WorldWideScience

Sample records for weaknesses threats strengths

  1. Strengths, weaknesses, opportunities and threats

    DEFF Research Database (Denmark)

    Bull, J. W.; Jobstvogt, N.; Böhnke-Henrichs, A.;

    2016-01-01

    environmental awareness. Threats include resistance to change, and difficulty with interdisciplinary collaboration. Consideration of SWOT themes suggested five strategic areas for developing and implementing ES.The ES concept could improve decision-making related to natural resource use, and interpretation...... facilitate interdisciplinary research, ensuring decision-making that supports sustainable development........ Such an assessment could form the basis for improving ES thinking, further embedding it into environmental decisions and management.The Young Ecosystem Services Specialists (YESS) completed a Strengths-Weaknesses-Opportunities-Threats (SWOT) analysis of ES through YESS member surveys. Strengths include the approach...

  2. Strengths, Weaknesses, Opportunities and Threats

    NARCIS (Netherlands)

    Bull, J.W.; Jobstvogt, N.; Böhnke-Henrichs, A.; Mascarenhas, A.; Sitas, N.; Baulcomb, C.; Lambini, C.K.; Rawlins, M.; Baral, H.; Zähringer, J.; Carter-Silk, E.; Balzan, M.V.; Kenter, J.O.; Häyhä, T.; Petz, K.; Koss, R.

    2016-01-01

    The ecosystem services concept (ES) is becoming a cornerstone of contemporary sustainability thought. Challenges with this concept and its applications are well documented, but have not yet been systematically assessed alongside strengths and external factors that influence uptake. Such an

  3. The future of Jungian analysis: strengths, weaknesses, opportunities, threats ('SWOT').

    Science.gov (United States)

    Samuels, Andrew

    2017-11-01

    Using a methodology derived from management and organizational studies, the author reviews the future of Jungian analysis. The methodology is termed SWOT - strengths, weaknesses, opportunities, threats. A selected list in each of these categories is presented. The author is transparent in allowing for the fact that the paper not only derives from a public lecture on the topic, but also retains the immediacy and the contrarian and opinionated style of such a lecture. © 2017, The Society of Analytical Psychology.

  4. Big Data and Health Economics: Strengths, Weaknesses, Opportunities and Threats.

    Science.gov (United States)

    Collins, Brendan

    2016-02-01

    'Big data' is the collective name for the increasing capacity of information systems to collect and store large volumes of data, which are often unstructured and time stamped, and to analyse these data by using regression and other statistical techniques. This is a review of the potential applications of big data and health economics, using a SWOT (strengths, weaknesses, opportunities, threats) approach. In health economics, large pseudonymized databases, such as the planned care.data programme in the UK, have the potential to increase understanding of how drugs work in the real world, taking into account adherence, co-morbidities, interactions and side effects. This 'real-world evidence' has applications in individualized medicine. More routine and larger-scale cost and outcomes data collection will make health economic analyses more disease specific and population specific but may require new skill sets. There is potential for biomonitoring and lifestyle data to inform health economic analyses and public health policy.

  5. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  6. Strengths, weaknesses, opportunities and threats for HTR deployment in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Bredimas, Alexandre, E-mail: alexandre.bredimas@strane-innovation.com [Strane Innovation, 27 rue Léon Bourgeois, 91120 Palaiseau (France); Kugeler, Kurt [Strane Innovation, 27 rue Léon Bourgeois, 91120 Palaiseau (France); Fütterer, Michael A. [Strane Innovation, 27 rue Léon Bourgeois, 91120 Palaiseau (France); European Commission, Joint Research Centre, Institute for Energy and Transport, P.O. Box 2, NL-1755ZG Petten (Netherlands)

    2014-05-01

    High temperature nuclear reactors are a technology, of which early versions were demonstrated in the 1960s–1980s in Germany (AVR, THTR) and the United States (Peach Bottom, Fort St. Vrain). HTRs were initially designed for high temperature, high efficiency electricity generation but the technology, the market and the targeted applications have evolved since then to address industrial cogeneration and new operational conditions (in particular new safety regulations). This paper intends to analyse the latest status of HTR today, as regards their intrinsic strengths and weaknesses and their external context, whether positive (opportunities) or negative (threats). Different dimensions are covered by the analysis: technology status, results from R and D programmes (especially in Europe), competences and skills, licensing aspects, experience feedback from demonstrator operation (in particular in Germany), economic conditions and other non-technical aspects. Europe has a comprehensive experience in the field of HTR with capabilities in both pebble bed and prismatic designs (R and D, engineering, manufacturing, operation, dismantling, and the full fuel cycle). Europe is also a promising market for HTR as the process heat market is large with good industrial and cogeneration infrastructures. The analysis of the European situation is to a good deal indicative for the global potential of this technology.

  7. Strengths Weaknesses Opportunities and Threats of Blended Learning: Students’ Perceptions

    Science.gov (United States)

    Hande, S

    2014-01-01

    Background: Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. Aim: The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. Subjects and Methods: It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students’ perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. Results: The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. Conclusions: The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach. PMID:24971204

  8. Strengths weaknesses opportunities and threats of blended learning: students' perceptions.

    Science.gov (United States)

    Hande, S

    2014-05-01

    Blended learning (BL) in a cell biology course of the premedical program at the Kasturba Medical College International Centre, Manipal, India, commenced in 2006. The program provides training in basic sciences to students, especially from the United States and Canada. The approach to the study was phenomenographic, with a qualitative study design using an open-ended questionnaire, focused interviews and empirical observations. The aim of this study was to identify the strengths, weaknesses, opportunities and threats (SWOT) of BL in a premedical class. It was a cross-sectional study. Ninety six students in a premedical cell biology class participated in the study. SWOT analysis of students' perceptions was conducted manually. Statistical analysis included content analysis of qualitative data to classify data and aligning them into the SWOT analysis matrix. The outcomes of the study revealed student perceptions in terms of SWOT of BL and the potential uses of this strategy. The study provides background for educators and curriculum experts to plan their modules while incorporating a BL approach.

  9. Health Education in India: A Strengths, Weaknesses, Opportunities, and Threats (SWOT) Analysis

    Science.gov (United States)

    Sharma, Manoj

    2005-01-01

    The purpose of this study was to conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis of the health education profession and discipline in India. Materials from CINAHL, ERIC, MEDLINE, and Internet were collected to conduct the open coding of the SWOT analysis. Strengths of health education in India include an elaborate…

  10. [A SWOT (strengths, weaknesses, opportunities, threats) analysis of the current immunization program in Zhejiang Province].

    Science.gov (United States)

    He, Han-Qing; Ling, Luo-Ya; Xu, Xu-Qing

    2009-02-01

    To know the status of Immunization program in Zhejiang Province. The investigation on immunization program in zhejiang province was conducted, and the SWOT analysis was corducted to make a comprehensive evaluation. 11 cities, 22 counties and 44 towns were investigated in this study, and the current immunization program in Zhejiang province were explored by SWOT analysis. The SWOT Matrix, includes SO (strength-opportunity), ST (strength-threat), WO (weakness-opportunity) and WT (weakness-threat) can apply to make optimal strategy for the development of expanded program on immunization.

  11. Role of editors and journals in detecting and preventing scientific misconduct: strengths, weaknesses, opportunities, and threats.

    Science.gov (United States)

    Marusic, Ana; Katavic, Vedran; Marusic, Matko

    2007-09-01

    Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, authority and expertise, power to formulate editorial policies, and responsibility for the integrity of published records. Weaknesses stem from having no mandate for legal action, reluctance to get involved, and lack of training. Opportunities for editors are new technologies for detecting misconduct, policies by editorial organization or national institutions, and greater transparency of published research. Editors face threats from the lack of legal regulation and culture of research integrity in academic communities, lack of support from stakeholders in scientific publishing, and different pressures. Journal editors cannot be the policing force of the scientific community but they should actively ensure the integrity of the scientific record.

  12. SWOT analysis: strengths, weaknesses, opportunities and threats of the Israeli Smallpox Revaccination Program.

    Science.gov (United States)

    Huerta, Michael; Balicer, Ran D; Leventhal, Alex

    2003-01-01

    During September 2002, Israel began its current revaccination program against smallpox, targeting previously vaccinated "first responders" among medical and emergency workers. In order to identify the potential strengths and weaknesses of this program and the conditions under which critical decisions were reached, we conducted a SWOT analysis of the current Israeli revaccination program, designed to identify its intrinsic strengths and weaknesses, as well as opportunities for its success and threats against it. SWOT analysis--a practical tool for the study of public health policy decisions and the social and political contexts in which they are reached--revealed clear and substantial strengths and weaknesses of the current smallpox revaccination program, intrinsic to the vaccine itself. A number of threats were identified that may jeopardize the success of the current program, chief among them the appearance of severe complications of vaccination. Our finding of a lack of a generation of knowledge on smallpox vaccination highlights the need for improved physician education and dissipation of misconceptions that are prevalent in the public today.

  13. [Analysing strengths and weaknesses: opportunities and threats for service providers in the German health care system].

    Science.gov (United States)

    Hensen, Peter; Wollert, Silke; Schawrz, Thomas; Luger, Thomas; Roeder, Norbert

    2003-05-01

    Hospitals in the German health care system are confronted with increasing economic competition due to paradigm shifts in funding inpatient treatment. Major hospitals, such as university hospitals, will be under significantly greater pressure to keep up the ability to compete by uniform per case payment. The new hospital funding system based on a Diagnosis Related Group (DRG) system and the economic competition involved require analyses of organisational and locational factors. Cooperativeness and efficient utilisation of resources, properties and staff will be determining factors to secure existence. Adequate responses and strategies are essential to cope with the growing operating requirements. Carrying out an analysis identifying one's own strengths and weaknesses, opportunities and threats will help to focus activities and sustainable strategies into areas where the strengths and the greatest opportunities lie. An example of the process of strategic planning and positioning is shown for a university department of dermatology.

  14. Programme coordinators' perceptions of strengths, weaknesses, opportunities and threats associated with school nutrition programmes.

    Science.gov (United States)

    Valaitis, Renata F; Hanning, Rhona M; Herrmann, Isabela S

    2014-06-01

    As part of a larger evaluation of school nutrition programmes (SNP), the present study examined programme coordinators' perceptions of strengths, weaknesses, opportunities and threats (SWOT) regarding their SNP and public health professionals' support. Qualitative interviews were conducted with twenty-two of eighty-one programme coordinators who had completed a programme evaluation survey. Interviews followed a SWOT framework to evaluate programmes and assessed coordinators' perceptions regarding current and future partnerships with public health professionals. The study was conducted in a large, urban region within Ontario. The twenty-two coordinators who participated represented a cross-section of elementary, secondary, Public and Catholic schools. SNP varied enormously in foods/services offered, how they offered them and perceived needs. Major strengths included universality, the ability to reach needy students and the provision of social opportunities. Major weaknesses included challenges in forming funding partnerships, lack of volunteers, scheduling and timing issues, and coordinator workload. Common threats to effective SNP delivery included lack of sustainable funding, complexity in tracking programme use and food distribution, unreliable help from school staff, and conflicts with school administration. Opportunities for increased public health professionals' assistance included menu planning, nutrition education, expansion of programme food offerings, and help identifying community partners and sustainable funding. The present research identified opportunities for improving SNP and strategies for building on strengths. Since programmes were so diverse, tailored strategies are needed. Public health professionals can play a major role through supporting menu planning, food safety training, access to healthy foods, curriculum planning and by building community partnerships.

  15. Strength, Weaknesses, Opportunities, and Threats (SWOT Analysis of CV Rejeki Mapan Lestari

    Directory of Open Access Journals (Sweden)

    Teguh Sriwidadi

    2016-05-01

    Full Text Available The objectives of this research were to identify the strengths, weaknesses, opportunities, and threats faced by CV Rejek Mapan Lestari, and to establish the appropriate strategies that should be applied to the company to evolve the company business. The research was conducted with a descriptive method, the researcher gathered the data with two medium, questionnaire and interview followed by the extraction method using various way such as IFE Matrix, EFE Matrix, SWOT/TOWS, IE Matrix, and QSPM Matrix which result in various alternative strategies that could be the viable option for the company. It can be concluded that CV Rejeki Mapan Lestari is highly advised in using a product development strategy by extending product variant and adding product that meet the markets need, for instance plastic flake.

  16. The voluntary community health movement in India: a strengths, weaknesses, opportunities, and threats (SWOT) analysis.

    Science.gov (United States)

    Sharma, M; Bhatia, G

    1996-12-01

    There has been a prolific growth of voluntary organizations in India since independence in 1947. One of the major areas of this growth has been in the field of community health. The purpose of this article is to historically trace the voluntary movement in community health in India, analyze the current status, and predict future trends of voluntary efforts. A review of the literature in the form of a Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis was the method of this study. Some of the key trends which emerged as the priority areas for progress and for strengthening voluntary organizations in the future were enhancing linkages between health and development; building upon collective force; greater utilization of participatory training; establishing egalitarian and effectual linkages for decision making at the international level; developing self-reliant community-based models; and the need for attaining holistic empowerment at individual, organizational, and community levels through "duty consciousness" as opposed to merely asking for rights.

  17. Lateral flow (immuno)assay: its strengths, weaknesses, opportunities and threats. A literature survey.

    Science.gov (United States)

    Posthuma-Trumpie, Geertruida A; Korf, Jakob; van Amerongen, Aart

    2009-01-01

    Lateral flow (immuno)assays are currently used for qualitative, semiquantitative and to some extent quantitative monitoring in resource-poor or non-laboratory environments. Applications include tests on pathogens, drugs, hormones and metabolites in biomedical, phytosanitary, veterinary, feed/food and environmental settings. We describe principles of current formats, applications, limitations and perspectives for quantitative monitoring. We illustrate the potentials and limitations of analysis with lateral flow (immuno)assays using a literature survey and a SWOT analysis (acronym for "strengths, weaknesses, opportunities, threats"). Articles referred to in this survey were searched for on MEDLINE, Scopus and in references of reviewed papers. Search terms included "immunochromatography", "sol particle immunoassay", "lateral flow immunoassay" and "dipstick assay".

  18. Traits-based approaches in bioassessment and ecological risk assessment: strengths, weaknesses, opportunities and threats.

    Science.gov (United States)

    Van den Brink, Paul J; Alexander, Alexa C; Desrosiers, Mélanie; Goedkoop, Willem; Goethals, Peter L M; Liess, Matthias; Dyer, Scott D

    2011-04-01

    We discuss the application of traits-based bioassessment approaches in retrospective bioassessment as well as in prospective ecological risk assessments in regulatory frameworks. Both approaches address the interaction between species and stressors and their consequences at different levels of biological organization, but the fact that a specific species may be less abundant in a potentially impacted site compared with a reference site is, regrettably, insufficient to provide diagnostic information. Species traits may, however, overcome the problems associated with taxonomy-based bioassessment. Trait-based approaches could provide signals regarding what environmental factors may be responsible for the impairment and, thereby, provide causal insight into the interaction between species and stressors. For development of traits-based (TBA), traits should correspond to specific types of stressors or suites of stressors. In this paper, a strengths, weaknesses, opportunities, and threats (SWOT) analysis of TBA in both applications was used to identify challenges and potentials. This paper is part of a series describing the output of the TERA (Traits-based ecological risk assessment: Realising the potential of ecoinformatics approaches in ecotoxicology) Workshop held between 7 and 11 September, 2009, in Burlington, Ontario, Canada. The recognized strengths were that traits are transferrable across geographies, add mechanistic and diagnostic knowledge, require no new sampling methodology, have an old tradition, and can supplement taxonomic analysis. Weaknesses include autocorrelation, redundancy, and inability to protect biodiversity directly. Automated image analysis, combined with genetic and biotechnology tools and improved data analysis to solve autocorrelation problems were identified as opportunities, whereas low availability of trait data, their transferability, their quantitative interpretation, the risk of developing nonrelevant traits, low quality of historic

  19. Cannabis social clubs in Belgium: organizational strengths and weaknesses, and threats to the model.

    Science.gov (United States)

    Decorte, Tom

    2015-02-01

    Cannabis Social Clubs (CSCs) are private organizations or clubs of users that produce cannabis for non-profit distribution to adult members to meet their personal needs without having to turn to the black market. CSCs can be found in many countries, but the term often covers very different empirical realities. Inspired by the Spanish CSCs and similarly taking advantage of a grey area in the Belgian cannabis legislation, Belgian cannabis activists set up the first Belgian CSC in 2006, and there are now at least 5 Belgian CSCs. The paper's main objective is to analyse the (internal) strengths and weaknesses and the (external) opportunities and threats of the model, as it exists today. The paper draws on a review of international literature and qualitative data on the Belgian cannabis social clubs. Field visits and interviews were conducted with each club. We analysed membership application forms, cultivation protocols and contracts with growers, cannabis ownership certificates of members, information leaflets, the clubs' websites, and all media articles and documentaries on the clubs in the Belgian media. The paper describes the membership criteria and house rules, the members' profile, the organization and protocols for cannabis production, the distribution of cannabis through 'exchange fairs', the administrative features of the clubs and their contacts with other CSCs and with local authorities, the drug sector and the media. Belgian CSCs seem not profit-driven, and operate as a system in which cannabis is not too easily available. The clubs have fairly direct control over the quality and the potency of the cannabis they distribute. The model offers important potential opportunities, in terms of economic advantages and monitoring consumption patterns. The main threats to Belgian CSCs consist of attempts to criminalize the model, the emergence of profit-driven clubs and systemic violence from criminal entrepreneurs. Weaknesses of the model relate to the unstable or

  20. Partitioning in aqueous two-phase systems: Analysis of strengths, weaknesses, opportunities and threats.

    Science.gov (United States)

    Soares, Ruben R G; Azevedo, Ana M; Van Alstine, James M; Aires-Barros, M Raquel

    2015-08-01

    For half a century aqueous two-phase systems (ATPSs) have been applied for the extraction and purification of biomolecules. In spite of their simplicity, selectivity, and relatively low cost they have not been significantly employed for industrial scale bioprocessing. Recently their ability to be readily scaled and interface easily in single-use, flexible biomanufacturing has led to industrial re-evaluation of ATPSs. The purpose of this review is to perform a SWOT analysis that includes a discussion of: (i) strengths of ATPS partitioning as an effective and simple platform for biomolecule purification; (ii) weaknesses of ATPS partitioning in regard to intrinsic problems and possible solutions; (iii) opportunities related to biotechnological challenges that ATPS partitioning may solve; and (iv) threats related to alternative techniques that may compete with ATPS in performance, economic benefits, scale up and reliability. This approach provides insight into the current status of ATPS as a bioprocessing technique and it can be concluded that most of the perceived weakness towards industrial implementation have now been largely overcome, thus paving the way for opportunities in fermentation feed clarification, integration in multi-stage operations and in single-step purification processes.

  1. THE STRENGTHS, WEAKNESSES, OPPORTUNITIES, AND THREATS (SWOTs) ANALYSES OF THE EBOLA VIRUS – PAPER RETRACTED

    Science.gov (United States)

    Babalola, Michael Oluyemi

    2016-01-01

    Background: Owing to the extreme virulence and case fatality rate of ebola virus disease (EVD), there had been so much furore, panic and public health emergency about the possible pandemic from the recent West African outbreak of the disease, with attendant handful research, both in the past and most recently. The magnitude of the epidemic of ebola virus disease has prompted global interest and urgency in the discovery of measures to mitigate the impact of the disease. Researchers in the academia and the industry were pressured to only focus on the development of effective and safe ebola virus vaccines, without consideration of the other aspects to this virus, which may influence the success or otherwise of a potential vaccine. The objective of this review was to adopt the SWOT concept to elucidate the biological Strengths, Weaknesses, Opportunities, and Threats to Ebola virus as a pathogen, with a view to understanding and devising holistic strategies at combating and overcoming the scourge of EVD. Method: This systematic review and narrative synthesis utilized Medline, PubMed, Google and other databases to select about 150 publications on ebola and ebola virus disease using text word searches to generate the specific terms. Relevant publications were reviewed and compared, findings were synthesized using a narrative method and summarized qualitatively. Results: Some of the identified strengths of ebola virus include: Ebola virus is an RNA virus with inherent capability to mutate, reassort and recombine to generate mutant or reassortant virulent strains; Ebola virus has a broad cellular tropism; Natural Reservoir of ebola virus is unconfirmed but fruit bats, arthropods, and plants are hypothesized; Ebola virus primarily targets and selectively destroys the immune system; Ebola viruses possess accessory proteins that inhibits the host’ immune responses; Secreted glycoprotein (sGP), a truncated soluble protein that triggers immune activation and increased vascular

  2. THE STRENGTHS, WEAKNESSES, OPPORTUNITIES, AND THREATS (SWOTs) ANALYSES OF THE EBOLA VIRUS - PAPER RETRACTED.

    Science.gov (United States)

    Babalola, Michael Oluyemi

    2016-01-01

    Owing to the extreme virulence and case fatality rate of ebola virus disease (EVD), there had been so much furore, panic and public health emergency about the possible pandemic from the recent West African outbreak of the disease, with attendant handful research, both in the past and most recently. The magnitude of the epidemic of ebola virus disease has prompted global interest and urgency in the discovery of measures to mitigate the impact of the disease. Researchers in the academia and the industry were pressured to only focus on the development of effective and safe ebola virus vaccines, without consideration of the other aspects to this virus, which may influence the success or otherwise of a potential vaccine. The objective of this review was to adopt the SWOT concept to elucidate the biological Strengths, Weaknesses, Opportunities, and Threats to Ebola virus as a pathogen, with a view to understanding and devising holistic strategies at combating and overcoming the scourge of EVD. This systematic review and narrative synthesis utilized Medline, PubMed, Google and other databases to select about 150 publications on ebola and ebola virus disease using text word searches to generate the specific terms. Relevant publications were reviewed and compared, findings were synthesized using a narrative method and summarized qualitatively. Some of the identified strengths of ebola virus include: Ebola virus is an RNA virus with inherent capability to mutate, reassort and recombine to generate mutant or reassortant virulent strains; Ebola virus has a broad cellular tropism; Natural Reservoir of ebola virus is unconfirmed but fruit bats, arthropods, and plants are hypothesized; Ebola virus primarily targets and selectively destroys the immune system; Ebola viruses possess accessory proteins that inhibits the host' immune responses; Secreted glycoprotein (sGP), a truncated soluble protein that triggers immune activation and increased vascular permeability is uniquely

  3. Cogeneration in Mexico: Weaknesses, Threats, strengths and opportunities; Cogeneracion en Mexico: Debilidades, amenazas, fortalezas y oportunidades

    Energy Technology Data Exchange (ETDEWEB)

    Elizalde Baltierra, Alberto; Garcia Pelaez, Juan [Programa Universitario de Energia, UNAM (Mexico)

    1997-07-01

    In this paper the strategies are formulated and evaluated, taking into account the internal and external aspects of the cogeneration in Mexico that foment their development in the medium term (two or four years). In the formulation of strategies a matrix DAFO (Weaknesses, Threats, Strengths and Opportunities) is employed and in the evaluation is applied the procedure of analytical hierarchical structuring. The future on the cogeneration in the next years will depend on diverse factors, among which can be mentioned: the legal frame; the financial situation of the interested companies; the outsourcing of financing; the prices of the electricity and fuels, as well as their availability, among others. [Spanish] En este trabajo se formulan y evaluan estrategias que, tomando en cuenta los aspectos internos y externos de la cogeneracion en Mexico, fomenten su desarrollo en el mediano plazo (dos o cuatro anos). En la formulacion de estrategias se emplea la matriz DAFO (Debilidades, Amenazas, Fortalezas y Oportunidades) y en la evaluacion se aplica el procedimiento de jerarquizacion analitica. El futuro de la cogeneracion en los proximos anos dependera de diversos factores, entre los que se pueden mencionar: el marco legal; la situacion financiera de las empresas interesadas; las fuentes externas de financiamiento; los precios de la electricidad y de los combustibles, asi como su disponibilidad, entre otros.

  4. Evidence-based practice and speech-language pathology: strengths, weaknesses, opportunities and threats.

    Science.gov (United States)

    Dodd, Barbara

    2007-01-01

    Speech-language pathologists are increasingly required to demonstrate that their practice is based on evidence. While the concept of evidence-based practice has strengths, there have been some weaknesses in its application in speech-language pathology. Nevertheless, since current health care demands compliance, the profession must consider the opportunities and threats that evidence-based practice poses. This paper reviews the literature to provide an understanding of the relevance of evidence-based practice for speech-language pathology. It considers the assumptions on which definitions of evidenced-based practice rely and reviews the ways in which clinicians might base their practice on evidence. While the medical model of evidence-based practice research is controversial even in the medical field, the concept provides opportunities for the profession of speech-language pathology. Evidence-based practice has the potential to improve intervention for people with communication disorders, increase resources for services and enhance perception of the profession. Copyright 2007 S. Karger AG, Basel.

  5. Strengths, Weaknesses, Opportunities and Threats: Computational Studies of Mn- and Fe-Catalyzed Epoxidations

    Directory of Open Access Journals (Sweden)

    Filipe Teixeira

    2016-12-01

    Full Text Available The importance of epoxides as synthetic intermediates in a number of highly added-value chemicals, as well as the search for novel and more sustainable chemical processes have brought considerable attention to the catalytic activity of manganese and iron complexes towards the epoxidation of alkenes using non-toxic terminal oxidants. Particular attention has been given to Mn(salen and Fe(porphyrin catalysts. While the former attain remarkable enantioselectivity towards the epoxidation of cis-alkenes, the latter also serve as an important model for the behavior of cytochrome P450, thus allowing the exploration of complex biological processes. In this review, a systematic survey of the bibliographical data for the theoretical studies on Mn- and Fe-catalyzed epoxidations is presented. The most interesting patterns and trends are reported and finally analyzed using an evaluation framework similar to the SWOT (Strengths, Weaknesses, Opportunities and Threats analysis performed in enterprise media, with the ultimate aim to provide an overview of current trends and areas for future exploration.

  6. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT).

    Science.gov (United States)

    von Kodolitsch, Yskert; Bernhardt, Alexander M; Robinson, Peter N; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-06-01

    It is the physicians' task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise "SO" maximizing strengths and opportunities, "WT" minimizing weaknesses and threats, "WO" minimizing weaknesses and maximizing opportunities, and "ST" maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching "SW" with "OT". As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies.

  7. Analysis of Strengths, Weaknesses, Opportunities, and Threats as a Tool for Translating Evidence into Individualized Medical Strategies (I-SWOT)

    Science.gov (United States)

    von Kodolitsch, Yskert; Bernhardt, Alexander M.; Robinson, Peter N.; Kölbel, Tilo; Reichenspurner, Hermann; Debus, Sebastian; Detter, Christian

    2015-01-01

    Background It is the physicians’ task to translate evidence and guidelines into medical strategies for individual patients. Until today, however, there is no formal tool that is instrumental to perform this translation. Methods We introduce the analysis of strengths (S) and weaknesses (W) related to therapy with opportunities (O) and threats (T) related to individual patients as a tool to establish an individualized (I) medical strategy (I-SWOT). The I-SWOT matrix identifies four fundamental types of strategy. These comprise “SO” maximizing strengths and opportunities, “WT” minimizing weaknesses and threats, “WO” minimizing weaknesses and maximizing opportunities, and “ST” maximizing strengths and minimizing threats. Each distinct type of strategy may be considered for individualized medical strategies. Results We describe four steps of I-SWOT to establish an individualized medical strategy to treat aortic disease. In the first step, we define the goal of therapy and identify all evidence-based therapeutic options. In a second step, we assess strengths and weaknesses of each therapeutic option in a SW matrix form. In a third step, we assess opportunities and threats related to the individual patient, and in a final step, we use the I-SWOT matrix to establish an individualized medical strategy through matching “SW” with “OT”. As an example we present two 30-year-old patients with Marfan syndrome with identical medical history and aortic pathology. As a result of I-SWOT analysis of their individual opportunities and threats, we identified two distinct medical strategies in these patients. Conclusion I-SWOT is a formal but easy to use tool to translate medical evidence into individualized medical strategies. PMID:27069939

  8. Model-based drug development: strengths, weaknesses, opportunities, and threats for broad application of pharmacometrics in drug development.

    Science.gov (United States)

    Wetherington, Jeffrey D; Pfister, Marc; Banfield, Christopher; Stone, Julie A; Krishna, Rajesh; Allerheiligen, Sandy; Grasela, Dennis M

    2010-09-01

    Systematic implementation of model-based drug development (MBDD) to drug discovery and development has the potential to significantly increase the rate of medical breakthroughs and make available new and better treatments to patients. An analysis of the strengths, weaknesses, opportunities, and threats (ie, SWOT) was conducted through focus group discussions that included 24 members representing 8 pharmaceutical companies to systematically assess the challenges to implementing MBDD into the drug development decision-making process. The application of the SWOT analysis to the successful implementation of MBDD yielded 19 strengths, 27 weaknesses, 34 opportunities, and 22 threats, which support the following conclusions. The shift from empirical drug development to MBDD requires a question-based mentality; early, proactive planning; dynamic access to multisource data; quantitative knowledge integration; multidisciplinary collaboration; effective communication and leadership skills; and innovative, impactful application of pharmacometrics focused on enhancing quantitative decision making. The ultimate goal of MBDD is to streamline discovery and development of innovative medicines to benefit patients.

  9. Analysis of strengths, weaknesses, opportunities, and threats in the development of a health technology assessment program in Turkey.

    Science.gov (United States)

    Kahveci, Rabia; Meads, Catherine

    2008-01-01

    The Turkish healthcare system is currently undergoing reform, and efficient use of resources has become a key factor in determining the allocation of resources. The objective of this study was to analyze strengths, weaknesses, opportunities, and threats (SWOT) in the development of a health technology assessment (HTA) program in Turkey. A SWOT analysis was performed using a literature review and interviews with key people in the Turkish Ministry of Health and Ministry of Labor and Social Security. Regarding recent reforms in health care, investments for information network and databank are the strengths, but the traditional "expert-based" decision making, poor availability of data, and poor quality of data could be seen as some of the weaknesses. Another major weakness is lack of general awareness of HTA. Increasing demand for transparency in decision making, demand for evidence, and demand for credibility by decision makers are some of the opportunities, and current healthcare reforms, i.e., restructuring of healthcare and general health insurance, could also be seen as major opportunities. These opportunities unfortunately could be threatened by lack of funding, and resources are challenged by large, recent national investments. There is a good opportunity for Turkey to use the skills in HTA currently being developed through activities in Europe and the Americas to assist in the development of a much more cost-effective and transparent healthcare system in Turkey.

  10. Strengths, weaknesses, opportunities and threats of the pig health monitoring systems used in England.

    Science.gov (United States)

    Stärk, K D C; Nevel, A

    2009-10-17

    Several systems are being used in England to record information about the health of pigs. The British Pig Health Scheme (BPHS), the National Animal Disease Information System (NADIS), the Zoonoses Action Plan (ZAP) for Salmonella and the Veterinary Investigation Diagnosis Analysis (VIDA) system have been assessed to make recommendations for their future separate or joint development. The structure, organisation, processes, data quality, dissemination, utilisation and acceptance of each system have been assessed. Information was extracted from documents and websites, and informal interviews were conducted with technical experts and stakeholders. The systems covered a broad range of objectives, used variable approaches and operated at very different scales and budgets. There was a high level of awareness and involvement by the industry. Common weaknesses of the systems were the lack of in-depth quantitative analysis of the data, the lack of assessment of each system's impact, and the unknown level of bias as a result of the voluntary or selective participation in them.

