrete to represent a LWR melt at different stages of a molten core/concrete interaction. The collection of data was used to assess the strength and stability of an anchored, plant-scale crust. The results indicate that such a crust is likely to be too weak to support itself above the melt. It is therefore improbable that an anchored crust configuration could persist and the melt become thermally decoupled from the water layer to restrict cooling and prolong an attack of the reactor cavity concrete.

  8. Weak decays of stable particles

    International Nuclear Information System (INIS)

    Brown, R.M.

    1988-09-01

    In this article we review recent advances in the field of weak decays and consider their implications for quantum chromodynamics (the theory of strong interactions) and electroweak theory (the combined theory of electromagnetic and weak interactions), which together form the ''Standard Model'' of elementary particles. (author)

  9. Nonperturbative theory of weak pre- and post-selected measurements

    Energy Technology Data Exchange (ETDEWEB)

    Kofman, Abraham G., E-mail: kofmana@gmail.com; Ashhab, Sahel; Nori, Franco

    2012-11-01

    This paper starts with a brief review of the topic of strong and weak pre- and post-selected (PPS) quantum measurements, as well as weak values, and afterwards presents original work. In particular, we develop a nonperturbative theory of weak PPS measurements of an arbitrary system with an arbitrary meter, for arbitrary initial states of the system and the meter. New and simple analytical formulas are obtained for the average and the distribution of the meter pointer variable. These formulas hold to all orders in the weak value. In the case of a mixed preselected state, in addition to the standard weak value, an associated weak value is required to describe weak PPS measurements. In the linear regime, the theory provides the generalized Aharonov–Albert–Vaidman formula. Moreover, we reveal two new regimes of weak PPS measurements: the strongly-nonlinear regime and the inverted region (the regime with a very large weak value), where the system-dependent contribution to the pointer deflection decreases with increasing the measurement strength. The optimal conditions for weak PPS measurements are obtained in the strongly-nonlinear regime, where the magnitude of the average pointer deflection is equal or close to the maximum. This maximum is independent of the measurement strength, being typically of the order of the pointer uncertainty. In the optimal regime, the small parameter of the theory is comparable to the overlap of the pre- and post-selected states. We show that the amplification coefficient in the weak PPS measurements is generally a product of two qualitatively different factors. The effects of the free system and meter Hamiltonians are discussed. We also estimate the size of the ensemble required for a measurement and identify optimal and efficient meters for weak measurements. Exact solutions are obtained for a certain class of the measured observables. These solutions are used for numerical calculations, the results of which agree with the theory

  10. Nonperturbative theory of weak pre- and post-selected measurements

    International Nuclear Information System (INIS)

    Kofman, Abraham G.; Ashhab, Sahel; Nori, Franco

    2012-01-01

    This paper starts with a brief review of the topic of strong and weak pre- and post-selected (PPS) quantum measurements, as well as weak values, and afterwards presents original work. In particular, we develop a nonperturbative theory of weak PPS measurements of an arbitrary system with an arbitrary meter, for arbitrary initial states of the system and the meter. New and simple analytical formulas are obtained for the average and the distribution of the meter pointer variable. These formulas hold to all orders in the weak value. In the case of a mixed preselected state, in addition to the standard weak value, an associated weak value is required to describe weak PPS measurements. In the linear regime, the theory provides the generalized Aharonov–Albert–Vaidman formula. Moreover, we reveal two new regimes of weak PPS measurements: the strongly-nonlinear regime and the inverted region (the regime with a very large weak value), where the system-dependent contribution to the pointer deflection decreases with increasing the measurement strength. The optimal conditions for weak PPS measurements are obtained in the strongly-nonlinear regime, where the magnitude of the average pointer deflection is equal or close to the maximum. This maximum is independent of the measurement strength, being typically of the order of the pointer uncertainty. In the optimal regime, the small parameter of the theory is comparable to the overlap of the pre- and post-selected states. We show that the amplification coefficient in the weak PPS measurements is generally a product of two qualitatively different factors. The effects of the free system and meter Hamiltonians are discussed. We also estimate the size of the ensemble required for a measurement and identify optimal and efficient meters for weak measurements. Exact solutions are obtained for a certain class of the measured observables. These solutions are used for numerical calculations, the results of which agree with the theory

  11. Weak values in collision theory

    Science.gov (United States)

    de Castro, Leonardo Andreta; Brasil, Carlos Alexandre; Napolitano, Reginaldo de Jesus

    2018-05-01

    Weak measurements have an increasing number of applications in contemporary quantum mechanics. They were originally described as a weak interaction that slightly entangled the translational degrees of freedom of a particle to its spin, yielding surprising results after post-selection. That description often ignores the kinetic energy of the particle and its movement in three dimensions. Here, we include these elements and re-obtain the weak values within the context of collision theory by two different approaches, and prove that the results are compatible with each other and with the results from the traditional approach. To provide a more complete description, we generalize weak values into weak tensors and use them to provide a more realistic description of the Stern-Gerlach apparatus.

  12. Hartman effect and weak measurements that are not really weak

    International Nuclear Information System (INIS)

    Sokolovski, D.; Akhmatskaya, E.

    2011-01-01

    We show that in wave packet tunneling, localization of the transmitted particle amounts to a quantum measurement of the delay it experiences in the barrier. With no external degree of freedom involved, the envelope of the wave packet plays the role of the initial pointer state. Under tunneling conditions such ''self-measurement'' is necessarily weak, and the Hartman effect just reflects the general tendency of weak values to diverge, as postselection in the final state becomes improbable. We also demonstrate that it is a good precision, or a 'not really weak' quantum measurement: no matter how wide the barrier d, it is possible to transmit a wave packet with a width σ small compared to the observed advancement. As is the case with all weak measurements, the probability of transmission rapidly decreases with the ratio σ/d.

  13. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  14. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  15. Weak Measurement and Quantum Correlation

    Indian Academy of Sciences (India)

    Arun Kumar Pati

    Entanglement: Two quantum systems can be in a strongly correlated state even if .... These are resources which can be used to design quantum computer, quantum ...... Weak measurements have found numerous applications starting from the ...

  16. Weakly infinite-dimensional spaces

    International Nuclear Information System (INIS)

    Fedorchuk, Vitalii V

    2007-01-01

    In this survey article two new classes of spaces are considered: m-C-spaces and w-m-C-spaces, m=2,3,...,∞. They are intermediate between the class of weakly infinite-dimensional spaces in the Alexandroff sense and the class of C-spaces. The classes of 2-C-spaces and w-2-C-spaces coincide with the class of weakly infinite-dimensional spaces, while the compact ∞-C-spaces are exactly the C-compact spaces of Haver. The main results of the theory of weakly infinite-dimensional spaces, including classification via transfinite Lebesgue dimensions and Luzin-Sierpinsky indices, extend to these new classes of spaces. Weak m-C-spaces are characterised by means of essential maps to Henderson's m-compacta. The existence of hereditarily m-strongly infinite-dimensional spaces is proved.

  17. Weak interactions and presupernova evolution

    International Nuclear Information System (INIS)

    Aufderheide, M.B.; State Univ. of New York

    1991-01-01

    The role of weak interactions, particularly electron capture and β - decay, in presupernova evolution is discussed. The present uncertainty in these rates is examined and the possibility of improving the situation is addressed. 12 refs., 4 figs

  18. Weak Deeply Virtual Compton Scattering

    International Nuclear Information System (INIS)

    Ales Psaker; Wolodymyr Melnitchouk; Anatoly Radyushkin

    2006-01-01

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities

  19. Weakly compact operators and interpolation

    OpenAIRE

    Maligranda, Lech

    1992-01-01

    The class of weakly compact operators is, as well as the class of compact operators, a fundamental operator ideal. They were investigated strongly in the last twenty years. In this survey, we have collected and ordered some of this (partly very new) knowledge. We have also included some comments, remarks and examples. The class of weakly compact operators is, as well as the class of compact operators, a fundamental operator ideal. They were investigated strongly in the last twenty years. I...

  20. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  1. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  2. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  3. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  4. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  5. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  6. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  7. Acute muscular weakness in children

    Directory of Open Access Journals (Sweden)

    Ricardo Pablo Javier Erazo Torricelli

    Full Text Available ABSTRACT Acute muscle weakness in children is a pediatric emergency. During the diagnostic approach, it is crucial to obtain a detailed case history, including: onset of weakness, history of associated febrile states, ingestion of toxic substances/toxins, immunizations, and family history. Neurological examination must be meticulous as well. In this review, we describe the most common diseases related to acute muscle weakness, grouped into the site of origin (from the upper motor neuron to the motor unit. Early detection of hyperCKemia may lead to a myositis diagnosis, and hypokalemia points to the diagnosis of periodic paralysis. Ophthalmoparesis, ptosis and bulbar signs are suggestive of myasthenia gravis or botulism. Distal weakness and hyporeflexia are clinical features of Guillain-Barré syndrome, the most frequent cause of acute muscle weakness. If all studies are normal, a psychogenic cause should be considered. Finding the etiology of acute muscle weakness is essential to execute treatment in a timely manner, improving the prognosis of affected children.

  8. Astrophysical evidence for weak new forces

    International Nuclear Information System (INIS)

    Burgess, C.; Cloutier, J.

    1988-01-01

    Recent observations of the orbital precession rate for eclipsing binary star systems appear to be in disagreement with the predictions of general relativity. We here analyse whether these discrepancies can be interpreted as being due to the existence of a new, long range, very weak force. We find that, with a conservative estimate of the astrophysical errors involved, the binary-star data by itself is consistent with what would be expected of a new force. The coupling and range required to fit the data can be consistent with the present limits on the existence of new forces. The strongest constraints come from recent terrestrial searches for a ''fifth force''. This analysis underlines the fact that these binary star systems are sensitive to forces whose coupling strength can be as low as 10 -5 that of gravity

  9. Bond strength of masonry

    NARCIS (Netherlands)

    Pluijm, van der R.; Vermeltfoort, A.Th.

    1992-01-01

    Bond strength is not a well defined property of masonry. Normally three types of bond strength can be distinguished: - tensile bond strength, - shear (and torsional) bond strength, - flexural bond strength. In this contribution the behaviour and strength of masonry in deformation controlled uniaxial

  10. Weakness

    Science.gov (United States)

    ... by a slipped disk in the spine) Stroke MUSCLE DISEASES Becker muscular dystrophy Dermatomyositis Muscular dystrophy (Duchenne) Myotonic dystrophy POISONING Botulism Poisoning ( insecticides , nerve gas) ...

  11. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  12. Cosmology with weak lensing surveys

    International Nuclear Information System (INIS)

    Munshi, Dipak; Valageas, Patrick; Waerbeke, Ludovic van; Heavens, Alan

    2008-01-01

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening matter. The distortions are due to fluctuations in the gravitational potential, and are directly related to the distribution of matter and to the geometry and dynamics of the Universe. As a consequence, weak gravitational lensing offers unique possibilities for probing the Dark Matter and Dark Energy in the Universe. In this review, we summarise the theoretical and observational state of the subject, focussing on the statistical aspects of weak lensing, and consider the prospects for weak lensing surveys in the future. Weak gravitational lensing surveys are complementary to both galaxy surveys and cosmic microwave background (CMB) observations as they probe the unbiased non-linear matter power spectrum at modest redshifts. Most of the cosmological parameters are accurately estimated from CMB and large-scale galaxy surveys, so the focus of attention is shifting to understanding the nature of Dark Matter and Dark Energy. On the theoretical side, recent advances in the use of 3D information of the sources from photometric redshifts promise greater statistical power, and these are further enhanced by the use of statistics beyond two-point quantities such as the power spectrum. The use of 3D information also alleviates difficulties arising from physical effects such as the intrinsic alignment of galaxies, which can mimic weak lensing to some extent. On the observational side, in the next few years weak lensing surveys such as CFHTLS, VST-KIDS and Pan-STARRS, and the planned Dark Energy Survey, will provide the first weak lensing surveys covering very large sky areas and depth. In the long run even more ambitious programmes such as DUNE, the Supernova Anisotropy Probe (SNAP) and Large-aperture Synoptic Survey Telescope (LSST) are planned. Weak lensing of diffuse components such as the CMB and 21 cm emission can also

  13. Cosmology with weak lensing surveys

    Energy Technology Data Exchange (ETDEWEB)

    Munshi, Dipak [Institute of Astronomy, Madingley Road, Cambridge, CB3 OHA (United Kingdom); Astrophysics Group, Cavendish Laboratory, Madingley Road, Cambridge CB3 OHE (United Kingdom)], E-mail: munshi@ast.cam.ac.uk; Valageas, Patrick [Service de Physique Theorique, CEA Saclay, 91191 Gif-sur-Yvette (France); Waerbeke, Ludovic van [University of British Columbia, Department of Physics and Astronomy, 6224 Agricultural Road, Vancouver, BC V6T 1Z1 (Canada); Heavens, Alan [SUPA - Scottish Universities Physics Alliance, Institute for Astronomy, University of Edinburgh, Blackford Hill, Edinburgh EH9 3HJ (United Kingdom)

    2008-06-15

    Weak gravitational lensing is responsible for the shearing and magnification of the images of high-redshift sources due to the presence of intervening matter. The distortions are due to fluctuations in the gravitational potential, and are directly related to the distribution of matter and to the geometry and dynamics of the Universe. As a consequence, weak gravitational lensing offers unique possibilities for probing the Dark Matter and Dark Energy in the Universe. In this review, we summarise the theoretical and observational state of the subject, focussing on the statistical aspects of weak lensing, and consider the prospects for weak lensing surveys in the future. Weak gravitational lensing surveys are complementary to both galaxy surveys and cosmic microwave background (CMB) observations as they probe the unbiased non-linear matter power spectrum at modest redshifts. Most of the cosmological parameters are accurately estimated from CMB and large-scale galaxy surveys, so the focus of attention is shifting to understanding the nature of Dark Matter and Dark Energy. On the theoretical side, recent advances in the use of 3D information of the sources from photometric redshifts promise greater statistical power, and these are further enhanced by the use of statistics beyond two-point quantities such as the power spectrum. The use of 3D information also alleviates difficulties arising from physical effects such as the intrinsic alignment of galaxies, which can mimic weak lensing to some extent. On the observational side, in the next few years weak lensing surveys such as CFHTLS, VST-KIDS and Pan-STARRS, and the planned Dark Energy Survey, will provide the first weak lensing surveys covering very large sky areas and depth. In the long run even more ambitious programmes such as DUNE, the Supernova Anisotropy Probe (SNAP) and Large-aperture Synoptic Survey Telescope (LSST) are planned. Weak lensing of diffuse components such as the CMB and 21 cm emission can also

  14. Conformational transitions of a weak polyampholyte

    KAUST Repository

    Nair, Arun Kumar Narayanan

    2014-10-07

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  15. Conformational transitions of a weak polyampholyte

    KAUST Repository

    Nair, Arun Kumar Narayanan; Uyaver, Sahin; Sun, Shuyu

    2014-01-01

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  16. Weak interactions in hot nucleon matter

    International Nuclear Information System (INIS)

    Cowell, S.; Pandharipande, V.R.