  11. An Examination of the Strengths, Weaknesses, Opportunities, and Threats Associated with the Adoption of Moodle[TM] by eXtension

    Science.gov (United States)

    Hightower, Tayla Elise; Murphrey, Theresa Pesl; Coppernoll, Susanna Mumm; Jahedkar, Jennifer; Dooley, Kim E.

    2011-01-01

    The use of technology to deliver programming across Extension has been addressed widely; however, little research has been conducted concerning the use of Moodle[TM] as a course management system for Extension. The purpose of the study reported here was to identify the strengths, weaknesses, opportunities, and threats associated with the use of…

  12. Special Education and Rehabilitation in Georgia: Strengths, Weakness, Opportunities, and Threats in a Newly-Independent State of the Former Soviet Union.

    Science.gov (United States)

    Hobbs, Tim; Szydlowski, Steven; West, Daniel, Jr.; Germava, Otar

    2002-01-01

    Forty-nine Georgian professionals from the fields of health, education, and rehabilitation were brought together for a week-long workshop to discuss issues related to disability, rehabilitation, and special education. Workshop activities included a SWOT (strengths, weaknesses, opportunities, and threats) analysis of special education in Georgia.…

  13. SWOT analysis of Banff: strengths, weaknesses, opportunities and threats of the international Banff consensus process and classification system for renal allograft pathology.

    Science.gov (United States)

    Mengel, M; Sis, B; Halloran, P F

    2007-10-01

    The Banff process defined the diagnostic histologic lesions for renal allograft rejection and created a standardized classification system where none had existed. By correcting this deficit the process had universal impact on clinical practice and clinical and basic research. All trials of new drugs since the early 1990s benefited, because the Banff classification of lesions permitted the end point of biopsy-proven rejection. The Banff process has strengths, weaknesses, opportunities and threats (SWOT). The strength is its self-organizing group structure to create consensus. Consensus does not mean correctness: defining consensus is essential if a widely held view is to be proved wrong. The weaknesses of the Banff process are the absence of an independent external standard to test the classification; and its almost exclusive reliance on histopathology, which has inherent limitations in intra- and interobserver reproducibility, particularly at the interface between borderline and rejection, is exactly where clinicians demand precision. The opportunity lies in the new technology such as transcriptomics, which can form an external standard and can be incorporated into a new classification combining the elegance of histopathology and the objectivity of transcriptomics. The threat is the degree to which the renal transplant community will participate in and support this process.

  14. Appraising Bioenergy Alternatives in Uganda Using Strengths, Weaknesses, Opportunities and Threats (SWOT-Analytical Hierarchy Process (AHP and a Desirability Functions Approach

    Directory of Open Access Journals (Sweden)

    Collins Okello

    2014-02-01

    Full Text Available Poor access to clean and reliable energy technologies is a major challenge to most developing countries. The decision to introduce new technologies is often faced by low adoption rates or even public opposition. In addition, the data required for effective decision making is often inadequate or even lacking, thus constraining the planning process. In this study, a methodology for participatory appraisal of technologies, integrating desirability functions to the strengths, weaknesses, opportunities and threats (SWOT-analytical hierarchy process (AHP methodology was developed. Application of the methodology was illustrated with an example for participatory appraisal of four bioenergy technologies in Uganda. Results showed that the methodology is effective in evaluating stakeholder preferences for bioenergy technologies. It showed a high potential to be used to identify and rate factors that stakeholders take into consideration when selecting bioenergy systems. The method could be used as a tool for technology screening, or reaching consensus in a participatory setup in a transparent manner.

  15. Strategic analyses in nursing schools: attracting, educating, and graduating more nursing students: part I--strengths, weaknesses, opportunities, and threats analysis.

    Science.gov (United States)

    Crow, Stephen M; Hartman, Sandra J; Mahesh, Sathiadev; McLendon, Christy L; Henson, Steve W; Jacques, Paul

    2008-01-01

    The shortage of nurses in the United States remains a persistent problem. Faced with this reality, nursing programs in colleges and universities continue to struggle to expand enrollment levels to meet the spiraling demand. This research uses familiar tools in strategic management: the strengths, weaknesses, opportunities, and threats (SWOT) analysis and stakeholder analysis as initial steps to draw more students to the profession of nursing. In a 2-round modified Delphi survey, chief administrators of schools of nursing identify the main SWOT of schools of nursing and the important internal and external stakeholders that influence nursing school success. The authors of the research suggest ways to use that knowledge to increase the enrollment level of nursing students. Part I of this research focuses on the SWOT analyses.

  16. Applicability of SWOT analysis for measuring quality of public oral health services as perceived by adult patients in Finland. Strengths, weaknesses, opportunities and threats.

    Science.gov (United States)

    Toivanen, T; Lahti, S; Leino-Kilpi, H

    1999-10-01

    To determine the applicability of SWOT analysis for measuring the quality of public oral health services from the adult client's perspective. Data were collected using a structured questionnaire developed in an earlier study. The study group consisted of all adult (over 18 years of age) clients (n = 256) using public municipal oral health services in Kirkkonummi, Finland, during 2 weeks in 1995. Before treatment, patients filled out a questionnaire that measured the importance of their expectations in different aspects of oral care. After the appointment, they filled out a similar questionnaire that measured the enactment of these expectations in the treatment situation. The response rate was 51%. The difference between subjective importance and enactment of expectations was tested by Wilcoxon's signed rank test. Results were interpreted using both a conventional analysis of "expectation enacted or not" and SWOT analysis, which is used in strategic planning to identify areas of strengths (S), weaknesses (W), opportunities (O) and threats (T) in an organisation. In 28 statements out of 35, the two analyses revealed similar interpretations. In most areas the patient-perceived quality of the services was good. Weaknesses were found in the following areas: communicating to patients the causes and risk of developing oral diseases, informing them about different treatment possibilities, and including patients in decision-making when choosing restorative materials. SWOT analysis provided more structured interpretation of the results, and can be more easily transferred to development of services.

  17. Analysis of the strengths, weaknesses, opportunities and threats of the network form of organization of traumatic brain injury service delivery systems.

    Science.gov (United States)

    Lamontagne, Marie-Eve; Swaine, Bonnie R; Lavoie, André; Careau, Emmanuelle

    2011-01-01

    Networks are an increasingly popular way to deal with the lack of integration of traumatic brain injury (TBI) care. Knowledge of the stakes of the network form of organization is critical in deciding whether or not to implement a TBI network to improve the continuity of TBI care. To report the strengths, weaknesses, opportunities, and threats of a TBI network and to consider these elements in a discussion about whether networks are a suitable solution to fragmented TBI care. In-depth interviews with 12 representatives of network organization members. Interviews were qualitatively analyzed using the EGIPSS model of performance. The majority of elements reported were related to the network's adaptation to its environment and more precisely to its capacity to acquire resources. The issue of value maintenance also received considerable attention from participants. The network form of organization seems particularly sensitive to environmental issues, such as resource acquisition and legitimacy. The authors suggest that the network form of organization is a suitable way to increase the continuity of TBI care if the following criteria are met: (1) expectations toward network effectiveness to increase continuity of care are moderate and realistic; (2) sufficient resources are devoted to the design, implementation, and maintenance of the network; (3) a network's existence and actions are deemed legitimate by community and organization member partners; and (4) there is a good collaborative climate between the organizations.

  18. The hospital Internal Medicine specialist today: a literature review and strength, weaknesses, opportunity, threats (SWOT analysis to develop a working proposal

    Directory of Open Access Journals (Sweden)

    Emilio Scotti

    2013-12-01

    Full Text Available The aim of the paper is to identify the role of the hospital Internal Medicine specialist in the Internal Medicine Unit (IMU through a clinical and statistical analysis of the patients referred to them by identifying the activities that differentiate them from patients in General Medicine and Emergency Departments, i.e. diagnosis and treatment of complex patient with varying degrees of instability, identifying priorities in the acute problems of co-morbidities. The modified early warning score (MEWS, an internationally validated marker, was chosen to assess and stratify the clinical instability of patients referred to the IMU. A literature review was carried out, and a cut-off score of 3 was chosen to define the critical patients referred to the IMU; a MEWS value of 4 defines the need for transfer to the Intensive Care Unit (ICU or Intensive Cardiac Care Unit (CCU, considered the primary end point in most of the studies examined. To better characterize the internist’s role today, a strength, weaknesses, opportunity, threats (SWOT analysis was performed and examined, and commented upon. A total of 101 articles were reviewed and 5 were selected. The case histories relating to the IMU appear to be made up of complex patients with conditions that are, in most cases, acute and unstable. From 10% to 17% of patients present a MEWS of 3 or more that defines a condition of severe clinical instability requiring continuous observation and non-invasive multi-parametric monitoring. From 5% to 7% of cases present a MEWS of 4 or more and therefore require transfer to the ICU/CCU or risk rapid death. Approximately 40% of patients present MEWS of 1-2 and still have disease flare-up, but with a lesser degree of instability; however, these patients could experience a potentially negative disease development if not promptly and properly treated. Approximately 40% of patients have MEWS of 0 and represent the group of fragile patients that cannot be studied

  19. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting.

    Science.gov (United States)

    Devriendt, Els; Wellens, Nathalie I H; Flamaing, Johan; Declercq, Anja; Moons, Philip; Boonen, Steven; Milisen, Koen

    2013-09-05

    The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons' medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients' data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. The primary strengths of the BelRAI-system were a structured overview of the patients' condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of care. An actual shortage of

  20. Strengths Weaknesses Opportunities and Threats of Blended ...

    African Journals Online (AJOL)

    Blended learning (BL), defined as “the thoughtful integration of classroom .... Students learned some of the material independently and helped them to apply the .... awareness of participants' own knowledge gaps, which leads to deeper ...

  1. Agile Software Methodologies: Strength and Weakness

    OpenAIRE

    Dr. Adel Hamdan Mohammad; Dr. Tariq Alwada’n; Dr. Jafar "M.Ali" Ababneh

    2013-01-01

    Agile methodologies are great software development methodologies. No doubt that these methodologies have widespread reputation. The core of agile methodologies is people. Customer and each team member in agiledevelopment teams are the key success or failure factor in agile process. In this paper authors demonstrate strength and weakness points in agile methodologies. Also authors demonstrate how strength and weakness factors can affect the overall results of agile development process.

  2. The Strengths and Weaknesses of Universal Grammar

    Institute of Scientific and Technical Information of China (English)

    华芳

    2013-01-01

      Chomsky’s universal grammar (UG) has always had a following among certain linguists. This article discusses the strengths and weaknesses of UG in the L2 setting according to its proponents and opponents. The author also evaluates it using Ka⁃plan’s five-point tool and Long’s eight-point measuring stick.

  3. Strength and Weakness of Animal Vaccine Industry in China

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Based on the introduction of the status of animal vaccine industry in China,the strength,weakness,opportunity and threat of animal vaccine industry are analyzed by SWOT. Among them,strength is mainly reflected in the broad market,and the favorable industrial policy and development environment. Weakness is the irrational structure of product,the nonstandard production inspection,and the irregular market. Opportunity is mainly reflected in improving government’s emphasis on animal security,expanding the scope of compulsory immunization,increasing the proportion of scale breeding,upgrading animal vaccine in China,speeding up industry consolidation and improving market concentration. Threat is manifested mainly in the poor market consciousness due to the long-term planned economy. And animal vaccine enterprises in China are at a relatively disadvantage position during the competition with international companies. Based on these,countermeasures to promote the development of animal vaccine enterprises in China are put forward from the aspects of both government and enterprise. On the one hand,government should improve the laws and regulations and promote the healthy development of vaccine industry,strengthen the manufacturers’ consciousness of quality and biological safety,and create a favorable environment for market competition. On the other hand,enterprises should adjust the product structure and strengthen research and innovation,improve the brand competitiveness,take the road of common development,enhance the management capacity of the enterprises,and promote customer service.

  4. Governance Strengths and Weaknesses to implement the Marine Strategy Framework Directive in European Waters

    DEFF Research Database (Denmark)

    Freire-Gibb, L. Carlos; Koss, Rebecca; Piotr, Margonski

    2014-01-01

    addresses the Strengths, Weakness, Opportunities and Threats (SWOT) of the current European marine governance structures and its relationship to implement the MSFD. Results of the SWOT analysis were acquired through a combination of approaches with MSFD experts and stakeholders including: 30 face......-to-face interviews, an online survey with 264 stakeholder respondents and focus groups within each European marine region. The SWOT analysis concurrently identifies common strengths and weakness and key governance issues for implementing the MSFD for European marine regions. This paper forms one assessment within...

  5. Compressive strength of brick masonry made with weak mortars

    DEFF Research Database (Denmark)

    Pedersen, Erik Steen; Hansen, Klavs Feilberg

    2013-01-01

    The use of weak mortar has a number of advantages (e.g. prevention of expansion joints, environmental issues). However, according to EC6, the strength of masonry vanishes when the compressive strength of the mortar approaches zero. In reality the presence of even unhardened mortar kept in place...... (fm≈6 N/mm2) compression tests of masonry with perforated bricks show that the EC6 expression is not always safe for Danish masonry. This is probably because the tensile strength of the bricks also has an effect on the compressive strength of masonry when the mortar is stronger than weak lime mortar...

  6. Compressive strength of brick masonry made with weak mortars

    DEFF Research Database (Denmark)

    Pedersen, Erik Steen; Hansen, Klavs Feilberg

    2013-01-01

    The use of weak mortar has a number of advantages (e.g. prevention of expansion joints, environmental issues). However, according to EC6, the strength of masonry vanishes when the compressive strength of the mortar approaches zero. In reality the presence of even unhardened mortar kept in place...... in the joint will ensure a certain level of load-carrying capacity. This is due to the interaction between compression in the weak mortar and tension in the adjacent bricks. This paper proposes an expression for the compressive strength of masonry made with weak lime mortars (fm... of masonry depends only on the strength of the bricks. A compression failure in masonry made with weak mortars occurs as a tension failure in the bricks, as they seek to prevent the mortar from being pressed out of the joints. The expression is derived by assuming hydrostatic pressure in the mortar joints...

  7. Virtual Shopping and Impulse Purchasing Strengths and Weaknesses in Pakistan

    Directory of Open Access Journals (Sweden)

    Muhammad Ali Hussain

    2011-11-01

    Full Text Available This research analyzed the perceptive of consumers doing online shopping and impulse purchasing. This study examined the behavior of thirty consumers who were asked to fill the questionnaire based on some close ended questions. The focus of this investigation was to discuss the strengths and Weaknesses of online shopping and impulse purchasing in developing country like Pakistan. Today consumers choose and buy things while sitting at home through internet and buy things impulsively. Do consumer in Pakistan are using Internet for shopping online? Do they make more impulse purchase on the Internet? Does online shopping save time? Do online shopping is more attractive or consumer feels lack of trust? Impacts of advertising are also discussed. We covered the virtual shopping weakness and strengths in our VSIPSWP (Virtual Shopping and Impulse Purchasing Strengths and Weaknesses in Pakistan Models.

  8. European Marine Biodiversity Monitoring Networks: Strengths, Weaknesses, Opportunities and Threats

    National Research Council Canada - National Science Library

    Patrício, Joana; Little, Sally; Mazik, Krysia; Papadopoulou, Konstantia-Nadia; Smith, Christopher J; Teixeira, Heliana; Hoffmann, Helene; Uyarra, Maria C; Solaun, Oihana; Zenetos, Argyro; Kaboglu, Gokhan; Kryvenko, Olga; Churilova, Tanya; Moncheva, Snejana; Bučas, Martynas; Borja, Angel; Hoepffner, Nicolas; Elliott, Michael

    2016-01-01

    By 2020, European Union Member States should achieve Good Environmental Status (GES) for eleven environmental quality descriptors for their marine waters to fulfill the Marine Strategy Framework Directive...

  9. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    Science.gov (United States)

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  10. School-Based Sexuality Education in Portugal: Strengths and Weaknesses

    Science.gov (United States)

    Rocha, Ana Cristina; Leal, Cláudia; Duarte, Cidália

    2016-01-01

    Portugal, like many other countries, faces obstacles regarding school-based sexuality education. This paper explores Portuguese schools' approaches to implementing sexuality education at a local level, and provides a critical analysis of potential strengths and weaknesses. Documents related to sexuality education in a convenience sample of 89…

  11. Strength trapped within weakness/ weakness trapped within strength: the influence of family of origin experiences on the lives of abused women.

    Science.gov (United States)

    Buchbinder, Eli; Birnbaum, Liora

    2010-06-01

    By conceptualizing abused women as victims or survivors, the literature offers two contradictory narratives of abused women. The aim of this article is to show that these two narratives are not mutually exclusive but rather can be used simultaneously to represent battered women's existential experiences. The study sample was comprised of 20 Israeli battered women. Three in-depth interviews were conducted with each participant-twice for data collection purposes and once for validating the themes that emerged from the content analysis. "Strength trapped in weakness/weakness trapped in strength" was found to be a dominant theme in the life narratives of the interviewees. Most interviewees grew up in families of origin in distress; most were abused physically and emotionally. Although this anguish colored their lives with pain and turmoil, their experiences were the key to their ability to overcome difficulties. From the onset, interviewees' lives were marked by a sense of threat and deprivation, but these very difficulties were also the source of a sense of power that emerged from the women's struggle with their past. In their attempts to cope with and transcend the legacies of their past, interviewees' feelings oscillated continuously between past and present, creating a unique powerful sense of simultaneously being victims and survivors. Implications for intervention are suggested.

  12. [Strength and weaknesses of the German digital health economy].

    Science.gov (United States)

    Leppert, Florian; Gerlach, Jan; Ostwald, Dennis A; Greiner, Wolfgang

    2017-07-26

    There are high expectations from digitalization of health care, ehealth and telemedicine. Nevertheless, the diffusion of these services falls short of expectations. This study analyses the strength and weaknesses of the German digital health economy. Thereby, we specially focus on small and medium-sized enterprises (SME). The study is based on a literature review, interviews of experts and a workshop. The digital health economy is influenced by a heterogeneous environment with both promotive and obstructive factors. One of the largest weaknesses results from a lack of business models. There is a lack of possibilities of reimbursement by the Statutory Health Insurance (SHI). In addition, private users only have a small willingness to pay for digital services. The large number of regulations makes the implementation even harder, especially for SMEs. Thus, the current environment hampers fast diffusion of digital services in the German health care market. © Georg Thieme Verlag KG Stuttgart · New York.

  13. Weak and Failing States: Evolving Security Threats and U.S. Policy

    Science.gov (United States)

    2008-08-28

    for International Studies, Working Paper No. 2005/20 (2005); Rose E. Brooks, “Failed States, or the State as Failure?” The University of Chicago Law...Threats: Fact of Fiction?” The Washington Quarterly 29 (2006), pp. 27-53; Rumsfeld (2002), op. cit.; and Ray Takeyh and Nikolas Gvosdev, “Do Terrorist...sometimes be less conducive to a terrorist presence than countries that are still weak, but retain some governmental effectiveness.15 International Crime

  14. Analisis Internal Perusahaan (Strength & Weakness, Menggunakankonsep Resource-Based View of the Firm dengan Kerangka VRIO

    Directory of Open Access Journals (Sweden)

    Son Wandrial

    2011-10-01

    Full Text Available Problems in the company's internal environmental analysis is to determine the strengths and weaknesses (internal resources, we did not have reasonable grounds to determine whether the company's internal resources as a strength or weakness. Before we can determine whether a resource can be categorized as strengths or weaknesses, we must have a certain criteria so that appropriate resources are said to be a strength or weakness

  15. Unified programs nationally? Strengths and weaknesses of the learning standards

    Directory of Open Access Journals (Sweden)

    Ignacio Polo Martínez

    2014-06-01

    Full Text Available The inclusion of measurable learning standards as an element of the curriculum has definitely opened the door to the connection between the curriculum and external assessments. Since its origin, the potential impact of that element in improving our educational system has been defended and criticized. The truth is that in our country, though all regions are based on the same Royal Decree of core curriculum, and therefore the same reference for the evaluation, curriculum that ultimately applies to students ( teaching-learning- assessment from the different regions can have significant differences . This article proposes, from the analysis of various research , training programs, the plan of action for inspection and the author's own experience in processes of curriculum specifications , assess the potential strengths and weaknesses of the learning standards.

  16. Strengths and Weaknesses of Financing Hospitals in Germany

    Directory of Open Access Journals (Sweden)

    Kemal Yaman

    2014-10-01

    Full Text Available In this study strengths and weaknesses of financing hospitals in the German health care sector are examined. In the first part of the paper key data of hospitals, subsidies granted by federal states to hospitals, allocation of expenses in the statutory and private health sector are examined. Moreover, in the same part precautions taken in the German health care industry are analyzed. In the second part of the study compensation system, in particular Diagnosis Related Groups, as a financial resource for the activities performed in hospitals are investigated. For comparison the system before 2003 is also considered. In the third part critical view of the dual system in Germany is discussed. Change in financing of hospitals from 2003 shows improvement in financial situation of these institutions in Germany. However, the new implemented dual system reveals deficits in investment expenditures supported by federal states. The monistic model proposed by Rürup for a financing system from a single resource may provide a better financial base for well-equipped hospitals to meet the challenges among the competitive German hospitals.

  17. The thermal index: its strengths, weaknesses, and proposed improvements.

    Science.gov (United States)

    Bigelow, Timothy A; Church, Charles C; Sandstrom, Kurt; Abbott, John G; Ziskin, Marvin C; Edmonds, Peter D; Herman, Bruce; Thomenius, Kai E; Teo, Tat Jin

    2011-05-01

    The thermal index (TI) has been used as a relative indicator of thermal risk during diagnostic ultrasound examinations for many years. It is useful in providing feedback to the clinician or sonographer, allowing assessment of relative, potential risks to the patient of an adverse effect due to a thermal mechanism. Recently, several shortcomings of the TI formulations in quantifying the risk to the patient have been identified by members of the basic scientific community, and possible improvements to address these shortcomings have been proposed. For this reason, the Output Standards Subcommittee of the American Institute of Ultrasound in Medicine convened a subcommittee to review the strengths of the TI formulations as well as their weaknesses and proposed improvements. This article summarizes the findings of this subcommittee. After a careful review of the literature and an assessment of the cost of updating the TI formulations while maximizing the quality of patient care, the Output Standards Subcommittee makes the following recommendations: (1) some inconsistencies in the current TI formulations should be resolved, and the break point distance should be redefined to take focusing into consideration; (2) an entirely new indicator of thermal risk that incorporates the time dependence not be implemented at this time but be included in continuing efforts toward standards or consensus documents; (3) the exponential dependence of risk on temperature not be incorporated into a new definition of the TI formulations at this time but be included in continuing efforts toward standards or consensus documents; (4) the TI formulations not be altered to include nonlinear propagation at this time but be included in continuing efforts toward standards or consensus documents; and (5) a new indicator for risk from thermal mechanisms should be developed, distinct from the traditional TI formulations, for new imaging modalities such as acoustic radiation force impulse imaging, which

  18. Strengths and weaknesses of the smallholder oil palm sector in Cameroon

    Directory of Open Access Journals (Sweden)

    Nkongho Raymond N.

    2014-03-01

    Full Text Available The present study is an evaluation of the current strengths and weaknesses of the oil palm smallholder sector in Cameroon, or more precisely of the non-industrial sector, as some holdings owned by elites can reach hundreds of hectares. A randomized sample of oil palm producers was chosen after categorization into elites, migrants, natives and company workers (past and present in four palm oil production basins in the Southern part of the country. 176 semi-structured questionnaires were administered. The production basins included: Eseka, Dibombari, Muyuka, and Lobe. Results from the study revealed that elites owned larger average areas (41.3 ha than the other categories of oil palm producers. All categories recorded low average plantation yields, ranging from 7 to 8.4 t FFB/ha/year (with minimum yields of 3 t FFB/ha. Though the elites showed better bargaining power and higher income, all categories of producers faced similar problems such as the high cost of inputs with no governmental subsidies, the difficulty in accessing loans with low interest rates and the use of rudimentary working tools. Despite such weaknesses, the sector also demonstrates some strengths such as the ability to impose little threat to the primary forest when compared to agro-industrial plantations, the availability of a domestic and sub-regional market for red palm oil, the availability of artisanal mills with low extraction rates although able to generate more income for the producers. There is a need for governmental policies that will strengthen partnership between small and medium oil palm producers and agro-industries as it was the case during the Fonader period, in order to converge with the poverty reduction strategy intiated by the government of Cameroon.

  19. [Archaeology and criminology--Strengths and weaknesses of interdisciplinary cooperation].

    Science.gov (United States)

    Bachhiesl, Christian

    2015-01-01

    Interdisciplinary cooperation of archaeology and criminology is often focussed on the scientific methods applied in both fields of knowledge. In combination with the humanistic methods traditionally used in archaeology, the finding of facts can be enormously increased and the subsequent hermeneutic deduction of human behaviour in the past can take place on a more solid basis. Thus, interdisciplinary cooperation offers direct and indirect advantages. But it can also cause epistemological problems, if the weaknesses and limits of one method are to be corrected by applying methods used in other disciplines. This may result in the application of methods unsuitable for the problem to be investigated so that, in a way, the methodological and epistemological weaknesses of two disciplines potentiate each other. An example of this effect is the quantification of qualia. These epistemological reflections are compared with the interdisciplinary approach using the concrete case of the "Eulau Crime Scene".

  20. TU(R)NING WEAKNESS TO STRENGTH MECHANOMUTABLE BIOINSPIRED MATERIALS

    Science.gov (United States)

    2017-04-03

    water at nanoporous two-dimensional interfaces resists high- speed flow through cooperativity," Vol.15(6), pp. 3939-44, 2015 • T. Al-Mulla, Z. Qin, M.J...34Biomateriomics," Materials Genome Initiative - Materials By Design Town Hall, Brown University, Providence, RI March 2012 - “From atoms to structures...Mesoscopic Modeling of Materials (CM4) November 2014 - "Biologically inspired materials & structures for strength and toughness," MIT-CEE Research Speed

  1. Identifying and Analyzing Internal Strengths and Weaknesses of Shohada and Razi Hospitals

    National Research Council Canada - National Science Library

    Friba Mirzamohamadi-Teimorloue; Asadolllah Khadivi; Alireza Khodaei; Alireza Pashaeifar; Hassan Hassan Zadeh; Tooraj Ebrahimian; Baharak Abbasi; Hossein Mohammad Alizadeh Fard; Shahnaz Hosseini

    2016-01-01

    ... a proper prospect and plan an effective and efficient strategy. The purpose of this research was analyzing the internal environment, identifying the weaknesses and the strengths of the organization...

  2. Perceived Strengths and Weaknesses of Highly Realistic Training and Live Tissue Training for Navy Corpsmen

    Science.gov (United States)

    2015-04-08

    Naval Health Research Center Perceived Strengths and Weaknesses of Highly Realistic Training and Live Tissue Training for Navy Corpsmen Stephanie...Highly Realistic and Live Tissue Training 1 Perceived Strengths and Weaknesses of Highly Realistic Training and Live Tissue...Highly Realistic and Live Tissue Training 2 ABSTRACT The U.S. Navy currently employs two types of trauma care training for Navy corpsmen: highly

  3. Analisis Internal Perusahaan (Strength & Weakness, Menggunakan konsep ‘Resource-Based View of the Firm’ dengan Kerangka VRIO

    Directory of Open Access Journals (Sweden)

    Son Wandrial

    2011-11-01

    Full Text Available Problems in the company's internal environmental analysis is to determine the strengths and weaknesses (internal resources, we did not have reasonable grounds to determine whether the company's internal resources as a strength or weakness. Before we can determine whether a resource can be categorized as strengths or weaknesses, we must have a certain criteria so that appropriate resources are said to be a strength or weakness

  4. Analisis Internal Perusahaan (Strength & Weakness), Menggunakan konsep ‘Resource-Based View of the Firm’ dengan Kerangka VRIO

    OpenAIRE

    Son Wandrial

    2011-01-01

    Problems in the company's internal environmental analysis is to determine the strengths and weaknesses (internal resources), we did not have reasonable grounds to determine whether the company's internal resources as a strength or weakness. Before we can determine whether a resource can be categorized as strengths or weaknesses, we must have a certain criteria so that appropriate resources are said to be a strength or weakness

  5. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    Science.gov (United States)

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  6. Objective Evaluation of Muscle Strength in Infants with Hypotonia and Muscle Weakness

    Science.gov (United States)

    Reus, Linda; van Vlimmeren, Leo A.; Staal, J. Bart; Janssen, Anjo J. W. M.; Otten, Barto J.; Pelzer, Ben J.; Nijhuis-van der Sanden, Maria W. G.

    2013-01-01

    The clinical evaluation of an infant with motor delay, muscle weakness, and/or hypotonia would improve considerably if muscle strength could be measured objectively and normal reference values were available. The authors developed a method to measure muscle strength in infants and tested 81 typically developing infants, 6-36 months of age, and 17…

  7. In the students' own words: what are the strengths and weaknesses of the dental school curriculum?

    Science.gov (United States)

    Henzi, David; Davis, Elaine; Jasinevicius, Roma; Hendricson, William

    2007-05-01

    Dental students have little input into the selection of course topics and subject matter included in their dental curricula. Curriculum requirements are framed by the Commission on Dental Accreditation, which has stipulated competencies and associated biomedical and clinical knowledge that must be addressed during dental school. Although these competency requirements restrict the variance of educational experiences, students are eager to share their views on the curriculum within the realm of their educational experience. The objective of this research project was to elicit the perspectives of dental students from a broad cross-section of U.S. and Canadian dental schools about their education. A total of 605 students (285 sophomores, 220 seniors, 100 residents) from twenty North American dental schools completed a SWOT (Strengths, Weaknesses, Opportunities, and Threats) analysis to communicate their perceptions of the curriculum. Students were also asked to provide their impressions of the overall quality of the educational program in an open-ended written format. The students' qualitative comments were then reviewed and categorized into key issues or themes. Resulting themes for each category of the Curriculum SWOT (C-SWOT) analysis were the following. Strengths: 1) clinical learning experience, and 2) opportunity to work with knowledgeable faculty. Weaknesses: 1) disorganized and inefficient clinical learning environment, 2) teaching and testing that focus on memorization, 3) poor quality instruction characterized by curricular disorganization, and 4) inconsistency among instructors during student evaluations. Opportunities: 1) develop strategies to provide students with more exposure to patients, especially early in the curriculum, and 2) opportunities to learn new technology/techniques. Threats: 1) cost of dental education, 2) students' concerns about faculty "brain drain," i.e., lack of sufficient numbers of dental faculty capable of providing high

  8. Profiles of Strengths and Weaknesses in Dyslexia and Other Learning Difficulties

    Science.gov (United States)

    Everatt, John; Weeks, Sally; Brooks, Peter

    2008-01-01

    A total of 83 children with different special educational needs (SEN) assessments were contrasted with a control group (N = 40) without special needs on measures that aimed to identify potential areas of strengths as well as weaknesses in these SEN groups. Carefully selected groups of dyslexics, dyspraxics, children with specific language…

  9. Memory Profiles in Children with Mild Intellectual Disabilities: Strengths and Weaknesses

    Science.gov (United States)

    Van der Molen, Mariet J.; Van Luit, Johannes E. H.; Jongmans, Marian J.; Van der Molen, Maurits W.