    2006-01-01

    The reaction rates for electron capture, neutrino absorption, and neutrino scattering in hot asymmetric nuclear matter are calculated with two-body effective interactions and one-body effective weak operators obtained from realistic models of nuclear forces by use of correlated basis theory. The infinite system is modeled in a box with periodic boundary conditions, and the one-quasiparticle quasi-hole response functions are calculated with a large microcanonical sample and the Tamm-Dancoff approximation. Results for matter at a temperature of 10 MeV, proton fraction 0.4, and densities ρ=(1/2),1,(3/2)ρ 0 , where ρ 0 is the equilibrium density of symmetric nuclear matter, are presented to illustrate the method. In general, the strength of the response is shifted to higher-energy transfers when compared with that of a noninteracting Fermi gas. The shift in the response and the weakness of effective operators as compared with the bare operators significantly reduce the cross sections for electron capture and neutrino scattering by factors of ∼2.5-3.5. In contrast, the symmetry energy enhances the neutrino absorption reaction rate relative to the Fermi gas. However, this reaction rate is still quite small because of Pauli blocking

  17. Peripheral facial weakness (Bell's palsy).

    Science.gov (United States)

    Basić-Kes, Vanja; Dobrota, Vesna Dermanović; Cesarik, Marijan; Matovina, Lucija Zadro; Madzar, Zrinko; Zavoreo, Iris; Demarin, Vida

    2013-06-01

    Peripheral facial weakness is a facial nerve damage that results in muscle weakness on one side of the face. It may be idiopathic (Bell's palsy) or may have a detectable cause. Almost 80% of peripheral facial weakness cases are primary and the rest of them are secondary. The most frequent causes of secondary peripheral facial weakness are systemic viral infections, trauma, surgery, diabetes, local infections, tumor, immune disorders, drugs, degenerative diseases of the central nervous system, etc. The diagnosis relies upon the presence of typical signs and symptoms, blood chemistry tests, cerebrospinal fluid investigations, nerve conduction studies and neuroimaging methods (cerebral MRI, x-ray of the skull and mastoid). Treatment of secondary peripheral facial weakness is based on therapy for the underlying disorder, unlike the treatment of Bell's palsy that is controversial due to the lack of large, randomized, controlled, prospective studies. There are some indications that steroids or antiviral agents are beneficial but there are also studies that show no beneficial effect. Additional treatments include eye protection, physiotherapy, acupuncture, botulinum toxin, or surgery. Bell's palsy has a benign prognosis with complete recovery in about 80% of patients, 15% experience some mode of permanent nerve damage and severe consequences remain in 5% of patients.

  18. An upper bound on right-chiral weak interactions

    International Nuclear Information System (INIS)

    Stephenson, G.J.; Goldman, T.; Maltman, K.

    1990-01-01

    Weak vertex corrections to the quark-gluon vertex functions produce differing form-factor corrections for quarks of differing chiralities. These differences grow with increasing four-momentum transfer in the gluon leg. Consequently, inclusive polarized proton--proton scattering to a final state jet should show a large parity-violating asymmetry at high energies. The absence of large signals at sufficiently high energies can be interpreted as being due to balancing vertex corrections from a right-handed weak vector boson of limited mass, and limits on the strength of such signals can, in principle, give upper bounds on that mass. 2 refs

  19. An upper bound on right-Chiral weak interactions

    International Nuclear Information System (INIS)

    Stephenson, G.J.; Goldman, T.; Maltman, K.

    1990-01-01

    Weak vertex corrections to the quark-gluon vertex functions produce differing form-factor corrections for quarks of differing chiralities. These differences grow with increasing four-momentum transfer in the gluon leg. Consequently, inclusive polarized proton-proton scattering to a final state jet should show a large parity-violating asymmetry at high energies. The absence of large signals at sufficiently high energies can be interpreted as being due to balancing vertex corrections from a right-handed weak vector boson of limited mass, and limits on the strength of such signals can, in principle, give upper bounds on that mass

  20. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  1. Weak-interacting holographic QCD

    International Nuclear Information System (INIS)

    Gazit, D.; Yee, H.-U.

    2008-06-01

    We propose a simple prescription for including low-energy weak-interactions into the frame- work of holographic QCD, based on the standard AdS/CFT dictionary of double-trace deformations. As our proposal enables us to calculate various electro-weak observables involving strongly coupled QCD, it opens a new perspective on phenomenological applications of holographic QCD. We illustrate efficiency and usefulness of our method by performing a few exemplar calculations; neutron beta decay, charged pion weak decay, and meson-nucleon parity non-conserving (PNC) couplings. The idea is general enough to be implemented in both Sakai-Sugimoto as well as Hard/Soft Wall models. (author)

  2. Plane waves with weak singularities

    International Nuclear Information System (INIS)

    David, Justin R.

    2003-03-01

    We study a class of time dependent solutions of the vacuum Einstein equations which are plane waves with weak null singularities. This singularity is weak in the sense that though the tidal forces diverge at the singularity, the rate of divergence is such that the distortion suffered by a freely falling observer remains finite. Among such weak singular plane waves there is a sub-class which does not exhibit large back reaction in the presence of test scalar probes. String propagation in these backgrounds is smooth and there is a natural way to continue the metric beyond the singularity. This continued metric admits string propagation without the string becoming infinitely excited. We construct a one parameter family of smooth metrics which are at a finite distance in the space of metrics from the extended metric and a well defined operator in the string sigma model which resolves the singularity. (author)

  3. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  4. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  5. Topic Detection Based on Weak Tie Analysis: A Case Study of LIS Research

    Directory of Open Access Journals (Sweden)

    Ling Wei

    2016-11-01

    Full Text Available Purpose: Based on the weak tie theory, this paper proposes a series of connection indicators of weak tie subnets and weak tie nodes to detect research topics, recognize their connections, and understand their evolution. Design/methodology/approach: First, keywords are extracted from article titles and preprocessed. Second, high-frequency keywords are selected to generate weak tie co-occurrence networks. By removing the internal lines of clustered sub-topic networks, we focus on the analysis of weak tie subnets' composition and functions and the weak tie nodes' roles. Findings: The research topics' clusters and themes changed yearly; the subnets clustered with technique-related and methodology-related topics have been the core, important subnets for years; while close subnets are highly independent, research topics are generally concentrated and most topics are application-related; the roles and functions of nodes and weak ties are diversified. Research limitations: The parameter values are somewhat inconsistent; the weak tie subnets and nodes are classified based on empirical observations, and the conclusions are not verified or compared to other methods. Practical implications: The research is valuable for detecting important research topics as well as their roles, interrelations, and evolution trends. Originality/value: To contribute to the strength of weak tie theory, the research translates weak and strong ties concepts to co-occurrence strength, and analyzes weak ties' functions. Also, the research proposes a quantitative method to classify and measure the topics' clusters and nodes.

  6. Cosmology and the weak interaction

    Energy Technology Data Exchange (ETDEWEB)

    Schramm, D.N. (Fermi National Accelerator Lab., Batavia, IL (USA)):(Chicago Univ., IL (USA))

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  7. Cosmology and the weak interaction

    International Nuclear Information System (INIS)

    Schramm, D.N.

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N ν ∼ 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs

  8. Nonlinear waves and weak turbulence

    CERN Document Server

    Zakharov, V E

    1997-01-01

    This book is a collection of papers on dynamical and statistical theory of nonlinear wave propagation in dispersive conservative media. Emphasis is on waves on the surface of an ideal fluid and on Rossby waves in the atmosphere. Although the book deals mainly with weakly nonlinear waves, it is more than simply a description of standard perturbation techniques. The goal is to show that the theory of weakly interacting waves is naturally related to such areas of mathematics as Diophantine equations, differential geometry of waves, Poincaré normal forms, and the inverse scattering method.

  9. Weak disorder in Fibonacci sequences

    Energy Technology Data Exchange (ETDEWEB)

    Ben-Naim, E [Theoretical Division and Center for Nonlinear Studies, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Krapivsky, P L [Department of Physics and Center for Molecular Cybernetics, Boston University, Boston, MA 02215 (United States)

    2006-05-19

    We study how weak disorder affects the growth of the Fibonacci series. We introduce a family of stochastic sequences that grow by the normal Fibonacci recursion with probability 1 - {epsilon}, but follow a different recursion rule with a small probability {epsilon}. We focus on the weak disorder limit and obtain the Lyapunov exponent that characterizes the typical growth of the sequence elements, using perturbation theory. The limiting distribution for the ratio of consecutive sequence elements is obtained as well. A number of variations to the basic Fibonacci recursion including shift, doubling and copying are considered. (letter to the editor)

  10. Weak interactions at high energies

    International Nuclear Information System (INIS)

    Ellis, J.

    1978-08-01

    Review lectures are presented on the phenomenological implications of the modern spontaneously broken gauge theories of the weak and electromagnetic interactions, and some observations are made about which high energy experiments probe what aspects of gauge theories. Basic quantum chromodynamics phenomenology is covered including momentum dependent effective quark distributions, the transverse momentum cutoff, search for gluons as sources of hadron jets, the status and prospects for the spectroscopy of fundamental fermions and how fermions may be used to probe aspects of the weak and electromagnetic gauge theory, studies of intermediate vector bosons, and miscellaneous possibilities suggested by gauge theories from the Higgs bosons to speculations about proton decay. 187 references

  11. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Digital resilience is your company ready for the next cyber threat?

    CERN Document Server

    Rothrock, Ray A

    2018-01-01

    Cybersecurity expert Ray Rothrock, lays bare tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving even while under assault. Fascinating and highly readable, this book helps businesses: Understand the threats they face * Assess the resilience of their networks against attacks * Identify and address weaknesses * Respond to exploits swiftly and effectively.

  13. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  14. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  15. Weak localization of seismic waves

    International Nuclear Information System (INIS)

    Larose, E.; Margerin, L.; Tiggelen, B.A. van; Campillo, M.

    2004-01-01

    We report the observation of weak localization of seismic waves in a natural environment. It emerges as a doubling of the seismic energy around the source within a spot of the width of a wavelength, which is several tens of meters in our case. The characteristic time for its onset is the scattering mean-free time that quantifies the internal heterogeneity

  16. On Weak-BCC-Algebras

    Science.gov (United States)

    Thomys, Janus; Zhang, Xiaohong

    2013-01-01

    We describe weak-BCC-algebras (also called BZ-algebras) in which the condition (x∗y)∗z = (x∗z)∗y is satisfied only in the case when elements x, y belong to the same branch. We also characterize ideals, nilradicals, and nilpotent elements of such algebras. PMID:24311983

  17. Voltage Weak DC Distribution Grids

    NARCIS (Netherlands)

    Hailu, T.G.; Mackay, L.J.; Ramirez Elizondo, L.M.; Ferreira, J.A.

    2017-01-01

    This paper describes the behavior of voltage weak DC distribution systems. These systems have relatively small system capacitance. The size of system capacitance, which stores energy, has a considerable effect on the value of fault currents, control complexity, and system reliability. A number of

  18. The structure of weak interaction

    International Nuclear Information System (INIS)

    Zee, A.

    1977-01-01

    The effect of introducing righthanded currents on the structure of weak interaction is discussed. The ΔI=1/2 rule is in the spotlight. The discussion provides an interesting example in which the so-called Iizuka-Okubo-Zweing rule is not only evaded, but completely negated

  19. Coverings, Networks and Weak Topologies

    Czech Academy of Sciences Publication Activity Database

    Dow, A.; Junnila, H.; Pelant, Jan

    2006-01-01

    Roč. 53, č. 2 (2006), s. 287-320 ISSN 0025-5793 R&D Projects: GA ČR GA201/97/0216 Institutional research plan: CEZ:AV0Z10190503 Keywords : Banach spaces * weak topologies * networks topologies Subject RIV: BA - General Mathematics

  20. Weak differentiability of product measures

    NARCIS (Netherlands)

    Heidergott, B.F.; Leahu, H.

    2010-01-01

    In this paper, we study cost functions over a finite collection of random variables. For these types of models, a calculus of differentiation is developed that allows us to obtain a closed-form expression for derivatives where "differentiation" has to be understood in the weak sense. The technique

  1. Weak lensing and dark energy

    International Nuclear Information System (INIS)

    Huterer, Dragan

    2002-01-01

    We study the power of upcoming weak lensing surveys to probe dark energy. Dark energy modifies the distance-redshift relation as well as the matter power spectrum, both of which affect the weak lensing convergence power spectrum. Some dark-energy models predict additional clustering on very large scales, but this probably cannot be detected by weak lensing alone due to cosmic variance. With reasonable prior information on other cosmological parameters, we find that a survey covering 1000 sq deg down to a limiting magnitude of R=27 can impose constraints comparable to those expected from upcoming type Ia supernova and number-count surveys. This result, however, is contingent on the control of both observational and theoretical systematics. Concentrating on the latter, we find that the nonlinear power spectrum of matter perturbations and the redshift distribution of source galaxies both need to be determined accurately in order for weak lensing to achieve its full potential. Finally, we discuss the sensitivity of the three-point statistics to dark energy

  2. Weak pion production from nuclei

    Indian Academy of Sciences (India)

    effect of Pauli blocking, Fermi motion and renormalization of weak ∆ properties ... Furthermore, the angular distribution and the energy distribution of ... Here ψα(p ) and u(p) are the Rarita Schwinger and Dirac spinors for ∆ and nucleon.

  3. Weak transitions in 44Ca

    International Nuclear Information System (INIS)

    Tauhata, L.; Marques, A.

    1972-01-01

    Energy levels and gamma radiation transitions of Ca 44 are experimentally determined, mainly the weak transition at 564 KeV and 728 KeV. The decay scheme and the method used (coincidence with Ge-Li detector) are also presented [pt

  4. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  5. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  6. Muscle Weakness Thresholds for Prediction of Diabetes in Adults.

    Science.gov (United States)

    Peterson, Mark D; Zhang, Peng; Choksi, Palak; Markides, Kyriakos S; Al Snih, Soham

    2016-05-01

    Despite the known links between weakness and early mortality, what remains to be fully understood is the extent to which strength preservation is associated with protection from cardiometabolic diseases, such as diabetes. The purposes of this study were to determine the association between muscle strength and diabetes among adults, and to identify age- and sex-specific thresholds of low strength for detection of risk. A population-representative sample of 4066 individuals, aged 20-85 years, was included from the combined 2011-2012 National Health and Nutrition Examination Survey (NHANES) data sets. Strength was assessed using a handheld dynamometer, and the single highest reading from either hand was normalized to body mass. A logistic regression model was used to assess the association between normalized grip strength and risk of diabetes, as determined by haemoglobin A1c levels ≥6.5 % (≥48 mmol/mol), while controlling for sociodemographic characteristics, anthropometric measures and television viewing time. For every 0.05 decrement in normalized strength, there were 1.26 times increased adjusted odds for diabetes in men and women. Women were at lower odds of having diabetes (odds ratio 0.49; 95 % confidence interval 0.29-0.82). Age, waist circumference and lower income were also associated with diabetes. The optimal sex- and age-specific weakness thresholds to detect diabetes were 0.56, 0.50 and 0.45 for men at ages of 20-39, 40-59 and 60-80 years, respectively, and 0.42, 0.38 and 0.33 for women at ages of 20-39, 40-59 and 60-80 years, respectively. We present thresholds of strength that can be incorporated into a clinical setting for identifying adults who are at risk of developing diabetes and might benefit from lifestyle interventions to reduce risk.