    2009-01-01

    Strengths and weaknesses in short-term memory (STM) and working memory (WM) were identified in children with mild intellectual disabilities (MID) by comparing their performance to typically developing children matched on chronological age (CA children) and to younger typically developing children with similar mental capacities (MA children).…

  10. Memory profiles in children with mild intellectual disabilities: strengths and weaknesses

    NARCIS (Netherlands)

    van der Molen, M.J.; van Luit, J.E.H.; Jongmans, M.J.; van der Molen, M.W.

    2009-01-01

    Strengths and weaknesses in short-term memory (STM) and working memory (WM) were identified in children with mild intellectual disabilities (MID) by comparing their performance to typically developing children matched on chronological age (CA children) and to younger typically developing children

  11. The Ambivalence of Strengths and Weaknesses of E-Learning Educational Services

    Directory of Open Access Journals (Sweden)

    Venera Mihaela Cojocariu

    2016-08-01

    Full Text Available This paper represents a thorough phase in the effort to identify and assort the strengths and weaknesses of e-learning educational services. This paper reviews a synthesis of the assessments on the e-learning educational services through a survey of the specialized literature from 2000 to 2012 in order to identify the strengths and weaknesses of e-learning educational services which were reported during the past decade. The steps of our approach are the following: 1. The identification of a large number of specialized studies that analyze the above mentioned issue; 2. A basic theoretical review of the research from the perspective of identifying the strengths and weaknesses of the e-learning educational services and some of their implications on the intellectual development of the beneficiaries; 3. A descriptive statistical data analysis which is carried out in order to extract information about strengths and weaknesses relevant to the literature taken into consideration; 4. Results classification and interpretation; 5. Formulating practical suggestions for the notion of e-learning educational services considering the development of studies on the impact of their use on the intellectual development of the beneficiaries. The study results highlighted that strengths and weaknesses are not 'pure', but ambivalent, simultaneously incorporating meanings and limits with different weights. A predictive model of future e-learning educational services can be designed on the basis of the results obtained in the research. This predictive model is based on a pedagogical concept that takes into account the ambivalence of the higher indices which have been identified.

  12. Does Weak Turbulence Impact PMSEs' Strengths Closer To The Northern Pole?

    Science.gov (United States)

    Swarnalingam, N.; Hocking, W. K.; Janches, D.; Nicolls, M. J.

    2015-12-01

    Existing 51.0 MHz VHF radar at Eureka (80N, 86W) in northern Canada is located closer to both the northern magnetic and geomagnetic poles. A recent calibrated study of Polar Mesosphere Summer Echoes (PMSE) using this radar supports the previous results by other radars that the absolute signal strength of PMSE in this region is relatively weak compared with the radar observations located at high latitudes. Although very cold temperature and existence of charged ice particles are the most important ingredient required for PMSE to appear, several other factors could potentially influence the absolute signal strengths of these echoes. One of them is neutral air turbulence. Previous studies indicate that upper mesospheric turbulence's strength decreases with latitudes, especially in the very high latitudes [Becker, 2004; Lubken et. al., 2009]. In this study, we investigate long-term mesospheric turbulence strengths at Eureka and study how they could be associated with the weak PMSE signal strengths compared with other high latitude conditions, where PMSE are strong.

  13. STRENGTHS AND WEAKNESSES OF SMES LISTED IN ISE: A CHAID DECISION TREE APPLICATION

    Directory of Open Access Journals (Sweden)

    ALİ SERHAN KOYUNCUGİL

    2013-06-01

    Full Text Available The aim of this study is to detect the strength and weakness of SMEs which have a significant position in globalization. 697 SMEs listed in the İstanbul Stock Exchange (ISE during the years 2000-2005 were covered in the study. Data Mining method, which can be describe as a collection of techniques that aim to find useful but undiscovered patterns in collected and  Chi-Square Automatic Interaction Detector (CHAID decision tree algorithms, one of the data mining method was used for segmentation in the study. As a result of the study, SMEs listed in the ISE were categorized in 19 different profiles by the CHAID and it was founded that strengths and weakness of the SMEs were identified by strategies of  the equity and assets productivity, financing fixed assets, management of accounts receivables and liquidity

  14. Strengths and weaknesses of the smallholder oil palm sector in Cameroon

    OpenAIRE

    Nkongho Raymond N.; Feintrenie Laurène; Levang Patrice

    2014-01-01

    The present study is an evaluation of the current strengths and weaknesses of the oil palm smallholder sector in Cameroon, or more precisely of the non-industrial sector, as some holdings owned by elites can reach hundreds of hectares. A randomized sample of oil palm producers was chosen after categorization into elites, migrants, natives and company workers (past and present) in four palm oil production basins in the Southern part of the ...

  15. Strengths and weaknesses of the smallholder oil palm sector in Cameroon

    OpenAIRE

    Nkongho, R. N.; Feintrenie, L.; Levang, Patrice

    2014-01-01

    The present study is an evaluation of the current strengths and weaknesses of the oil palm smallholder sector in Cameroon, or more precisely of the non-industrial sector, as some holdings owned by elites can reach hundreds of hectares. A randomized sample of oil palm producers was chosen after categorization into elites, migrants, natives and company workers (past and present) in four palm oil production basins in the Southern part of the country. 176 semi-structured questionnaires were admin...

  16. Exploring the strengths and weaknesses of European innovation capacity within the Strategic Energy Technologies (SET) Plan

    OpenAIRE

    Drmac, I.; Jakšic, D.; Karadža, N.; Kunze, R.; Dehler, J.; R. MIGLIO; Shivakumar, A.; Beltramo, A; Romero Nevado, M.; Welsch, M.; Basslim, M.; Lojanica, M.; Dobbins, A.

    2016-01-01

    This report explored the strengths and weaknesses of the European innovation capacity within the Strategic Energy Technologies (SET) Plan Integrated Roadmap through the assessment of energy technology R&I in these specific sectors. The methodology is based on collating publicly available data and compares how the EU performs in comparison to other key countries worldwide through key indicators (e.g., patents, publications and export/import) across these 13 SET Plan themes.

  17. Strategic marketing management for health management: cross impact matrix and TOWS (threats, opportunities, weaknesses, strengths).

    Science.gov (United States)

    Proctor, T

    2000-01-01

    Organisations operate within a three-tiered environment--internal, micro and macro. The environment is a powerful force acting upon the effectiveness of strategic decision making. Failure to take cognisance of the influence of the three-tiered environment can have disastrous consequences. The cross-impact matrix and the TOWS matrix are two strategic decision-making aids that improve effective decision making. When used in conjunction with creative problem solving methods they can provide the basis of a powerful management tool.

  18. Strengths, Weaknesses, Opportunities and Threats: A SWOT analysis of the ecosystem services framework

    CSIR Research Space (South Africa)

    Bull, JW

    2016-02-01

    Full Text Available Science (SAMS), Scotland n Stockholm Resilience Centre, Sweden o PBL Netherlands Environmental Assessment Agency, The Hague, The Netherlands p Dalton Koss HQ, Melbourne, Australia q Lab of Landscape Ecology, Geography Institute, Humboldt...

  19. Lateral flow (immuno)assay: its strengths, weaknesses, opportunities and threats. A literature survey

    NARCIS (Netherlands)

    Posthuma-Trumpie, G.A.; Korf, J.; Amerongen, van A.

    2009-01-01

    Lateral flow (immuno)assays are currently used for qualitative, semiquantitative and to some extent quantitative monitoring in resource-poor or non-laboratory environments. Applications include tests on pathogens, drugs, hormones and metabolites in biomedical, phytosanitary, veterinary, feed/food an

  20. Lateral flow (immuno) assay : its strengths, weaknesses, opportunities and threats. A literature survey

    NARCIS (Netherlands)

    Posthuma-Trumpie, Geertruida A.; Korf, Jakob; van Amerongen, Aart

    Lateral flow (immuno) assays are currently used for qualitative, semiquantitative and to some extent quantitative monitoring in resource-poor or non-laboratory environments. Applications include tests on pathogens, drugs, hormones and metabolites in biomedical, phytosanitary, veterinary, feed/food

  1. Lateral flow (immuno)assay: its strengths, weaknesses, opportunities and threats. A literature survey

    NARCIS (Netherlands)

    Posthuma-Trumpie, G.A.; Korf, J.; Amerongen, van A.

    2009-01-01

    Lateral flow (immuno)assays are currently used for qualitative, semiquantitative and to some extent quantitative monitoring in resource-poor or non-laboratory environments. Applications include tests on pathogens, drugs, hormones and metabolites in biomedical, phytosanitary, veterinary, feed/food

  2. Lateral flow (immuno) assay : its strengths, weaknesses, opportunities and threats. A literature survey

    NARCIS (Netherlands)

    Posthuma-Trumpie, Geertruida A.; Korf, Jakob; van Amerongen, Aart

    2009-01-01

    Lateral flow (immuno) assays are currently used for qualitative, semiquantitative and to some extent quantitative monitoring in resource-poor or non-laboratory environments. Applications include tests on pathogens, drugs, hormones and metabolites in biomedical, phytosanitary, veterinary, feed/food a

  3. Long-term monitoring of river basins: strengths and weaknesses, opportunities and threats

    Science.gov (United States)

    Howden, N. J. K.; Burt, T. P.

    2016-12-01

    In a world where equilibrium is more and more uncommon, monitoring is an essential way to discover whether undesirable change is taking place. Monitoring requires a deliberate plan of action: the regular collection and processing of information. Long-term data reveal important patterns, allowing trends, cycles, and rare events to be identified. This is particularly important for complex systems where signals may be subtle and slow to emerge. Moreover, very long data sets are essential to test hypotheses undreamt of at the time the monitoring was started. This overview includes long time series from UK river basins showing how hydrology and water quality have changed over time - and continue to change. An important conclusion is the long time frame of system recovery, well beyond the normal lifetime of individual governments or research grants. At a time of increasing hydroclimatic variability, long time series remain crucially important; in particular, continuity of observations is vital at key benchmark sites.

  4. Retail pharmacy staff perceptions of design strengths and weaknesses of electronic prescribing

    Science.gov (United States)

    Chui, Michelle A

    2012-01-01

    Objective This paper explored pharmacy staff perceptions of the strengths and weaknesses of electronic prescribing (e-prescribing) design in retail pharmacies using the sociotechnical systems framework. This study examined how adoption of e-prescribing technology is affecting clinical practice and patient care. Materials and methods Direct observations and think aloud protocols were used to collect data from seven retail pharmacies. Results Pharmacists and pharmacy technicians reported strengths of e-prescribing design that facilitated pharmacy work which included: legibility, ease of archiving, quick access to prescriptions and consistency in the format of electronic prescriptions (e-prescriptions). Design weaknesses and potential hazards to patient care associated with e-prescribing systems were due to differences between pharmacy and prescriber computer systems which resulted in the selection of wrong patient or drug (name, directions, dose, strength, formulation, package sizes). There were unique strengths and weaknesses in the design of e-prescriptions peculiar to the three pharmacy computer systems examined in this study. Discussion Findings from this study can help inform policy on creating e-prescribing design standards for pharmacy. e-Prescribing system developers can use the results of this study to identify and apply the most usable features of the three main pharmacy computer systems to design systems that support dispensing efficiency and safety. Conclusions This is the first study to highlight design flaws with e-prescribing in retail pharmacies. The sociotechnical systems framework was useful in providing an indepth understanding of the pharmacist and pharmacy technician's interface with e-prescribing technology. This information can be used by policy makers to create e-prescribing standards for pharmacies. PMID:22753809

  5. China as a Net Creditor: An Indication of Strength or Weaknesses?

    Institute of Scientific and Technical Information of China (English)

    Xin Wang

    2007-01-01

    China's international investment position is characterized by large net foreign assets, a dominance of low-return foreign exchange reserves and costly foreign direct investment in foreign assets and foreign liabilities. In addition, China's foreign investment positions are facing potentially large exchange risks. These features reflect entrenched institutional and structural problems in China, including underdeveloped capital markets, biased resource allocation and a defective social security system. China's net creditor status might actually be an indication of weakness rather than strength. To improve its international investment position, China must speed up economic reforms and allow the market to play a fundamental role in resource allocation.

  6. Study on the Strengths and Weaknesses of Agricultural Climate Resources during Summer Drought in Guizhou Province

    Institute of Scientific and Technical Information of China (English)

    Fei; YU; Xiaoping; GU; Hua; XIONG

    2015-01-01

    In order to quantitatively assess the objective impact of light,heat and water agricultural climate resources on food crops during summer drought,this paper uses the assessment methods for light and temperature potential productivity,and light,temperature and water potential productivity of food crops,performs the comparative analysis of the difference between the food production potential and the average climate state during summer drought,and objectively analyzes the strengths and weaknesses of agricultural climate resources in Guizhou Province during summer drought. Studies show that under summer drought in Guizhou Province,the light and temperature potential productivity of rice and corn is generally about 10% higher than in normal climate years,and the strengths of light and heat resources are obvious; the light,temperature and water potential productivity of rice and corn is generally 30% to 40% lower than in normal climate years,and the weaknesses of water resources hamper the crop growth. Rational development and efficient use of water resources and good light and heat conditions for crops during drought,are more conducive to agricultural production.

  7. Supplementary WMS-III tables for determining primary subtest strengths and weaknesses.

    Science.gov (United States)

    Ryan, J J; Arb, J D; Ament, P A

    2000-06-01

    It is common practice to evaluate the age-adjusted subtest scores from the Wechsler intelligence scales to determine strengths and weaknesses within a profile. The Wechsler Memory Scale-III (WMS-III; D. Wechsler, 1997a) represents a significant improvement over its predecessors and, for the first time, provides age-adjusted subtest scores for interpretation, just as the Wechsler intelligence scales have done for 60 years. It is reasonable to assume that examiners will evaluate the WMS-III subtest profiles for strengths and weaknesses. However, the WMS-III Administration and Scoring Manual and the WAIS-III-WMS-III Technical Manual (The Psychological Corporation, 1997) provide no assistance for accomplishing this goal. Data from the WMS-III standardization sample, as described in the WAIS-III-WMS-III Technical Manual, were used to develop tables for determining both confidence levels and infrequency of differences between individual subtest scores and the means of 5 subtest combinations that may be clinically relevant for individual cases.

  8. Strength and Weakness of Crisis Management in Hormozgan Medical University’s Hospitals

    Directory of Open Access Journals (Sweden)

    Zahra Mastane

    2012-02-01

    Full Text Available Background & Objective: Various communities continuously try to manage the unexpected events. In this regard, hospitals with providing timely health care services has transformed to the most pragmatic unit of health system. Planning and preparation of them should be strategic policy of health system. This paper aimed to investigate the strength and weakness of crisis management in training hospitals of Hormozgan University of Medical Sciences. Materials & Methods: This is descriptive-analytic research. Research statistical population includes managers, nursing directors, financial directors and masters of crises committee of hospitals, totally 34 persons. Data collected with questionnaire in 8 domains and demographic information. Questionnaire was validated and reliabled. Collected data entered to SPSS and analyzed by descriptive & inferential statistics. Results: Preparedness Rate of Hospitals encounters Unexpected Events was average (50%. Preparedness rate in managerial policies (44.1%, structural and non-structural stability (41.2% and register & informed (47% domains were in average level. In this regard HEICS (32.3%, maneuvers (55.9% and use of relative technologies were in very low grade. Between preparedness rate with crises committee function, training and maneuvers there were meaningful relations (P<0.05. Conclusion: Suitable crises management will be feasible by documented planning, preparing intra and extra organizational relations, reinforcing human resources with organizing, delivering of training and durational maneuvers to them. Keywords: Strength, Weakness, Crisis, Crisis Management Type of Article: Original Article

  9. Motivated Implicit Theories of Personality: My Weaknesses Will Go Away, but My Strengths Are Here to Stay.

    Science.gov (United States)

    Steimer, Andreas; Mata, André

    2016-04-01

    Across six studies, this research found consistent evidence for motivated implicit theories about personality malleability: People perceive their weaknesses as more malleable than their strengths. Moreover, motivation also influences how people see themselves in the future, such that they expect their present strengths to remain constant, but they expect their present weaknesses to improve in the future. Several additional findings suggest the motivational nature of these effects: The difference in perceived malleability for strengths versus weaknesses was only observed for the self, not for other people. When the desirability of possessing a certain trait was manipulated, that trait was perceived to be more malleable when it was depicted as undesirable. And these different beliefs that people have about how malleable their traits are, and how they will develop in the future, were associated with their desire for change, which is higher for weaknesses versus strengths. © 2016 by the Society for Personality and Social Psychology, Inc.

  10. Continental Rifts: Lithospheric Weakness and Strength Contrasts as Triggers for Necking Instabilities

    Science.gov (United States)

    Wenker, S.; Beaumont, C.

    2014-12-01

    Rifted margin geometry is too complex and diverse to be explained by simple kinematic models. Instead, we consider the effects of strain localization and the growth of necking instabilities as they apply to rifted margins. The intrinsic layering of the lithosphere will affect the growth rate of necking instabilities, leading to depth-dependent extension. In addition, continents are far from homogeneous after multiple cycles of collision, strike-slip motion and rifting. The resulting inherited heterogeneities may serve to localize strain and initiate necking instabilities. We use 2D finite element models containing embedded finite weak zones in the crust and/or mantle as well as a vertical lithospheric boundary across which lithospheric layering changes resulting in an overall strength contrast. We show that there are two controls on the style of rifting: Control 1, the stiff/pliable nature of the lithospheric layers and; Control 2, the distribution of the background strain rate in the lithosphere. Control 1 depends on the lithospheric rheology, such that necking instabilities grow faster in a stiff, dominantly plastic, layer than in equivalent layers with a pliable, mostly viscous, rheology. Control 2 is important where a strength contrast at a lithospheric boundary influences the distribution of the background strain rate. Necking is a mechanism that amplifies the background strain rate, which implies faster necking in parts of the lithosphere where background strain rates are highest. In a laterally homogeneous lithosphere, the background strain rate will be uniform in each layer and Control 1 will dominate giving necking in stiff layers. However, juxtaposed lithospheres with different strengths will distribute strain giving the weaker lithosphere the higher strain rate, implying the fastest necking may occur under Control 2 in pliable layers with the higher strain rate. An end-member case is where strong lithosphere acts as a rigid block. Here, no necking

  11. The strengths and weaknesses of the written English of black high school pupils

    Directory of Open Access Journals (Sweden)

    Erna Alant

    2013-02-01

    Full Text Available This study attempts to identify some of the strengths and weaknesses of the English of black high school pupils. A random sample of pupils from three classes in each of two schools was selected and given a battery of tests consisting of essay writing, spelling, word usage and punctuation. The method of evaluation of the test battery is described. The results of the tests are outlined and suggestions for the development of an intervention programme are given. Hierdie artikel poog om sommige van die swakhede sowel as die sterk punte van die Engels van swart hoerskoolleerlinge te identifiseer. 'n Ewekansige steekproef van leerlinge van drie klasse in twee afsonderlike skole is gekies en 'n reeks toetse bestaande uit opstel skryf, spel, woordgebruik en punktuasie is gegee. Die skryfster beskryf die metode van evaluasie van die toetsreeks, skets die uitslae van die toets en gee voorstelle vir die ontwikkeling van 'n intervensie-program.

  12. Patients’ perspectives on antenatal group consultations: Identifying communicative strengths and weaknesses

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    consultations, followed by an observation study of group consultations at the same clinic. Results: Analysis identified the value of placing patients together, as it helped to normalize pregnancy which otherwise can be medicalized in the healthcare setting. The sharing of personal experiences had a reassuring......-patient communication, which is increasingly taking place in online patient communities. One novel offline setting which can support patient-patient communication is the group consultation where an individual healthcare professional and a group of patients engage. The purpose of this study is to investigate how patient......-patient communication unfolds in a group consultation with a midwife in order to identify its communicative strengths and weaknesses. Methods: Using a sequential multi-methods design, we performed eight individual interviews with pregnant women from a Danish antenatal clinic about their experiences of two group...

  13. The Janus-faced nature of comparative psychology--strength or weakness?

    Science.gov (United States)

    Burghardt, Gordon M

    2013-07-18

    What is the nature of comparative psychology and how does or should it relate to evolutionary psychology? This is a time of reassessment of both fields and this article reviews the history of comparative psychology and its relationships with evolutionary psychology, ethology, and other approaches to behavior from the perspective of a former editor of the Journal of Comparative Psychology who has spent many decades engaged in research in animal behavior. Special attention is given to a reassessment of comparative psychology that was carried out in 1987. The various tensions and orientations that seem endemic to comparative psychology may, in fact, be both a strength and weakness as comparative psychology and evolutionary approaches to human psychology return to issues prominent in the late 19th Century, when both fields were just becoming established.

  14. Appreciating the Strengths and Weaknesses of Transthoracic Echocardiography in Hemodynamic Assessments

    Directory of Open Access Journals (Sweden)

    Stephen J. Huang

    2012-01-01

    Full Text Available Transthoracic echocardiography (TTE is becoming the choice of hemodynamic assessment tool in many intensive care units. With an ever increasing number of training programs available worldwide, learning the skills to perform TTE is no longer a limiting factor. Instead, the future emphasis will be shifted to teach the users how to recognize measurement errors and artefacts (internal validity, to realize the limitations of TTE in various applications, and finally how to apply the information to the patient in question (external validity. This paper aims to achieve these objectives in a common area of TTE application—hemodynamic assessments. We explore the strengths and weaknesses of TTE in such assessments in this paper. Various methods of hemodynamic assessments, such as cardiac output measurements, estimation of preload, and assessment of fluid responsiveness, will be discussed.

  15. The Janus-Faced Nature of Comparative Psychology – Strength or Weakness?

    Directory of Open Access Journals (Sweden)

    Gordon M. Burghardt

    2013-07-01

    Full Text Available What is the nature of comparative psychology and how does or should it relate to evolutionary psychology? This is a time of reassessment of both fields and this article reviews the history of comparative psychology and its relationships with evolutionary psychology, ethology, and other approaches to behavior from the perspective of a former editor of the Journal of Comparative Psychology who has spent many decades engaged in research in animal behavior. Special attention is given to a reassessment of comparative psychology that was carried out in 1987. The various tensions and orientations that seem endemic to comparative psychology may, in fact, be both a strength and weakness as comparative psychology and evolutionary approaches to human psychology return to issues prominent in the late 19th Century, when both fields were just becoming established.

  16. 3D printing from MRI Data: Harnessing strengths and minimizing weaknesses.

    Science.gov (United States)

    Ripley, Beth; Levin, Dmitry; Kelil, Tatiana; Hermsen, Joshua L; Kim, Sooah; Maki, Jeffrey H; Wilson, Gregory J

    2017-03-01

    3D printing facilitates the creation of accurate physical models of patient-specific anatomy from medical imaging datasets. While the majority of models to date are created from computed tomography (CT) data, there is increasing interest in creating models from other datasets, such as ultrasound and magnetic resonance imaging (MRI). MRI, in particular, holds great potential for 3D printing, given its excellent tissue characterization and lack of ionizing radiation. There are, however, challenges to 3D printing from MRI data as well. Here we review the basics of 3D printing, explore the current strengths and weaknesses of printing from MRI data as they pertain to model accuracy, and discuss considerations in the design of MRI sequences for 3D printing. Finally, we explore the future of 3D printing and MRI, including creative applications and new materials. 5 J. Magn. Reson. Imaging 2017;45:635-645. © 2016 International Society for Magnetic Resonance in Medicine.

  17. The Strengths and Weaknesses of Conceptual Metaphor Theory: A View from Cognitive Science

    Institute of Scientific and Technical Information of China (English)

    Raymond W.Gibbs,Jr.

    2008-01-01

    A major revolution in the study of metaphor occurred over 25 year ago with the introduction of "conceptual metaphor theory." Unlike previous theories of metaphor and metaphorical meaning,conceptual metaphor theory,or CMT,proposed that metaphor is not just an aspect of language,but also a fundamental part of human thought.Indeed,most metaphorical language arises from pre-existing patterns of metaphorical thought or conceptual metaphors.This paper provides a brief overview of the linguistic and psychological evidence supporting CMT and describes some of the criticisms of CMT offered by various scholars within cognitive science.Advocates of CMT must address these weaknesses in the theory,while critics must acknowledge the strengths of CMT as metaphor scholars from all academic fields work toward a comprehensive theory of metaphoric language and thought.

  18. Strengths and weaknesses of Problem Based Learning from the professional perspective of registered nurses

    Directory of Open Access Journals (Sweden)

    María Cónsul-Giribet

    2014-10-01

    Full Text Available OBJECTIVE: to identify competency strengths and weaknesses as perceived by nursing professionals who graduated with a integrated curriculum and competency-based through Problem Based Learning in small groups.METHOD: an intrinsic case study method was used, which analyzes this innovation through former students (from the first class with three years of professional experience. The data were collected through a questionnaire and discussion groups.RESULTS: the results show that their competency level is valued in a very satisfactory manner. This level paradoxically contrasts with the lack of theoretical knowledge they perceived at the end of their education, when they started working in clinical practice.CONCLUSIONS: the teaching strategy was key to motivate an in-depth study and arouse the desire to know. In addition, Problem Based Learning favors and reinforces the decision to learn, which is that necessary in the course of professional life.

  19. Identifying and Analyzing Internal Strengths and Weaknesses of Shohada and Razi Hospitals

    Directory of Open Access Journals (Sweden)

    Friba Mirzamohamadi-Teimorloue

    2016-12-01

    Full Text Available Background and Objectives: Assessment of the internal environment involves evaluating the situation of an organization, its performance measurement, identifying the problems and its potentials. If this evaluation is performed appropriately, then the organization can have access to an accurate and complete image of the existing situation which will assist the organization in providing a proper prospect and plan an effective and efficient strategy. The purpose of this research was analyzing the internal environment, identifying the weaknesses and the strengths of the organization. Material and Methods: This was a cross sectional and descriptive study which was carried out as a survey. The sample size of this survey was formed by 260 employees holding a bachelor’s degree or higher. The data were collected by distributing questionnaires among the members of the sample group. The different components of Weisbord model included setting goals, structure, leadership, communications, reward, useful mechanism (co-ordination, and the attitude towards change. The data were analyzed by SPSS software and statistical tests. Results: The findings of this study showed that the components of goal setting and communications have a lot of strong points at both Shohada and Razi Hospitals. Regarding the components of leadership, structure, and the attitude towards change, more attention is needed by the managers of these hospitals. The reward component is actually one of the weak points in both centers. Useful mechanism component is the weak point of Razi hospital. Conclusion: Considering the findings of this survey, both Shohada and Razi hospitals are in a desirable and positive condition in all of the components except for the component of reward. Hence, conducting periodical surveys for a better understanding of the organization, making right decisions and promoting the efficiency of the employees are recommended.

  20. Nuclear structure properties and stellar weak rates for 76Se: Unblocking of the Gamow Teller strength

    Science.gov (United States)

    Nabi, Jameel-Un; Ishfaq, Mavra; Böyükata, Mahmut; Riaz, Muhammad

    2017-10-01

    At finite temperatures (≥ 107K), 76Se is abundant in the core of massive stars and electron capture on 76Se has a consequential role to play in the dynamics of core-collapse. The present work may be classified into two main categories. In the first phase we study the nuclear structure properties of 76Se using the interacting boson model-1 (IBM-1). The IBM-1 investigations include the energy levels, B (E 2) values and the prediction of the geometry. We performed the extended consistent-Q formalism (ECQF) calculation and later the triaxial formalism calculation (constructed by adding the cubic term to the ECQF). The geometry of 76Se can be envisioned within the formalism of the potential energy surface based on the classical limit of IBM-1 model. In the second phase, we reconfirm the unblocking of the Gamow-Teller (GT) strength in 76Se (a test case for nuclei having N > 40 and Z < 40). Using the deformed pn-QRPA model we calculate GT transitions, stellar electron capture cross section (within the limit of low momentum transfer) and stellar weak rates for 76Se. The distinguishing feature of our calculation is a state-by-state evaluation of stellar weak rates in a fully microscopic fashion. Results are compared with experimental data and previous calculations. The calculated GT distribution fulfills the Ikeda sum rule. Rates for β-delayed neutrons and emission probabilities are also calculated. Our study suggests that at high stellar temperatures and low densities, the β+-decay on 76Se should not be neglected and needs to be taken into consideration along with electron capture rates for simulation of presupernova evolution of massive stars.

  1. Regenerative medicine in Huntington's disease: Strengths and weaknesses of preclinical studies.

    Science.gov (United States)

    Tartaglione, A M; Popoli, P; Calamandrei, G

    2017-02-20

    Huntington's disease (HD) is an inherited neurodegenerative disorder, characterized by impairment in motor, cognitive and psychiatric domains. Currently, there is no specific therapy to act on the onset or progression of HD. The marked neuronal death observed in HD is a main argument in favour of stem cells (SCs) transplantation as a promising therapeutic perspective to replace the population of lost neurons and restore the functionality of the damaged circuitry. The availability of rodent models of HD encourages the investigation of the restorative potential of SCs transplantation longitudinally. However, the results of preclinical studies on SCs therapy in HD are so far largely inconsistent; this hampers the individuation of the more appropriate model and precludes the comparative analysis of transplant efficacy on behavioural end points. Thus, this review will describe the state of the art of in vivo research on SCs therapy in HD, analysing in a translational perspective the strengths and weaknesses of animal studies investigating the therapeutic potential of cell transplantation on HD progression.

  2. Strengths and weaknesses of the school mediation from the perspective of students in secondary education

    Directory of Open Access Journals (Sweden)

    Laura García Raga

    2016-06-01

    Full Text Available In this paper we present a study to know the valuation of school mediation as an educational strategy taking into account the views of students in five schools in secondary Valencia, where the formal mediation process has been active for at least two years. It also seeks to identify the strengths and weaknesses identified.To achieve the objectives it has collected information from 593 students through an ad hoc difference between issues that all students must answer questionnaire; questions addressed only the students who have gone to mediation service; and finally issues to respond only the students who have acted as mediators.Through descriptive exploratory study conducted, is highlighted as a result the great general agreement exists on the part of students participating in valuing very positively to mediation, particularly their impact on conflict resolution and prevention of serious and violent situations. On the other hand, as for improvement, poor training in mediation and little relation to those benefits linked with faculty is detected, since mediation seems so positively influence the teaching faculty teaching in the classroom and in the relationships between students and faculty. In conclusion, the study shows that school mediation is considered advantageous for students and an opportunity that helps them manage their own conflicts, although there are aspects that should work towards the educational potential of school mediation in the improving coexistence and configuration of democratic citizenship.