  7. A weak magnetic field inhibits hippocampal neurogenesis in SD rats

    Science.gov (United States)

    Zhang, B.; Tian, L.; Cai, Y.; Pan, Y.

    2017-12-01

    Geomagnetic field is an important barrier that protects life forms on Earth from solar wind and radiation. Paleomagnetic data have well demonstrated that the strength of ancient geomagnetic field was dramatically weakened during a polarity transition. Accumulating evidence has shown that weak magnetic field exposures has serious adverse effects on the metabolism and behaviors in organisms. Hippocampal neurogenesis occurs throughout life in mammals' brains which plays a key role in brain function, and can be influenced by animals' age as well as environmental factors, but few studies have examined the response of hippocampal neurogenesis to it. In the present study, we have investigated the weak magnetic field effects on hippocampal neurogenesis of adult Sprague Dawley (SD) rats. Two types of magnetic fields were used, a weak magnetic field (≤1.3 μT) and the geomagnetic fields (51 μT).The latter is treated as a control condition. SD rats were exposure to the weak magnetic field up to 6 weeks. We measured the changes of newborn nerve cells' proliferation and survival, immature neurons, neurons and apoptosis in the dentate gyrus (DG) of hippocampus in SD rats. Results showed that, the weak magnetic field (≤1.3 μT) inhibited their neural stem cells proliferation and significantly reduced the survival of newborn nerve cells, immature neurons and neurons after 2 or 4 weeks continuous treatment (i.e. exposure to weak magnetic field). Moreover, apoptosis tests indicated the weak magnetic field can promote apoptosis of nerve cells in the hippocampus after 4 weeks treatment. Together, our new data indicate that weak magnetic field decrease adult hippocampal neurogenesis through inhibiting neural stem cells proliferation and promoting apoptosis, which provides useful experimental constraints on better understanding the mechanism of linkage between life and geomagnetic field.

  8. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  9. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  10. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  11. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  12. Argument Strength and the Persuasiveness of Stories

    Science.gov (United States)

    Schreiner, Constanze; Appel, Markus; Isberner, Maj-Britt; Richter, Tobias

    2017-01-01

    ABSTRACT Stories are a powerful means to change people’s attitudes and beliefs. The aim of the current work was to shed light on the role of argument strength (argument quality) in narrative persuasion. The present study examined the influence of strong versus weak arguments on attitudes in a low or high narrative context. Moreover, baseline attitudes, interindividual differences in working memory capacity, and recipients’ transportation were examined. Stories with strong arguments were more persuasive than stories with weak arguments. This main effect was qualified by a two-way interaction with baseline attitude, revealing that argument strength had a greater impact on individuals who initially were particularly doubtful toward the story claim. Furthermore, we identified a three-way interaction showing that argument strength mattered most for recipients who were deeply transported into the story world in stories that followed a typical narrative structure. These findings provide an important specification of narrative persuasion theory. PMID:29805322

  13. Light weakly interacting massive particles

    Science.gov (United States)

    Gelmini, Graciela B.

    2017-08-01

    Light weakly interacting massive particles (WIMPs) are dark matter particle candidates with weak scale interaction with the known particles, and mass in the GeV to tens of GeV range. Hints of light WIMPs have appeared in several dark matter searches in the last decade. The unprecedented possible coincidence into tantalizingly close regions of mass and cross section of four separate direct detection experimental hints and a potential indirect detection signal in gamma rays from the galactic center, aroused considerable interest in our field. Even if these hints did not so far result in a discovery, they have had a significant impact in our field. Here we review the evidence for and against light WIMPs as dark matter candidates and discuss future relevant experiments and observations.

  14. (Weakly) three-dimensional caseology

    International Nuclear Information System (INIS)

    Pomraning, G.C.

    1996-01-01

    The singular eigenfunction technique of Case for solving one-dimensional planar symmetry linear transport problems is extended to a restricted class of three-dimensional problems. This class involves planar geometry, but with forcing terms (either boundary conditions or internal sources) which are weakly dependent upon the transverse spatial variables. Our analysis involves a singular perturbation about the classic planar analysis, and leads to the usual Case discrete and continuum modes, but modulated by weakly dependent three-dimensional spatial functions. These functions satisfy parabolic differential equations, with a different diffusion coefficient for each mode. Representative one-speed time-independent transport problems are solved in terms of these generalised Case eigenfunctions. Our treatment is very heuristic, but may provide an impetus for more rigorous analysis. (author)

  15. History of the weak interactions

    International Nuclear Information System (INIS)

    Lee, T.D.

    1987-01-01

    At the 'Jackfest' marking the 65th birthday of Jack Steinberger (see July/August 1986 issue, page 29), T.D. Lee gave an account of the history of the weak interactions. This edited version omits some of Lee's tributes to Steinberger, but retains the impressive insight into the subtleties of a key area of modern physics by one who played a vital role in its development. (orig./HSI).

  16. Weak neutral-current interactions

    International Nuclear Information System (INIS)

    Barnett, R.M.

    1978-08-01

    The roles of each type of experiment in establishing uniquely the values of the the neutral-current couplings of u and d quarks are analyzed together with their implications for gauge models of the weak and electromagnetic interactions. An analysis of the neutral-current couplings of electrons and of the data based on the assumption that only one Z 0 boson exists is given. Also a model-independent analysis of parity violation experiments is discussed. 85 references

  17. Submanifolds weakly associated with graphs

    Indian Academy of Sciences (India)

    A CARRIAZO, L M FERN ´ANDEZ and A RODRÍGUEZ-HIDALGO. Department of Geometry and Topology, ..... by means of trees (connected graphs without cycles) and forests (disjoint unions of trees, see [6]) given in [3], by extending it to weak ... CR-submanifold. In this case, every tree is a K2. Finally, Theorem 3.8 of [3] can ...

  18. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  19. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  20. The Strength Compass

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    In the Ph.D-project ͚Strengths-based Learning - Children͛s character strengths as a means to their learning potential͛ 750 Danish children have assessed ͚The Strength Compass͛ in order to identify their strengths and to create awareness of strengths. This was followed by a strengths......-based intervention program in order to explore the strengths. Finally different methods to apply the strength in everyday life at school were applied. The paper presentation will show the results for strengths display for children aged 6-16 in different categories: Different age groups: Are the same strengths...... present in both small children and youths? Gender: Do the results show differences between the two genders? Danish as a mother- tongue language: Do the results show any differences in the strengths display when considering different language and cultural backgrounds? Children with Special Needs: Do...

  1. Role of Orbital Dynamics in Spin Relaxation and Weak Antilocalization in Quantum Dots

    Science.gov (United States)

    Zaitsev, Oleg; Frustaglia, Diego; Richter, Klaus

    2005-01-01

    We develop a semiclassical theory for spin-dependent quantum transport to describe weak (anti)localization in quantum dots with spin-orbit coupling. This allows us to distinguish different types of spin relaxation in systems with chaotic, regular, and diffusive orbital classical dynamics. We find, in particular, that for typical Rashba spin-orbit coupling strengths, integrable ballistic systems can exhibit weak localization, while corresponding chaotic systems show weak antilocalization. We further calculate the magnetoconductance and analyze how the weak antilocalization is suppressed with decreasing quantum dot size and increasing additional in-plane magnetic field.

  2. Root strength changes after logging in southeast Alaska

    Science.gov (United States)

    R. R. Ziemer; D. N. Swanston

    1977-01-01

    Abstract - A crucial factor in the stability of steep forested slopes is the role of plant roots in maintaining the shear strength of soil mantles. Roots add strength to the soil by vertically anchoring through the soil mass into failures in the bedrock and by laterally tying the slope together across zones of weakness or instability. Once the covering vegetation is...

  3. Celebrate Strengths, Nurture Affinities: A Conversation with Mel Levine

    Science.gov (United States)

    Scherer, Marge

    2006-01-01

    In this interview with "Educational Leadership," pediatrician Dr. Mel Levine, cofounder of "All Kinds of Minds," explains why students and educators should learn about eight neurodevelopmental functions that undergird our strengths and weaknesses. For the most part, he notes, adults who lead successful lives mobilize their strengths and compensate…

  4. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  5. Gossip and Distributed Kalman Filtering: Weak Consensus Under Weak Detectability

    Science.gov (United States)

    Kar, Soummya; Moura, José M. F.

    2011-04-01

    The paper presents the gossip interactive Kalman filter (GIKF) for distributed Kalman filtering for networked systems and sensor networks, where inter-sensor communication and observations occur at the same time-scale. The communication among sensors is random; each sensor occasionally exchanges its filtering state information with a neighbor depending on the availability of the appropriate network link. We show that under a weak distributed detectability condition: 1. the GIKF error process remains stochastically bounded, irrespective of the instability properties of the random process dynamics; and 2. the network achieves \\emph{weak consensus}, i.e., the conditional estimation error covariance at a (uniformly) randomly selected sensor converges in distribution to a unique invariant measure on the space of positive semi-definite matrices (independent of the initial state.) To prove these results, we interpret the filtered states (estimates and error covariances) at each node in the GIKF as stochastic particles with local interactions. We analyze the asymptotic properties of the error process by studying as a random dynamical system the associated switched (random) Riccati equation, the switching being dictated by a non-stationary Markov chain on the network graph.

  6. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  7. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    Science.gov (United States)

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  8. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  9. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  10. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  11. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  12. Why is gravity so weak?

    International Nuclear Information System (INIS)

    Goradia, S.G.

    2006-01-01

    Why is gravity weak? Gravity is plagued with this and many other questions. After decades of exhausting work we do not have a clear answer. In view of this fact it will be shown in the following pages that there are reasons for thinking that gravity is just a composite force consisting of the long-range manifestations of short range nuclear forces that are too tiny to be measured at illuminated or long ranges by particle colliders. This is consistent with Einstein's proposal in 1919

  13. Weak decays of heavy quarks

    International Nuclear Information System (INIS)

    Gaillard, M.K.

    1978-08-01

    The properties that may help to identify the two additional quark flavors that are expected to be discovered. These properties are lifetime, branching ratios, selection rules, and lepton decay spectra. It is also noted that CP violation may manifest itself more strongly in heavy particle decays than elsewhere providing a new probe of its origin. The theoretical progress in the understanding of nonleptonic transitions among lighter quarks, nonleptonic K and hyperon decay amplitudes, omega minus and charmed particle decay predictions, and lastly the Kobayashi--Maskawa model for the weak coupling of heavy quarks together with the details of its implications for topology and bottomology are treated. 48 references

  14. Weak consistency and strong paraconsistency

    Directory of Open Access Journals (Sweden)

    Gemma Robles

    2009-11-01

    Full Text Available In a standard sense, consistency and paraconsistency are understood as, respectively, the absence of any contradiction and as the absence of the ECQ (“E contradictione quodlibet” rule that allows us to conclude any well formed formula from any contradiction. The aim of this paper is to explain the concepts of weak consistency alternative to the standard one, the concepts of paraconsistency related to them and the concept of strong paraconsistency, all of which have been defined by the author together with José M. Méndez.

  15. Electromagnetic weak turbulence theory revisited

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, P. H. [IPST, University of Maryland, College Park, Maryland 20742 (United States); Ziebell, L. F. [Instituto de Fisica, UFRGS, Porto Alegre, RS (Brazil); Gaelzer, R.; Pavan, J. [Instituto de Fisica e Matematica, UFPel, Pelotas, RS (Brazil)

    2012-10-15

    The statistical mechanical reformulation of weak turbulence theory for unmagnetized plasmas including fully electromagnetic effects was carried out by Yoon [Phys. Plasmas 13, 022302 (2006)]. However, the wave kinetic equation for the transverse wave ignores the nonlinear three-wave interaction that involves two transverse waves and a Langmuir wave, the incoherent analogue of the so-called Raman scattering process, which may account for the third and higher-harmonic plasma emissions. The present paper extends the previous formalism by including such a term.

  16. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  17. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  18. How much muscle strength is required to walk in a crouch gait?

    NARCIS (Netherlands)

    Steele, K.M.; van der Krogt, M.M.; Schwartz, M.H.; Delp, S.L.

    2012-01-01

    Muscle weakness is commonly cited as a cause of crouch gait in individuals with cerebral palsy; however, outcomes after strength training are variable and mechanisms by which muscle weakness may contribute to crouch gait are unclear. Understanding how much muscle strength is required to walk in a

  19. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  20. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  1. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  2. Inferring the nature of anthropogenic threats from long-term abundance records.

    Science.gov (United States)

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  3. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  4. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  5. Weak interactions at the SSC

    International Nuclear Information System (INIS)

    Chanowitz, M.S.

    1986-03-01

    Prospects for the study of standard model weak interactions at the SSC are reviewed, with emphasis on the unique capability of the SSC to study the mechanism of electroweak symmetry breaking whether the associated new quanta are at the TeV scale or higher. Symmetry breaking by the minimal Higgs mechanism and by related strong interaction dynamical variants is summarized. A set of measurements is outlined that would calibrate the proton structure functions and the backgrounds to new physics. The ability to measure the three weak gauge boson vertex is found to complement LEP II, with measurements extending to larger Q 2 at a comparable statistical level in detectable decays. B factory physics is briefly reviewed as one example of a possible broad program of high statistics studies of sub-TeV scale phenomena. The largest section of the talk is devoted to the possible manifestations of symmetry breaking in the WW and ZZ production cross sections. Some new results are presented bearing on the ability to detect high mass WW and ZZ pairs. The principal conclusion is that although nonstandard model scenarios are typically more forgiving, the capability to study symmetry breaking in the standard model (and in related strong interaction dynamical variants) requires achieving the SSC design goals of √ s,L = 40Tev, 10 33 cm -2 sec -1 . 28 refs., 5 figs

  6. Probing supervoids with weak lensing

    Science.gov (United States)

    Higuchi, Yuichi; Inoue, Kaiki Taro

    2018-05-01

    The cosmic microwave background (CMB) has non-Gaussian features in the temperature fluctuations. An anomalous cold spot surrounded with a hot ring, called the Cold Spot, is one of such features. If a large underdense region (supervoid) resides towards the Cold Spot, we would be able to detect a systematic shape distortion in the images of background source galaxies via weak lensing effect. In order to estimate the detectability of such signals, we used the data of N-body simulations to simulate full-sky ray-tracing of source galaxies. We searched for a most prominent underdense region using the simulated convergence maps smoothed at a scale of 20° and obtained tangential shears around it. The lensing signal expected in a concordant Λ cold dark matter model can be detected at a signal-to-noise ratio S/N ˜ 3. If a supervoid with a radius of ˜200 h-1 Mpc and a density contrast δ0 ˜ -0.3 at the centre resides at a redshift z ˜ 0.2, on-going and near-future weak gravitational lensing surveys would detect a lensing signal with S/N ≳ 4 without resorting to stacking. From the tangential shear profile, we can obtain a constraint on the projected mass distribution of the supervoid.