  3. Macroeconomics of Natural Disasters: Strengths and Weaknesses of Meta-Analysis Versus Review of Literature.

    Science.gov (United States)

    A G van Bergeijk, Peter; Lazzaroni, Sara

    2015-06-01

    We use the case of the macroeconomic impact of natural disasters to analyze strengths and weaknesses of meta-analysis in an emerging research field. Macroeconomists have published on this issue since 2002 (we identified 60 studies to date). The results of the studies are contradictory and therefore the need to synthesize the available research is evident. Meta-analysis is a useful method in this field. An important aim of our article is to show how one can use the identified methodological characteristics to better understand the robustness and importance of new findings. To provide a comparative perspective, we contrast our meta-analysis and its findings with the major influential research synthesis in the field: the IPCC's 2012 special report Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation. We show that the IPCC could have been more confident about the negative economic impact of disasters and more transparent on inclusion and qualification of studies, if it had been complemented by a meta-analysis. Our meta-analysis shows that, controlling for modeling strategies and data set, the impact of disasters is significantly negative. The evidence is strongest for direct costs studies where we see no difference between our larger sample and the studies included in the IPCC report. Direct cost studies and indirect cost studies differ significantly, both in terms of the confidence that can be attached to a negative impact of natural disasters and in terms of the sources of heterogeneity of the findings reported in the primary studies. © 2015 Society for Risk Analysis.

  4. Evaluation of the strengths and weaknesses of community-based education from the viewpoint of students

    Directory of Open Access Journals (Sweden)

    SEDIGHEH MOKHTARPOUR

    2016-10-01

    Full Text Available Introduction: Responsive medicine is an appropriate training method which trains the graduates who can act effectively in initial and secondary aspects of health issues in the society. Methods: This was a cross-sectional descriptive-analytic study which was done using quantitative method. The target population of this study was all the students of the Nutrition and Health School of Shiraz University of Medical Sciences. The sample was randomly selected in this study and 75 students were selected based on the methodologist’s comments and similar studies and randomnumber table from a list obtained from the school’s department of education. This questionnaire was a researcher-made one which consisted of 23 questions in 2 sections with 21 closedended questions and 2 open-ended questions; 70 questionnaires were completed correctly. The closed-ended questions had 4 aspects (completely agree to completely disagree answered in 5-point Likert scale type. Its face validity was confirmed by 4 faculty members. The construct validity of the questionnaire was analyzed by factor analysis test and its reliability was assessed by a pilot on 20 students with a Cronbach’s alpha of 0.85. The data were analyzed using descriptive statistical tests (mean, standard deviation, … and the Pearson coefficient (p<0.001. Results: The results of this study showed that the maximum mean score was 3.58±0.65 which was related to the context of these courses and the minimum mean was 2.66±1.14 which was related to the logbook implementation. The 2 open-ended questions indicated that the most important strengths were the use of logbooks as a guide and determining the minimum training; of the weaknesses was the mismatch between the theoretical education and the practical activities. Also, developing the minimum training that an expert should know and using the common topics related to theoretical education were the most important points mentioned by the respondents

  5. On the extraction of weak transition strengths via the (3He,t) reaction at 420 MeV

    CERN Document Server

    Zegers, R G T; Akimune, H; Austin, Sam M; Berg, A M van den; Brown, B A; Fujita, Y; Fujiwara, M; Galès, S; Guess, C J; Harakeh, M N; Hashimoto, H; Hatanaka, K; Hayami, R; Hitt, G W; Howard, M E; Itoh, M; Kawabata, T; Kawase, K; Kinoshita, M; Matsubara, M; Nakanishi, K; Nakayama, S; Okumura, S; Ohta, T; Sakemi, Y; Shimbara, Y; Shimizu, Y; Scholl, C; Simenel, C; Tameshige, Y; Tamii, A; Uchida, M; Yamagata, T; Yosoi, M

    2007-01-01

    Differential cross sections for transitions of known weak strength were measured with the (3He,t) reaction at 420 MeV on targets of 12C, 13C, 18O, 26Mg, 58Ni, 60Ni, 90Zr, 118Sn, 120Sn and 208Pb. Using this data, it is shown the proportionalities between strengths and cross sections for this probe follow simple trends as a function of mass number. These trends can be used to confidently determine Gamow-Teller strength distributions in nuclei for which the proportionality cannot be calibrated via beta-decay strengths. Although theoretical calculations in distorted-wave Born approximation overestimate the data, they allow one to understand the main experimental features and to predict deviations from the simple trends observed in some of the transitions.

  6. The relationship between early ego strength and adolescent responses to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Andrekus, N.J.

    1989-01-01

    Ego resiliency and ego control, measured when subjects were 3 or 4 years old, were related to expectation of war, concern for the future, and activism in response to the threat of nuclear war, measured when subjects were 18 years old. Data from 92 participants in a longitudinal study of ego and cognitive development conducted by Jeanne and Jack Block at the University of California, Berkeley were used to test hypotheses. Assessments with the California Child Q-set, composited across multiple independent observers, provide measures of ego resiliency and ego control. Adolescent interviews regarding the perception of likelihood of nuclear war, how this affects their future, and their antinuclear and general political activism were scaled and rated. Early ego resiliency and ego under control were hypothesized to account for the variance in adolescent nuclear responses and activism. The only significant longitudinal relationships were in the female sample, where ego under control was found to be a significant predictor of both general political activism (p<.01) and ideas of the future being affected by the nuclear threat (p<.05). Among males, the relationship between early ego resiliency and adolescent antinuclear activism approached significance (p<.10). Adolescent personality was significantly related to several measures of nuclear response. In girls, adolescent ego under control related to perception of likelihood of nuclear war (p<.05) and antinuclear activism (p<.05), and the interaction of ego resiliency and ego under control predicted general political activism (p<.0005). In boys, adolescent ego resiliency correlated with antinuclear activism (p<.05). These findings were discussed in terms of antecedent parenting styles, and conceptual links were drawn between children's ego resiliency and security of attachment, perspective taking, and moral development.

  7. Nine years of publications on strengths and weaknesses of Family Physician Program in rural area of Iran: A systematic review

    Directory of Open Access Journals (Sweden)

    Saber Azami-Aghdash

    2016-12-01

    Full Text Available Introduction: One of the most important duties of a family physician is to provide primary health care. This is completely considered in the Family Physician Program for a target population. The aim of this study was to systematically review the Family Physician and Referral System strength and weakness in rural area of Iran. Methods: In this systematic review, Scientific Information Database (SID, Science Direct, and PubMed databases were searched and Google search engine was employed using key words such as family medicine, family physician, and referral system for the period of January 2005 to June 2013, both in English and Persian. For identifying duplicated references, Endnote Software was used and for summarizing results of fully assessed articles extraction table was employed. Results: Strengths and weaknesses of Family Physician Program and referral system in rural areas of Iran were extracted from 28 studies. In total, 115 weaknesses (3.96 per study and 103 strengths (3.55 per study were obtained. Content analysis was used and 218 items were summarized into 29 items. Strengths of Family Physician Program were: access of villagers to health services, filling health document for clients, improving services for pregnant mothers, and family planning; while its obvious weaknesses included repeated unnecessary referral of clients as well as lack of providing job stability. Conclusion: Results of studies conducted in Iran showed that Family Physician and Referral System in rural area of Iran could not be successful enough and has many shortcomings. Therefore, a growing body of effective changes must be made for a better performance and to obtain better outcomes.

  8. A review on weaknesses and strengths of delivering Mehr housing project in terms of achieving economical goals

    Directory of Open Access Journals (Sweden)

    Ali Karshenasan

    2013-09-01

    Full Text Available Housing is one of the most important sections of development in a country and its economic importance has put it in the center of attention. It can cause rise and depression of habitation by its extended economic aspects. Mehr Housing plan is a state run housing project in most cities started 2007 in Iran to protect and provide cheap housing for poor people and young couples. Mehr housing project by its large scale and wide dimensions can affect the society’s economy. Therefore, to investigate weaknesses and strengths of this project in terms of economic and applying necessary reformation can increase the success probability of this project. For this purpose, this study assess the weaknesses and strengths of Mehr housing of province of Khorram Abad in Iran for achieving economic goals and also presents solutions to better access to these goals. Time scope of the present study is 6 months of 2011 and the second 3 months of 2012. The methodology is applicable in terms of goal and is descriptive survey in terms of nature. In this study, a combined method of interviewing to experts and distributing a questionnaire among the applicants of Mehr housing has been used for data collecting. Among strengths of Khorram Abad in economic section, employment and urban landfill pattern reformation can be implied. In addition, among weaknesses of this project are lack of proper first design and technical justification of the project and use of only 2 shabby fabrics.

  9. Preoperative muscle weakness as defined by handgrip strength and postoperative outcomes: a systematic review

    Directory of Open Access Journals (Sweden)

    Sultan Pervez

    2012-01-01

    Full Text Available Abstract Background Reduced muscle strength- commonly characterized by decreased handgrip strength compared to population norms- is associated with numerous untoward outcomes. Preoperative handgrip strength is a potentially attractive real-time, non-invasive, cheap and easy-to-perform "bedside" assessment tool. Using systematic review procedure, we investigated whether preoperative handgrip strength was associated with postoperative outcomes in adults undergoing surgery. Methods PRISMA and MOOSE consensus guidelines for reporting systematic reviews were followed. MEDLINE, EMBASE, and the Cochrane Central Register of Controlled Clinical Trials (1980-2010 were systematically searched by two independent reviewers. The selection criteria were limited to include studies of preoperative handgrip strength in human adults undergoing non-emergency, cardiac and non-cardiac surgery. Study procedural quality was analysed using the Newcastle-Ottawa Quality Assessment score. The outcomes assessed were postoperative morbidity, mortality and hospital stay. Results Nineteen clinical studies (17 prospective; 4 in urgent surgery comprising 2194 patients were identified between1980-2010. Impaired handgrip strength and postoperative morbidity were defined inconsistently between studies. Only 2 studies explicitly ensured investigators collecting postoperative outcomes data were blinded to preoperative handgrip strength test results. The heterogeneity of study design used and the diversity of surgical procedures precluded formal meta-analysis. Despite the moderate quality of these observational studies, lower handgrip strength was associated with increased morbidity (n = 10 studies, mortality (n = 2/5 studies and length of hospital stay (n = 3/7 studies. Conclusions Impaired preoperative handgrip strength may be associated with poorer postoperative outcomes, but further work exploring its predictive power is warranted using prospectively acquired, objectively defined

  10. While Heisenberg Is Not Looking: The Strength of "Weak Measurements" in Educational Research

    Science.gov (United States)

    Geelan, David R.

    2015-01-01

    The concept of "weak measurements" in quantum physics is a way of "cheating" the Uncertainty Principle. Heisenberg stated (and 85 years of experiments have demonstrated) that it is impossible to know both the position and momentum of a particle with arbitrary precision. More precise measurements of one decrease the precision…

  11. The expression and interpretation of uncertain forensic science evidence: verbal equivalence, evidence strength, and the weak evidence effect.

    Science.gov (United States)

    Martire, Kristy A; Kemp, Richard I; Watkins, Ian; Sayle, Malindi A; Newell, Ben R

    2013-06-01

    Standards published by the Association of Forensic Science Providers (2009, Standards for the formulation of evaluative forensic science expert opinion, Science & Justice, Vol. 49, pp. 161-164) encourage forensic scientists to express their conclusions in the form of a likelihood ratio (LR), in which the value of the evidence is conveyed verbally or numerically. In this article, we report two experiments (using undergraduates and Mechanical Turk recruits) designed to investigate how much decision makers change their beliefs when presented with evidence in the form of verbal or numeric LRs. In Experiment 1 (N = 494), participants read a summary of a larceny trial containing inculpatory expert testimony in which evidence strength (low, moderate, high) and presentation method (verbal, numerical) varied. In Experiment 2 (N = 411), participants read the same larceny trial, this time including either exculpatory or inculpatory expert evidence that varied in strength (low, high) and presentation method (verbal, numerical). Both studies found a reasonable degree of correspondence in observed belief change resulting from verbal and numeric formats. However, belief change was considerably smaller than Bayesian calculations would predict. In addition, participants presented with evidence weakly supporting guilt tended to "invert" the evidence, thereby counterintuitively reducing their belief in the guilt of the accused. This "weak evidence effect" was most apparent in the verbal presentation conditions of both experiments, but only when the evidence was inculpatory. These findings raise questions about the interpretability of LRs by jurors and appear to support an expectancy-based account of the weak evidence effect.

  12. The strength of the rotating Presidency is that it keeps the Presidency weak

    DEFF Research Database (Denmark)

    Beach, Derek

    that while the powers possessed by the Presidency are relatively weak, it is the very weakness of the Presidency that makes it an effective leader. Drawing upon recent advances in the study of informal norms in the Council and leadership theories, this paper first discusses what types of leadership...... are demanded in the Council. It is argued that given the consensual and long-term iterated game nature of EU decision-making, consensual forms of leadership are the most effective at achieving maximum possible gains from cooperation. In this type of leadership, the leader manages the agenda in an acceptable...... fashion to all, and finds, formulates and brokers acceptable compromises. Acceptable is not the same as being neutral, and an instrumental leader can exploit its position for private gains, but it cannot be too blatant as it is in more hegemonic forms of leadership....

  13. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network

    CERN Document Server

    Lee, Kyu-Min

    2016-01-01

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can c...

  14. A Review of Meta-Analyses in Education: Methodological Strengths and Weaknesses

    Science.gov (United States)

    Ahn, Soyeon; Ames, Allison J.; Myers, Nicholas D.

    2012-01-01

    The current review addresses the validity of published meta-analyses in education that determines the credibility and generalizability of study findings using a total of 56 meta-analyses published in education in the 2000s. Our objectives were to evaluate the current meta-analytic practices in education, identify methodological strengths and…

  15. An Estimate of Some Strengths and Weaknesses of the Soviet Naval Officer That Could Affect His Performance in Future Combat.

    Science.gov (United States)

    1982-06-01

    rules of the road quizzes and essays addressing the need for the Soviet naval officer to be a 7 0 proficient shiphandler . In this area, Adm. Gorshkov...RD-A12l 773 AN ESTIMATE OF SOME STRENGTHS AND WEAKNESSES OF THE 1/2 SOVIET NAVAL OFFICER..(U) NAVAL POSTGRADUATE SCHOOL UNCLSSIIED MONTEREY CA RN...WMAGGI JUN 82 FG59 N EM2 MICROCOPY RESOLUTION TEST CHART 𔃾NAIIONAI. BUREAU OF STANDARDS_ 193-A NAVAL POSTGRADUATE SCHOOL Monterey, California ". 1 14

  16. The Strengths, Weaknesses, Opportunities and Threats of Using Social Software in Higher and Further Education Teaching and Learning

    Science.gov (United States)

    Schroeder, A.; Minocha, S.; Schneider, C.

    2010-01-01

    Social software is increasingly being used in higher and further education to support teaching and learning processes. These applications provide students with social and cognitive stimulation and also add to the interaction between students and educators. However, in addition to the benefits the introduction of social software into a course…

  17. Strength of weak layers in cascading failures on multiplex networks: case of the international trade network.

    Science.gov (United States)

    Lee, Kyu-Min; Goh, K-I

    2016-05-23

    Many real-world complex systems across natural, social, and economical domains consist of manifold layers to form multiplex networks. The multiple network layers give rise to nonlinear effect for the emergent dynamics of systems. Especially, weak layers that can potentially play significant role in amplifying the vulnerability of multiplex networks might be shadowed in the aggregated single-layer network framework which indiscriminately accumulates all layers. Here we present a simple model of cascading failure on multiplex networks of weight-heterogeneous layers. By simulating the model on the multiplex network of international trades, we found that the multiplex model produces more catastrophic cascading failures which are the result of emergent collective effect of coupling layers, rather than the simple sum thereof. Therefore risks can be systematically underestimated in single-layer network analyses because the impact of weak layers can be overlooked. We anticipate that our simple theoretical study can contribute to further investigation and design of optimal risk-averse real-world complex systems.

  18. The Strength of Weak Ties in MBA Job Search: A Within–Person Test

    Directory of Open Access Journals (Sweden)

    Jason Greenberg

    2016-05-01

    Full Text Available Whether and how social ties create value has inspired substantial research in organizational theory, sociology, and economics. Scholars generally believe that social ties impact labor market outcomes. Two explanatory mechanisms have been identified, emphasizing access to better job offers in pecuniary terms and the efficacy of non-redundant information. The evidence informing each theory, however, has been inconsistent and circumstantial. We test predictions from both models using a rich set of job search data collected from an MBA student population, including detailed information about search channels and characteristics of job offers. Importantly, we can compare offers made to the same student derived via different search channels while accounting for industry, function, and non-pecuniary characteristics. We find that contrary to conventional wisdom, search through social networks typically results in job offers with lower total compensation (-17 percent for referrals through strong ties and -16 percent for referrals via weak ties vs. formal search. However, our models also show that students are considerably more likely to accept offers derived via weak ties. They do so because they are perceived to have greater growth potential and other non-pecuniary value. On balance, our tests are consistent with Granovetter’s argument that networks provide value by facilitating access to information that is otherwise difficult to obtain, rather than providing greater pecuniary compensation.

  19. [Strengths and weaknesses of a cervical cancer detection and control program: a qualitative evaluation in San Luis Potosi, Mexico].

    Science.gov (United States)

    Tejada-Tayabas, Luz María; Hernández-Ibarra, Luis Eduardo; Pastor-Durango, María del Pilar

    2012-01-01

    To identify, from the perspective of the health staff, the strengths and weaknesses of the program for the detection and control of cervical cancer through a qualitative assessment implemented in three health centers in the city of San Luis Potosi, Mexico, from August 2008 to November 2009. A qualitative evaluation was performed. Nine providers participated in the study. The providers were selected by purposeful sampling using a voluntary participation criterion. Initially, information on the characteristics and the context in which the program operates was obtained from the health centers. Later, 18 semi-structured interviews were conducted with nine informants to probe their perspective. A directed content analysis was used. The strengths reported by staff were the fact that the program is free of charge, the availability of material resources, and the strategies that helped encourage the recruitment of women and their access to screening. The main weaknesses consisted of limitations in human resources and physical infrastructure, inefficient organization of activities, the staff's poor technical training, limited promotion of activities, and limitations in monitoring women with positive results. This study reveals the need for increased human resources, changes in regulations and reorganization of the program's actions in some health centers to ensure the quality of the service, meet women's needs, and promote coverage in all the program's actions. Copyright © 2011 SESPAS. Published by Elsevier España, S.L. All rights reserved.

  20. The Strengths and Weaknesses of Logic Formalisms to Support Mishap Analysis

    Science.gov (United States)

    Johnson, C. W.; Holloway, C. M.

    2002-01-01

    The increasing complexity of many safety critical systems poses new problems for mishap analysis. Techniques developed in the sixties and seventies cannot easily scale-up to analyze incidents involving tightly integrated software and hardware components. Similarly, the realization that many failures have systemic causes has widened the scope of many mishap investigations. Organizations, including NASA and the NTSB, have responded by starting research and training initiatives to ensure that their personnel are well equipped to meet these challenges. One strand of research has identified a range of mathematically based techniques that can be used to reason about the causes of complex, adverse events. The proponents of these techniques have argued that they can be used to formally prove that certain events created the necessary and sufficient causes for a mishap to occur. Mathematical proofs can reduce the bias that is often perceived to effect the interpretation of adverse events. Others have opposed the introduction of these techniques by identifying social and political aspects to incident investigation that cannot easily be reconciled with a logic-based approach. Traditional theorem proving mechanisms cannot accurately capture the wealth of inductive, deductive and statistical forms of inference that investigators routinely use in their analysis of adverse events. This paper summarizes some of the benefits that logics provide, describes their weaknesses, and proposes a number of directions for future research.

  1. Echo, SPECT/PET, MRI and CT: A Comparison of Strengths, Weaknesses and Opportunities

    Directory of Open Access Journals (Sweden)

    S. Wann

    2007-05-01

    Full Text Available Non-invasive cardiac imaging has come of age over the last 30 years, and is now an essential part of the evaluation of this lecture is to review the use of these powerful tools from the standpoint of the fundamen-tal pathophysiology of heart disease, so as to impart an understanding of the unique capabilities of the different modalities, and to discuss relative merits and weaknesses of each. Clinical problem solving will be emphasized with the goal of not only achieving an accurate diagnosis, but rather the delivery of cost-effective and evidence based medicine, which posi-tively affects patient outcomes. Echocardiography is the least expensive and most widely practiced cardiac imaging modality, usually the first test employed to evaluate cardiac structure and function. By comparison, cardiac MR provides higher resolution and more easily quantified struc-tural information, but is much more expensive and much less available. Nuclear cardiac imaging has well proven efficacy in the diagnosis of myocardial ische-mia, with valuable prognostic implications. Cardiac CT has unique and rapidly developing capabilities in defining the epicardial coronary anatomy. Newer developments and future hopes for all these modalities will also be discussed.

  2. IDENTIFICATION OF STRENGTH AND WEAKNESSES OF INDIAN MANUFACTURING SMES USING AHP APPROACH

    Directory of Open Access Journals (Sweden)

    S. D. Kalpande

    2010-12-01

    Full Text Available This paper empirically determines the extent to which the criteria of total quality management (TQM are achieved in small- and medium-sized enterprises (SMEs in Vidharbha region of state Maharashtra in India. These criteria represent the attributes of TQM and as such one can equate these to the benefits of TQM that are achieved in SME. In addition, weaknesses are highlighted to which scarce resources could be parsimoniously allocated. The analytic hierarchy process (AHP methodology is used to determine the percent weightings of five categories of performance criteria that were identified via a review of quality management literature. An empirical analysis of the criteria of each stage using the AHP methodology and the expert opinion of the top management of SMEs operating in Vidharbha region are used to evaluate the percent weightings of the criteria that are synonymous with TQM implementation The findings of this study suggest that the SMEs were focused on UCN, but were least able to effectively determine their strategic direction. In addition, the potential benefits that could be derived from TQM criteria were lacking in the areas of EUD. Having compliance requirements that deal directly with these areas would help SMEs align their quality management practices with quality culture and strategic process changes towards TQM.

  3. From strengths to weaknesses: Guiding students in their development of oral skills

    Directory of Open Access Journals (Sweden)

    Ariza Ariza Aleida

    2003-08-01

    Full Text Available This article intends to report on a small research project carried out with a group of adult EFL learners at the National University extension program, in Bogotá. Founded on a needs analysis process, some activities based on students’ strengths were proposed and developed in order to meet the students’ main need: oral skills. The proposal was implemented and evaluated revealing oral portfolios and debates as useful tools in the development of oral proficiency as well as support in students’ self-regulation processes. Key words: Adult Second Language Acquisition-Methodology-Evaluation, English- Teaching-Evaluation, Oral Communication-Teaching-Methodology, Teaching Adults- Programs El objetivo del presente artículo es dar a conocer un proyecto de investigación a pequeña escala, desarrollado con un grupo de estudiantes adultos de inglés como lengua extranjera en la Unidad de Extensión de la Universidad Nacional de Colombia, en Bogotá. A partir de un proceso de análisis de necesidades, se plantearon y desarrollaron algunas actividades basadas en las fortalezas de los estudiantes con miras a suplir la principal necesidad de los estudiantes: las habilidades orales. La implementación y evaluación de la propuesta mostró que los portafolios y los debates son herramientas claves en el desarrollo de la proficiencia así como en el apoyo de los procesos de autorregulación de los estudiantes. Palabras claves: Adquisición de una segunda lengua-Metodología-Evaluación, Inglés-Enseñanza-Evaluación, Comunicación oral-Enseñanza-Metodología, Educación de adultos-Programas

  4. Identifying strengths and weaknesses in the utilization of Objective Structured Clinical Examination (OSCE) in a nursing program.

    Science.gov (United States)

    McWilliam, Paula L; Botwinski, Carol A

    2012-01-01

    Objective Structured Clinical Examination (OSCE) is used in nursing to assess students' transfer of classroom and laboratory learning experiences into simulated clinical practice. OSCE is a performance-based exam in which students are observed demonstrating a multitude of clinical behaviors. The purpose of this study was to identify strengths and weaknesses in the utilization of OSCE in this nursing program with 60 full-time students ages 21 to 23. An evaluation methodology was used for this study. Interviews were conducted with two groups: faculty facilitators of OSCE and standardized patients (SPs). Areas of focus were: data collection of students' performance, SP selection and training, and modification of the Nursing Interview Interaction Scale (NIIS). It was found that with appropriate SP selection and training, utilization of appropriate tools, and good data collection, OSCE can offer a valid and reliable means of testing nursing students' clinical competencies.

  5. The students' voice: Strengths and weaknesses of an undergraduate medical curriculum in a developing country, a qualitative study

    Directory of Open Access Journals (Sweden)

    Wickramasinghe Ruwan

    2011-07-01

    Full Text Available Abstract Background In medical education, feedback from students' is essential in course evaluation and development. Students at Faculty of Medicine, University of Colombo, Sri Lanka complete a five year medical curriculum comprising of five different streams. We aimed to evaluate the five year medical curriculum at the Faculty of Medicine, University of Colombo, Sri Lanka. Methods A qualitative research was conducted among recent graduates of the faculty. Students' opinions on strengths and weaknesses of the curriculum were collected via questionnaires, which were analysed and classified into common themes. A focus group discussion (FGD based on these themes was conducted among two student groups, each comprising of a facilitator, two observers and nine students selected as a representative sample from questionnaire respondents. FGDs were conducted using a semi-structured set of open-ended questions to guide participants and maintain consistency between groups. The FGD evaluated the reasons behind students' perceptions, attitudes, emotions and perceived solution. Verbal and non-verbal responses were transcribed and analysed. Results Questionnaire response rate was 82% (153/186. Students highlighted 68 and 135 different responses on strengths and weaknesses respectively. After analysis of both questionnaire and FGD results the following themes emerged: a well organized module system, increased frequency of assessments, a good variety in clinical appointments, lack of specific objectives and assessments at clinical appointments, community and behavioural sciences streams beneficial but too much time allocation, lengthy duration of course, inadequate knowledge provided on pharmacology and pathology. Conclusion We demonstrate how a brief qualitative method could be efficiently used to evaluate a curriculum spanning a considerable length of time. This method provided an insight into the students' attitudes and perceptions of the present faculty

  6. Area-based conservation: The strengths and weaknesses of the Egyptian emerging experience in area-based conservation

    Directory of Open Access Journals (Sweden)

    Ayman G. Abdel Tawab

    2012-06-01

    Full Text Available The interest in securing and sustaining the townscape and urban values of the historic environment has escalated as a response to the writings of intellectuals, such as Kevin Lynch and Gordon Cullen. Such interest has been construed by the governments’ introduction of statutory tools allowing them the right to designate urban areas within the boundaries of which the historic environment can be provided a statutory protection. The earliest European attempt to introduce such tools has been the Dutch establishment of the model of conservation areas known as “Protected Town and Village Views” in 1961. In 1962, the renowned Malraux Act has officially established the French similar model of protected areas known as “Secteurs Sauvegardés”. The introduction of such tools has marked the emergence of what has been later called area-based conservation. In Egypt, the enactment of the Act No. 119, in 2008, and the establishment of the model of protected areas known as “Areas Enjoying a Distinctive Value”, seem to have marked the emergence of the Egyptian official experience in area-based conservation. The main aim of this study was to preview the key features of the Egyptian emerging experience in area-based conservation and to unveil its strengths and weaknesses. The study approached the issue by means of a comparative analysis conducted among a group of adopted case studies. The adopted case studies included the British, the Dutch, the Egyptian, the French, the Irish and the Maltese experiences in area-based conservation, in addition to the international institutions’ experiences. The findings indicated that adopting the centralized approach to designate the Egyptian “Areas Enjoying a Distinctive Value” seems to be the major weakness of the Egyptian experience. The findings suggest the further boosting of the role of the Egyptian local authorities in the management of such designated areas.

  7. A Study of Strengths and Weaknesses of Descriptive Assessment from Principals, Teachers and Experts Points of View in Chaharmahal and Bakhteyari Primary Schools

    Science.gov (United States)

    Sharief, Mostafa; Naderi, Mahin; Hiedari, Maryam Shoja; Roodbari, Omolbanin; Jalilvand, Mohammad Reza

    2012-01-01

    The aim of current study is to determine the strengths and weaknesses of descriptive evaluation from the viewpoint of principals, teachers and experts of Chaharmahal and Bakhtiari province. A descriptive survey was performed. Statistical population includes 208 principals, 303 teachers, and 100 executive experts of descriptive evaluation scheme in…

  8. Wildfire Prevention and Suppression plans enhancing: a first overview on strength and weakness in Italian stakeholders experiences and perception.

    Science.gov (United States)

    Bonora, Laura; Conese, Claudio; Barbati, Anna

    2014-05-01

    Fires and wildfires represent an element of vulnerability for forests, considering that have now reached a level beyond which further burning would seriously endanger the ecosystem services and their sustainable management. It is fundamental to support fire-fighting Centres by giving them tools, useful to faces future trends; in this sense the first step is to examine technical and operative procedures to evaluate their strong and weak aspects, in collaboration with personnel responsible of risk management, suppression coordination and patrol responsible of direct attack. The aims this work is to identify present elements of strength ad problematic aspects to tuning the wildfire suppression actions to future changes; this is a crucial challenge both for policy and territory planners and managers. Historical investigation lines on forest fire covered the basilar and fundamental dynamics which understanding was necessary to confine and fight the wildfire phenomenon. At the present all the competences, knowledge and connections acquired are translating and including in the Plans, sharing innovative strategies -with the "direct involved actors"- trying to decrease the fire trend. Stakeholders underlined that collaboration between research and territorial Institutions are producing positive results, showing the conceptual rightness and the well-run of the in-progress implementations. The Italian framework of wildfire prevention plans is very peculiar because the Plans related to prevention and active intervention procedure are coincident. Normative, procedural, economic and logistic aspects are considered and handled in the same general document; each year the local structures, designed by the Regions, have in charge the draft of the operative plan, defining and managing the means and patrols distribution and turnover. In the present work 3 Italian Regions (Tuscany, Puglia and Sardinia, with different territorial and vegetation characteristics and affected by different

  9. AERONET-OC: Strengths and Weaknesses of a Network for the Validation of Satellite Coastal Radiometric Products

    Science.gov (United States)

    Zibordi, Giuseppe; Holben, Brent; Slutsker, Ilya; Giles, David; D'Alimonte, Davide; Melin, Frederic; Berthon, Jean-Francois; Vandemark, Doug; Feng, Hui; Schuster, Gregory; Fabbri, Bryan E.; Kaitala, Seppo; Seppala, Jukka

    2008-01-01

    The Ocean Color component of the Aerosol Robotic Network (AERONET-OC) has been implemented to support long-term satellite ocean color investigations through cross-site consistent and accurate measurements collected by autonomous radiometer systems deployed on offshore fixed platforms. The ultimate purpose of AERONET-OC is the production of standardized measurements performed at different sites with identical measuring systems and protocols, calibrated using a single reference source and method, and processed with the same code. The AERONET-OC primary data product is the normalized water leaving radiance determined at center-wavelengths of interest for satellite ocean color applications, with an uncertainty lower than 5% in the blue-green spectral regions and higher than 8% in the red. Measurements collected at 6 sites counting the northern Adriatic Sea, the Baltic Proper, the Gulf of Finland, the Persian Gulf, and, the northern and southern margins of the Middle Atlantic Bay, have shown the capability of producing quality assured data over a wide range of bio-optical conditions including Case-2 yellow substance- and sedimentdominated waters. This work briefly introduces network elements like: deployment sites, measurement method, instrument calibration, processing scheme, quality-assurance, uncertainties, data archive and products accessibility. Emphases is given to those elements which underline the network strengths (i.e., mostly standardization of any network element) and its weaknesses (i.e., the use of consolidated, but old-fashioned technology). The work also addresses the application of AERONET-OC data to the validation of primary satellite radiometric products over a variety of complex coastal waters and finally provides elements for the identification of new deployment sites most suitable to support satellite ocean color missions.