  7. Relaxion monodromy and the Weak Gravity Conjecture

    International Nuclear Information System (INIS)

    Ibáñez, L.E.; Montero, M.; Uranga, A.M.; Valenzuela, I.

    2016-01-01

    The recently proposed relaxion models require extremely large trans-Planckian axion excursions as well as a potential explicitly violating the axion shift symmetry. The latter property is however inconsistent with the axion periodicity, which corresponds to a gauged discrete shift symmetry. A way to make things consistent is to use monodromy, i.e. both the axion and the potential parameters transform under the discrete shift symmetry. The structure is better described in terms of a 3-form field C_μ_ν_ρ coupling to the SM Higgs through its field strength F_4. The 4-form also couples linearly to the relaxion, in the Kaloper-Sorbo fashion. The extremely small relaxion-Higgs coupling arises in a see-saw fashion as g≃F_4/f, with f being the axion decay constant. We discuss constraints on this type of constructions from membrane nucleation and the Weak Gravity Conjecture. The latter requires the existence of membranes, whose too fast nucleation could in principle drive the theory out of control, unless the cut-off scale is lowered. This allows to rule out the simplest models with the QCD axion as relaxion candidate on purely theoretical grounds. We also discuss possible avenues to embed this structure into string theory.

  8. Relaxion monodromy and the Weak Gravity Conjecture

    Energy Technology Data Exchange (ETDEWEB)

    Ibáñez, L.E.; Montero, M. [Departamento de Física Teórica, Facultad de CienciasUniversidad Autónoma de Madrid, 28049 Madrid (Spain); Instituto de Física Teórica IFT-UAM/CSIC,C/ Nicolás Cabrera 13-15, Campus de Cantoblanco, 28049 Madrid (Spain); Uranga, A.M. [Instituto de Física Teórica IFT-UAM/CSIC,C/ Nicolás Cabrera 13-15, Campus de Cantoblanco, 28049 Madrid (Spain); Valenzuela, I. [Max-Planck-Institut fur Physik,Fohringer Ring 6, 80805 Munich (Germany); Institute for Theoretical Physics and Center for Extreme Matter and Emergent Phenomena,Utrecht University,Leuvenlaan 4, 3584 CE Utrecht (Netherlands)

    2016-04-05

    The recently proposed relaxion models require extremely large trans-Planckian axion excursions as well as a potential explicitly violating the axion shift symmetry. The latter property is however inconsistent with the axion periodicity, which corresponds to a gauged discrete shift symmetry. A way to make things consistent is to use monodromy, i.e. both the axion and the potential parameters transform under the discrete shift symmetry. The structure is better described in terms of a 3-form field C{sub μνρ} coupling to the SM Higgs through its field strength F{sub 4}. The 4-form also couples linearly to the relaxion, in the Kaloper-Sorbo fashion. The extremely small relaxion-Higgs coupling arises in a see-saw fashion as g≃F{sub 4}/f, with f being the axion decay constant. We discuss constraints on this type of constructions from membrane nucleation and the Weak Gravity Conjecture. The latter requires the existence of membranes, whose too fast nucleation could in principle drive the theory out of control, unless the cut-off scale is lowered. This allows to rule out the simplest models with the QCD axion as relaxion candidate on purely theoretical grounds. We also discuss possible avenues to embed this structure into string theory.

  9. The strength compass

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    of agreement/disagreement. Also the child/teacher is asked whether the actual strength is important and if he or she has the possibilities to apply the strength in the school. In a PhDproject ‘Strengths-based Learning - Children’s Character Strengths as Means to their Learning Potential’ 750 Danish children......Individual paper presentation: The ‘Strength Compass’. The results of a PhDresearch project among schoolchildren (age 6-16) identifying VIAstrengths concerning age, gender, mother-tongue-langue and possible child psychiatric diagnosis. Strengths-based interventions in schools have a theoretical...... Psychological Publishing Company. ‘The Strength Compass’ is a computer/Ipad based qualitative tool to identify the strengths of a child by a self-survey or a teacher’s survey. It is designed as a visual analogue scale with a statement of the strength in which the child/teacher may declare the degree...

  10. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  11. Forecasting Lightning Threat using Cloud-Resolving Model Simulations

    Science.gov (United States)

    McCaul, Eugene W., Jr.; Goodman, Steven J.; LaCasse, Katherine M.; Cecil, Daniel J.

    2008-01-01

    Two new approaches are proposed and developed for making time and space dependent, quantitative short-term forecasts of lightning threat, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are distinctive in that they are based entirely on the ice-phase hydrometeor fields generated by regional cloud-resolving numerical simulations, such as those produced by the WRF model. These methods are justified by established observational evidence linking aspects of the precipitating ice hydrometeor fields to total flash rates. The methods are straightforward and easy to implement, and offer an effective near-term alternative to the incorporation of complex and costly cloud electrification schemes into numerical models. One method is based on upward fluxes of precipitating ice hydrometeors in the mixed phase region at the-15 C level, while the second method is based on the vertically integrated amounts of ice hydrometeors in each model grid column. Each method can be calibrated by comparing domain-wide statistics of the peak values of simulated flash rate proxy fields against domain-wide peak total lightning flash rate density data from observations. Tests show that the first method is able to capture much of the temporal variability of the lightning threat, while the second method does a better job of depicting the areal coverage of the threat. Our blended solution is designed to retain most of the temporal sensitivity of the first method, while adding the improved spatial coverage of the second. Exploratory tests for selected North Alabama cases show that, because WRF can distinguish the general character of most convective events, our methods show promise as a means of generating quantitatively realistic fields of lightning threat. However, because the models tend to have more difficulty in predicting the instantaneous placement of storms, forecasts of the detailed location of the lightning threat based on single

  12. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  13. Weak KAM for commuting Hamiltonians

    International Nuclear Information System (INIS)

    Zavidovique, M

    2010-01-01

    For two commuting Tonelli Hamiltonians, we recover the commutation of the Lax–Oleinik semi-groups, a result of Barles and Tourin (2001 Indiana Univ. Math. J. 50 1523–44), using a direct geometrical method (Stoke's theorem). We also obtain a 'generalization' of a theorem of Maderna (2002 Bull. Soc. Math. France 130 493–506). More precisely, we prove that if the phase space is the cotangent of a compact manifold then the weak KAM solutions (or viscosity solutions of the critical stationary Hamilton–Jacobi equation) for G and for H are the same. As a corollary we obtain the equality of the Aubry sets and of the Peierls barrier. This is also related to works of Sorrentino (2009 On the Integrability of Tonelli Hamiltonians Preprint) and Bernard (2007 Duke Math. J. 136 401–20)

  14. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Science.gov (United States)

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  15. Fermi and the Theory of Weak Interactions

    Indian Academy of Sciences (India)

    IAS Admin

    Quantum Field Theory created by Dirac and used by Fermi to describe weak ... of classical electrodynamics (from which the electric field and magnetic field can be obtained .... Universe. However, thanks to weak interactions, this can be done.

  16. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  17. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  18. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  19. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  20. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  1. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  2. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul

    2015-01-01

    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election...

  3. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  4. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  5. Weakly distributive modules. Applications to supplement submodules

    Indian Academy of Sciences (India)

    Abstract. In this paper, we define and study weakly distributive modules as a proper generalization of distributive modules. We prove that, weakly distributive supplemented modules are amply supplemented. In a weakly distributive supplemented module every submodule has a unique coclosure. This generalizes a result of ...

  6. Post-quantum attacks on key distribution schemes in the presence of weakly stochastic sources

    International Nuclear Information System (INIS)

    Al–Safi, S W; Wilmott, C M

    2015-01-01

    It has been established that the security of quantum key distribution protocols can be severely compromised were one to permit an eavesdropper to possess a very limited knowledge of the random sources used between the communicating parties. While such knowledge should always be expected in realistic experimental conditions, the result itself opened a new line of research to fully account for real-world weak randomness threats to quantum cryptography. Here we expand of this novel idea by describing a key distribution scheme that is provably secure against general attacks by a post-quantum adversary. We then discuss possible security consequences for such schemes under the assumption of weak randomness. (paper)

  7. Muscle weakness, afferent sensory dysfunction and exercise in knee osteoarthritis

    DEFF Research Database (Denmark)

    Roos, Ewa M.; Herzog, Walter; Block, Joel A

    2011-01-01

    Lower-extremity muscle strength and afferent sensory dysfunction, such as reduced proprioceptive acuity, are potentially modifiable putative risk factors for knee osteoarthritis (OA). Findings from current studies suggest that muscle weakness is a predictor of knee OA onset, while there is confli...... with previous knee injuries) are easily identified, and may benefit from exercise interventions to prevent or delay OA onset....... there is conflicting evidence regarding the role of muscle weakness in OA progression. In contrast, the literature suggests a role for afferent sensory dysfunction in OA progression but not necessarily in OA onset. The few pilot exercise studies performed in patients who are at risk of incident OA indicate...... a possibility for achieving preventive structure or load modifications. In contrast, large randomized controlled trials of patients with established OA have failed to demonstrate beneficial effects of strengthening exercises. Subgroups of individuals who are at increased risk of knee OA (such as those...

  8. Gauge theory of weak, electromagnetic and dual electromagnetic interactions

    International Nuclear Information System (INIS)

    Soln, J.

    1980-01-01

    An SU 2 x U 1 algebra, in addition to the ordinary electric charge, also establishes the existence of the dual electric charge. This is taken as an indication of the existence of dual electromagnetic interactions in nature. Here, the unification of weak, electromagnetic and dual electromagnetic interactions is performed. The Yang-Mills-type group which contains the electromagnetic, dual electromagnetic and weak currents is SUsub(L,2) x U 1 x U' 1 . The masses of vector mesons are generated through the Higgs-Kibble mechanism. A simple consistency requirement suggests that dual electromagnetism and ordinary electromagnetism have the same strengths, leading the theory to a rather good agreement with experiments. (author)

  9. Open string T-duality in a weakly curved background

    International Nuclear Information System (INIS)

    Davidovic, Ljubica

    2016-01-01

    We consider a theory of an open string moving in a weakly curved background, composed of a constant metric and a linearly coordinate dependent Kalb-Ramond field with an infinitesimal field strength. We find its T-dual using the generalized Buscher procedure developed for the closed string moving in a weakly curved background, and the fact that solving the boundary conditions, the open string theory transforms to the effective closed string theory. So, T-dualizing the effective theory along all effective directions we obtain its T-dual theory and resume the open string theory which has such an effective theory. In this way we obtain the open string theory T-dual. (orig.)

  10. Breaking through barriers: using technology to address executive function weaknesses and improve student achievement.

    Science.gov (United States)

    Schwartz, David M

    2014-01-01

    Assistive technologies provide significant capabilities for improving student achievement. Improved accessibility, cost, and diversity of applications make integration of technology a powerful tool to compensate for executive function weaknesses and deficits and their impact on student performance, learning, and achievement. These tools can be used to compensate for decreased working memory, poor time management, poor planning and organization, poor initiation, and decreased memory. Assistive technology provides mechanisms to assist students with diverse strengths and weaknesses in mastering core curricular concepts.

  11. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  12. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  13. A Universe without Weak Interactions

    Energy Technology Data Exchange (ETDEWEB)

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-04-07

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  14. A Universe without Weak Interactions

    International Nuclear Information System (INIS)

    Harnik, R

    2006-01-01

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe

  15. A universe without weak interactions

    International Nuclear Information System (INIS)

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-01-01

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''weakless universe'' is matched to our Universe by simultaneously adjusting standard model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the weakless universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multiparameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe

  16. Measurements of weak conversion lines

    International Nuclear Information System (INIS)

    Feoktistov, A.I.; Frantsev, Yu.E.

    1979-01-01

    Described is a new methods for measuring weak conversion lines with the help of the β spectrometer of the π √ 2 type which permits to increase the reliability of the results obtained. According to this method the measurements were carried out by short series with the storage of the information obtained on the punched tape. The spectrometer magnetic field was stabilized during the measuring of the conversion spectra with the help of three nmr recorders. Instead of the dependence of the pulse calculation rate on the magnetic field value was measured the dependence of the calculation rate on the value of the voltage applied between the source and the spectrometer chamber. A short description of the automatic set-up for measuring conversion lines according to the method proposed is given. The main set-up elements are the voltage multiplexer timer, printer, scaler and the pulse analyzer. With the help of the above methods obtained is the K 1035, 8 keV 182 Ta line. It is obtained as a result of the composition of 96 measurement series. Each measurement time constitutes 640 s 12 points are taken on the line

  17. Methodology for analyzing weak spectra

    International Nuclear Information System (INIS)

    Yankovich, T.L.; Swainson, I.P.

    2000-02-01

    There is considerable interest in quantifying radionuclide transfer between environmental compartments. However, in many cases, it can be a challenge to detect concentrations of gamma-emitting radionuclides due to their low levels in environmental samples. As a result, it is valuable to develop analytical protocols to ensure consistent analysis of the areas under weak peaks. The current study has focused on testing how reproducibly peak areas and baselines can be determined using two analytical approaches. The first approach, which can be carried out using Maestro software, involves extracting net counts under a curve without fitting a functional form to the peak, whereas the second approach, which is used by most other peak fitting programs, determines net counts from spectra by fitting a Gaussian form to the data. It was found that the second approach produces more consistent peak area and baseline measurements, with the ability to de-convolute multiple, overlapping peaks. In addition, programs, such as Peak Fit, which can be used to fit a form to spectral data, often provide goodness of fit analyses, since the Gaussian form can be described using a characteristic equation against which peak data can be tested for their statistical significance. (author)

  18. Social identity threat motivates science-discrediting online comments.

    Science.gov (United States)

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  19. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  20. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  1. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  2. Strengths-based Learning

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    -being. The Ph.D.-project in Strength-based learning took place in a Danish school with 750 pupils age 6-16 and a similar school was functioning as a control group. The presentation will focus on both the aware-explore-apply processes and the practical implications for the schools involved, and on measurable......Strength-based learning - Children͛s Character Strengths as Means to their Learning Potential͛ is a Ph.D.-project aiming to create a strength-based mindset in school settings and at the same time introducing strength-based interventions as specific tools to improve both learning and well...