  10. Educational ranking of schools providing nutrition program in Iran: A strategy to identify the strengths and weaknesses

    Directory of Open Access Journals (Sweden)

    R Mojtahedzadeh

    2012-06-01

    Full Text Available Introduction: After two decades of expansion of universities of medical sciences and increasing the number of students as one of the most attainable solutions to overcome sub-standard status of Iranian workforce in health section, quality of medical education has recently taken priority in national health plans. The purpose of this study was designing a benchmark tool for determining differences in the field of education among schools offering nutrition programs in Iran by stratifying their educational services. Methods: To measure the educational performance of schools providing nutrition programs nationwide, a benchmarking tool consisting of more than 50 indicators was developed by a special committee via brainstorming and nominal group. The weight given to each indicator was defined through consensus developing methods. Each school was asked to introduce a representative who would complete a questionnaire designed to collect schools’ information. Next, all the divisions were visited by one of the project's members and the school’s representative. Then, data retrieval was performed and verified at the project’s office. The average score of each school for each indicator was calculated. Finally, a special computer software was applied to perform the final analysis. Results: A total of 50 indicators were designed in the form of tree diagram and were weighted via consensus agreement. The medical universities offering nutritional programs were compared using the designed model. Conclusion: This study defined the educational strengths and weaknesses of nutrition program in Iranian schools that could be used as a measure for authorities to devise practical strategies for qualitative and quantitative improvement in medical education.

  11. ScienceToGo.org: The Strengths and Weaknesses of Communicating Climate Change through Mass Transit Advertising Spaces

    Science.gov (United States)

    Lustick, D. S.; Lohmeier, J.; Chen, R. F.; Wilson, R.; Rabkin, D.; Thompson, S. R.

    2016-02-01

    Engaging urban populations with climate change science is a difficult challenge since cities can seem so removed from the `natural environment.' However, mass transit provides an inherent means of communicating environmental messages with a cross section of the urban population. The Out of Home Media (OHM) spaces found on platforms and inside train cars provide a potentially effective means of bringing informal science learning opportunities directly to an underserved STEM audience. Our team felt that any messaging curriculum for a coastal urban subway system must complement the scary reality of the impacts of a changing climate (i.e. rising sea levels) with current examples of how the city is preparing for a more sustainable future. Urban areas such as Boston must develop adaptation and mitigation strategies that will help them not only survive, but thrive in a changing environment. In 2013-14, ScienceToGo.org ran a series of 12 engaging posters and placards staring `Ozzie the Ostrich' on the Massachusetts Bay Transit Authority's Red and Orange subway lines targeting an audience of more than 400,000 riders per day. The 12 month curriculum was divided into three phases: reality, relevance, and hope. During the presentation, we will present the results of our quasi-experimental research which identifies, quantifies, and explains the observed impacts of the campaign on adult riders. The strengths and weaknesses of the communication strategy will be discussed. Finally, we will conclude with some recommendations for how this work could improve and inform other urban informal science learning initiatives.

  12. Strengths and weaknesses of weak-strong cluster problems: A detailed overview of state-of-the-art classical heuristics versus quantum approaches

    Science.gov (United States)

    Mandrà, Salvatore; Zhu, Zheng; Wang, Wenlong; Perdomo-Ortiz, Alejandro; Katzgraber, Helmut G.

    2016-08-01

    To date, a conclusive detection of quantum speedup remains elusive. Recently, a team by Google Inc. [V. S. Denchev et al., Phys. Rev. X 6, 031015 (2016), 10.1103/PhysRevX.6.031015] proposed a weak-strong cluster model tailored to have tall and narrow energy barriers separating local minima, with the aim to highlight the value of finite-range tunneling. More precisely, results from quantum Monte Carlo simulations as well as the D-Wave 2X quantum annealer scale considerably better than state-of-the-art simulated annealing simulations. Moreover, the D-Wave 2X quantum annealer is ˜108 times faster than simulated annealing on conventional computer hardware for problems with approximately 103 variables. Here, an overview of different sequential, nontailored, as well as specialized tailored algorithms on the Google instances is given. We show that the quantum speedup is limited to sequential approaches and study the typical complexity of the benchmark problems using insights from the study of spin glasses.

  13. Outline the strengths and weaknesses of performance-related pay (PRP) systems and assess their overall value

    Institute of Scientific and Technical Information of China (English)

    廖雯静

    2015-01-01

    Performance-related pay is very important in the aspect of human resource in an organization. However, it also has some weaknesses. This article analyzes the performance-related pay (PRP) system from an overall point of view.

  14. Investigating the Strengths and Weaknesses of Bojnurd Islamic Azad University in Order to Strategic Planning by Fuzzy Hierarchy Analysis (Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Azam Batyari

    2013-04-01

    Full Text Available A large part of country's economy in the new era is based on knowledge and intellectual activities produced in universities. In recent years, the concepts related to strategic management have been issued in the universities of our country and some of them have attempted to exploit strategic management benefits in order to manage their activities more efficiently. Nowadays, increasing growth of organizations and competition for gaining more market share has doubled the necessity of appropriate strategic plans. Generally, grand strategies are threefold: aggressive strategies, defensive strategies and stability strategies. This research investigate inner environment (strengths and weaknesses of Bojnourd Islamic Azad University, using SWOT analysis. In rating inner factors Fuzzy hierarchy analysis was used in which factor's weight was calculated by hierarchy analysis and using QSB software. The results showed that in strategic planning strengths were more important that weaknesses. In weaknesses set, lack of scientific - research in most training departments and in strengths set the existence of rather young and efficient faculty had the first priority and rank.

  15. Supraspinatus and infraspinatus weakness in overhead athletes with scapular dyskinesis: strength assessment before and after restoration of scapular musculature balance.

    Science.gov (United States)

    Merolla, Giovanni; De Santis, Elisa; Campi, Fabrizio; Paladini, Paolo; Porcellini, Giuseppe

    2010-12-01

    A disturbance in scapulohumeral rhythm may cause negative biomechanic effects on rotator cuff (RC). Alteration in scapular motion and shoulder pain can influence RC strength. Purpose of this study was to assess supraspinatus and infraspinatus strength in 29 overhead athletes with scapular dyskinesis, before and after 3 and 6 months of rehabilitation aimed to restore scapular musculature balance. A passive posterior soft tissues stretching was prescribed to balance shoulder mobility. Scapular dyskinesis patterns were evaluated according to Kibler et al. Clinical assessment was performed with the empty can (EC) test and infraspinatus strength test (IST). Strength values were recorded by a dynamometer; scores for pain were assessed with VAS scale. Changes of shoulder IR were measured. The force values increased at 3 months (P muscles. These data should encourage those caring for athletes to consider restoring of scapular musculature balance as essential part of the athletic training.

  16. Gamow-Teller strength distributions and stellar weak-interaction rates for ^{76}Ge and ^{82}Se using the deformed pn-QRPA model

    Science.gov (United States)

    Nabi, Jameel-Un; Ishfaq, Mavra

    2016-07-01

    We calculate Gamow-Teller strength distributions for β β-decay nuclei ^{76}Ge and ^{82}Se using the deformed pn-QRPA model. We use a deformed Nilsson basis and consider pairing correlations within the deformed BCS theory. Ground state correlations and two-particle and two-hole mixing states were included in our pn-QRPA model. Our calculated strength distributions were compared with experimental data and previous calculation. The total Gamow-Teller strength and centroid placement calculated in our model compares well with the measured value. We calculate β-decay and positron capture rates on ^{76}Ge and ^{82}Se in supernovae environments and compare them to those obtained from experimental data and previous calculation. Our study shows that positron capture rates command the total weak rates at high stellar temperatures. We also calculate energy rates of β-delayed neutrons and their emission probabilities.

  17. Time-resolved carrier dynamics and electron-phonon coupling strength in proximized weak ferromagnet-superconductor nanobilayers

    OpenAIRE

    2007-01-01

    We present our femtosecond optical pump-probe studies of proximized ferromagnet-superconductor nanobilayers. The weak ferromagnetic nature of a thin NiCu film makes it possible to observe the dynamics of the nonequilibrium carriers through the near-surface optical reflectivity change measurements. The subpicosecond biexponential reflectivity decay has been identified as electron-phonon Debye and acoustic phonon relaxation times, and the decay of Debye phonons versus temperature dependence was...

  18. The effect of a weak W/SiC interface on the strength of sigma silicon carbide monofilament

    Science.gov (United States)

    Dyos; Shatwell

    1999-11-01

    Fractography studies have shown that the strength-determining flaws in silicon carbide monofilaments are generally at the core/silicon carbide interface or in the vicinity of the outside, carbon-based coating. In tungsten-cored monofilaments like DERA Sigma, the W/SiC flaws primarily determine the strength. Fracture is accompanied by brittle failure of the tungsten. The crack propagates simultaneously outwards through the silicon carbide, inwards through the tungsten and also around the W/SiC interface before being deflected into the tungsten or out through the silicon carbide. Experiments depositing boundary layers between the tungsten and silicon carbide have resulted in significantly different fracture behaviour. The tungsten fails in a ductile manner and the strength-determining flaws are located predominantly at the outside surface of the silicon carbide. This behaviour is discussed in terms of models proposed by E. Martin and W. Curtin. It is thought that the work will ultimately lead to a significantly stronger, tungsten-based monofilament.

  19. Students’ perceptions of the Master in Secondary Teacher Education: Strengths and weaknesses of the new training model

    Directory of Open Access Journals (Sweden)

    M.ª José HERNÁNDEZ AMORÓS

    2013-01-01

    Full Text Available This paper is the result of a research process developed to know which the students’ perceptions about the program of Secondary Teachers Training are, during the academic course 2011/2012, when it has already been developed for three years. For that, we have reached some information from 227 students who have completed an anonymous open questionnaire. It has been used an evaluative methodology which is typical of qualitative paradigm. The information has been analyzed by AQUAD 6 software program (Huber, 2006, which has allowed the classification of the different codes in nine categories that help us to organize the information and reach some conclusions. These dimensions are: assessment time and teachers, teachers’ development through training, training difficulties, benefits of training, concept of education, interest in teaching, expectations of professional development, basic principles of educational work and suggestions for improvement. Results, therefore, are useful for doing several reformulations in curriculum and for enhance strengths of curriculum, identified by the students.

  20. 态势分析法在护理管理中的应用%The application of the analysis of Superiority Weakness Opportunity Threats in the nursing management

    Institute of Scientific and Technical Information of China (English)

    史瑞芬

    2004-01-01

    态势分析法(Superiority Weakness Opportunity Threats,SWOT),是目前战略管理与规划领域广泛使用的分析工具,已在企业界应用30余年.它通过估量组织内部的优势与劣势,以及对外部环境的机会与威胁进行分析辨别,制定有效的战略计划.将其引入护理管理,可以较客观全面地分析护理组织所处的内外环境,并根据构建的态势矩阵制定科学的护理工作对策,较好地增强护理管理的科学性及护理组织的市场适应性.

  1. Review and analysis of strengths and weaknesses of agro-ecosystem models for simulating C and N fluxes.

    Science.gov (United States)

    Brilli, Lorenzo; Bechini, Luca; Bindi, Marco; Carozzi, Marco; Cavalli, Daniele; Conant, Richard; Dorich, Cristopher D; Doro, Luca; Ehrhardt, Fiona; Farina, Roberta; Ferrise, Roberto; Fitton, Nuala; Francaviglia, Rosa; Grace, Peter; Iocola, Ileana; Klumpp, Katja; Léonard, Joël; Martin, Raphaël; Massad, Raia Silvia; Recous, Sylvie; Seddaiu, Giovanna; Sharp, Joanna; Smith, Pete; Smith, Ward N; Soussana, Jean-Francois; Bellocchi, Gianni

    2017-11-15

    Biogeochemical simulation models are important tools for describing and quantifying the contribution of agricultural systems to C sequestration and GHG source/sink status. The abundance of simulation tools developed over recent decades, however, creates a difficulty because predictions from different models show large variability. Discrepancies between the conclusions of different modelling studies are often ascribed to differences in the physical and biogeochemical processes incorporated in equations of C and N cycles and their interactions. Here we review the literature to determine the state-of-the-art in modelling agricultural (crop and grassland) systems. In order to carry out this study, we selected the range of biogeochemical models used by the CN-MIP consortium of FACCE-JPI (http://www.faccejpi.com): APSIM, CERES-EGC, DayCent, DNDC, DSSAT, EPIC, PaSim, RothC and STICS. In our analysis, these models were assessed for the quality and comprehensiveness of underlying processes related to pedo-climatic conditions and management practices, but also with respect to time and space of application, and for their accuracy in multiple contexts. Overall, it emerged that there is a possible impact of ill-defined pedo-climatic conditions in the unsatisfactory performance of the models (46.2%), followed by limitations in the algorithms simulating the effects of management practices (33.1%). The multiplicity of scales in both time and space is a fundamental feature, which explains the remaining weaknesses (i.e. 20.7%). Innovative aspects have been identified for future development of C and N models. They include the explicit representation of soil microbial biomass to drive soil organic matter turnover, the effect of N shortage on SOM decomposition, the improvements related to the production and consumption of gases and an adequate simulations of gas transport in soil. On these bases, the assessment of trends and gaps in the modelling approaches currently employed to

  2. The hospital Internal Medicine specialist today: a literature review and strength, weaknesses, opportunity, threats (SWOT) analysis to develop a working proposal

    National Research Council Canada - National Science Library

    Scotti, Emilio; Pietrantonio, Filomena

    2013-01-01

    ...) through a clinical and statistical analysis of the patients referred to them by identifying the activities that differentiate them from patients in General Medicine and Emergency Departments, i.e...

  3. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    Science.gov (United States)

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  4. The Application of Strengths, Weaknesses, Opportunities and Threats (SWOT) Analysis for Managing Vocational and Technical Education (VTE) Programmes for Improved Efficiency in Nigeria

    Science.gov (United States)

    Adepoju, T. L.; Famade, Olu Adesola

    2010-01-01

    This paper reviews the current status of vocational and technical education programmes (VTE) in Nigeria and the major innovations of the Nigerian Government in the recent times in the sector vis-a-vis the demands of the modern world for vocational and technological development. It therefore, proposes a paradigm shift in the operation of VTE…

  5. El portafolio digital como herramienta didáctica: una evaluación crítica de fortalezas y debilidades = The digital portfolio as a teaching tool: a critical evaluation of its strengths and weaknesses

    Directory of Open Access Journals (Sweden)

    Olga Moreno-Fernández

    2017-01-01

    Full Text Available Resumen: Se presenta un estudio exploratorio sobre el uso del portafolio digital como herramienta educativa. La experiencia se centró en valorar las debilidades, amenazas, fortalezas y oportunidades de esta herramienta a partir de las apreciaciones de los participantes. De igual modo, se pretende conocer hasta qué punto su utilización potencia habilidades y competencias relevantes en el Espacio Europeo de Educación Superior, tanto a nivel individual como grupal. Para ello, se llevó a cabo un estudio de naturaleza descriptiva a través de la técnica de la encuesta (cuestionario. Los resultados muestran que se trata de una herramienta de aprendizaje valorada positivamente que favorece cuestiones como la accesibilidad al aprendizaje cooperativo o el ahorro económico y medioambiental. A partir de estas valoraciones concluimos que el portafolio digital contribuye al proceso de enseñanza-aprendizaje, favoreciendo que el alumnado sea consciente de éste, y acercándole progresivamente a un aprendizaje más autónomo y responsable.Abstract: An exploratory study on the use of the digital portfolio as an educational tool is presented. The experience focused on assessing the weaknesses, threats, strengths and opportunities of this tool based on the participants' assessments. Likewise, it seeks to know to what extent its use enhances skills and competences relevant in the European Higher Education Area, both individually and as a group. To do this, we conducted a study of descriptive nature through technical survey (questionnaire. The results show that this is a positively valued learning tool that favors issues such as accessibility to cooperative learning or economic and environmental cost savings without printing paper. We conclude therefore that the digital portfolio contributes to the process of teaching and learning, encouraging the students to be aware of this, and progressively bringing you to a more autonomous and responsible learning.

  6. Strengths, Opportunities, Aspirations, and Results: An Emerging Approach to Organization Development

    Science.gov (United States)

    Zarestky, Jill; Cole, Catherine S.

    2017-01-01

    Organization development (OD) interventions have typically relied on the strengths, weaknesses, opportunities, and threats (SWOT) framework for strategic planning. The strengths, opportunities, aspirations, and results (SOAR) framework is a relatively new innovation in OD that may serve as a viable alternative to SWOT for those who wish to apply…

  7. LONG-TREM STRENGTH OF WEAK INTERCALATED SOIL IN SOFT ROCK OF BADONG FORMATION%巴东组软岩非饱和碎屑土夹层的长期强度

    Institute of Scientific and Technical Information of China (English)

    祝艳波; 余宏明

    2015-01-01

    巴东组软岩碎屑土夹层的非饱和蠕变特性明显、强度时间效应显著,研究其长期强度对含碎屑土夹层软岩路堑边坡稳定性分析有所帮助。为研究非饱和碎屑土夹层的长期强度问题,首先利用 GDS 非饱和三轴仪开展碎屑土夹层的非饱和强度、蠕变试验,得到其不同基质吸力下的应力-应变曲线、应变-时间曲线,分析基质吸力对其强度与蠕变特性的影响;其次基于碎屑土夹层的蠕变曲线,利用等时曲线法确定其不同基质吸力下的长期强度。结果表明碎屑土夹层的长期强度较瞬时强度大幅降低,强度产生折损,损失率在34%~62%之间。碎屑土夹层的基质吸力越小,其长期强度越小,强度损失率越大。即巴东组软岩碎屑土夹层的饱和度越高,其强度越小,在荷载长期作用下的强度损失越大,且强度损失率增加的幅度随饱和度的增高而不断增大。%The properties of creep and time dependent behaviours of strength of weak intercalated soils in soft rock of Badong formation are obvious.To study the long-term strength of weak intercalated soils can be useful for stability analysis of the cutting slopes with weak intercalated soils.In order to study the long-term strength of the weak intercalated soils,the strength and creep tests of weak intercalated soils are carried out with a GDS unsaturated triaxial apparatus.It is to find out the effects of matrix suction on strength and creep characteristics of weak intercalated soils from the stress-strain and strain-time curves.Then the isochronous curves method is used to determine the long-term strength of weak intercalated soils based on the creep curves.The results show that the long-term strength of weak intercalated soils is reduced greatly in comparison with the instantaneous strength.The loss rate of strength is between 34% and 62%.The smaller the matrix suction is,the smaller the long

  8. Spatial noise in coupling strength and natural frequency within a pacemaker network; consequences for development of intestinal motor patterns according to a weakly coupled phase oscillator model

    Directory of Open Access Journals (Sweden)

    Sean P Parsons

    2016-02-01

    Full Text Available Pacemaker activities generated by networks of interstitial cells of Cajal (ICC, in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e. spatial noise with a long-tailed distribution, plateau steps occurred at points of low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency.

  9. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model

    Science.gov (United States)

    Parsons, Sean P.; Huizinga, Jan D.

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency. PMID:26869875

  10. The strengths and weaknesses in verbal short-term memory and visual working memory in children with hearing impairment and additional language learning difficulties.

    Science.gov (United States)

    Willis, Suzi; Goldbart, Juliet; Stansfield, Jois

    2014-07-01

    To compare verbal short-term memory and visual working memory abilities of six children with congenital hearing-impairment identified as having significant language learning difficulties with normative data from typically hearing children using standardized memory assessments. Six children with hearing loss aged 8-15 years were assessed on measures of verbal short-term memory (Non-word and word recall) and visual working memory annually over a two year period. All children had cognitive abilities within normal limits and used spoken language as the primary mode of communication. The language assessment scores at the beginning of the study revealed that all six participants exhibited delays of two years or more on standardized assessments of receptive and expressive vocabulary and spoken language. The children with hearing-impairment scores were significantly higher on the non-word recall task than the "real" word recall task. They also exhibited significantly higher scores on visual working memory than those of the age-matched sample from the standardized memory assessment. Each of the six participants in this study displayed the same pattern of strengths and weaknesses in verbal short-term memory and visual working memory despite their very different chronological ages. The children's poor ability to recall single syllable words in relation to non-words is a clinical indicator of their difficulties in verbal short-term memory. However, the children with hearing-impairment do not display generalized processing difficulties and indeed demonstrate strengths in visual working memory. The poor ability to recall words, in combination with difficulties with early word learning may be indicators of children with hearing-impairment who will struggle to develop spoken language equal to that of their normally hearing peers. This early identification has the potential to allow for target specific intervention that may remediate their difficulties. Copyright © 2014. Published

  11. Spatial Noise in Coupling Strength and Natural Frequency within a Pacemaker Network; Consequences for Development of Intestinal Motor Patterns According to a Weakly Coupled Phase Oscillator Model.

    Science.gov (United States)

    Parsons, Sean P; Huizinga, Jan D

    2016-01-01

    Pacemaker activities generated by networks of interstitial cells of Cajal (ICC), in conjunction with the enteric nervous system, orchestrate most motor patterns in the gastrointestinal tract. It was our objective to understand the role of network features of ICC associated with the myenteric plexus (ICC-MP) in the shaping of motor patterns of the small intestine. To that end, a model of weakly coupled oscillators (oscillators influence each other's phase but not amplitude) was created with most parameters derived from experimental data. The ICC network is a uniform two dimensional network coupled by gap junctions. All ICC generate pacemaker (slow wave) activity with a frequency gradient in mice from 50/min at the proximal end of the intestine to 40/min at the distal end. Key features of motor patterns, directly related to the underlying pacemaker activity, are frequency steps and dislocations. These were accurately mimicked by reduction of coupling strength at a point in the chain of oscillators. When coupling strength was expressed as a product of gap junction density and conductance, and gap junction density was varied randomly along the chain (i.e., spatial noise) with a long-tailed distribution, plateau steps occurred at pointsof low density. As gap junction conductance was decreased, the number of plateaus increased, mimicking the effect of the gap junction inhibitor carbenoxolone. When spatial noise was added to the natural interval gradient, as gap junction conductance decreased, the number of plateaus increased as before but in addition the phase waves frequently changed direction of apparent propagation, again mimicking the effect of carbenoxolone. In summary, key features of the motor patterns that are governed by pacemaker activity may be a direct consequence of biological noise, specifically spatial noise in gap junction coupling and pacemaker frequency.

  12. Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data

    Directory of Open Access Journals (Sweden)

    A. Arul Lawrence Selvakumar

    2012-01-01

    Full Text Available Problem statement: Intrusion Detection System (IDS have become an important component of infrastructure protection mechanism to secure the current and emerging networks, its services and applications by detecting, alerting and taking necessary actions against the malicious activities. The network size, technology diversities and security policies make networks more challenging and hence there is a requirement for IDS which should be very accurate, adaptive, extensible and more reliable. Although there exists the novel framework for this requirement namely Mining Audit Data for Automated Models for Intrusion Detection (MADAM ID, it is having some performance shortfalls in processing the audit data. Approach: Few experiments were conducted on tcpdump data of DARPA and BCM audit files by applying the algorithms and tools of MADAM ID in the processing of audit data, mine patterns, construct features and build RIPPER classifiers. By putting it all together, four main categories of attacks namely DOS, R2L, U2R and PROBING attacks were simulated. Results: This study outlines the experimentation results of MADAM ID in testing the DARPA and BSM data on a simulated network environment. Conclusion: The strengths and weakness of MADAM ID has been identified thru the experiments conducted on tcpdump data and also on Pascal based audit files of Basic Security Module (BSM. This study also gives some additional directions about the future applications of MADAM ID.

  13. Patterns of Strengths and Weaknesses on the WISC-V, DAS-II, and KABC-II and Their Relationship to Students' Errors in Oral Language, Reading, Writing, Spelling, and Math

    Science.gov (United States)

    Breaux, Kristina C.; Avitia, Maria; Koriakin, Taylor; Bray, Melissa A.; DeBiase, Emily; Courville, Troy; Pan, Xingyu; Witholt, Thomas; Grossman, Sandy

    2017-01-01

    This study investigated the relationship between specific cognitive patterns of strengths and weaknesses and the errors children make on oral language, reading, writing, spelling, and math subtests from the Kaufman Test of Educational Achievement-Third Edition (KTEA-3). Participants with scores from the KTEA-3 and either the Wechsler Intelligence…

  14. Modelling ultraviolet threats

    Science.gov (United States)

    James, I.

    2016-10-01

    Electro-optically (EO) guided surface to air missiles (SAM) have developed to use Ultraviolet (UV) wavebands supplementary to the more common Infrared (IR) wavebands. Missiles such as the US Stinger have been around for some time but are not considered a proliferation risk. The Chinese FN-16 and Russian SA-29 (Verba) are considered a much higher proliferation risk. As a result, models of the missile seekers must be developed to understand the characteristics of the seeker and the potential performance enhancement that are included. Therefore, the purpose of this paper is to introduce the steps that have been taken to characterise and model these missiles. It begins by outlining some of the characteristics of the threats, the key elements of a UV scene, the potential choice of waveband for a detector, the initial modelling work to represent the UV detector of the missile and presents initial results. The modelling shows that the UV detection range of a typical aircraft is dependent on both the size of the aircraft and its reflectivity. However, the strength of this correlation is less than expected. As a result, further work is required to model more seeker types and to investigate what is causing the weak correlations found in these initial investigations. In addition, there needs to be further study of the sensitivities of the model to other variables, such as the modelled detectivity of the detector and the signal to noise ratio assumed. Overall, the outcome of this work will be to provide specifications for aircraft size and reflectivity that limit the effectiveness of the UV channels.

  15. Clinical utility of the Chinese Strengths and Weaknesses of ADHD-Symptoms and Normal-behaviors questionnaire (SWAN when compared with DISC-IV

    Directory of Open Access Journals (Sweden)

    Chan GFC

    2014-08-01

    Full Text Available Grace Fong-Chun Chan,1 Kelly Yee-Ching Lai,2 Ernest Siu-Luen Luk,3 Se-Fong Hung,2 Patrick Wing-Leung Leung4 1Department of Psychiatry, Alice Ho Miu Ling Nethersole Hospital, 2Department of Psychiatry, The Chinese University of Hong Kong, 3Private practice, 4Clinical and Health Psychology Centre, Department of Psychology, The Chinese University of Hong Kong, Hong Kong Special Administrative Region Background: Attention-deficit/hyperactivity disorder (ADHD is a common and impairing child and adolescent psychiatric disorder. Early identification and prompt treatment are essential. Rating scales are commonly used by clinicians and researchers to assess ADHD children. Objective: In the current study, we aimed to examine the clinical utility of the Chinese version of the Strengths and Weaknesses of ADHD Symptoms and Normal Behaviors (SWAN questionnaire. We validated its subscale scores against the Diagnostic Interview Schedule for Children Version IV (DISC-IV and looked into its ability to identify ADHD in a psychiatric clinic setting. We also tested age and gender effects on SWAN scores. Specific subscale cutoff scores of SWAN were subsequently determined.Method: A total of 290 children aged 6–12 years old studying in local mainstream primary schools were recruited from a clinic setting and interviewed with the parent version of DISC-IV. Their parents and teachers completed the corresponding version of SWAN.Results: Both parent and teacher versions of SWAN were found to have good concurrent validity with DISC-IV. It could identify ADHD well in a clinic sample. Gender-specific cutoff scores were determined. Sensitivities and specificities were found to be satisfactory. SWAN was also found to perform equally well in identifying ADHD in those with and without comorbid Autistic Spectrum Disorder.Conclusion: SWAN was proven to be a useful tool to aid the assessment of ADHD in a clinic sample. Keywords: ADHD, SWAN, DISC-IV, validity

  16. La formación actual del médico: fortalezas y debilidades The current training of doctors: strengths and weaknesses

    Directory of Open Access Journals (Sweden)

    X. Clèries

    2009-03-01

    Full Text Available Las “Jornadas estatales de estudio y debate sobre el futuro de la formación integral del médico ¿bioingeniería o medicina?” que se realizaron en Barcelona el 8 y 9 de febrero de 2008 fueron el marco para que un grupo de trabajo abordara el tema de las fortalezas y debilidades de la formación actual del médico. Las principales aportaciones se estructuraron en los tres niveles educativos siguientes: pregrado, posgrado y formación continuada. Se destacó la necesidad de una formación integral y psicosocial en la enseñanza de pregrado, la conveniencia de una estructuración troncal de la formación de posgrado para conseguir una mayor transversalidad de la competencia del médico y la contextualización de la formación continuada en el desarrollo profesional de cada médico. El predominio de los conocimientos biomédicos y tecnológicos en la formación actual del médico contrastan con las demandas de carácter psicosocial de una gran parte de la población en el sistema sanitario.The “National Conference for study and debate on the future of the integral training of doctors: bioengineering or medicine?” that were realized in Barcelona on February 8-9th, 2008 it was the context so that a work group was carried out on the topic about strengths and weaknesses of the current training of physicians. The main contributions were structured around three educational levels: undergraduate, postgraduate and continuing education. In the undergraduate level was emphasized the need to achieve an integral and psychosocial education. The postgraduate education should have a core subject in order to acquire a better global understanding of doctors' competences. Continuing medical education in the context of professional development of every physician. The predominance of the biomedical and technological knowledge in the current training of doctors contrasts with psychosocial demands of the population of healthcare system.

  17. Tips from the toolkit: 2--assessing organisational strengths.

    Science.gov (United States)

    Steer, Neville

    2010-03-01

    'SWOT' is a familiar term used in the development of business strategy. It is based on the identification of strengths, weaknesses, opportunities and threats as part of a strategic analysis approach. While there are a range of more sophisticated models for analysing and developing business strategy, it is a useful model for general practice as it is less time consuming than other approaches. The following article discusses some ways to apply this framework to assess organisational strengths (and weaknesses). It is based on The Royal Australian College of General Practitioners' "General practice management toolkit".

  18. Compare and Contrast the Strengths and Weaknesses of Task-based Language Teaching Method and Audio Lingual Teaching Method and Study How They Impact Upon Both the Teachers and the Learners

    Institute of Scientific and Technical Information of China (English)

    曹怡之

    2013-01-01

    This essay focused on comparing and contrasts audio lingual method and Task-based language teaching method, demonstrating the strengths and weaknesses of the two methods and discusses how they impact upon both the teachers and the learners. TBLT is the contemporary teaching method with a great number of strong points. It seems that if there is more relatively scientific and effective method, TBLT should give way to it. The ultimate goal is to advocate the comparatively successful teaching method in the field of foreign language education.

  19. Weak Convergence and Weak Convergence

    Directory of Open Access Journals (Sweden)

    Narita Keiko

    2015-09-01

    Full Text Available In this article, we deal with weak convergence on sequences in real normed spaces, and weak* convergence on sequences in dual spaces of real normed spaces. In the first section, we proved some topological properties of dual spaces of real normed spaces. We used these theorems for proofs of Section 3. In Section 2, we defined weak convergence and weak* convergence, and proved some properties. By RNS_Real Mizar functor, real normed spaces as real number spaces already defined in the article [18], we regarded sequences of real numbers as sequences of RNS_Real. So we proved the last theorem in this section using the theorem (8 from [25]. In Section 3, we defined weak sequential compactness of real normed spaces. We showed some lemmas for the proof and proved the theorem of weak sequential compactness of reflexive real Banach spaces. We referred to [36], [23], [24] and [3] in the formalization.

  20. A Partial Swot Analysis of the Turkish Bank Call Centers: The Actual and the Assumed Weaknesses

    OpenAIRE

    ÖZKAN, Ahmet Hakan

    2011-01-01

    The bank call centers of Turkey are seen as a tool of perceiving the threats and evaluating opportunities in the SWOT analysis. By the way they are evaluated as a factor of strength. However, the weaknesses of the call centers which must be taken into account in a SWOT analysis, are so various that they cannot be ignored. The weaknesses of the call centers are elaborated with this research. The ways the call centers harm the corporations or the ways they might harm are revised.

  1. Strengths and weaknesses in the supply of school food resulting from the procurement of family farm produce in a municipality in Brazil.

    Science.gov (United States)

    Soares, Panmela; Martinelli, Suellen Secchi; Melgarejo, Leonardo; Davó-Blanes, Mari Carmen; Cavalli, Suzi Barletto

    2015-06-01

    The objective of this study was to assess compliance with school food programme recommendations for the procurement of family farm produce. This study consists of an exploratory descriptive study utilising a qualitative approach based on semistructured interviews with key informants in a municipality in the State of Santa Catarina in Brazil. Study participants were managers and staff of the school food programme and department of agriculture, and representatives of a farmers' organisation. The produce delivery and demand fulfilment stages of the procurement process were carried out in accordance with the recommendations. However, nonconformities occurred in the elaboration of the public call for proposals, elaboration of the sales proposal, and fulfilment of produce quality standards. It was observed that having a diverse range of suppliers and the exchange of produce by the cooperative with neighbouring municipalities helped to maintain a regular supply of produce. The elaboration of menus contributed to planning agricultural production. However, agricultural production was not mapped before elaborating the menus in this case study and an agricultural reform settlement was left out of the programme. A number of weaknesses in the programme were identified which need to be overcome in order to promote local family farming and improve the quality of school food in the municipality.

  2. Evaluation of hospital palliative care teams: strengths and weaknesses of the before-after study design and strategies to improve it.

    Science.gov (United States)

    Simon, S; Higginson, I J

    2009-01-01

    Hospital palliative care teams (HPCTs) are well established as multi-professional services to provide palliative care in an acute hospital setting and are increasing in number. However, there is still limited evaluation of them, in terms of efficacy and effectiveness. The gold standard method of evaluation is a randomised control trial, but because of methodological (e.g., randomisation), ethical and practical difficulties such trials are often not possible. HPCT is a complex intervention, and the specific situation in palliative care makes it challenging to evaluate (e.g., distress and cognitive impairment of patients). The quasi-experimental before-after study design has the advantage of enabling an experimental character without randomisation. But this has other weaknesses and is prone to bias, for example, temporal trends and selection bias. As for every study design, avoidance and minimisation of bias is important to improve validity. Therefore, strategies of selecting an appropriate control group or time series and applying valid outcomes and measurement tools help reducing bias and strengthen the methods. Special attention is needed to plan and define the design and applied method.

  3. Weak Force

    CERN Multimedia

    Without the weak force, the sun wouldn't shine. The weak force causes beta decay, a form of radioactivity that triggers nuclear fusion in the heart of the sun. The weak force is unlike other forces: it is characterised by disintegration. In beta decay, a down quark transforms into an up quark and an electron is emitted. Some materials are more radioactive than others because the delicate balance between the strong force and the weak force varies depending on the number of particles in the atomic nucleus. We live in the midst of a natural radioactive background that varies from region to region. For example, in Cornwall where there is a lot of granite, levels of background radiation are much higher than in the Geneva region. Text for the interactive: Move the Geiger counter to find out which samples are radioactive - you may be surprised. It is the weak force that is responsible for the Beta radioactivity here. The electrons emitted do not cross the plastic cover. Why do you think there is some detected radioa...

  4. 坝基软弱夹层剪切蠕变及其长期强度试验研究%EXPERIMENTAL RESEARCH ON SHEAR CREEP AND ITS LONG-TERM STRENGTH OF WEAK INTERCALATION IN DAM FOUNDATION

    Institute of Scientific and Technical Information of China (English)

    王宇; 李建林; 刘锋

    2013-01-01

    为了更准确认识坝基岩体中的软弱夹层剪切蠕变特性,进行不同正应力水平下的剪切蠕变试验,采用不同正应力水平下分级加载剪应力的方式,重点研究软弱夹层的剪切蠕变变形规律、破裂机制及其长期抗剪强度。研究结果表明,经验公式u=u0+A[1-exp(-Bt)]+Ctn能较好反映软弱夹层的剪切蠕变变形规律,不同正应力水平下的平均及稳态剪切蠕变速率随剪应力增加呈指数函数增大,且软弱夹层剪切蠕变破坏呈现典型的延性破坏特征。通过新提出的拐点法确定不同正应力水平下的长期抗剪强度,并与稳态速率法的计算结果进行对比,验证了拐点法的合理性和适用性,该方法大大提高了确定岩体长期抗剪强度的准确性,对工程实际具有重要的参考价值。%In order to understand exactly the creep property of weak intercalation in dam foundation rock,the shear creep test is carried out under different normal stresses by using step loading shear stress. The shear creep deformation law,failure mechanism and long-term shear strength of weak intercalation are concerned in this study. The results indicate that the empirical formulation u=u0+A[1-exp(-Bt)]+Ctn can reflect the shear creep deformation law of weak intercalation properly,the average and steady-state shear creep rates increase at a exponential function with the shear stress increasing,and the shear creep failure of weak intercalation shows typical ductility failure characteristics. Based on a new method,called inflection-point method,the long-term shear strength of weak intercalation under different normal stresses is determined. The calculation results of inflection-point method are compared with that of steady-state rate method,and the rationality and validity of inflection-point method are test. The research results show that this method greatly improves the accuracy of determining the rock mass long-term shear strength

  5. The Reliability and Validity of the English and Spanish Strengths and Weaknesses of ADHD and Normal Behavior Rating Scales in a Preschool Sample: Continuum Measures of Hyperactivity and Inattention

    Science.gov (United States)

    Lakes, Kimberley D.; Swanson, James M.; Riggs, Matt

    2013-01-01

    Objective To evaluate the reliability and validity of the English and Spanish versions of the Strengths and Weaknesses of ADHD-symptom and Normal-behavior (SWAN) rating scale. Method Parents of preschoolers completed both a SWAN and the well-established Strengths and Difficulties Questionnaire (SDQ) on two separate occasions over a span of 3 months; instruments were in the primary language of the family (English or Spanish). Results Psychometric properties for the English and Spanish versions of the SWAN were adequate, with high internal consistency and moderate test–retest reliability. Skewness and kurtosis statistics for the SWAN were within the range expected for a normally distributed population. The SWAN also demonstrated adequate convergent and discriminant validity in correlations with the various subscales of the SDQ. Conclusion Psychometric properties of both the English and Spanish versions of the SWAN indicate that it is a reliable and valid instrument for measuring child attention and hyperactivity. The stability of ratings over time in this preschool sample was moderate, which may reflect the relative instability of these characteristics in preschool children. PMID:21807955

  6. CONCEPTUALIZING STATE STRENGTH: MOVING BEYOND STRONG AND WEAK STATES Conceptualizando la fortaleza del Estado: Más allá de los estados débiles o fuertes

    Directory of Open Access Journals (Sweden)

    AGUSTINA GIRAUDY

    2012-01-01

    Full Text Available The strength of states has long been regarded by the specialized literature as an important factor to guarantee the viability of different political and economic phenomena such as democratic consolidation, the rule of law, adequate provision of basic public goods, and economic growth. Despite the importance of state strength, only few scholarly works have systematically explored the definition and the constitutive dimensions of this concept. This article seeks to (a refine the conceptualization of state strength, (b increase awareness about the effects of different rules of aggregation for achieving differentiation among empirical cases (i.e., countries, and (c provide conceptual tools to help analysts move beyond the classical dichotomy of strong states versus weak states.La literatura especializada ha considerado a la capacidad estatal como unfactor importante para garantizar la viabilidad de diferentesfenómenos políticos y económicos como, por ejemplo, la consolidación democrática, el estado de derecho, la adecuada provisión de bienes públicos y el crecimiento económico. A pesar de la importancia de la capacidad estatal, solo algunos pocos trabajos académicos han explorado sistemáticamente la definición así como las dimensiones constitutivas de este concepto. Este artículo busca (a precisar la conceptualización de capacidad estatal, (b echar luz sobre los efectos que tienen las reglas de agregación a efectos de alcanzar diferenciación entre casos empíricos (e.g., países y (c brindar herramientas conceptuales para superar la clásica dicotomía entre estados débiles y estados fuertes.

  7. Muscle strength and BMI as predictors of major mobility disability in the lifestyle interventions and independence for elders pilot (LIFE-P)

    Science.gov (United States)

    Muscle weakness and obesity are two significant threats to mobility facing the increasing number of older adults. To date, there are no studies that have examined the association of strength and body mass index (BMI) on event rates on a widely used performance measure of major mobility disability. T...

  8. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  9. Facebook in teaching: strengths and weaknesses

    OpenAIRE

    González Ramírez, María Reyes; Gascó Gascó, José Luis; Llopis Taverner, Juan

    2015-01-01

    Purpose – The use of online social networks has experienced a vertiginous increase in the last few years, and young people appear as the key players in this trend. Immersed, educated and raised in the middle of technology, the new student generation is one of digital natives. Instead, lecturers are digital immigrants, but the authors have the responsibility to turn a technology which can be a distraction into a teaching tool. Facebook is an example of Web 2.0 technology that owns a huge poten...

  10. Strengths and Weaknesses: The Impediments of Formalism

    Science.gov (United States)

    Rozycki, Edward G.

    2005-01-01

    We tend to overlook the fact that we judge performances in context. That is why people who are generally competent outside the classroom can appear so inept inside it. "Can you read this text?" is not merely a demand to make some sense of it, but often, in school, to identify plot, character, author intent, or at a minimum, to be ready to recast…

  11. Weak relativity

    CERN Document Server

    Selleri, Franco

    2015-01-01

    Weak Relativity is an equivalent theory to Special Relativity according to Reichenbach’s definition, where the parameter epsilon equals to 0. It formulates a Neo-Lorentzian approach by replacing the Lorentz transformations with a new set named “Inertial Transformations”, thus explaining the Sagnac effect, the twin paradox and the trip from the future to the past in an easy and elegant way. The cosmic microwave background is suggested as a possible privileged reference system. Most importantly, being a theory based on experimental proofs, rather than mutual consensus, it offers a physical description of reality independent of the human observation.

  12. Strength and weakness of tax planning in listed company mergers and acquisitions%上市公司并购纳税筹划的优劣势分析

    Institute of Scientific and Technical Information of China (English)

    李绍萍; 高玮茁

    2013-01-01

      针对上市公司并购纳税问题,采用SWOT方法,分析了上市公司并购过程中的纳税筹划的优势和劣势,提出合理运用税收优惠政策、研究税收政策与会计政策之间的差异、提高企业内部管理人员的素质等策略。研究结果为上市公司并购纳税筹划提供参考。%To address the taxation in listed company mergers and acquisitions, SWOT was adopted to analyze the strength and weakness of tax planning in listed company mergers and acquisitions. Strategies were provided in making reasonable use of tax preferential poli-cies, researching the difference between the tax policy and the accounting policy and im-proving the quality of enterprise managing staff. The results will provide reference for tax planning in listed company mergers and acquisitions.

  13. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  14. Muscle Weakness

    Science.gov (United States)

    Al Kaissi, Ali; Ryabykh, Sergey; Ochirova, Polina; Kenis, Vladimir; Hofstätter, Jochen G.; Grill, Franz; Ganger, Rudolf; Kircher, Susanne Gerit

    2017-01-01

    Marked ligamentous hyperlaxity and muscle weakness/wasting associated with awkward gait are the main deficits confused with the diagnosis of myopathy. Seven children (6 boys and 1 girl with an average age of 8 years) were referred to our department because of diverse forms of skeletal abnormalities. No definitive diagnosis was made, and all underwent a series of sophisticated investigations in other institutes in favor of myopathy. We applied our methodology through the clinical and radiographic phenotypes followed by targeted genotypic confirmation. Three children (2 boys and 1 girl) were compatible with the diagnosis of progressive pseudorheumatoid chondrodysplasia. The genetic mutation was correlated with the WISP 3 gene actively expressed by articular chondrocytes and located on chromosome 6. Klinefelter syndrome was the diagnosis in 2 boys. Karyotyping confirmed 47,XXY (aneuploidy of Klinefelter syndrome). And 2 boys were finally diagnosed with Morquio syndrome (MPS type IV A) as both showed missense mutations in the N-acetylgalactosamine-sulfate sulfatase gene. Misdiagnosis can lead to the initiation of a long list of sophisticated investigations. PMID:28210640

  15. Round table: moderated by Marco Bersanelli and François Bouchet - What next? science objectives and required observations: Objective: Open discussion of what are the strengths and weaknesses of possible future experiments, complementarity, what is our target science for the M5 proposal and what is the best strategy to get it

    CERN Document Server

    CERN. Geneva

    2016-01-01

    Round table: moderated by Marco Bersanelli and François Bouchet - What next? science objectives and required observations: Objective: Open discussion of what are the strengths and weaknesses of possible future experiments, complementarity, what is our target science for the M5 proposal and what is the best strategy to get it

  16. External threat and the definition of deviance.

    Science.gov (United States)

    Laudedale, P; Smith-Cunnien, P; Parker, J; Inverarity, J

    1984-05-01

    Research ( Lauderdale , 1976; Schachter , 1951) suggests that an external threat to a group can lead to the rejection of deviant members of the group and alteration of group communication patterns and solidarity. This study sought to extend those findings, integrate them with concepts from Simmel 's (1917/1955) work on group conflict, and link them to key issues in the societal reaction approach to deviant behavior. We examined the effect of variation in level of threat, the relationship between deviant status and nonconformity to the central task norm, the role of high-status actors in deviance designation, the relationship between rejection and negative definition of the deviant, and the effects of rejection and negative definition on group solidarity. Hypotheses were tested in an experimental design involving three conditions (strong threat, weak threat, and no threat). The results suggest that (a) the level of threat is directly related to the extent of rejection and negative definition, (b) nonconformity to the central task norm is not systematically related to deviant status, (c) high-status actors are more involved in the rejection of the deviant, (d) sociometric rejection of the deviant is accompanied by negative definition in the strong-threat condition, and (e) the level of group solidarity is related to the extent of rejection and negative definition. Implications of these findings are discussed relative to the societal reaction approach to deviant behavior and analogous processes in other social groups.

  17. Modelos de gestión en nutrición clínica: Puntos débiles y puntos fuertes Management models in clinical nutrition: Weaknesses and strengths

    Directory of Open Access Journals (Sweden)

    A. García de Lorenzo

    2009-04-01

    Full Text Available En el VIº Foro de Debate Abbott-SENPE se establece una discusión multidisciplinar y multiprofesional para buscar el o los modelos de gestión clínica que consideramos más adecuados para la Unidades de Nutrición Clínica y Dietética (UNCyD en España. Se valoran los puntos débiles y fuertes así como las oportunidades de los actuales sistemas y se concluye en la observación de una cierta disparidad vinculada no solo a las comunidades autónomas sino también a los diferentes tipos de hospital. Se propone, desde SENPE, la creación de un grupo de trabajo que ayude a la normalización de los modelos y a potenciar la cultura del Cuadro de Mandos Integral y de Gestión del Cambio.At the 6th Abbott-SENPE Debate Forum a multidisciplinary and multiprofessional discussion was established in order to seek for the model or the models of clinical management most appropriate for Clinical Nutrition and Dietetics Units (CNAD in Spain. The weaknesses and strengths as well as opportunities for the current systems were assessed concluding that a certain degree of disparity was observed not only due to regional differences but also to different hospital types. It was proposed, from SENPE, the creation of a working group helping to standardize the models and promote the culture of Integral Control and Change Management.

  18. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc...... of threats, and their mitigation. Another important observation is that the distinction between insiders and outsiders seems to loose significance as IT infrastructure is used in performing insider attacks....

  19. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  20. Strengths and Weakness and Routes of Taiwanese Banking Institutions Entering into China Mainland Market%台湾银行机构进入大陆市场的优劣势及途径分析

    Institute of Scientific and Technical Information of China (English)

    刘嘉芸; 孙启明

    2012-01-01

    Based on the reform of China mainland banking sector and investment trends of Taiwanese banking institutions entering into the mainland financial market, this paper researches the advantages of Taiwanese banks, the obstacles that may be encountered, the measures that need to be taken, and also proposes six ways may be taken by Taiwanese banking institutions. This paper begins with analyzing the demand of China mainland banking reform and reasons for Taiwanese banks willing to enter into China mainland financial market. Through the comparison between China mainland banks and foreign banks, this paper also analyzes the strengths and weaknesses of Taiwanese banking institutions and further discusses strategies and routes which should be taken by Taiwanese banking institutions in order to enter into China mainland efficiently and effectively, including the determination of the target customers, the orientation of the target market, the entry mode and so on.%以目前大陆银行业改革破冰和台湾银行机构来大陆金融市场的投资趋向为背景,分析台湾银行机构进入大陆银行业的优势、进入后可能遇到的阻碍问题、需要采取的应对措施,同时提出台湾银行机构进入大陆银行业的六条途径。从大陆银行业改革的需求和分析台湾银行机构积极进入大陆金融市场的原因分析入手,通过与大陆银行和外资银行的情况进行的对比,分析台湾银行机构进入大陆市场的优势和劣势,进而讨论台湾银行机构高效进入大陆金融新市场所要采取的策略和途径,其中包括目标客户群的确定,目标市场的定位,以及应以怎样的模式进入等。

  1. Fragilidades, fortalezas e desafios na formação do enfermeiro Debilidades, fortalezas y desafíos en la formación del enfermero Weaknesses, strengths and challenges in the nurse's education

    Directory of Open Access Journals (Sweden)

    Jamila Geri Tomaschewski Barlem

    2012-06-01

    undergraduate studies, and identifying aspects in education which contribute for facing the conflicts and dilemmas of the work routine. Data was collected between August and December of 2009, from eight nurses of a public federal hospital in the far south of Brazil, through semi-structured interviews. Thematic analysis was used for data treatment, two emerging categories: weaknesses in the formative process, and strengths in the professional education. It has been realized that finding alternatives to better fulfill the needs of the professional practice is a challenge that requires not only knowledge of the gaps left by undergraduate studies, but also ways of consolidating the strengths present in the education process.

  2. Alternative Threat Methodology

    Directory of Open Access Journals (Sweden)

    Charles B. King III

    2011-01-01

    Full Text Available Of the many challenges facing risk analysis practitioners, perhaps the most difficult to overcome is in the field of terrorist threat analysis. When estimating the threat associated with naturally occurring events, historical data provides a great deal of insight into the frequency of those events. Threat associated with accidents applies many operations research tools to gauge future failure-rates (Failure Mode and Effects Analysis being perhaps the most widely known. However, estimating the probability of an individual's or group's attacking a specific (or even a generic target is an element of risk analysis in which art and intuition are applied far more regularly than is science.

  3. Weak Galois and Weak Cocleft Coextensions

    Institute of Scientific and Technical Information of China (English)

    J.N. Alonso (A)lvarez; J.M. Fernández Vilaboa; R. González Rodríguez; A.B. Rodríguez Raposo

    2007-01-01

    For a weak entwining structure (A, C,ψ) living in a braided monoidal category with equalizers and coequalizers, we formulate the notion of weak A-Galois coextension with normal basis and we show that these Galois coextensions are equivalent to the weak A-cocleft coextensions introduced by the authors.

  4. Spin effects in the weak interaction

    Energy Technology Data Exchange (ETDEWEB)

    Freedman, S.J. (Argonne National Lab., IL (USA) Chicago Univ., IL (USA). Dept. of Physics Chicago Univ., IL (USA). Enrico Fermi Inst.)

    1990-01-01

    Modern experiments investigating the beta decay of the neutron and light nuclei are still providing important constraints on the theory of the weak interaction. Beta decay experiments are yielding more precise values for allowed and induced weak coupling constants and putting constraints on possible extensions to the standard electroweak model. Here we emphasize the implications of recent experiments to pin down the strengths of the weak vector and axial vector couplings of the nucleon.

  5. Dissolution Threats and Legislative Bargaining

    DEFF Research Database (Denmark)

    Becher, Michael; Christiansen, Flemming Juul

    2015-01-01

    Chief executives in many parliamentary democracies have the power to dissolve the legislature. Despite a well-developed literature on the endogenous timing of parliamentary elections, political scientists know remarkably little about the strategic use of dissolution power to influence policymaking....... To address this gap, we propose and empirically evaluate a theoretical model of legislative bargaining in the shadow of executive dissolution power. The model implies that the chief executive's public support and legislative strength, as well as the time until the next constitutionally mandated election......, are important determinants of the use and effectiveness of dissolution threats in policymaking. Analyzing an original time-series data set from a multiparty parliamentary democracy, we find evidence in line with key empirical implications of the model....

  6. Combatting Insider Threats

    Science.gov (United States)

    Neumann, Peter G.

    Risks from insider threats are strongly context dependent, and arise in many ways at different layers of system abstraction for different types of systems. We discuss various basic characteristics of insider threats, and consider approaches to the development and use of computer-related environments that require systems and networking to be trustworthy in spite of insider misuse. We also consider future research that could improve both detectability, prevention, and response. This chapter seeks to cope with insider misuse in a broad range of application domains - for example, critical infrastructures, privacy-preserving database systems, financial systems, and interoperable health-care infrastructures. To illustrate this, we apply the principles considered here to the task of detecting and preventing insider misuse in systems that might be used to facilitate trustworthy elections. This discussion includes an examination of the relevance of the Saltzer-Schroeder-Kaashoek security principles and the Clark-Wilson integrity properties for end-to-end election integrity. Trustworthy system developments must consider insider misuse as merely one set of threats that must be addressed consistently together with many other threats such as penetrations, denials of service, system faults and failures, and other threats to survivability. In addition, insider misuse cannot be realistically addressed unless significant improvements are made in the trustworthiness of component systems and their networking as well as their predictably trustworthy compositions into enterprise solutions - architecturally, developmentally, and operationally.

  7. On Weak Regular *-semigroups

    Institute of Scientific and Technical Information of China (English)

    Yong Hua LI; Hai Bin KAN; Bing Jun YU

    2004-01-01

    In this paper, a special kind of partial algebras called projective partial groupoids is defined.It is proved that the inverse image of all projections of a fundamental weak regular *-semigroup under the homomorphism induced by the maximum idempotent-separating congruence of a weak regular *-semigroup has a projective partial groupoid structure. Moreover, a weak regular *-product which connects a fundamental weak regular *-semigroup with corresponding projective partial groupoid is defined and characterized. It is finally proved that every weak regular *-product is in fact a weak regular *-semigroup and any weak regular *-semigroup is constructed in this way.

  8. A weak balance: the contribution of muscle weakness to postural instability and falls.

    NARCIS (Netherlands)

    Horlings, C.G.; Engelen, B.G.M. van; Allum, J.H.; Bloem, B.R.

    2008-01-01

    Muscle strength is a potentially important factor contributing to postural control. In this article, we consider the influence of muscle weakness on postural instability and falling. We searched the literature for research evaluating muscle weakness as a risk factor for falls in community-dwelling e

  9. Aspects of Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter;

    2010-01-01

    The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the ins...

  10. Cyber Intelligence Threat Prioritization

    Science.gov (United States)

    2014-10-01

    possible direction of their behavior. and determines their interest in targeting the organization. t Intrinsic (personally rewarding ) Extrinsic (receive...external reward or avoid punishment) Software Engineering Institute I Cm·nt·git• .\\lellon Lnin·r·sity Targeted Data Understanding what a threat

  11. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    on to discuss a number of approaches from the technological, the sociological, and the socio-technical domain. We draw two main conclusions. Tackling insider threats requires a combination of techniques from the technical, the sociological, and the socio-technical domain, to enable qualified detection...

  12. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  13. Cofinitely weak supplemented modules

    OpenAIRE

    Alizade, Rafail; Büyükaşık, Engin

    2003-01-01

    We prove that a module M is cofinitely weak supplemented or briefly cws (i.e., every submodule N of M with M/N finitely generated, has a weak supplement) if and only if every maximal submodule has a weak supplement. If M is a cws-module then every M-generated module is a cws-module. Every module is cws if and only if the ring is semilocal. We study also modules, whose finitely generated submodules have weak supplements.

  14. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  15. GENERALIZED WEAK FUNCTIONS

    Institute of Scientific and Technical Information of China (English)

    丁夏畦; 罗佩珠

    2004-01-01

    In this paper the authors introduce some new ideas on generalized numbers and generalized weak functions. They prove that the product of any two weak functions is a generalized weak function. So in particular they solve the problem of the multiplication of two generalized functions.

  16. Threat in dreams: an adaptation?

    Science.gov (United States)

    Malcolm-Smith, Susan; Solms, Mark; Turnbull, Oliver; Tredoux, Colin

    2008-12-01

    Revonsuo's influential Threat Simulation Theory (TST) predicts that people exposed to survival threats will have more threat dreams, and evince enhanced responses to dream threats, compared to those living in relatively safe conditions. Participants in a high crime area (South Africa: n=208) differed significantly from participants in a low crime area (Wales, UK: n=116) in having greater recent exposure to a life-threatening event (chi([1,N=186])(2)=14.84, pdreams (chi([1,N=287])(2)=6.11, pdream threats (Fisher's Exact test, p=.2478). Overall, the incidence of threat in dreams was extremely low-less than 20% of dreams featured realistic survival threats. Escape from dream threats occurred in less than 2% of dreams. We conclude that this evidence contradicts key aspects of TST.

  17. Nuclear Threats and Security

    OpenAIRE

    Garry Jacobs; Winston P. Nagan

    2012-01-01

    This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legalit...

  18. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  19. Bluetooth Threat Taxonomy

    OpenAIRE

    Dunning, John Paul

    2010-01-01

    Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides ...

  20. [Counterfeit medicines: a growing threat].

    Science.gov (United States)

    Barbereau, S

    2006-12-01

    The medical drug market has undergone considerable transformation in recent years. Like other products, medicines have been affected by globalization. Free trade policies have had a number of negative effects including a reduction in quality control not only for some products but also for raw materials and finished products. The global environment has also created conditions conducive to counterfeit medicines. The term counterfeit medicine is defined differently from one country to another in terms of quality, legality and fraudulent intent. This situation prompted the WHO to propose the following definition: "A counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Counterfeiting can apply to both branded and generic products and counterfeit products may include products with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." Weak pharmaceutical regulation often compounded by widespread corruption in developing countries has greatly facilitated the development of this illicit market with harmful and costly effects on public health. Due to the lack of pharmocovigilance accidents involving use of counterfeit drugs go unreported. For this reason it is not possible to measure the economic impact. While counterfeiting has become a major threat in developing countries, it also affects industrialized countries. Fraudulent behavior occurs all over the world.

  1. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  2. Analysing non-malicious threats to urban smart grids by interrelating threats and threat taxonomies

    NARCIS (Netherlands)

    Vasenev, Alexandr; Montoya, L.

    2016-01-01

    A comprehensive study of the smart grid threat landscape is important for designing resilient urban grids of the future. To this end, an analysis could first cross reference threat categorizations and interrelate treat events on the basis of threat lists that complement each other. This paper show

  3. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  4. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  5. Otters Increasing - Threats Increasing

    Directory of Open Access Journals (Sweden)

    Andreas Kranz

    1994-10-01

    Full Text Available In some parts of Central Europe populations of otters are apparently increasing. Until recently, no research was being conducted on the ecology of otters in mainly artificial habitats like fish farms. Otters are not only a new source of conflict requiring species management, but appear once again threatened by illegal hunting. Austria is dealing with this problem using compensation for otter damage, electric fencing and translocation of problem otters. Despite a rise in illegal killing, Austria does not formally recognise this as a threat.

  6. On Weakly Semicommutative Rings*

    Institute of Scientific and Technical Information of China (English)

    CHEN WEI-XING; CUI SHU-YING

    2011-01-01

    A ring R is said to be weakly scmicommutative if for any a, b ∈ R,ab = 0 implies aRb C_ Nil(R), where Nil(R) is the set of all nilpotcnt elements in R.In this note, we clarify the relationship between weakly semicommutative rings and NI-rings by proving that the notion of a weakly semicommutative ring is a proper generalization of NI-rings. We say that a ring R is weakly 2-primal if the set of nilpotent elements in R coincides with its Levitzki radical, and prove that if R is a weakly 2-primal ring which satisfies oα-condition for an endomorphism α of R (that is, ab = 0 (←→) aα(b) = 0 where a, b ∈ R) then the skew polynomial ring R[π; αα]is a weakly 2-primal ring, and that if R is a ring and I is an ideal of R such that I and R/I are both weakly semicommutative then R is weakly semicommutative.Those extend the main results of Liang et al. 2007 (Taiwanese J. Math., 11(5)(2007),1359-1368) considerably. Moreover, several new results about weakly semicommutative rings and NI-rings are included.

  7. Many-body chaos at weak coupling

    Science.gov (United States)

    Stanford, Douglas

    2016-10-01

    The strength of chaos in large N quantum systems can be quantified using λ L , the rate of growth of certain out-of-time-order four point functions. We calculate λ L to leading order in a weakly coupled matrix Φ4 theory by numerically diagonalizing a ladder kernel. The computation reduces to an essentially classical problem.