  3. The Role of Threat in the Dynamics of the Philippine-United States Alliance

    Science.gov (United States)

    2014-12-01

    new ones as a measure to counter the effect of threats among both nations. This step ensures that the alliance is functioning efficiently and that...states tend to balance rather than to bandwagon against a threatening state, and bandwagoning cases are manifested only by weak and isolated states...theory, Walt presents the principles of bandwagoning and balancing from the works of Kenneth Waltz in Theory of International Politics, in which he

  4. Experimental verification of a weak zone model for timber in bending

    DEFF Research Database (Denmark)

    Källsner, B.; Ditlevsen, Ove Dalager; Salmela, K.

    1997-01-01

    In order to verify a stochastic model for the variation of bending strength within and between structural timber members, tests with long members subjected to constant bending moment have been performed. The span with constant moment contained between five and nine weak zones, i.e. zones...... with a cluster of knots. In a previous investigation test specimens, each containing one weak zone, have been tested in bending separately. Based on these tests a hierarchical model with two levels was formulated. The test results show that the bending strength of the long timber members on the average is 5...

  5. Weak Interaction processes in core-collapse supernova

    International Nuclear Information System (INIS)

    Martinez-Pinedo, Gabriel

    2008-01-01

    In this manuscript we review the role that weak interaction processes play in supernova. This includes electron captures and inelastic neutrino-nucleus scattering (INNS). Electron captures during the collapse occur mainly in heavy nuclei, however the proton contribution is responsible for the convergence of different models to a 'norm' stellar trajectory. Neutrino-nucleus cross sections at supernova neutrino energies can be determined from precise data on the magnetic dipole strength. The results agree well with large-scale shell-model calculations. When incorporated in core-collapse simulations INNS increases the neutrino opacities noticeably and strongly reduces the high-energy part of the supernova spectrum

  6. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  7. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  8. Fatigue is associated with muscle weakness in Ehlers-Danlos syndrome: an explorative study.

    Science.gov (United States)

    Voermans, N C; Knoop, H; Bleijenberg, G; van Engelen, B G

    2011-06-01

    Ehlers-Danlos syndrome (EDS) is a clinically and genetically heterogeneous group of inherited connective tissue disorders characterised by joint hypermobility, skin hyperextensibility and tissue fragility. It has recently been shown that muscle weakness occurs frequently in EDS, and that fatigue is a common and clinically important symptom. The aim of this study was to investigate the relationship between fatigue severity and subjective and objective measures of muscle weakness. Furthermore, the predictive value of muscle weakness for fatigue severity was determined, together with that of pain and physical activity. An explorative, cross-sectional, observational study. Thirty EDS patients, recruited from the Dutch patient association, were investigated at the neuromuscular outpatient department of a tertiary referral centre in The Netherlands. Muscle strength measured with manual muscle strength testing and hand-held dynamometry. Self-reported muscle weakness, pain, physical activity levels and fatigue were assessed with standardised questionnaires. Fatigue severity in EDS was significantly correlated with measured and self-reported muscle weakness (r=-0.408 for manual muscle strength, r=0.461 for hand-held dynamometry and r=0.603 for self-reported muscle weakness). Both muscle weakness and pain severity were significant predictors of fatigue severity in a multiple regression analysis. The results suggest a positive and direct relationship between fatigue severity and muscle weakness in EDS. Future research should focus on the relationship between fatigue, muscle weakness and objectively measured physical activity, preferably in a larger cohort of EDS patients. Copyright © 2010 Chartered Society of Physiotherapy. Published by Elsevier Ltd. All rights reserved.

  9. Exploration of the validity of weak magnets as a suitable placebo in trials of magnetic therapy.

    Science.gov (United States)

    Greaves, C J; Harlow, T N

    2008-06-01

    To investigate whether 50 mT magnetic bracelets would be suitable as a placebo control condition for studying the pain relieving effects of higher strength magnetic bracelets in arthritis. Randomised controlled comparison between groups given either a weak 50 mT or a higher strength 180 mT magnetic bracelets to test. Four arthritis support groups in Devon, UK. One hundred sixteen people with osteoarthritis and rheumatoid arthritis. Beliefs about group allocation and expectation of benefit. There was no significant difference between groups in beliefs about allocation to the 'active magnet' group. Participants were however more likely to have an expectation of benefit (pain relief) with the higher strength magnetic bracelets. Asking about perceived group allocation is not sufficient to rule out placebo effects in trials of magnetic bracelets which use weak magnets as a control condition. There are differences in expectation of benefit between different magnet strengths.

  10. Homological properties of modules with finite weak injective and weak flat dimensions

    OpenAIRE

    Zhao, Tiwei

    2017-01-01

    In this paper, we define a class of relative derived functors in terms of left or right weak flat resolutions to compute the weak flat dimension of modules. Moreover, we investigate two classes of modules larger than that of weak injective and weak flat modules, study the existence of covers and preenvelopes, and give some applications.

  11. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  12. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  13. Weak boson emission in hadron collider processes

    International Nuclear Information System (INIS)

    Baur, U.

    2007-01-01

    The O(α) virtual weak radiative corrections to many hadron collider processes are known to become large and negative at high energies, due to the appearance of Sudakov-like logarithms. At the same order in perturbation theory, weak boson emission diagrams contribute. Since the W and Z bosons are massive, the O(α) virtual weak radiative corrections and the contributions from weak boson emission are separately finite. Thus, unlike in QED or QCD calculations, there is no technical reason for including gauge boson emission diagrams in calculations of electroweak radiative corrections. In most calculations of the O(α) electroweak radiative corrections, weak boson emission diagrams are therefore not taken into account. Another reason for not including these diagrams is that they lead to final states which differ from that of the original process. However, in experiment, one usually considers partially inclusive final states. Weak boson emission diagrams thus should be included in calculations of electroweak radiative corrections. In this paper, I examine the role of weak boson emission in those processes at the Fermilab Tevatron and the CERN LHC for which the one-loop electroweak radiative corrections are known to become large at high energies (inclusive jet, isolated photon, Z+1 jet, Drell-Yan, di-boson, tt, and single top production). In general, I find that the cross section for weak boson emission is substantial at high energies and that weak boson emission and the O(α) virtual weak radiative corrections partially cancel

  14. Improving the fidelity of teleportation through noisy channels using weak measurement

    Energy Technology Data Exchange (ETDEWEB)

    Pramanik, T., E-mail: tanu.pram99@bose.res.in; Majumdar, A.S., E-mail: archan@bose.res.in

    2013-12-13

    We employ the technique of weak measurement in order to enable preservation of teleportation fidelity for two-qubit noisy channels. We consider one or both qubits of a maximally entangled state to undergo amplitude damping, and show that the application of weak measurement and a subsequent reverse operation could lead to a fidelity greater than 2/3 for any value of the decoherence parameter. The success probability of the protocol decreases with the strength of weak measurement, and is lower when both the qubits are affected by decoherence. Finally, our protocol is shown to work for the Werner state too.

  15. Constraints on the dark matter and dark energy interactions from weak lensing bispectrum tomography

    Energy Technology Data Exchange (ETDEWEB)

    An, Rui [School of Physics and Astronomy, Shanghai Jiao Tong University, Shanghai 200240 (China); Feng, Chang [Department of Physics and Astronomy, University of California, Irvine, CA 92697 (United States); Wang, Bin, E-mail: an_rui@sjtu.edu.cn, E-mail: chang.feng@uci.edu, E-mail: wang_b@sjtu.edu.cn [Center for Gravitation and Cosmology, College of Physical Science and Technology, Yangzhou University, Yangzhou 225009 (China)

    2017-10-01

    We estimate uncertainties of cosmological parameters for phenomenological interacting dark energy models using weak lensing convergence power spectrum and bispectrum. We focus on the bispectrum tomography and examine how well the weak lensing bispectrum with tomography can constrain the interactions between dark sectors, as well as other cosmological parameters. Employing the Fisher matrix analysis, we forecast parameter uncertainties derived from weak lensing bispectra with a two-bin tomography and place upper bounds on strength of the interactions between the dark sectors. The cosmic shear will be measured from upcoming weak lensing surveys with high sensitivity, thus it enables us to use the higher order correlation functions of weak lensing to constrain the interaction between dark sectors and will potentially provide more stringent results with other observations combined.

  16. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  17. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  18. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  19. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  20. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  1. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  2. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  3. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  4. Joint weak value for all order coupling using continuous variable and qubit probe

    Science.gov (United States)

    Kumari, Asmita; Pan, Alok Kumar; Panigrahi, Prasanta K.

    2017-11-01

    The notion of weak measurement in quantum mechanics has gained a significant and wide interest in realizing apparently counterintuitive quantum effects. In recent times, several theoretical and experimental works have been reported for demonstrating the joint weak value of two observables where the coupling strength is restricted to the second order. In this paper, we extend such a formulation by providing a complete treatment of joint weak measurement scenario for all-order-coupling for the observable satisfying A 2 = 𝕀 and A 2 = A, which allows us to reveal several hitherto unexplored features. By considering the probe state to be discrete as well as continuous variable, we demonstrate how the joint weak value can be inferred for any given strength of the coupling. A particularly interesting result we pointed out that even if the initial pointer state is uncorrelated, the single pointer displacement can provide the information about the joint weak value, if at least third order of the coupling is taken into account. As an application of our scheme, we provide an all-order-coupling treatment of the well-known Hardy paradox by considering the continuous as well as discrete meter states and show how the negative joint weak probabilities emerge in the quantum paradoxes at the weak coupling limit.

  5. Analysis of factors related to arm weakness in patients with breast cancer-related lymphedema.

    Science.gov (United States)

    Lee, Daegu; Hwang, Ji Hye; Chu, Inho; Chang, Hyun Ju; Shim, Young Hun; Kim, Jung Hyun

    2015-08-01

    The aim of this study was to evaluate the ratio of significant weakness in the affected arm of breast cancer-related lymphedema patients to their unaffected side. Another purpose was to identify factors related to arm weakness and physical function in patients with breast cancer-related lymphedema. Consecutive patients (n = 80) attended a single evaluation session following their outpatient lymphedema clinic visit. Possible independent factors (i.e., lymphedema, pain, psychological, educational, and behavioral) were evaluated. Handgrip strength was used to assess upper extremity muscle strength and the disabilities of arm, shoulder, and hand (DASH) questionnaire was used to assess upper extremity physical function. Multivariate logistic regression was performed using factors that had significant differences between the handgrip weakness and non-weakness groups. Out of the 80 patients with breast cancer-related lymphedema, 29 patients (36.3 %) had significant weakness in the affected arm. Weakness of the arm with lymphedema was not related to lymphedema itself, but was related to the fear of using the affected limb (odds ratio = 1.76, 95 % confidence interval = 1.30-2.37). Fears of using the affected limb and depression significantly contributed to the variance in DASH scores. Appropriate physical and psychological interventions, including providing accurate information and reassurance of physical activity safety, are necessary to prevent arm weakness and physical dysfunction in patients with breast cancer-related lymphedema.

  6. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  7. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  8. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  9. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  10. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  11. Creep Strength of Discontinuous Fibre Composites

    DEFF Research Database (Denmark)

    Pedersen, Ole Bøcker

    1974-01-01

    relation between stress and strain rate. Expressions for the interface stress, the creep velocity profile adjacent to the fibres and the creep strength of the composite are derived. Previous results for the creep strength, sc = aVfs0 ( \\frac[( Î )\\dot] [( Î )\\dot] 0 )1/nr1 + 1/n c=Vf001n1+1n in which[( Î...... )\\dot] is the composite creep rate,V f is the fibre volume fraction,sgr 0,epsi 0 andn are the constants in the matrix creep law. The creep strength coefficient agr is found to be very weakly dependent onV f and practically independent ofn whenn is greater than about 6....

  12. Classical field approach to quantum weak measurements.

    Science.gov (United States)

    Dressel, Justin; Bliokh, Konstantin Y; Nori, Franco

    2014-03-21

    By generalizing the quantum weak measurement protocol to the case of quantum fields, we show that weak measurements probe an effective classical background field that describes the average field configuration in the spacetime region between pre- and postselection boundary conditions. The classical field is itself a weak value of the corresponding quantum field operator and satisfies equations of motion that extremize an effective action. Weak measurements perturb this effective action, producing measurable changes to the classical field dynamics. As such, weakly measured effects always correspond to an effective classical field. This general result explains why these effects appear to be robust for pre- and postselected ensembles, and why they can also be measured using classical field techniques that are not weak for individual excitations of the field.

  13. Strength functions for fragmented doorway states

    International Nuclear Information System (INIS)

    MacDonald, W.M.

    1980-01-01

    Coupling a strongly excited ''doorway state'' to weak ''hallway states'' distributes its strength into micro-resonances seen in differential cross sections taken with very good energy resolution. The distribution of strength is shown to be revealed by reduced widths of the K-matrix rather than by the imaginary part of poles of the S-matrix. Different strength functions (SF) constructed by averaging the K-matrix widths are then investigated to determine their dependences on energy and on parameters related to averages of microscopic matrix elements. A new sum rule on the integrated strength of these SF is derived and used to show that different averaging procedures actually distribute the strength differently. Finally, it is shown that the discontinuous summed strength defines spreading parameters for the doorway state only in strong coupling, where it approximates the idefinite integral of the continuous SF of MacDonald-Mekjian-Kerman-De Toledo Piza. A new method of ''parametric continuation'' is used to relate a discontinuous sliding box-average, or a finite sum, of discrete terms to a continous function

  14. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  15. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  16. Instrumental systematics and weak gravitational lensing

    International Nuclear Information System (INIS)

    Mandelbaum, R.

    2015-01-01

    We present a pedagogical review of the weak gravitational lensing measurement process and its connection to major scientific questions such as dark matter and dark energy. Then we describe common ways of parametrizing systematic errors and understanding how they affect weak lensing measurements. Finally, we discuss several instrumental systematics and how they fit into this context, and conclude with some future perspective on how progress can be made in understanding the impact of instrumental systematics on weak lensing measurements

  17. Fixed points of occasionally weakly biased mappings

    OpenAIRE

    Y. Mahendra Singh, M. R. Singh

    2012-01-01

    Common fixed point results due to Pant et al. [Pant et al., Weak reciprocal continuity and fixed point theorems, Ann Univ Ferrara, 57(1), 181-190 (2011)] are extended to a class of non commuting operators called occasionally weakly biased pair[ N. Hussain, M. A. Khamsi A. Latif, Commonfixed points for JH-operators and occasionally weakly biased pairs under relaxed conditions, Nonlinear Analysis, 74, 2133-2140 (2011)]. We also provideillustrative examples to justify the improvements. Abstract....

  18. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  19. Give Me Strength.