  8. Experimental noiseless linear amplification using weak measurements

    Science.gov (United States)

    Ho, Joseph; Boston, Allen; Palsson, Matthew; Pryde, Geoff

    2016-09-01

    The viability of quantum communication schemes rely on sending quantum states of light over long distances. However, transmission loss can degrade the signal strength, adding noise. Heralded noiseless amplification of a quantum signal can provide a solution by enabling longer direct transmission distances and by enabling entanglement distillation. The central idea of heralded noiseless amplification—a conditional modification of the probability distribution over photon number of an optical quantum state—is suggestive of a parallel with weak measurement: in a weak measurement, learning partial information about an observable leads to a conditional back-action of a commensurate size. Here we experimentally investigate the application of weak, or variable-strength, measurements to the task of heralded amplification, by using a quantum logic gate to weakly couple a small single-optical-mode quantum state (the signal) to an ancilla photon (the meter). The weak measurement is carried out by choosing the measurement basis of the meter photon and, by conditioning on the meter outcomes, the signal is amplified. We characterise the gain of the amplifier as a function of the measurement strength, and use interferometric methods to show that the operation preserves the coherence of the signal.

  9. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  10. Idiopathic isolated orbicularis weakness

    Science.gov (United States)

    MacVie, O P; Majid, M A; Husssin, H M; Ung, T; Manners, R M; Ormerod, I; Pawade, J; Harrad, R A

    2012-01-01

    Purpose Orbicularis weakness is commonly associated with seventh nerve palsy or neuromuscular and myopathic conditions such as myotonic dystrophy and myasethenia gravis. We report four cases of idiopathic isolated orbicularis weakness. Methods All four cases were female and the presenting symptoms of ocular irritation and epiphora had been present for over 7 years in three patients. All patients had lagophthalmos and three had ectropion. Three patients underwent full investigations which excluded known causes of orbicularis weakness. Two patients underwent oribularis oculi muscle biopsy and histological confirmation of orbicularis atrophy. Results All patients underwent surgery to specifically address the orbicularis weakness with satisfactory outcomes and alleviation of symptoms in all cases. Isolated orbicularis weakness may be a relatively common entity that is frequently overlooked. Conclusion Early recognition of this condition may lead to better management and prevent patients undergoing unnecessary surgical procedures. PMID:22322997

  11. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  12. Moving threat : Attention and distance change interact in threat responding

    NARCIS (Netherlands)

    Arnaudova, I.; Krypotos, A.-M.; Effting, M.; Kindt, M.; Beckers, T.

    2017-01-01

    Defensive reactions need to be quick and appropriate to ensure survival. Thus, it is crucial that threats trigger immediate action upon detection, even in the absence of awareness. In addition, the form of such action should be appropriate to the imminence of the threat. Thus, attention should be

  13. Weak decays. [Lectures, phenomenology

    Energy Technology Data Exchange (ETDEWEB)

    Wojcicki, S.

    1978-11-01

    Lectures are given on weak decays from a phenomenological point of view, emphasizing new results and ideas and the relation of recent results to the new standard theoretical model. The general framework within which the weak decay is viewed and relevant fundamental questions, weak decays of noncharmed hadrons, decays of muons and the tau, and the decays of charmed particles are covered. Limitation is made to the discussion of those topics that either have received recent experimental attention or are relevant to the new physics. (JFP) 178 references

  14. Weakly asymptotically hyperbolic manifolds

    CERN Document Server

    Allen, Paul T; Lee, John M; Allen, Iva Stavrov

    2015-01-01

    We introduce a class of "weakly asymptotically hyperbolic" geometries whose sectional curvatures tend to $-1$ and are $C^0$, but are not necessarily $C^1$, conformally compact. We subsequently investigate the rate at which curvature invariants decay at infinity, identifying a conformally invariant tensor which serves as an obstruction to "higher order decay" of the Riemann curvature operator. Finally, we establish Fredholm results for geometric elliptic operators, extending the work of Rafe Mazzeo and John M. Lee to this setting. As an application, we show that any weakly asymptotically hyperbolic metric is conformally related to a weakly asymptotically hyperbolic metric of constant negative curvature.

  15. Weak layer fracture: facets and depth hoar

    Directory of Open Access Journals (Sweden)

    I. Reiweger

    2013-05-01

    Full Text Available Understanding the fracture behavior of weak snow layers is essential for modeling and predicting dry-snow slab avalanches. We therefore performed laboratory experiments with snow samples containing a weak layer consisting of either faceted crystals or depth hoar. During these experiments the samples were loaded with different loading rates and at various tilt angles until fracture. The strength of the samples decreased with increasing loading rate and increasing tilt angle. Additionally, we took pictures of the side of the samples with a high-speed video camera and calculated the displacement using a particle image velocimetry (PIV algorithm. The fracture process within the weak layer could thus be studied in detail. We found a fracture in shear immediately followed by a collapse of the weak layer.

  16. Character strengths and virtues

    OpenAIRE

    2015-01-01

    The target of this work is to carry out a critical analysis about some of the underlying epistemological assumptions in Peterson and Seligman’s book Character Strengths and Virtues. A handbook and classifications (2004). This is a theoretical investigation that belongs to the epistemology of psychology field. According to the theory proposed by Serroni Copello (2003), a critic progress rational criterion is methodologically applied. The analysis points out some epistemological weakness that l...

  17. Strange Weak Values

    CERN Document Server

    Hosoya, Akio

    2010-01-01

    We develop a formal theory of the weak values with emphasis on the consistency conditions and a probabilistic interpretation in the counter-factual processes. We present the condition for the choice of the post-selected state to give a negative weak value of a given projection operator and strange values of an observable in general. The general framework is applied to Hardy's paradox and the spin $1/2$ system to explicitly address the issues of counter-factuality and strange weak values. The counter-factual arguments which characterize the paradox specifies the pre-selected state and a complete set of the post-selected states clarifies how the strange weak values emerge.

  18. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  19. Communication issues during bomb threats.

    Science.gov (United States)

    Kuebler, S A

    How should healthcare security professionals handle a bomb threat? How can a large complex best be searched? The author discusses why he believes the judicial use of radios and cellular phones during emergencies can enhance security's ability to handle bomb threat situations, and offers guidelines to follow.

  20. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  2. Quantum-memory-assisted entropic uncertainty relations under weak measurements

    Science.gov (United States)

    Li, Lei; Wang, Qing-Wen; Shen, Shu-Qian; Li, Ming

    2017-08-01

    We investigate quantum-memory-assisted entropic uncertainty relations (EURs) based on weak measurements. It is shown that the lower bound of EUR revealed by weak measurements is always larger than that revealed by the corresponding projective measurements. A series of lower bounds of EUR under both weak measurements and projective measurements are presented. Interestingly, the quantum-memory-assisted EUR based on weak measurements is a monotonically decreasing function of the strength parameter. Furthermore, some information-theoretic inequalities associated with weak measurements are also derived.

  3. Muscle strength in myasthenia gravis

    DEFF Research Database (Denmark)

    Cejvanovic, S; Vissing, J

    2014-01-01

    OBJECTIVE: Myasthenia gravis (MG) is characterized by fatigue and fluctuating muscle weakness as a result of impaired neuromuscular transmission (NMT). Although MG is a prototypic fatiguing disorder, little is known about how the condition affects fixed weakness, and if present, whether weakness...... is related to disease duration or gender. The aim of this study was to quantify the strength of patients with MG and investigate whether it is related to disease duration. METHODS: Eight muscle groups were tested by manual muscle testing and with a hand-held dynamometer in 38 patients with generalized MG...... and 37 healthy age- and gender-matched controls. The disease duration was recorded and compared with strength measures. RESULTS: On average, muscle strength was decreased by 28% compared with controls (Pmuscle...

  4. Stereotype Threat as Validity Threat: The Anxiety-Sex-Threat Interaction

    Science.gov (United States)

    Delgado, Ana R.; Prieto, Gerardo

    2008-01-01

    Stereotype threat has been invoked to explain underperformance on a variety of groups for whom the stereotypes allege inferior cognitive abilities. In math testing, stereotype threat has been used to explain sex differences in test performance. This paper describes an experimental study on a large sample (n = 313), in which the role of anxiety and…

  5. Coherence for weak units

    CERN Document Server

    Joyal, André

    2009-01-01

    We define weak units in a semi-monoidal 2-category $\\CC$ as cancellable pseudo-idempotents: they are pairs $(I,\\alpha)$ where $I$ is an object such that tensoring with $I$ from either side constitutes a biequivalence of $\\CC$, and $\\alpha: I \\tensor I \\to I$ is an equivalence in $\\CC$. We show that this notion of weak unit has coherence built in: Theorem A: $\\alpha$ has a canonical associator 2-cell, which automatically satisfies the pentagon equation. Theorem B: every morphism of weak units is automatically compatible with those associators. Theorem C: the 2-category of weak units is contractible if non-empty. Finally we show (Theorem E) that the notion of weak unit is equivalent to the notion obtained from the definition of tricategory: $\\alpha$ alone induces the whole family of left and right maps (indexed by the objects), as well as the whole family of Kelly 2-cells (one for each pair of objects), satisfying the relevant coherence axioms.

  6. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  7. Attentional bias to threat: a perceptual accuracy approach.

    Science.gov (United States)

    Van Damme, Stefaan; Crombez, Geert; Notebaert, Lies

    2008-12-01

    To investigate attentional bias to threatening information, the authors propose a new version of the spatial cueing paradigm in which the focus is on perceptual accuracy instead of response speed. In two experiments, healthy volunteers made unspeeded discriminations between three visual targets presented left or right. Each target was preceded by a visual cue (colored rectangle) at either the same (valid) or opposite (invalid) location. By means of differential classical conditioning with aversive white noise, a threat cue and a control cue were created. Analyses of error rates showed that cueing effects (lower proportion of errors in valid trials relative to invalid trials) were more pronounced in threat trials than in neutral trials. This threat-related bias was particularly because of threat cues reducing accuracy in invalid trials, indicating difficulty disengaging attention from threatening information. Engagement of attention was not affected by threat, as threat cues did not facilitate the processing of targets in valid trials. The findings are discussed in light of the strengths and limitations of spatial cueing tasks.

  8. Global Threats to Child Safety.

    Science.gov (United States)

    Mace, Sharon E

    2016-02-01

    Children have rights, as enumerated in the Declaration of the Rights of the Child, and need protection from violence, exploitation, and abuse. Global threats to child safety exist. These threats include lack of basic needs (food, clean water, sanitation), maltreatment, abandonment, child labor, child marriage, female genital mutilation, child trafficking, disasters, and armed conflicts/wars. Recent disasters and armed conflicts have led to a record number of displaced people especially children and their families. Strategies and specific programs can be developed and implemented for eliminating threats to the safety of children.

  9. Strength and weakness of the totalitarianism in Wartime Soviet Union

    OpenAIRE

    Suprun, Mikhail

    2015-01-01

    Unlike all other countries of the Barents Area, Russia found itself in a very specific situation. At the beginning of the war it entered into the alliance with the Axis, while from 1941 it continued the war in the Anti-Hitler coalition. But the main distinctive feature of the wartime Russia was the transformation of its policy. Not a single state in the world history had reached such a degree of centralization as the Soviet Union did during the Second World War. Along with an extremely high d...

  10. Weaknesses, strengths and needs in fertility care according to patients.

    NARCIS (Netherlands)

    Empel, I.W.H. van; Nelen, W.L.D.M.; Tepe, E.T.; Laarhoven, E.A. van; Verhaak, C.M.; Kremer, J.A.M.

    2010-01-01

    BACKGROUND: The patients' role in assessing health care quality is increasingly recognized. Measuring patients' specific experiences and needs generates concrete information for care improvement, whereas satisfaction surveys only give an overoptimistic, undifferentiating picture. Therefore, this stu

  11. Metformin in patients with chronic kidney disease: strengths and weaknesses.

    Science.gov (United States)

    Rocha, Ana; Almeida, Marta; Santos, Josefina; Carvalho, André

    2013-01-01

    A wide array of benefits has been attributed to metformin. These include attenuation of abnormal glucose metabolism (diabetes treatment and prevention), weight neutrality or weight loss, improvement in the pathophysiologic components of metabolic syndrome (insulin resistance, subclinical inflammation, and endothelial dysfunction), lipid-lowering properties, cardiovascular protection, and antineoplastic potential. Metformin itself is not a nephrotoxic drug. Initially appointed as the safest hypoglycemic agent in chronic kidney disease, its use has been limited in these patients because of the perceived risk of lactic acidosis. A fear perpetuated by numerous case reports in which it is implicated. Current guidelines stipulate that it must be used with caution in estimated glomerular filtration rates (eGFRs) of less than 60 mL/minute and not at all in eGFRs of less than 30 mL/minute. Identified risk factors for metformin-associated lactic acidosis include acute kidney injury, hypoxemia, sepsis, alcohol abuse, liver failure, myocardial infarction, and shock. Treatment may include supportive care and dialysis techniques. On the other hand, it is likely that the use of metformin would be beneficial in many with chronic kidney disease according to the advantages associated with attenuation of metabolic syndrome and cardiovascular protection. The reality of severe metformin-induced lactic acidosis in the absence of chronic renal impairment raises the question of limitation of its use in these patients.

  12. Strengths and weaknesses of common sustainability indices for multidimensional systems.

    Science.gov (United States)

    Mayer, Audrey L

    2008-02-01

    Sustainability is rapidly moving from an abstract concept to a measurable state of dynamic human-ecological systems. The large number of economic, social, and environmental indicators currently available provides an unwieldy view of system sustainability. To aid policy decisions, these indicators are therefore either presented in the context of a conceptual framework, or quantitatively aggregated into indices. Due to the quantitative nature of sustainability indices, their results may be given more weight by scientists and policy-makers. However, policy decisions can be ineffective or even counterproductive if they do not consider factors which influence index behavior: the scale of the available data and choice of system boundaries; the inclusion, transformation, and weighting of indicator data; and the aggregation method used. As previous reviews have demonstrated, sustainability indices do not rank countries consistently, even when using some of the same indicator data. Several improvements would increase the utility of sustainability indices for policy decisions, particularly the identification of biases introduced by the index methodology and data inclusion. The discrepancy of current sustainability indices due to theoretical or methodological differences supports the use of several complementary indices.

  13. Sleep maintenance insomnia: strengths and weaknesses of current pharmacologic therapies.

    Science.gov (United States)

    Rosenberg, Russell P

    2006-01-01

    Although insomnia is highly prevalent, sleep disturbances often go unrecognized and untreated. When insomnia is recognized, considerable emphasis has been placed on improving sleep onset; however, there is growing evidence that improving sleep maintenance is an equally important treatment goal. A MEDLINE literature search was performed using the search parameters "insomnia," "zolpidem," "zaleplon," "flurazepam," "estazolam," "quazepam," "triazolam," and "temazepam," as these agents are FDA-approved for the treatment of insomnia. Per reviewer comments, the search criteria was later expanded to include lorazepam. A literature search using the terms "trazodone" and "insomnia" was also performed, as this is the second-most commonly prescribed agent for treating insomnia. Sleep efficacy endpoints from randomized, placebo-controlled clinical trials in adult populations and key review articles published between 1975 and 2004 were included in this review. As only one randomized placebo-controlled trial evaluated trazodone use in primary insomnia, the trazodone search was expanded to include all clinical trials that evaluated trazodone use in insomnia. Relevant texts and other articles that evaluated side effect profiles of these agents were also included, one of which was published in January of 2005. In all publications, impact of treatment on sleep maintenance parameters (wake time after sleep onset, number of awakenings) and measures of next-day functioning were evaluated, in addition to sleep onset parameters (sleep latency, time to sleep onset/induction) and sleep duration data (total sleep time). Many of the currently available agents used to treat insomnia, including the antidepressant trazodone, the non-benzodiazepine hypnotics zolpidem and zaleplon, and some of the benzodiazepines, have not consistently demonstrated effectiveness in promoting sleep maintenance. Furthermore, the benzodiazepines with established sleep maintenance efficacy are associated with next-day sedation, the risk of tolerance and dependence, or both. New agents that offer relief of sleep maintenance insomnia without residual next day impairment while improving next day function are needed. Several compounds currently under development may offer clinicians a more effective and safer treatment for this common disorder.

  14. The Strength of Varying Tie Strength

    CERN Document Server

    Bruggeman, Jeroen

    2012-01-01

    "The Strength of Weak Ties" argument (Granovetter 1973) says that the most valuable information is best collected through bridging ties with other social circles than one's own, and that those ties tend to be weak. Aral and Van Alstyne (2011) added that to access complex information, actors need strong ties ("high bandwidth") instead. These insights I generalize by pointing at actors' interest to avoid spending large resources on low value information. Weak ties are well-suited for relatively simple information at low transmission and tie maintenance costs, whereas for complex information, the best outcomes are expected for those actors who vary their bandwidths along with the value of information accessed. To support my claim I use all patents in the USA (two million) over the period 1975-1999. I also show that in rationalized fields, such as technology, bandwidth correlates highly with the value of information, which provides support for using this proxy if value can't be measured directly. Finally, I show ...

  15. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  16. WEAK CONVERGENCE OF SOME SERIES

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This paper continues the study of [1] on weak functions.The weak convergence theory is investigated in complex analysis,Fourier transform and Mellin transform.A Mobius inverse formula of weak functions is obtained.

  17. Supply Chain Risk Management: An Introduction to the Credible Threat

    Science.gov (United States)

    2016-08-01

    instantaneously. While all this advanced communications technology constitutes one of the greatest things about living in a technologically advanced world, it...also exposes us to one of the biggest threats. How can we be sure that any and all of these devices were made to strict manufac­ turing standards...distributors and the weaknesses in their testing regime for electronic parts creates unacceptable risks and vulnerabilities. The defense industry

  18. On Weak Markov's Principle

    DEFF Research Database (Denmark)

    Kohlenbach, Ulrich Wilhelm

    2002-01-01

    We show that the so-called weak Markov's principle (WMP) which states that every pseudo-positive real number is positive is underivable in E-HA + AC. Since allows one to formalize (atl eastl arge parts of) Bishop's constructive mathematics, this makes it unlikely that WMP can be proved within the...

  19. On closed weak supplemented modules

    Institute of Scientific and Technical Information of China (English)

    ZENG Qing-yi; SHI Mei-hua

    2006-01-01

    A module M is called closed weak supplemented if for any closed submodule N of M, there is a submodule K of M such that M=K+N and K(c)N<<M. Any direct summand of closed weak supplemented module is also closed weak supplemented.Any nonsingular image of closed weak supplemented module is closed weak supplemented. Nonsingular V-rings in which all nonsingular modules are closed weak supplemented are characterized in Section 4.

  20. Weak layer fracture: facets and depth hoar

    Directory of Open Access Journals (Sweden)

    I. Reiweger

    2013-09-01

    Full Text Available Understanding failure initiation within weak snow layers is essential for modeling and predicting dry-snow slab avalanches. We therefore performed laboratory experiments with snow samples containing a weak layer consisting of either faceted crystals or depth hoar. During these experiments the samples were loaded with different loading rates and at various tilt angles until fracture. The strength of the samples decreased with increasing loading rate and increasing tilt angle. Additionally, we took pictures of the side of four samples with a high-speed video camera and calculated the displacement using a particle image velocimetry (PIV algorithm. The fracture process within the weak layer could thus be observed in detail. Catastrophic failure started due to a shear fracture just above the interface between the depth hoar layer and the underlying crust.

  1. Near Earth Asteroid Characterization for Threat Assessment

    Science.gov (United States)

    Dotson, Jessie; Mathias, Donovan; Wheeler, Lorien; Wooden, Diane; Bryson, Kathryn; Ostrowski, Daniel

    2017-01-01

    Physical characteristics of NEAs are an essential input to modeling behavior during atmospheric entry and to assess the risk of impact but determining these properties requires a non-trivial investment of time and resources. The characteristics relevant to these models include size, density, strength and ablation coefficient. Some of these characteristics cannot be directly measured, but rather must be inferred from related measurements of asteroids and/or meteorites. Furthermore, for the majority of NEAs, only the basic measurements exist so often properties must be inferred from statistics of the population of more completely characterized objects. The Asteroid Threat Assessment Project at NASA Ames Research Center has developed a probabilistic asteroid impact risk (PAIR) model in order to assess the risk of asteroid impact. Our PAIR model and its use to develop probability distributions of impact risk are discussed in other contributions to PDC 2017 (e.g., Mathias et al.). Here we utilize PAIR to investigate which NEA characteristics are important for assessing the impact threat by investigating how changes in these characteristics alter the damage predicted by PAIR. We will also provide an assessment of the current state of knowledge of the NEA characteristics of importance for asteroid threat assessment. The relative importance of different properties as identified using PAIR will be combined with our assessment of the current state of knowledge to identify potential high impact investigations. In addition, we will discuss an ongoing effort to collate the existing measurements of NEA properties of interest to the planetary defense community into a readily accessible database.

  2. Strength Training

    Science.gov (United States)

    ... strengthens your heart and lungs. When you strength train with weights, you're using your muscles to ... see there are lots of different ways to train with weights. Try a few good basic routines ...

  3. Strength Training

    Science.gov (United States)

    ... en español Entrenamiento de la fuerza muscular Strength training is a vital part of a balanced exercise routine that includes aerobic activity and flexibility exercises. Regular aerobic exercise, such as running or ...

  4. Weak Polarized Electron Scattering

    CERN Document Server

    Erler, Jens; Mantry, Sonny; Souder, Paul A

    2014-01-01

    Scattering polarized electrons provides an important probe of the weak interactions. Precisely measuring the parity-violating left-right cross section asymmetry is the goal of a number of experiments recently completed or in progress. The experiments are challenging, since A_{LR} is small, typically between 10^(-4) and 10^(-8). By carefully choosing appropriate targets and kinematics, various pieces of the weak Lagrangian can be isolated, providing a search for physics beyond the Standard Model. For other choices, unique features of the strong interaction are studied, including the radius of the neutron density in heavy nuclei, charge symmetry violation, and higher twist terms. This article reviews the theory behind the experiments, as well as the general techniques used in the experimental program.

  5. Composite weak bosons

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, M.

    1988-04-01

    Dynamical mechanism of composite W and Z is studied in a 1/N field theory model with four-fermion interactions in which global weak SU(2) symmetry is broken explicitly by electromagnetic interaction. Issues involved in such a model are discussed in detail. Deviation from gauge coupling due to compositeness and higher order loop corrections are examined to show that this class of models are consistent not only theoretically but also experimentally.

  6. Threat image projection in CCTV

    Science.gov (United States)

    Neil, David; Thomas, Nicola; Baker, Bob

    2007-10-01

    Operators are key components in a Closed Circuit Television (CCTV) system, being the link between the system technology and its effective use. Operators' performance will largely determine the level of service provided by the system. There have been few studies testing operator performance, while much work has been done to test the performance of the technology. Previous work on CCTV operator performance carried out by the Home Office Scientific Development Branch (HOSDB) has used filmed video and subjects who knew they were undergoing testing, meaning subjects are likely to be concentrating harder on performing well. HOSDB believes that there is a need for a test that would be able to be routinely used in a CCTV control room throughout the course of a normal shift to provide management with operational performance data. Threat Image Projection (TIP) is routinely used in X-Ray baggage scanners to keep operators alert to possible threats. At random intervals, a threat target image is superimposed over the image of the baggage being screened. The operator then responds to this threat. A similar system could be used for CCTV operators. A threat image would be randomly superimposed over the live CCTV feed and the operator would be expected to respond to this.

  7. The Weak Haagerup Property II

    DEFF Research Database (Denmark)

    Haagerup, Uffe; Knudby, Søren

    2015-01-01

    The weak Haagerup property for locally compact groups and the weak Haagerup constant were recently introduced by the second author [27]. The weak Haagerup property is weaker than both weak amenability introduced by Cowling and the first author [9] and the Haagerup property introduced by Connes [6......] and Choda [5]. In this paper, it is shown that a connected simple Lie group G has the weak Haagerup property if and only if the real rank of G is zero or one. Hence for connected simple Lie groups the weak Haagerup property coincides with weak amenability. Moreover, it turns out that for connected simple...... Lie groups the weak Haagerup constant coincides with the weak amenability constant, although this is not true for locally compact groups in general. It is also shown that the semidirect product R2 × SL(2,R) does not have the weak Haagerup property....

  8. Weak martingale Hardy spaces and weak atomic decompositions

    Institute of Scientific and Technical Information of China (English)

    HOU; Youliang; REN; Yanbo

    2006-01-01

    In this paper we define some weak martingale Hardy spaces and three kinds of weak atoms. They are the counterparts of martingale Hardy spaces and atoms in the classical martingale Hp-theory. And then three atomic decomposition theorems for martingales in weak martingale Hardy spaces are proved. With the help of the weak atomic decompositions of martingale, a sufficient condition for a sublinear operator defined on the weak martingale Hardy spaces to be bounded is given. Using the sufficient condition, we obtain a series of martingale inequalities with respect to the weak Lp-norm, the inequalities of weak (p ,p)-type and some continuous imbedding relationships between various weak martingale Hardy spaces. These inequalities are the weak versions of the basic inequalities in the classical martingale Hp-theory.

  9. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  10. Inversion assuming weak scattering

    DEFF Research Database (Denmark)

    Xenaki, Angeliki; Gerstoft, Peter; Mosegaard, Klaus

    2013-01-01

    The study of weak scattering from inhomogeneous media or interface roughness has long been of interest in sonar applications. In an acoustic backscattering model of a stationary field of volume inhomogeneities, a stochastic description of the field is more useful than a deterministic description...... due to the complex nature of the field. A method based on linear inversion is employed to infer information about the statistical properties of the scattering field from the obtained cross-spectral matrix. A synthetic example based on an active high-frequency sonar demonstrates that the proposed...

  11. The Weak Neutral Current

    CERN Document Server

    Erler, Jens

    2013-01-01

    This is a review of electroweak precision physics with particular emphasis on low-energy precision measurements in the neutral current sector of the electroweak theory and includes future experimental prospects and the theoretical challenges one faces to interpret these observables. Within the minimal Standard Model they serve as determinations of the weak mixing angle which are competitive with and complementary to those obtained near the Z-resonance. In the context of new physics beyond the Standard Model these measurements are crucial to discriminate between models and to reduce the allowed parameter space within a given model. We illustrate this for the minimal supersymmetric Standard Model with or without R-parity.

  12. Measurement of weak radioactivity

    CERN Document Server

    Theodorsson , P

    1996-01-01

    This book is intended for scientists engaged in the measurement of weak alpha, beta, and gamma active samples; in health physics, environmental control, nuclear geophysics, tracer work, radiocarbon dating etc. It describes the underlying principles of radiation measurement and the detectors used. It also covers the sources of background, analyzes their effect on the detector and discusses economic ways to reduce the background. The most important types of low-level counting systems and the measurement of some of the more important radioisotopes are described here. In cases where more than one type can be used, the selection of the most suitable system is shown.

  13. Weakly broken galileon symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Pirtskhalava, David [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Santoni, Luca; Trincherini, Enrico [Scuola Normale Superiore, Piazza dei Cavalieri 7, 56126 Pisa (Italy); INFN, Sezione di Pisa, Piazza dei Cavalieri 7, 56126 Pisa (Italy); Vernizzi, Filippo [Institut de Physique Théorique, Université Paris Saclay, CEA, CNRS, Gif-sur-Yvette cédex, F-91191 (France)

    2015-09-01

    Effective theories of a scalar ϕ invariant under the internal galileon symmetryϕ→ϕ+b{sub μ}x{sup μ} have been extensively studied due to their special theoretical and phenomenological properties. In this paper, we introduce the notion of weakly broken galileon invariance, which characterizes the unique class of couplings of such theories to gravity that maximally retain their defining symmetry. The curved-space remnant of the galileon’s quantum properties allows to construct (quasi) de Sitter backgrounds largely insensitive to loop corrections. We exploit this fact to build novel cosmological models with interesting phenomenology, relevant for both inflation and late-time acceleration of the universe.

  14. Strengths and threats regarding the patient’s safety: nursing professionals’ opinion Fortalezas y amenazas en torno a la seguridad del paciente según la opinión de los profesionales de enfermería Fortalezas e ameaças em torno da segurança do paciente segundo a opinião dos profissionais de enfermagem

    Directory of Open Access Journals (Sweden)

    Ángel Alfredo Martínez Ques

    2010-06-01

    Full Text Available The aim of this research is to know the barriers and opportunities that nursing professionals detect in their clinical practice in order to develop the culture of patient safety and to identify future research lines. This qualitative study is based on the DELPHI method, with a group of 19 nursing professionals from education and care practice, involving both primary and specialized care. Weaknesses and threats revolve around five categories: profession, organization and infrastructure; indicators; communication and safety culture; and safety training. Opportunities to improve safety cover six categories: organizational change; promotion of the safety culture, professional training and development; relationship with the patients; research; and strategic planning. Work is needed to improve safety and nursing should be ready to assume this leadership.El objetivo de este estudio es conocer las barreras y oportunidades que los profesionales de enfermería detectan en su práctica clínica para el pleno desarrollo de la cultura de la seguridad del paciente e identificar posibles líneas de investigación futuras. Se trata de un estudio cualitativo basado en la técnica Delphi modificada sobre un grupo compuesto por 19 profesionales de enfermería del ámbito docente y asistencial, tanto de atención primaria como especializada. Se encontró que las debilidades y amenazas giran alrededor de cinco categorías: profesión; organización e infraestructura; indicadores; comunicación y cultura de seguridad; y, formación en seguridad. Las oportunidades para mejorar la seguridad comprenden seis categorías: cambio organizacional; fomento de la cultura de seguridad, formación y desarrollo profesional; relación con los pacientes, investigación; y, planificación estratégica. Se concluye que existe la necesidad de trabajar para mejorar la seguridad y que la enfermería debe asumir ese liderazgo.O objetivo deste estudo é conhecer as barreiras e

  15. Weak Decay of Hypernuclei

    CERN Document Server

    Alberico, W M

    2004-01-01

    The focus of these Lectures is on the weak decay modes of hypernuclei, with special attention to Lambda-hypernuclei. The subject involves many fields of modern theoretical and experimental physics, from nuclear structure to the fundamental constituents of matter and their interactions. The various weak decay modes of Lambda-hypernuclei are described: the mesonic mode and the non-mesonic ones. The latter are the dominant decay channels of medium--heavy hypernuclei, where, on the contrary, the mesonic decay is disfavoured by Pauli blocking effect on the outgoing nucleon. In particular, one can distinguish between one-body and two-body induced decays. Theoretical models employed to evaluate the (partial and total) decay widths of hypernuclei are illustrated, and their results compared with existing experimental data. Open problems and recent achievements are extensively discussed, in particular the determination of the ratio Gamma_n/Gamma_p, possible tests of the Delta I=1/2 rule in non-mesonic decays and the pu...

  16. ICU-Acquired Weakness.

    Science.gov (United States)

    Jolley, Sarah E; Bunnell, Aaron E; Hough, Catherine L

    2016-11-01

    Survivorship after critical illness is an increasingly important health-care concern as ICU use continues to increase while ICU mortality is decreasing. Survivors of critical illness experience marked disability and impairments in physical and cognitive function that persist for years after their initial ICU stay. Newfound impairment is associated with increased health-care costs and use, reductions in health-related quality of life, and prolonged unemployment. Weakness, critical illness neuropathy and/or myopathy, and muscle atrophy are common in patients who are critically ill, with up to 80% of patients admitted to the ICU developing some form of neuromuscular dysfunction. ICU-acquired weakness (ICUAW) is associated with longer durations of mechanical ventilation and hospitalization, along with greater functional impairment for survivors. Although there is increasing recognition of ICUAW as a clinical entity, significant knowledge gaps exist concerning identifying patients at high risk for its development and understanding its role in long-term outcomes after critical illness. This review addresses the epidemiologic and pathophysiologic aspects of ICUAW; highlights the diagnostic challenges associated with its diagnosis in patients who are critically ill; and proposes, to our knowledge, a novel strategy for identifying ICUAW. Copyright © 2016 American College of Chest Physicians. Published by Elsevier Inc. All rights reserved.

  17. Weak Measurements Beyond the Aharonov-Albert-Vaidman Formalism

    CERN Document Server

    Wu, Shengjun

    2010-01-01

    High-precision experiments via weak measurements require pre-selected and post-selected states (PPS) that are nearly orthogonal, the linear dependence of the measurement outcomes on the weak values quickly fails when the PPS become more and more orthogonal, the phenomena in this regime cannot be explained by the previous weak measurement formalism. In this paper we extend the idea of weak measurements to the most general case, provide a complete treatment and give results for both the regime when the PPS are almost orthogonal and the regime when they are exactly orthogonal. We surprisingly find that for a fixed interaction strength, there may exist a maximum signal amplification and a corresponding optimum overlap of PPS to achieve it. We also find interesting quantities, the orthogonal weak values, which play the role of weak values for the case when the PPS are exactly orthogonal.

  18. Neurogenic Orofacial Weakness and Speech in Adults With Dysarthria.

    Science.gov (United States)

    Solomon, Nancy Pearl; Makashay, Matthew J; Helou, Leah B; Clark, Heather M

    2017-08-15

    This study compared orofacial strength between adults with dysarthria and neurologically normal (NN) matched controls. In addition, orofacial muscle weakness was examined for potential relationships to speech impairments in adults with dysarthria. Matched groups of 55 adults with dysarthria and 55 NN adults generated maximum pressure (Pmax) against an air-filled bulb during lingual elevation, protrusion and lateralization, and buccodental and labial compressions. These orofacial strength measures were compared with speech intelligibility, perceptual ratings of speech, articulation rate, and fast syllable-repetition rate. The dysarthria group demonstrated significantly lower orofacial strength than the NN group on all tasks. Lingual strength correlated moderately and buccal strength correlated weakly with most ratings of speech deficits. Speech intelligibility was not sensitive to dysarthria severity. Individuals with severely reduced anterior lingual elevation Pmax (orofacial muscle weakness in adults with dysarthrias of varying etiologies but reinforce tenuous links between orofacial strength and speech production disorders. By examining individual data, preliminary evidence emerges to suggest that speech, but not necessarily intelligibility, is likely to be impaired when lingual weakness is severe.

  19. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  20. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the relevanc

  1. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and th

  2. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  3. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  4. Fortalezas y debilidades del programa para la detección y el control del cáncer cervicouterino: Evaluación cualitativa en San Luis Potosí, México Strengths and weaknesses of a cervical cancer detection and control program: a qualitative evaluation in San Luis Potosi, Mexico

    Directory of Open Access Journals (Sweden)

    Luz María Tejada-Tayabas

    2012-08-01

    Full Text Available Objetivo: Identificar, desde la perspectiva del personal de salud, las fortalezas y debilidades del programa para la detección y el control del cáncer cervicouterino mediante una evaluación cualitativa, en tres centros de salud de San Luis Potosí, México, entre agosto de 2008 y noviembre de 2009. Métodos: Se realizó una evaluación cualitativa. En el estudio participaron nueve prestadores de servicios, seleccionados mediante muestreo por conveniencia, bajo el criterio de participación voluntaria. Inicialmente se obtuvo información de los centros de salud para conocer las características y el contexto en que opera el programa; posteriormente, a los nueve informantes se les realizaron 18 entrevistas semiestructuradas para indagar su perspectiva. Se empleó un análisis de contenido dirigido. Resultados: Las fortalezas referidas por el personal son el carácter gratuito del programa, la disponibilidad de recursos materiales, así como algunas estrategias que facilitan la captación de mujeres y su acceso al cribado. Las principales debilidades son las limitaciones de recursos humanos y en la estructura física, la ineficiente organización de actividades, la deficiente capacidad técnica del personal y las limitadas acciones de promoción, así como las dificultades en el seguimiento de las mujeres con resultados positivos. Conclusiones: Este estudio muestra la necesidad de incrementar los recursos humanos, realizar cambios en la normatividad y reorganizar las acciones del programa en algunos centros de salud, para garantizar la calidad del servicio y satisfacer los requerimientos de las mujeres, y así favorecer la cobertura en todas sus acciones.Objective: To identify, from the perspective of the health staff, the strengths and weaknesses of the program for the detection and control of cervical cancer through a qualitative assessment implemented in three health centers in the city of San Luis Potosi, Mexico, from August 2008 to November

  5. Weak Quantum Ergodicity

    CERN Document Server

    Kaplan, L

    1998-01-01

    We examine the consequences of classical ergodicity for the localization properties of individual quantum eigenstates in the classical limit. We note that the well known Schnirelman result is a weaker form of quantum ergodicity than the one implied by random matrix theory. This suggests the possibility of systems with non-gaussian random eigenstates which are nonetheless ergodic in the sense of Schnirelman and lead to ergodic transport in the classical limit. These we call "weakly quantum ergodic.'' Indeed for a class of "slow ergodic" classical systems, it is found that each eigenstate becomes localized to an ever decreasing fraction of the available state space, in the semiclassical limit. Nevertheless, each eigenstate in this limit covers phase space evenly on any classical scale, and long-time transport properties betwen individual quantum states remain ergodic due to the diffractive effects which dominate quantum phase space exploration.

  6. Group Threat and Policy Change: The Spatial Dynamics of Prohibition Politics, 1890-1919.

    Science.gov (United States)

    Andrews, Kenneth T; Seguin, Charles

    2015-09-01

    The authors argue that group threat is a key driver of the adoption of new and controversial policies. Conceptualizing threat in spatial terms, they argue that group threat is activated through the joint occurrence of (1) proximity to threatening groups and (2) the population density of threatened groups. By analyzing the adoption of county and state "dry laws" banning alcohol from 1890 to 1919, they first show that prohibition victories were driven by the relative strength of supportive constituencies such as native whites and rural residents, vis-à-vis opponents such as Irish, Italian, or German immigrants or Catholics. Second, they show that threat contributed to prohibition victories: counties bordering large immigrant or urban populations, which did not themselves contain similar populations, were more likely to adopt dry laws. Threat arises primarily from interactions between spatially proximate units at the local level, and therefore higher-level policy change is not reducible to the variables driving local policy.

  7. Universal health coverage: a quest for all countries but under threat in some.

    Science.gov (United States)

    McKee, Martin; Balabanova, Dina; Basu, Sanjay; Ricciardi, Walter; Stuckler, David

    2013-01-01

    Over the past 50 years, health care has been making a growing contribution to population health in many countries. Yet its benefits are still denied to many people worldwide. This article describes how many countries, both developed and developing, have pursued the quest to achieve universal health care. This has been an explicitly political process. In Europe, it emerged from a belief in solidarity, a fear of revolution, and a changing view of the role of the state. In developing countries, progress was more erratic, characterized by debates about the affordability of universal health care, until it was realized that functioning health systems were essential to deliver development goals. Throughout, the United States has been an exception. An analysis of progress toward universal health care, combining a review of existing theories and new empirical analysis, identifies five factors as important: the strength of organized labor and left-wing parties, adequate economic resources, absence of societal divisions, weakness of institutions that might oppose it (such as organized medicine), and windows of opportunity. Having noted the substantial benefits accruing from universal health care, the article concludes with an analysis of how universal health care is under threat in some European countries and a warning about the risks posed by current radical austerity policies.

  8. Neutrino propagation in a weakly magnetized medium

    Indian Academy of Sciences (India)

    Sushan Konar; Subinoy Das

    2004-06-01

    Neutrino—photon processes, forbidden in vacuum, can take place in the presence of a thermal medium and/or an external electro-magnetic field, mediated by the corresponding charged leptons (real or virtual). Such interactions affect the propagation of neutrinos through a magnetized plasma. We investigate the neutrino—photon absorptive processes, at the one-loop level, for massless neutrinos in a weakly magnetized plasma. We find that there is no correction to the absorptive part of the axial-vector—vector amplitude due to the presence of a magnetic field, to the linear order in the field strength.

  9. Plasma ion stratification by weak planar shocks

    Science.gov (United States)

    Simakov, Andrei N.; Keenan, Brett D.; Taitano, William T.; Chacón, Luis

    2017-09-01

    We derive fluid equations for describing steady-state planar shocks of a moderate strength ( 0 shock Mach number) propagating through an unmagnetized quasineutral collisional plasma comprising two separate ion species. In addition to the standard fluid shock quantities, such as the total mass density, mass-flow velocity, and electron and average ion temperatures, the equations describe shock stratification in terms of variations in the relative concentrations and temperatures of the two ion species along the shock propagation direction. We have solved these equations analytically for weak shocks ( 0 shocks, and they have been used to verify kinetic simulations of shocks in multi-ion plasmas.

  10. Is China Threat a Hoax?

    Institute of Scientific and Technical Information of China (English)

    Niu Weigan; Ma Zongshi

    2008-01-01

    The Beijing Olympics has focused unprecedented world attention on China this year. Many people hail the Games as an occasion that showcases China's growing contribution to world development and harmony. But intent on politicizing this global event, a few modern Cassandras still cling to the flawed China Threat theory. In this paper, the author traces the origins of this fallacious theory. He sees it as a product of Western empiricism viewed through an historical and philosophical prism. He argues that the assertion of threat arises from a generalization of historical facts. The assertion links China's growing clout with declining Western dominance in international affairs. Starting with the myth that peace is possible only among democracies, the theory predicts the inevitability of conflict between the West and China, a country with an alleged expansionist tradition and under an authoritarian system.

  11. Weak Cat-Operads

    CERN Document Server

    Dosen, K

    2010-01-01

    An operad (this paper deals with non-symmetric operads) may be conceived as a partial algebra with a family of insertion operations, Gerstenhaber's circle-i products, which satisfy two kinds of associativity, one of them involving commutativity. A Cat-operad is an operad enriched over the category Cat of small categories, as a 2-category with small hom-categories is a category enriched over Cat. The notion of weak Cat-operad is to the notion of Cat-operad what the notion of bicategory is to the notion of 2-category. The equations of operads like associativity of insertions are replaced by isomorphisms in a category. The goal of this paper is to formulate conditions concerning these isomorphisms that ensure coherence, in the sense that all diagrams of canonical arrows commute. This is the sense in which the notions of monoidal category and bicategory are coherent. The coherence proof in the paper is much simplified by indexing the insertion operations in a context-independent way, and not in the usual manner. ...

  12. Zika Still a Threat During Winter Months

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_162518.html Zika Still a Threat During Winter Months Public health ... doesn't necessarily mean the end of the Zika threat in the United States, a public health ...

  13. Anisotropic turbulence in weakly stratified rotating magnetoconvection

    CERN Document Server

    Giesecke, A

    2010-01-01

    Numerical simulations of the 3D MHD-equations that describe rotating magnetoconvection in a Cartesian box have been performed using the code NIRVANA. The characteristics of averaged quantities like the turbulence intensity and the turbulent heat flux that are caused by the combined action of the small-scale fluctuations are computed. The correlation length of the turbulence significantly depends on the strength and orientation of the magnetic field and the anisotropic behavior of the turbulence intensity induced by Coriolis and Lorentz force is considerably more pronounced for faster rotation. The development of isotropic behavior on the small scales -- as it is observed in pure rotating convection -- vanishes even for a weak magnetic field which results in a turbulent flow that is dominated by the vertical component. In the presence of a horizontal magnetic field the vertical turbulent heat flux slightly increases with increasing field strength, so that cooling of the rotating system is facilitated. Horizont...

  14. Cyber Terrorism– Global Security Threat

    OpenAIRE

    Bogdanoski, Mitko; Petreski, Drage

    2013-01-01

    It is more than obvious that the way of conducting terrorism with the time is becoming more sophisticated. The cyber terrorism is real threat to fast technology development. Potential targets are systems which control the nation’s defenses and critical infrastructure. The terrorist of the future will win the wars without firing a shot - just by destroying infrastructure that significantly relies on information technology. The fast growth of the Internet users and Internet dependence dramat...

  15. Subordinates as Threats to Leaders

    OpenAIRE

    Glazer, Amihai; Segendorff, Björn

    2001-01-01

    A leader of an organization may view a subordinate as threatening or weakening the leader's position. The threat may increase with the subordinate's ability and reduce the rents the leader wins. In particular, a leader who trains his subordinate reduces the cost to the owner of a firm in replacing the leader, and so reduces the leader's bargaining power. The leader therefore provides inefficiently low training for the subordinate.

  16. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  17. Chaos in extended linear arrays of Josephson weak links

    Energy Technology Data Exchange (ETDEWEB)

    Nerenberg, M.A.H.; Spiteri, R.J. (Department of Applied Mathematics, University of Western Ontario, London, Ontario, Canada N6A 5B9 (CA)); Blackburn, J.A. (Department of Physics and Computing, Wilfred Laurier University, Waterloo, Ontario, Canada N2L 3C5 (CA))

    1989-12-01

    Extended linear arrays of interacting Josephson weak links are studied by numerical simulation using the resistively shunted junction model. The minimum coupling strength for chaotic behavior is determined as a function of the number of links. This strength is found to diminish steadily with increasing number, despite the inclusion of only nearest-neighbor interaction. The implications for Josephson technology are briefly discussed. Mathematically, the results are confirmation of the Ruelle-Takens scenario for chaos.

  18. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  19. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  20. Effects of Weak Ties on Epidemic Predictability in Community Networks

    CERN Document Server

    Shu, Panpan; Gong, Kai; Liu, Ying

    2012-01-01

    Weak ties play a significant role in the structures and the dynamics of community networks. Based on the susceptible-infected model in contact process, we study numerically how weak ties influence the predictability of epidemic dynamics. We first investigate the effects of different kinds of weak ties on the variabilities of both the arrival time and the prevalence of disease, and find that the bridgeness with small degree can enhance the predictability of epidemic spreading. Once weak ties are settled, compared with the variability of arrival time, the variability of prevalence displays a diametrically opposed changing trend with both the distance of the initial seed to the bridgeness and the degree of the initial seed. More specifically, the further distance and the larger degree of the initial seed can induce the better predictability of arrival time and the worse predictability of prevalence. Moreover, we discuss the effects of weak tie number on the epidemic variability. As community strength becomes ver...

  1. Weak Total Resolvability In Graphs

    Directory of Open Access Journals (Sweden)

    Casel Katrin

    2016-02-01

    Full Text Available A vertex v ∈ V (G is said to distinguish two vertices x, y ∈ V (G of a graph G if the distance from v to x is di erent from the distance from v to y. A set W ⊆ V (G is a total resolving set for a graph G if for every pair of vertices x, y ∈ V (G, there exists some vertex w ∈ W − {x, y} which distinguishes x and y, while W is a weak total resolving set if for every x ∈ V (G−W and y ∈ W, there exists some w ∈ W −{y} which distinguishes x and y. A weak total resolving set of minimum cardinality is called a weak total metric basis of G and its cardinality the weak total metric dimension of G. Our main contributions are the following ones: (a Graphs with small and large weak total metric bases are characterised. (b We explore the (tight relation to independent 2-domination. (c We introduce a new graph parameter, called weak total adjacency dimension and present results that are analogous to those presented for weak total dimension. (d For trees, we derive a characterisation of the weak total (adjacency metric dimension. Also, exact figures for our parameters are presented for (generalised fans and wheels. (e We show that for Cartesian product graphs, the weak total (adjacency metric dimension is usually pretty small. (f The weak total (adjacency dimension is studied for lexicographic products of graphs.

  2. Quantifying shoulder rotation weakness in patients with shoulder impingement.

    Science.gov (United States)

    Tyler, Timothy F; Nahow, Rachael C; Nicholas, Stephen J; McHugh, Malachy P

    2005-01-01

    The purpose of this study was to determine whether strength deficits could be detected in individuals with and without shoulder impingement, all of whom had normal shoulder strength bilaterally according to grading of manual muscle testing. Strength of the internal rotators and external rotators was tested isokinetically at 60 degrees /s and 180 degrees /s, as well as manually with a handheld dynamometer (HHD) in 17 patients and 22 control subjects. Testing was performed with the shoulder positioned in the scapular plane and in 90 degrees of shoulder abduction with 90 degrees of elbow flexion (90-90). The peak torque was determined for each movement. The strength deficit between the involved and uninvolved arms (patients) and the dominant and nondominant arms (control subjects) was calculated for each subject. Comparisons were made for the scapular-plane and 90-90 positions between isokinetic and HHD testing. Despite a normal muscle grade, patients had marked weakness (28% deficit, P weakness was not evident with isokinetic testing at the 90-90 position (60 degrees /s and 180 degrees /s, 0% deficit, P = .99). In control subjects, greater internal rotator strength in the dominant compared with the nondominant arm was evident with the HHD at the 90-90 position (11%, P muscle testing can quantify shoulder strength deficits that may not be apparent with isokinetic testing. By using an HHD during shoulder testing, clinicians can identify weakness that may have been presumed normal.

  3. Attitude Strength.

    Science.gov (United States)

    Howe, Lauren C; Krosnick, Jon A

    2017-01-03

    Attitude strength has been the focus of a huge volume of research in psychology and related sciences for decades. The insights offered by this literature have tremendous value for understanding attitude functioning and structure and for the effective application of the attitude concept in applied settings. This is the first Annual Review of Psychology article on the topic, and it offers a review of theory and evidence regarding one of the most researched strength-related attitude features: attitude importance. Personal importance is attached to an attitude when the attitude is perceived to be relevant to self-interest, social identification with reference groups or reference individuals, and values. Attaching personal importance to an attitude causes crystallizing of attitudes (via enhanced resistance to change), effortful gathering and processing of relevant information, accumulation of a large store of well-organized relevant information in long-term memory, enhanced attitude extremity and accessibility, enhanced attitude impact on the regulation of interpersonal attraction, energizing of emotional reactions, and enhanced impact of attitudes on behavioral intentions and action. Thus, important attitudes are real and consequential psychological forces, and their study offers opportunities for addressing behavioral change.

  4. Strengths and weaknesses analysis of overall management strategy for medical services in Shenzhen as measured by customer satisfaction%顾客满意度视角下的深圳市医疗服务整体管理的优劣势分析

    Institute of Scientific and Technical Information of China (English)

    江捍平; 谢若斯; 韩春艳; 樊宏; 黄丽佳; 初笑宇; 卢祖洵

    2010-01-01

    目的 探讨顾客满意度视角下的深圳市医疗服务整体管理战略的优势和劣势,为进一步提高其整体竞争力提供参考.方法 对2005年~2007年深圳市各级医疗机构满意度调查数据运用统计描述、方差分析以及象限图分析等方法进行统计分析.结果 2005年~2007年深圳市各级医疗机构总体满意度依次为86.01分、87.71分、87.84分.从顾客满意度的视角下来看,深圳市一级医疗机构在医疗费用、就医环境、服务理念方面具有较大优势,而二级医疗机构在其医疗服务整体管理质量提高方面具有较大优势.结论 深圳市各级医疗机构的顾客满意度均在逐年提高,但医疗服务整体管理战略在不同级别医疗机构的实施过程中,其优势和劣势表现各异.%Objective To evaluate the strengths and weaknesses of the overall management strategy of medical services in Shenzhen from the perspective of the customer satisfaction.Methods By means of statistical description,variance analysis,and the Magic Quadrant analysis,statistical analysis was made on the satisfaction survey data for all levels of medical institutions in Shenzhen from 2005 to 2007.Results From the perspective of customer satisfaction,the first class hospitals enjoy a greater advantage in medical expenses,medical environment,and service concepts,yet the second class ones maintain an obvious advantage in overall management quality improvement.Conclusions Customer satisfaction for all levels of medical organizations in Shenzhen keeps improving year by year,but different medical organizations behave differently in their overall management strategy.

  5. Weak compactness of biharmonic maps

    Directory of Open Access Journals (Sweden)

    Shenzhou Zheng

    2012-10-01

    Full Text Available This article shows that if a sequence of weak solutions of a perturbed biharmonic map satisfies $Phi_ko 0$ in $(W^{2,2}^*$ and $u_kightharpoonup u$ weakly in $W^{2,2}$, then $u$ is a biharmonic map. In particular, we show that the space of biharmonic maps is sequentially compact under the weak-$W^{2,2}$ topology.

  6. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  7. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  8. New Threat to World Economy

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The aggregate amount of money and credit in the global economy has risen sharply over the past 30 years,with its growth rate and stock far exceeding that of the real economy or real assets of the world.This is the view of Xiang Songzuo,professor at the Huazhong University of Science and Technology,whose opinion was first published in a recent article in China Business News.Xiang said this situation is a real threat to the world economy.Excerpts of his article are reprinted below:

  9. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  10. Respiratory weakness in patients with chronic neck pain.

    Science.gov (United States)

    Dimitriadis, Zacharias; Kapreli, Eleni; Strimpakos, Nikolaos; Oldham, Jacqueline

    2013-06-01

    Respiratory muscle strength is one parameter that is currently proposed to be affected in patients with chronic neck pain. This study was aimed at examining whether patients with chronic neck pain have reduced respiratory strength and with which neck pain problems their respiratory strength is associated. In this controlled cross-sectional study, 45 patients with chronic neck pain and 45 healthy well-matched controls were recruited. Respiratory muscle strength was assessed through maximal mouth pressures. The subjects were additionally assessed for their pain intensity and disability, neck muscle strength, endurance of deep neck flexors, neck range of movement, forward head posture and psychological states. Paired t-tests showed that patients with chronic neck pain have reduced Maximal Inspiratory (MIP) (r = 0.35) and Maximal Expiratory Pressures (MEP) (r = 0.39) (P Neck muscle strength (r > 0.5), kinesiophobia (r neck pain and disability (r Neck muscle strength was the only predictor that remained as significant into the prediction models of MIP and MEP. It can be concluded that patients with chronic neck pain present weakness of their respiratory muscles. This weakness seems to be a result of the impaired global and local muscle system of neck pain patients, and psychological states also appear to have an additional contribution. Clinicians are advised to consider the respiratory system of patients with chronic neck pain during their usual assessment and appropriately address their treatment.

  11. Nonperturbative theory of weak pre- and post-selected measurements

    Energy Technology Data Exchange (ETDEWEB)

    Kofman, Abraham G., E-mail: kofmana@gmail.com; Ashhab, Sahel; Nori, Franco

    2012-11-01

    This paper starts with a brief review of the topic of strong and weak pre- and post-selected (PPS) quantum measurements, as well as weak values, and afterwards presents original work. In particular, we develop a nonperturbative theory of weak PPS measurements of an arbitrary system with an arbitrary meter, for arbitrary initial states of the system and the meter. New and simple analytical formulas are obtained for the average and the distribution of the meter pointer variable. These formulas hold to all orders in the weak value. In the case of a mixed preselected state, in addition to the standard weak value, an associated weak value is required to describe weak PPS measurements. In the linear regime, the theory provides the generalized Aharonov–Albert–Vaidman formula. Moreover, we reveal two new regimes of weak PPS measurements: the strongly-nonlinear regime and the inverted region (the regime with a very large weak value), where the system-dependent contribution to the pointer deflection decreases with increasing the measurement strength. The optimal conditions for weak PPS measurements are obtained in the strongly-nonlinear regime, where the magnitude of the average pointer deflection is equal or close to the maximum. This maximum is independent of the measurement strength, being typically of the order of the pointer uncertainty. In the optimal regime, the small parameter of the theory is comparable to the overlap of the pre- and post-selected states. We show that the amplification coefficient in the weak PPS measurements is generally a product of two qualitatively different factors. The effects of the free system and meter Hamiltonians are discussed. We also estimate the size of the ensemble required for a measurement and identify optimal and efficient meters for weak measurements. Exact solutions are obtained for a certain class of the measured observables. These solutions are used for numerical calculations, the results of which agree with the theory

  12. [Systemic lupus erythematosus and weakness].

    Science.gov (United States)

    Vinagre, Filipe; Santos, Maria José; da Silva, José Canas

    2006-01-01

    We report a case of a 13-year old young girl, with Juvenile Systemic Lupus Erythematosus and recent onset of muscle weakness. Investigations lead to the diagnosis of Myasthenia Gravis. The most important causes of muscle weakness in lupus patients are discussed.

  13. Strong memories obscure weak memories in associative recognition.

    Science.gov (United States)

    Verde, Michael F; Rotello, Caren M

    2004-12-01

    The list strength effect, in which strengthening some memories has a detrimental effect on the retrieval of other memories, has generally not been found in item recognition. The present study shows that the list strength effect does occur in associative recognition. Study materials were sets of overlapping word pairs (A-B, A-C, D-B, etc.). Within critical sets of words, strong pairs were presented three times at study, as compared with one presentation for weak pairs. In Experiment 1, associative recognition for weak pairs was less accurate than that for baseline pairs, and response times for hits were slower. In Experiment 2, receiver-operating characteristic curve data provided further evidence of poor accuracy for weak pairs. These findings support a qualitative distinction between item and associative recognition.

  14. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  15. Enhanced Memory for both Threat and Neutral Information Under Conditions of Intergroup Threat

    Directory of Open Access Journals (Sweden)

    Yong eZhu

    2015-11-01

    Full Text Available Few studies have examined the effect of intergroup threat on cognitive outcomes such as memory. Different theoretical perspectives can inform how intergroup threat should affect memory for threat-relevant and neutral information, such as the mood-congruency approach, Yerkes-Dodson law, Easterbrook’s theory, and also evolutionary perspectives. To test among these, we conducted two experiments to examine how exposure to intergroup threats affected memory compared to control conditions. In study 1, we manipulated symbolic threat and examined participants’ memory for threat and neutral words. In study 2, memory performance was assessed following the induction of realistic threat. Across the studies, in the control condition participants showed better memory for threat-related than neutral information. However, participants under threat remembered neutral information as well as threat-related information. In addition, participants in the threat condition remembered threat-related information as well as participants in the control condition. The findings are discussed in terms of automatic vigilance processes but also the effects of threat on arousal and its effect on information processing. This latter perspective, suggests paradoxically, that under some circumstances involving an outgroup threat, non-threatening information about outgroups can be extensively processed.

  16. Countering the Nuclear Terrorist Threat

    Energy Technology Data Exchange (ETDEWEB)

    Vantine, H C

    2002-10-04

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things

  17. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  18. World's soils are under threat

    Science.gov (United States)

    Montanarella, Luca; Pennock, Daniel Jon; McKenzie, Neil; Badraoui, Mohamed; Chude, Victor; Baptista, Isaurinda; Mamo, Tekalign; Yemefack, Martin; Singh Aulakh, Mikha; Yagi, Kazuyuki; Hong, Suk Young; Vijarnsorn, Pisoot; Zhang, Gan-Lin; Arrouays, Dominique; Black, Helaina; Krasilnikov, Pavel; Sobocká, Jaroslava; Alegre, Julio; Henriquez, Carlos Roberto; de Lourdes Mendonça-Santos, Maria; Taboada, Miguel; Espinosa-Victoria, David; AlShankiti, Abdullah; Kazem AlaviPanah, Sayed; El Mustafa Elsheikh, Elsiddig Ahmed; Hempel, Jon; Camps Arbestain, Marta; Nachtergaele, Freddy; Vargas, Ronald

    2016-02-01

    The Intergovernmental Technical Panel on Soils has completed the first State of the World's Soil Resources Report. Globally soil erosion was identified as the gravest threat, leading to deteriorating water quality in developed regions and to lowering of crop yields in many developing regions. We need to increase nitrogen and phosphorus fertilizer use in infertile tropical and semi-tropical soils - the regions where the most food insecurity among us are found - while reducing global use of these products overall. Stores of soil organic carbon are critical in the global carbon balance, and national governments must set specific targets to stabilize or ideally increase soil organic carbon stores. Finally the quality of soil information available for policy formulation must be improved - the regional assessments in the State of the World's Soil Resources Report frequently base their evaluations on studies from the 1990s based on observations made in the 1980s or earlier.

  19. Ideology, Social Threat, and the Death Sentence: Capital Sentences across Time and Space

    Science.gov (United States)

    Jacobs, David; Carmichael, Jason T.

    2004-01-01

    Capital punishment is the most severe criminal penalty, yet we know little about the factors that produce jurisdictional differences in the use of the death sentence. Political explanations emphasize conservative values and the strength of more conservative political parties. Threat accounts suggest that this sentence will be more likely in…

  20. Bias Adjusted Precipitation Threat Scores

    Directory of Open Access Journals (Sweden)

    F. Mesinger

    2008-04-01

    Full Text Available Among the wide variety of performance measures available for the assessment of skill of deterministic precipitation forecasts, the equitable threat score (ETS might well be the one used most frequently. It is typically used in conjunction with the bias score. However, apart from its mathematical definition the meaning of the ETS is not clear. It has been pointed out (Mason, 1989; Hamill, 1999 that forecasts with a larger bias tend to have a higher ETS. Even so, the present author has not seen this having been accounted for in any of numerous papers that in recent years have used the ETS along with bias "as a measure of forecast accuracy".

    A method to adjust the threat score (TS or the ETS so as to arrive at their values that correspond to unit bias in order to show the model's or forecaster's accuracy in extit{placing} precipitation has been proposed earlier by the present author (Mesinger and Brill, the so-called dH/dF method. A serious deficiency however has since been noted with the dH/dF method in that the hypothetical function that it arrives at to interpolate or extrapolate the observed value of hits to unit bias can have values of hits greater than forecast when the forecast area tends to zero. Another method is proposed here based on the assumption that the increase in hits per unit increase in false alarms is proportional to the yet unhit area. This new method removes the deficiency of the dH/dF method. Examples of its performance for 12 months of forecasts by three NCEP operational models are given.

  1. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  2. Inferring the nature of anthropogenic threats from long-term abundance records.

    Science.gov (United States)

    Shoemaker, Kevin T; Akçakaya, H Resit

    2015-02-01

    Diagnosing the processes that threaten species persistence is critical for recovery planning and risk forecasting. Dominant threats are typically inferred by experts on the basis of a patchwork of informal methods. Transparent, quantitative diagnostic tools would contribute much-needed consistency, objectivity, and rigor to the process of diagnosing anthropogenic threats. Long-term census records, available for an increasingly large and diverse set of taxa, may exhibit characteristic signatures of specific threatening processes and thereby provide information for threat diagnosis. We developed a flexible Bayesian framework for diagnosing threats on the basis of long-term census records and diverse ancillary sources of information. We tested this framework with simulated data from artificial populations subjected to varying degrees of exploitation and habitat loss and several real-world abundance time series for which threatening processes are relatively well understood: bluefin tuna (Thunnus maccoyii) and Atlantic cod (Gadus morhua) (exploitation) and Red