    Institute of Scientific and Technical Information of China (English)

    维拉

    1996-01-01

    Mort had an absolutely terrible day at the office.Everythingthat could go wrong did go wrong.As he walked home he could beheard muttering strange words to himself:“Oh,give me strength,give me strength.”Mort isn’t asking for the kind of strength thatbuilds strong muscles:he’s asking for the courage or ability to

  20. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  1. Weak strange particle production: advantages and difficulties

    International Nuclear Information System (INIS)

    Angelescu, Tatiana; Baker, O.K.

    2002-01-01

    Electromagnetic strange particle production developed at Jefferson Laboratory was an important source of information on strange particle electromagnetic formfactors and induced and transferred polarization. The high quality of the beam and the detection techniques involved could be an argument for detecting strange particles in weak interactions and answer questions about cross sections, weak formfactors, neutrino properties, which have not been investigated yet. The paper analyses some aspects related to the weak lambda production and detection with the Hall C facilities at Jefferson Laboratory and the limitations in measuring the weak interaction quantities. (authors)

  2. The influence of stereotype threat on immigrants: review and meta-analysis

    Science.gov (United States)

    Appel, Markus; Weber, Silvana; Kronberger, Nicole

    2015-01-01

    In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of 0.63 (random effects model) in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research), cultural context (US versus Europe), age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed. PMID:26217256

  3. The Influence of Stereotype Threat on Immigrants: Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Markus eAppel

    2015-07-01

    Full Text Available In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of .63 (random effects model in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research, cultural context (US vs. Europe, age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed.

  4. Charge correlation effects on ionization of weak polyelectrolytes

    International Nuclear Information System (INIS)

    Panagiotopoulos, A Z

    2009-01-01

    Ionization curves of weak polyelectrolytes were obtained as a function of the charge coupling strength from Monte Carlo simulations. In contrast to many earlier studies, the present work treats counterions explicitly, thus allowing the investigation of charge correlation effects at strong couplings. For conditions representing typical weak polyelectrolytes in water near room temperature, ionization is suppressed because of interactions between nearby dissociated groups, as also seen in prior work. A novel finding here is that, for stronger couplings, relevant for non-aqueous environments in the absence of added salt, the opposite behavior is observed-ionization is enhanced relative to the behavior of the isolated groups due to ion-counterion correlation effects. The fraction of dissociated groups as a function of position along the chain also behaves non-monotonically. Dissociation is highest near the ends of the chains for aqueous polyelectrolytes and highest at the chain middle segments for non-aqueous environments. At intermediate coupling strengths, dissociable groups appear to behave in a nearly ideal fashion, even though chain dimensions still show strong expansion effects due to ionization. These findings provide physical insights on the impact of competition between acid/base chemical equilibrium and electrostatic attractions in ionizable systems.

  5. Weakly and strongly coupled Belousov-Zhabotinsky patterns

    Science.gov (United States)

    Weiss, Stephan; Deegan, Robert D.

    2017-02-01

    We investigate experimentally and numerically the synchronization of two-dimensional spiral wave patterns in the Belousov-Zhabotinsky reaction due to point-to-point coupling of two separate domains. Different synchronization modalities appear depending on the coupling strength and the initial patterns in each domain. The behavior as a function of the coupling strength falls into two qualitatively different regimes. The weakly coupled regime is characterized by inter-domain interactions that distorted but do not break wave fronts. Under weak coupling, spiral cores are pushed around by wave fronts in the other domain, resulting in an effective interaction between cores in opposite domains. In the case where each domain initially contains a single spiral, the cores form a bound pair and orbit each other at quantized distances. When the starting patterns consist of multiple randomly positioned spiral cores, the number of cores decreases with time until all that remains are a few cores that are synchronized with a partner in the other domain. The strongly coupled regime is characterized by interdomain interactions that break wave fronts. As a result, the wave patterns in both domains become identical.

  6. Inelastic multiple scattering of interacting bosons in weak random potentials

    International Nuclear Information System (INIS)

    Geiger, Tobias

    2013-01-01

    Within the present thesis we develop a diagrammatic scattering theory for interacting bosons in a three-dimensional, weakly disordered potential. Based on a microscopic N-body scattering theory, we identify the relevant diagrams including elastic and inelastic collision processes that are sufficient to describe quantum transport in the regime of weak disorder. By taking advantage of the statistical properties of the weak disorder potential, we demonstrate how the N-body dynamics can be reduced to a nonlinear integral equation of Boltzmann type for the single-particle diffusive flux. A presently available alternative description - based on the Gross-Pitaevskii equation - only includes elastic collisions. In contrast, we show that far from equilibrium the presence of inelastic collisions - even for weak interaction strength - must be accounted for and can induce the full thermalization of the single-particle current. In addition, we also determine the coherent corrections to the incoherent transport, leading to the effect of coherent backscattering. For the first time, we are able to analyze the influence of inelastic collisions on the coherent backscattering signal, which lead to an enhancement of the backscattered cone in a narrow spectral window, even for increasing non-linearity. With a short recollection of the presently available experimental techniques we furthermore show how an immediate implementation of our suggested setup with confined Bose-Einstein condensates can be accomplished. Thereby, the emergence of collective and/or thermodynamic behavior from fundamental, microscopic constituents can also be assessed experimentally. In a second part of this thesis, we present first results for light scattering off strongly interacting Rydberg atoms trapped in a one-dimensional, chain-like configuration. In order to monitor the time-dependence of this interacting many-body system, we devise a weak measurement scenario for which we derive a master equation for the

  7. Effect of Weak Magnetic Field on Bacterial Growth

    Science.gov (United States)

    Masood, Samina

    Effects of weak magnetic fields are observed on the growth of various bacterial strains. Different sources of a constant magnetic field are used to demonstrate that ion transport in the nutrient broth and bacterial cellular dynamics is perturbed in the presence of weak magnetic field which affects the mobility and absorption of nutrients in cells and hence their doubling rate. The change is obvious after a few hours of exposure and keeps on increasing with time for all the observed species. The growth rate depends on the field strength and the nature of the magnetic field. The field effect varies with the shape and the structure of the bacterial cell wall as well as the concentration of nutrient broth. We closely study the growth of three species Escherichia coli, Pseudomonas aeruginosa and Staphylococcus epidermidis with the same initial concentrations at the same temperature in the same laboratory environment. Our results indicate that the weak static field of a few gauss after a few hours gives a measurable change in the growth rates of all bacterial species. This shows that the same magnetic field has different effects on different species in the same environment.

  8. ASYMMETRIC MAGNETIC RECONNECTION IN WEAKLY IONIZED CHROMOSPHERIC PLASMAS

    International Nuclear Information System (INIS)

    Murphy, Nicholas A.; Lukin, Vyacheslav S.

    2015-01-01

    Realistic models of magnetic reconnection in the solar chromosphere must take into account that the plasma is partially ionized and that plasma conditions within any two magnetic flux bundles undergoing reconnection may not be the same. Asymmetric reconnection in the chromosphere may occur when newly emerged flux interacts with pre-existing, overlying flux. We present 2.5D simulations of asymmetric reconnection in weakly ionized, reacting plasmas where the magnetic field strengths, ion and neutral densities, and temperatures are different in each upstream region. The plasma and neutral components are evolved separately to allow non-equilibrium ionization. As in previous simulations of chromospheric reconnection, the current sheet thins to the scale of the neutral–ion mean free path and the ion and neutral outflows are strongly coupled. However, the ion and neutral inflows are asymmetrically decoupled. In cases with magnetic asymmetry, a net flow of neutrals through the current sheet from the weak-field (high-density) upstream region into the strong-field upstream region results from a neutral pressure gradient. Consequently, neutrals dragged along with the outflow are more likely to originate from the weak-field region. The Hall effect leads to the development of a characteristic quadrupole magnetic field modified by asymmetry, but the X-point geometry expected during Hall reconnection does not occur. All simulations show the development of plasmoids after an initial laminar phase

  9. Anisotropic Concrete Compressive Strength

    DEFF Research Database (Denmark)

    Gustenhoff Hansen, Søren; Jørgensen, Henrik Brøner; Hoang, Linh Cao

    2017-01-01

    When the load carrying capacity of existing concrete structures is (re-)assessed it is often based on compressive strength of cores drilled out from the structure. Existing studies show that the core compressive strength is anisotropic; i.e. it depends on whether the cores are drilled parallel...

  10. High strength ferritic alloy

    International Nuclear Information System (INIS)

    1977-01-01

    A high strength ferritic steel is specified in which the major alloying elements are chromium and molybdenum, with smaller quantities of niobium, vanadium, silicon, manganese and carbon. The maximum swelling is specified for various irradiation conditions. Rupture strength is also specified. (U.K.)

  11. Photon strength functions

    International Nuclear Information System (INIS)

    Bergqvist, I.

    1976-01-01

    Methods for extracting photon strength functions are briefly discussed. We follow the Brink-Axel approach to relate the strength functions to the giant resonances observed in photonuclear work and summarize the available data on the E1, E2 and M1 resonances. Some experimental and theoretical problems are outlined. (author)

  12. Interviewing to Understand Strengths

    Science.gov (United States)

    Hass, Michael R.

    2018-01-01

    Interviewing clients about their strengths is an important part of developing a complete understanding of their lives and has several advantages over simply focusing on problems and pathology. Prerequisites for skillfully interviewing for strengths include the communication skills that emerge from a stance of not knowing, developing a vocabulary…

  13. S-parameters for weakly excited slots

    DEFF Research Database (Denmark)

    Albertsen, Niels Christian

    1999-01-01

    A simple approach to account for parasitic effects in weakly excited slots cut in the broad wall of a rectangular waveguide is proposed......A simple approach to account for parasitic effects in weakly excited slots cut in the broad wall of a rectangular waveguide is proposed...

  14. Low-energy Electro-weak Reactions

    International Nuclear Information System (INIS)

    Gazit, Doron

    2012-01-01

    Chiral effective field theory (EFT) provides a systematic and controlled approach to low-energy nuclear physics. Here, we use chiral EFT to calculate low-energy weak Gamow-Teller transitions. We put special emphasis on the role of two-body (2b) weak currents within the nucleus and discuss their applications in predicting physical observables.

  15. Weak interaction: past answers, present questions

    International Nuclear Information System (INIS)

    Ne'eman, Y.

    1977-02-01

    A historical sketch of the weak interaction is presented. From beta ray to pion decay, the V-A theory of Marshak and Sudarshan, CVC principle of equivalence, universality as an algebraic condition, PCAC, renormalized weak Hamiltonian in the rehabilitation of field theory, and some current issues are considered in this review. 47 references

  16. Staggering towards a calculation of weak amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Sharpe, S.R.

    1988-09-01

    An explanation is given of the methods required to calculate hadronic matrix elements of the weak Hamiltonians using lattice QCD with staggered fermions. New results are presented for the 1-loop perturbative mixing of the weak interaction operators. New numerical techniques designed for staggered fermions are described. A preliminary result for the kaon B parameter is presented. 24 refs., 3 figs.

  17. Weak measurements with a qubit meter

    DEFF Research Database (Denmark)

    Wu, Shengjun; Mølmer, Klaus

    2009-01-01

    We derive schemes to measure the so-called weak values of quantum system observables by coupling of the system to a qubit meter system. We highlight, in particular, the meaning of the imaginary part of the weak values, and show how it can be measured directly on equal footing with the real part...

  18. Optimization of strong and weak coordinates

    NARCIS (Netherlands)

    Swart, M.; Bickelhaupt, F.M.

    2006-01-01

    We present a new scheme for the geometry optimization of equilibrium and transition state structures that can be used for both strong and weak coordinates. We use a screening function that depends on atom-pair distances to differentiate strong coordinates from weak coordinates. This differentiation

  19. Bose condensation in an attractive fermion gas: From weak to strong coupling superconductivity

    International Nuclear Information System (INIS)

    Nozieres, P.; Schmitt-Rink, S.

    1985-01-01

    We consider a gas of fermions interacting via an attractive potential. We study the ground state of that system and calculate the critical temperature for the onset of superconductivity as a function of the coupling strength. We compare the behavior of continuum and lattice models and show that the evolution from weak to strong coupling superconductivity is smooth

  20. Effect of Fluid Dynamic Viscosity on the Strength of Chalk

    DEFF Research Database (Denmark)

    Hedegaard, K.; Fabricius, Ida Lykke

    The mechanical strength of high porosity and weakly cemented chalk is affected by the fluid in the pores. In this study, the effect of the dynamic viscosity of non-polar fluids has been measured on outcrop chalk from Sigerslev Quarry, Stevns, Denmark. The outcome is that the measured strength...... of the chalk decreases with increasing dynamic viscosity. The proposed qualitative explanation is that pressure difference supports and enhances the generation of microscopic shear and tensile failures....

  1. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  2. The forensic autopsy as a teaching tool: Attitudes and perceptions of ...

    African Journals Online (AJOL)

    The strengths, weaknesses, opportunities and threats (SWOT) analysis indicated the following as strengths: record keeping, legislation review and traumatology description; as weaknesses: emotional trauma and nightmares; as opportunities: the attendance of autopsies; and as threats: physical dangers. Conclusion.

  3. Using SWOT Analysis for Promoting the Accounting Program.

    Science.gov (United States)

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  5. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    NARCIS (Netherlands)

    Salemink, E.; Friese, M.; Drake, E.; Mackintosh, B.; Hoppitt, L.

    2013-01-01

    Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process) models argue that both

  6. Weak positive cloud-to-ground flashes in Northeastern Colorado

    Science.gov (United States)

    Lopez, Raul E.; Maier, Michael W.; Garcia-Miguel, Juan A.; Holle, Ronald L.

    1991-01-01

    The frequency distributions of the peak magnetic field associated with the first detected return stroke of positive and negative cloud-to-ground (CG) flashes were studied using lightning data from northeastern Colorado. These data were obtained during 1985 with a medium-to-high gain network of three direction finders (DF's). The median signal strength of positive flashes was almost two times that of the negatives for flashes within 300 km of the DF's, which have an inherent detection-threshold bias that tends to discriminate against weak signals. This bias increases with range, and affects the detection of positive and negative flashes in different ways, because of the differing character of their distributions. Positive flashes appear to have a large percentage of signals clustered around very weak values that are lost to the medium-to-high gain Colorado Detection System very quickly with increasing range. The resulting median for positive signals could thus appear to be much larger than the median for negative signals, which are more clustered around intermediate values. When only flashes very close to the DF's are considered, however, the two distributions have almost identical medians. The large percentage of weak positive signals detected close to the DF's has not been explored previously. They have been suggested to come from intracloud discharges and thus are improperly classified as CG flashes. Evidence in hand, points to their being real positive, albeit weak CG flashes. Whether or not they are real positive ground flashes, it is important to be aware of their presence in data from magnetic DF networks.

  7. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  8. Weak Solution and Weakly Uniformly Bounded Solution of Impulsive Heat Equations Containing “Maximum” Temperature

    Directory of Open Access Journals (Sweden)

    Oyelami, Benjamin Oyediran

    2013-09-01

    Full Text Available In this paper, criteria for the existence of weak solutions and uniformly weak bounded solution of impulsive heat equation containing maximum temperature are investigated and results obtained. An example is given for heat flow system with impulsive temperature using maximum temperature simulator and criteria for the uniformly weak bounded of solutions of the system are obtained.

  9. Diagnosis of functional (psychogenic paresis and weakness

    Directory of Open Access Journals (Sweden)

    Savkov V.S.

    2018-03-01

    Full Text Available Functional (conversion neurological symptoms represent one of the most common situations faced by neurologists in their everyday practice. Among them, acute or subacute functional weakness may mimic very prevalent conditions such as stroke or traumatic injury. In the diagnosis of functional weakness, although elements of the history are helpful, physical signs are often of crucial importance in the diagnosis and positive signs are as important as absence of signs of disease. Hence, accurate and reliable positive signs of functional weakness are valuable for obtaining timely diagnosis and treatment, making it possible to avoid unnecessary or invasive tests and procedures up to thrombolysis. Functional weakness commonly presents as weakness of an entire limb, paraparesis, or hemiparesis, with observable or demonstrable inconsistencies and non-anatomic accompaniments. Documentation of limb movements during sleep, the arm drop test, the Babinski’s trunk-thigh test, Hoover tests, the Sonoo abductor test, and various dynamometer tests can provide useful bedside diagnostic information on functional weakness. We therefore present here a brief overview of the positive neurological signs of functional weakness available, both in the lower and in the upper limbs; but none should be used in isolation and must be interpreted in the overall context of the presentation. It should be borne in mind that a patient may have both a functional and an organic disorder.

  10. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  11. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  12. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  13. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  14. Adaptations in athletic performance after ballistic power versus strength training.

    Science.gov (United States)

    Cormie, Prue; McGuigan, Michael R; Newton, Robert U

    2010-08-01

    To determine whether the magnitude of improvement in athletic performance and the mechanisms driving these adaptations differ in relatively weak individuals exposed to either ballistic power training or heavy strength training. Relatively weak men (n = 24) who could perform the back squat with proficient technique were randomized into three groups: strength training (n = 8; ST), power training (n = 8; PT), or control (n = 8). Training involved three sessions per week for 10 wk in which subjects performed back squats with 75%-90% of one-repetition maximum (1RM; ST) or maximal-effort jump squats with 0%-30% 1RM (PT). Jump and sprint performances were assessed as well as measures of the force-velocity relationship, jumping mechanics, muscle architecture, and neural drive. Both experimental groups showed significant (P training with no significant between-group differences evident in either jump (peak power: ST = 17.7% +/- 9.3%, PT = 17.6% +/- 4.5%) or sprint performance (40-m sprint: ST = 2.2% +/- 1.9%, PT = 3.6% +/- 2.3%). ST also displayed a significant increase in maximal strength that was significantly greater than the PT group (squat 1RM: ST = 31.2% +/- 11.3%, PT = 4.5% +/- 7.1%). The mechanisms driving these improvements included significant (P force-velocity relationship, jump mechanics, muscle architecture, and neural activation that showed a degree of specificity to the different training stimuli. Improvements in athletic performance were similar in relatively weak individuals exposed to either ballistic power training or heavy strength training for 10 wk. These performance improvements were mediated through neuromuscular adaptations specific to the training stimulus. The ability of strength training to render similar short-term improvements in athletic performance as ballistic power training, coupled with the potential long-term benefits of improved maximal strength, makes strength training a more effective training modality for relatively weak individuals.

  15. Strength of wood versus rate of testing - A theoretical approach

    DEFF Research Database (Denmark)

    Nielsen, Lauge Fuglsang

    2007-01-01

    Strength of wood is normally measured in ramp load experiments. Experience shows that strength increases with increasing rate of testing. This feature is considered theoretically in this paper. It is shown that the influence of testing rate is a phenomenon, which depends on the quality...... of the considered wood. Low quality wood shows lesser influence of testing rate. This observation agrees with the well-known statement made by Borg Madsen that weak wood subjected to a constant load, has a longer lifetime than strong wood. In general, the influence of testing rate on strength increases...

  16. Comparison of PubMed, Scopus, Web of Science, and Google Scholar: strengths and weaknesses.

    Science.gov (United States)

    Falagas, Matthew E; Pitsouni, Eleni I; Malietzis, George A; Pappas, Georgios

    2008-02-01

    The evolution of the electronic age has led to the development of numerous medical databases on the World Wide Web, offering search facilities on a particular subject and the ability to perform citation analysis. We compared the content coverage and practical utility of PubMed, Scopus, Web of Science, and Google Scholar. The official Web pages of the databases were used to extract information on the range of journals covered, search facilities and restrictions, and update frequency. We used the example of a keyword search to evaluate the usefulness of these databases in biomedical information retrieval and a specific published article to evaluate their utility in performing citation analysis. All databases were practical in use and offered numerous search facilities. PubMed and Google Scholar are accessed for free. The keyword search with PubMed offers optimal update frequency and includes online early articles; other databases can rate articles by number of citations, as an index of importance. For citation analysis, Scopus offers about 20% more coverage than Web of Science, whereas Google Scholar offers results of inconsistent accuracy. PubMed remains an optimal tool in biomedical electronic research. Scopus covers a wider journal range, of help both in keyword searching and citation analysis, but it is currently limited to recent articles (published after 1995) compared with Web of Science. Google Scholar, as for the Web in general, can help in the retrieval of even the most obscure information but its use is marred by inadequate, less often updated, citation information.

  17. The Strengths and the Weakness Points of Mitch Albom's the TIME Keeper

    OpenAIRE

    Widodo, Bobby Chandra Vinanti

    2015-01-01

    Tugas akhir ini membahas tentang novel karya Mitch Albom yang berjudul The Time Keeper. The Time Keeper adalah sebuah novel yang bercerita tentang Dor, manusia pertama yang menghitung waktu di bumi. Ia dihukum di gua karena mencoba mengukur anugrah terbesar dari Tuhan, yaitu Waktu. Lalu kembali ke dunia, dengan membawa jam pasir ajaib dan sebuah misi yaitu menebus kesalahannya dengan mengajarkan makna Waktu pada dua manusia bumi. Dalam tugas akhir ini penulis memberikan ulasan mengenai keleb...

  18. Strengths and weakness of neuroscientific investigations of childhood poverty: future directions

    OpenAIRE

    Lipina, Sebasti?n J.; Segretin, M. Soledad

    2015-01-01

    The neuroscientific study of child poverty is a topic that has only recently emerged. In comparison with previous reviews (e.g., Hackman and Farah, 2009; Lipina and Colombo, 2009; Hackman et al., 2010; Raizada and Kishiyama, 2010; Lipina and Posner, 2012), our perspective synthesizes findings, and summarizes both conceptual and methodological contributions, as well as challenges that face current neuroscientific approaches to the study of childhood poverty. The aim of this effort is to identi...

  19. Strengths and weakness of neuroscientific investigations of childhood poverty: Future directions.

    Directory of Open Access Journals (Sweden)

    Sebastian J Lipina

    2015-02-01

    Full Text Available The neuroscientific study of child poverty is a topic that has only recently emerged. In comparison with previous reviews (e.g., Hackman et al., 2009, 2010; Lipina & Colombo, 2009; Lipina & Posner, 2012; Raizada & Kishiyama, 2010, our perspective synthesizes findings, and summarizes both conceptual and methodological contributions, as well as challenges that face current neuroscientific approaches to the study of childhood poverty. The aim of this effort is to identify target areas of study that could potentially help build a basic and applied research agenda for the coming years.

  20. Network Analysis as a Communication Audit Instrument: Uncovering Communicative Strengths and Weaknesses Within Organizations

    NARCIS (Netherlands)

    Koning, K.H.; de Jong, Menno D.T.

    2015-01-01

    Network analysis is one of the instruments in the communication audit toolbox to diagnose communication problems within organizations. To explore its contribution to a communication audit, the authors conducted a network analysis within three secondary schools, comparing its results with those of

  1. Turning a Weakness into a Strength. A Smart External Energy Policy for Europe

    International Nuclear Information System (INIS)

    Van der Linde, C.

    2008-04-01

    The EU should recognize that the current incomplete powers in the field of energy and the strategic foreign policy dimensions will take a long time to develop into what can be considered 'one voice'. If immediate accomplishments in this area are desired, a different approach to the development of an external energy policy is required. Instead of trying to convince the Member States to transfer their competencies in energy, foreign and security policy as soon as possible to the EU level, the EC should promote a bottom-up approach. This should allow for the smarter use of diversity, asymmetry, and subsidiarity among Member States, and turning these perceived stumbling blocks into assets or instruments of external energy policy. Such an approach uses, for example, the discipline of the internal energy market, climate change policies, and the expert ministries of individual Member States with producer and competing consumer countries. The EC can start by enhancing transparency and beginning to prepare the ground for a crisis mechanism. They should focus on stimulating the Member States and the companies in a race to the top, and reward best practices, bottom-up rather than top-down. It is also important that the development towards a low-carbon economy, as the EU's longterm containment policy, is made an integral part of security of supply approaches. A smart crisis mechanism is the basis for external energy policy to be developed on, not the other way around. Furthermore, Member States should substantiate why their external energy policy contributes not only to the national but also to the EU-regional or EU-wide security of supply. National interests should not run counter to the interests in continuous energy flows of other Member States, but instead should help increase the energy flows available to the European market. By using diversity and asymmetry as an asset of EU policy-making, those policies that truly are most effective at the European level will be 'produced' or demanded by that market.

  2. Adoption Costs Associated with Processing Strengths and Weaknesses Methods for Learning Disabilities Identification

    Science.gov (United States)

    Williams, Jacob; Miciak, Jeremy

    2018-01-01

    There is controversy regarding the relative merits of cognitive assessment for the identification of learning disabilities. Proponents of cognitive assessment have suggested that multitiered systems of support (MTSS) should be supplemented with routine, systematic assessment of cognitive processes following a determination of inadequate response…

  3. The EU as an actor at the WTO: its strengths and weaknesses throughout history

    Directory of Open Access Journals (Sweden)

    Rosana GARCIANDÍA GARMENDIA

    2012-06-01

    Full Text Available During the last decade, many reforms took place in the European Union legal and policy framework. Some of those reforms were motivated by the participation of the European Union and its member States in the World Trade Organization. This paper aims to analyze the role of the European Union as an actor in that organization, paying special attention to its mixed legal nature – EU and Member States. With that purpose, the evolution of the relationship between the EU member States and the EU itself as simultaneous actors at the WTO is studied. The division of competences is also reviewed. Finally, the analysis of the EU position in different negotiation rounds (Uruguay, Doha for the agricultural sector is reviewed as an example of the evolution in the protection of European interests. The paper shows that some changes in the Treaty of Lisbon have strengthened the legal framework for the EU to be heard with a unique voice in the WTO

  4. Strengths and weaknesses of EST-based prediction of tissue-specific alternative splicing

    Directory of Open Access Journals (Sweden)

    Vingron Martin

    2004-09-01

    Full Text Available Abstract Background Alternative splicing contributes significantly to the complexity of the human transcriptome and proteome. Computational prediction of alternative splice isoforms are usually based on EST sequences that also allow to approximate the expression pattern of the related transcripts. However, the limited number of tissues represented in the EST data as well as the different cDNA construction protocols may influence the predictive capacity of ESTs to unravel tissue-specifically expressed transcripts. Methods We predict tissue and tumor specific splice isoforms based on the genomic mapping (SpliceNest of the EST consensus sequences and library annotation provided in the GeneNest database. We further ascertain the potentially rare tissue specific transcripts as the ones represented only by ESTs derived from normalized libraries. A subset of the predicted tissue and tumor specific isoforms are then validated via RT-PCR experiments over a spectrum of 40 tissue types. Results Our strategy revealed 427 genes with at least one tissue specific transcript as well as 1120 genes showing tumor specific isoforms. While our experimental evaluation of computationally predicted tissue-specific isoforms revealed a high success rate in confirming the expression of these isoforms in the respective tissue, the strategy frequently failed to detect the expected restricted expression pattern. The analysis of putative lowly expressed transcripts using normalized cDNA libraries suggests that our ability to detect tissue-specific isoforms strongly depends on the expression level of the respective transcript as well as on the sensitivity of the experimental methods. Especially splice isoforms predicted to be disease-specific tend to represent transcripts that are expressed in a set of healthy tissues rather than novel isoforms. Conclusions We propose to combine the computational prediction of alternative splice isoforms with experimental validation for efficient delineation of an accurate set of tissue-specific transcripts.

  5. Blood culture procedures and diagnosis of Malassezia furfur bloodstream infections : Strength and weakness

    NARCIS (Netherlands)

    Iatta, Roberta; Battista, Michela; Miragliotta, Giuseppe; Boekhout, Teun; Otranto, Domenico; Cafarchia, Claudia

    2017-01-01

    The occurrence of Malassezia spp. bloodstream infections (BSIs) in neonatal intensive care unit was evaluated by using pediatric Isolator, BacT/Alert systems and central venous catheter (CVC) culture. The efficacy of BacT/Alert system in detecting Malassezia was assessed by conventional procedures,

  6. Mapping patent classifications: Portfolio and statistical analysis, and the comparison of strengths and weaknesses

    NARCIS (Netherlands)

    Leydesdorff, L.; Kogler, D.F.; Yan, B.

    The Cooperative Patent Classifications (CPC) recently developed cooperatively by the European and US Patent Offices provide a new basis for mapping patents and portfolio analysis. CPC replaces International Patent Classifications (IPC) of the World Intellectual Property Organization. In this study,

  7. Mapping patent classifications: portfolio and statistical analysis, and the comparison of strengths and weaknesses.

    Science.gov (United States)

    Leydesdorff, Loet; Kogler, Dieter Franz; Yan, Bowen

    2017-01-01

    The Cooperative Patent Classifications (CPC) recently developed cooperatively by the European and US Patent Offices provide a new basis for mapping patents and portfolio analysis. CPC replaces International Patent Classifications (IPC) of the World Intellectual Property Organization. In this study, we update our routines previously based on IPC for CPC and use the occasion for rethinking various parameter choices. The new maps are significantly different from the previous ones, although this may not always be obvious on visual inspection. We provide nested maps online and a routine for generating portfolio overlays on the maps; a new tool is provided for "difference maps" between patent portfolios of organizations or firms. This is illustrated by comparing the portfolios of patents granted to two competing firms-Novartis and MSD-in 2016. Furthermore, the data is organized for the purpose of statistical analysis.

  8. White paper of Italian Gastroenterology: delivery of services for digestive diseases in Italy: weaknesses and strengths.

    Science.gov (United States)

    Buscarini, Elisabetta; Conte, Dario; Cannizzaro, Renato; Bazzoli, Franco; De Boni, Michele; Delle Fave, Gianfranco; Farinati, Fabio; Ravelli, Paolo; Testoni, Pier Alberto; Lisiero, Manola; Spolaore, Paolo

    2014-07-01

    In 2011 the three major Italian gastroenterological scientific societies (AIGO, the Italian Society of Hospital Gastroenterologists and Endoscopists; SIED, the Italian Society of Endoscopy; SIGE, the Italian Society of Gastroenterology) prepared their official document aimed at analysing medical care for digestive diseases in Italy, on the basis of national and regional data (Health Ministry and Lombardia, Veneto, Emilia-Romagna databases) and to make proposals for planning of care. Digestive diseases were the first or second cause of hospitalizations in Italy in 1999-2009, with more than 1,500,000 admissions/year; however only 5-9% of these admissions was in specialized Gastroenterology units. Reported data show a better outcome in Gastroenterology Units than in non-specialized units: shorter average length of stay, in particular for admissions with ICD-9-CM codes proxying for emergency conditions (6.7 days versus 8.4 days); better case mix (higher average diagnosis-related groups weight in Gastroenterology Units: 1 vs 0.97 in Internal Medicine units and 0.76 in Surgery units); lower inappropriateness of admissions (16-25% versus 29-87%); lower in-hospital mortality in urgent admissions (2.2% versus 5.1%); for patients with urgent admissions due to gastrointestinnal haemorrhage, in-hospital mortality was 2.3% in Gastroenterology units versus 4.0% in others. The present document summarizes the scientific societies' official report, which constitutes the "White paper of Italian Gastroenterology". Copyright © 2014 Editrice Gastroenterologica Italiana S.r.l. Published by Elsevier Ltd. All rights reserved.

  9. Long-term Trends of Organic Carbon Concentrations in Freshwaters: Strengths and Weaknesses of Existing Evidence

    Directory of Open Access Journals (Sweden)

    Montserrat Filella

    2014-05-01

    Full Text Available Many articles published in the last few years start with the assumption that the past decades have seen an increase in dissolved organic carbon (DOC concentrations in the rivers and lakes of the Northern Hemisphere. This study analyses whether the existing evidence supports this claim. With this aim, we have collected published studies where long series of organic carbon concentrations (i.e., longer than 10 years were analyzed for existing trends and have carefully evaluated the 63 articles found. Information has been collated in a comprehensive and comparable way, allowing readers to easily access it. The two main aspects considered in our analysis have been the analytical methods used and the data treatment methods applied. Both are sensitive issues because, on the one hand, the difficulties associated with correctly determining organic carbon concentrations in surface waters are well known, while, on the other, dealing with real environmental data (i.e., lack of normality, censoring, missing values, etc. is an extremely intricate matter. Other issues such as data reporting and the geographical location of the systems studied are also discussed. In conclusion, it is clear that organic carbon concentrations have increased in some surface waters in the Northern Hemisphere since the 1990s. However, due to a lack of data in many parts of the world, it is not known whether this phenomenon is general and, more importantly, in the areas for which such data do exist, the reporting and methodological problems in the published studies prevent any conclusion on the existence of a general temporal behavior of organic carbon from being drawn.

  10. Strengths and weaknesses of current energy chains in a sustainable development perspective

    International Nuclear Information System (INIS)

    Hirschberg, S.; Dones, R.; Heck, T.; Burgherr, P.; Schenler, W.; Bauer, C.

    2006-01-01

    The paper summarizes a framework for a systematic comparative evaluation of the sustainability of energy systems and includes a comprehensive application of this framework to major electricity generating technologies and the associated fuel cycles in Germany. Main efforts have focussed on the generation of quantitative, technology-specific, economic, environmental and social indicators. A number of methods have been employed, including Life Cycle Assessment (LCA), Risk Assessment (RA), and the Impact Pathway Approach (IPA). Two methods of indicator aggregation were used: namely, the estimation of total (internal and external) costs, and Multi-Criteria Decision Analysis (MCDA). Use of MCDA is motivated principally by the acknowledgement of the role of value judgments in decision-making. (orig.)

  11. Profiling Fragile X Syndrome in Males: Strengths and Weaknesses in Cognitive Abilities

    Science.gov (United States)

    Van der Molen, M. J. W.; Huizinga, M.; Huizenga, H. M.; Ridderinkhof, K. R.; Van der Molen, M. W.; Hamel, B. J. C.; Curfs, L. M. G.; Ramakers, G. J. A.

    2010-01-01

    The present study examined the cognitive profile in Fragile X Syndrome (FXS) males, and investigated whether cognitive profiles are similar for FXS males at different levels of intellectual functioning. Cognitive abilities in non-verbal, verbal, memory and executive functioning domains were contrasted to both a non-verbal and verbal mental age…

  12. Communication strengths and weaknesses of radiation protection professionals in the United States and Canada

    International Nuclear Information System (INIS)

    Johnson, R.H.; Petcovic, W.L.; Alexander, R.E.

    1988-01-01

    Effective health risk communication may well determine the future of peaceful applications of nuclear technology and the social acceptance of risks from radiation in medicine, research, and industry. However, radiation protection professionals who know how to quantify risks and provide appropriate safeguards have historically encountered great difficulties in communicating their risk perspectives to the concerned public. In the United States, organisations such as the Health Physics Society and the American Nuclear Society have traditionally attributed communication difficulties to the public's lack of technical understanding. This has led to the belief that if the public could be provided sufficient information or education, they would understand radiation issues and their concerns about radiation risks would be resolved. Consequently, these national organisations have established public information programs and speaker bureaus. These programs primarily focus on presentation of technically accurate data and attempt to foster understanding of radiation by analogies with background radiation or other sources of risks commonly accepted by society. This paper shows that such public information programs can at their best reach only about 25% of the general public. These programs could greatly enhance their effectiveness by learning the different ways that radiation professionals and the general public prefer to gather data and make decisions

  13. Social Network Perspectives Reveal Strength of Academic Developers as Weak Ties

    Science.gov (United States)

    Matthews, Kelly E.; Crampton, Andrea; Hill, Matthew; Johnson, Elizabeth D.; Sharma, Manjula D.; Varsavsky, Cristina

    2015-01-01

    Social network perspectives acknowledge the influence of disciplinary cultures on academics' teaching beliefs and practices with implications for academic developers. The contribution of academic developers in 18 scholarship of teaching and learning (SoTL) projects situated in the sciences are explored by drawing on data from a two-year national…

  14. Urban Decay in Porto - Strengths and Weaknesses of Portuguese Regeneration Programmes

    DEFF Research Database (Denmark)

    Alves, Sonia; Ramos, Isabel

    2012-01-01

    The historic district of Porto is suffering from extensive physical and socioeconomic degradation, mainly induced by the housing policy during the dictatorship of Salazar. Despite numerous programmes and projects with the aim to improve the poor housing and social conditions implemented the social...

  15. Strengths and Weaknesses in a Human Rights-Based Approach to International Development

    DEFF Research Database (Denmark)

    Broberg, Morten; Sano, Hans-Otto

    2017-01-01

    we show how the approach works in practice, and we identify and discuss three human rights principles that play particularly important roles in its implementation: (i) participation and inclusion, (ii) non-discrimination and equality, and (iii) accountability. We show that in terms of implementation...

  16. Integrating Social Networking Tools into ESL Writing Classroom: Strengths and Weaknesses

    Science.gov (United States)

    Yunus, Melor Md; Salehi, Hadi; Chenzi, Chen

    2012-01-01

    With the rapid development of world and technology, English learning has become more important. Teachers frequently use teacher-centered pedagogy that leads to lack of interaction with students. This paper aims to investigate the advantages and disadvantages of integrating social networking tools into ESL writing classroom and discuss the ways to…

  17. Assessment of the strengths and weaknesses of the new Real Driving Emissions (RDE) test procedure

    NARCIS (Netherlands)

    Cuelenaere, R.F.A.; Ligterink, N.E.

    2016-01-01

    Door Dieselgate is er hernieuwde aandacht voor de luchtverontreinigende uitlaatgassen van auto’s, in het bijzonder voor de hoge NOx praktijkemissies van moderne Euro-5 en Euro-6 personenauto’s en bestelwagens. De ontwikkeling van nieuwe Europese Real Driving Emissions (RDE) wetgeving wordt gezien

  18. Strengths and weaknesses in executive functioning in children with intellectual disability

    OpenAIRE

    Danielsson, H.; Henry, L.; Messer, D. J.; Ronnberg, J.

    2012-01-01

    Children with intellectual disability (ID) were given a comprehensive range of executive functioning measures, which systematically varied in terms of verbal and non-verbal demands. Their performance was compared to the performance of groups matched on mental age (MA) and chronological age (CA), respectively. Twenty-two children were included in each group. Children with ID performed on par with the MA group on switching, verbal executive-loaded working memory and most fluency tasks, but belo...

  19. Strengths and Weaknesses in Executive Functioning in Children with Intellectual Disability

    Science.gov (United States)

    Danielsson, Henrik; Henry, Lucy; Messer, David; Ronnberg, Jerker

    2012-01-01

    Children with intellectual disability (ID) were given a comprehensive range of executive functioning measures, which systematically varied in terms of verbal and non-verbal demands. Their performance was compared to the performance of groups matched on mental age (MA) and chronological age (CA), respectively. Twenty-two children were included in…

  20. Understanding Learner Strengths and Weaknesses: Assessing Performance on an Integrated Writing Task

    Science.gov (United States)

    Sawaki, Yasuyo; Quinlan, Thomas; Lee, Yong-Won

    2013-01-01

    The present study examined the factor structures across features of 446 examinees' responses to a writing task that integrates reading and listening modalities as well as reading and listening comprehension items of the TOEFL iBT[R] (Internet-based test). Both human and automated scores obtained for the integrated essays were utilized. Based on a…

  1. Identifying service quality strengths and weaknesses using SERVQUAL: a study of dental services.

    Science.gov (United States)

    Kaldenberg, D; Becker, B W; Browne, B A; Browne, W G

    1997-01-01

    The goal of this study was to examine responses among dental patients to the most recent version of SERVQUAL, and to evaluate that instrument as a tool for measuring satisfaction in a dental practice. Items on the reliability and responsiveness dimensions produced the lowest satisfaction ratings, while improvements in providing services as promised and instilling confidence have the greatest potential for producing higher satisfaction among patients. Finally, using open-ended questions, we identified a number of patient events or experiences which caused either high or low scores on individual SERVQUAL items.

  2. Strengths perspective among the homeless adolescents: A systematic review

    Directory of Open Access Journals (Sweden)

    Janmejaya Samal

    2017-01-01

    Full Text Available Background: Earlier, the scholars of family studies have primarily focused on the problems and weaknesses of the families. However, during these days, there is a shift from problems to strength-based perspective. Methodology: Search of literature was carried out through internet-based Google Scholar search engine. Of the 112 titles obtained 21 titles fit the criteria of the study objectives, of which 9 full-text articles were finally selected for the purpose of this review. Results: In this review, nine full-text articles were reviewed. Nine of these researches investigated different facets of strengths perspective among the homeless adolescents. Chronologically, nine of these reviewed studies delineated the following thematic facets of strengths perspective among the homeless adolescents. These include personal strength and informal resources, personal strength in high-risk environment, strengths perspective during the transition of adolescence to adulthood, personal and social strengths that refrained the homeless adolescents form intravenous drug use, resilience and self-esteem, religion as an important strength, “hope” as a way of living among the homeless adolescents, coping strategies of street-involved youth, and usage of internet and social media as an important strength among homeless adolescents. Conclusion: Strengths perspective helps the youth to become a master of their own lives and helps to deal with all the adversities in life.

  3. Weak entropy inequalities and entropic convergence

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    A criterion for algebraic convergence of the entropy is presented and an algebraic convergence result for the entropy of an exclusion process is improved. A weak entropy inequality is considered and its relationship to entropic convergence is discussed.

  4. Current problems in the weak interactions

    International Nuclear Information System (INIS)

    Pais, A.

    1977-01-01

    Some reasons are discussed showing why the recent SU(2) x U(1) gauge theory of weak and electromagnetic interactions is not a complete theory of these interactions, Lepton theory, charm, and the CP problem are considered. 60 references

  5. From Suitable Weak Solutions to Entropy Viscosity

    KAUST Repository

    Guermond, Jean-Luc; Pasquetti, Richard; Popov, Bojan

    2010-01-01

    This paper focuses on the notion of suitable weak solutions for the three-dimensional incompressible Navier-Stokes equations and discusses the relevance of this notion to Computational Fluid Dynamics. The purpose of the paper is twofold (i

  6. The Strength of Friendship Ties in Proximity Sensor Data

    DEFF Research Database (Denmark)

    Sekara, Vedran; Jørgensen, Sune Lehmann

    2014-01-01

    strength parameter to distinguish between observations, we demonstrate that weak links, compared to strong links, have a lower probability of being observed at later times, while such links—on average—also have lower link-weights and probability of sharing an online friendship. Further, the role of link...

  7. Preseason adductor squeeze strength in 303 Spanish male soccer athletes

    DEFF Research Database (Denmark)

    Esteve, Ernest; Rathleff, Michael Skovdal; Vicens-Bordas, Jordi

    2018-01-01

    Background: Hip adductor muscle weakness and a history of groin injury both have been identified as strong risk factors for sustaining a new groin injury. Current groin pain and age have been associated with hip adductor strength. These factors could be related, but this has never been investigat...

  8. Prevalence of clinically relevant muscle weakness and its association with vitamin D status among older adults in Ecuador.

    Science.gov (United States)

    Orces, Carlos H

    2017-10-01

    Muscle weakness and 25-hydroxyvitamin D (25(OH)D) deficiency have been associated with adverse outcomes among older adults. However, little is known about the relationship between clinically relevant muscle weakness and 25(OH)D levels in Ecuador. To examine the prevalence of muscle weakness and its association with 25(OH)D status among subjects aged 60 years and older in Ecuador. The present study was based on data from 2205 participants in the first National Survey of Health, Wellbeing, and Aging. The Foundation for the National Institute of Health Sarcopenia Project criteria was used to examine muscle weakness prevalence rates. Gender-specific general linear and logistic regression models adjusted for potential confounders were created to compare mean 25(OH)D concentrations and 25(OH)D deficiency across muscle strength categories, respectively. An estimated 32.2% of women and 33.4% of men had evidence of clinically relevant muscle weakness in Ecuador. In general, increased muscle weakness prevalence rates were present among Indigenous, residents in the rural Andes Mountains, underweight subjects, and those with a sedentary lifestyle. Muscle strength was significantly and directly correlated with mean 25(OH)D levels. After controlling for potential confounders, 25(OH)D deficiency prevalence rates were 31 and 43% higher among men and women with muscle weakness than those with normal strength, respectively. One-third of older adults nationwide had evidence of muscle weakness. While the present study found a significant correlation between muscle strength and 25(OH)D concentrations, further research is needed to examine whether optimizing 25(OH)D levels may improve muscle weakness among older adults.

  9. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  10. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  11. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  12. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  13. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  14. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  15. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  16. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  17. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  18. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  19. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  20. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic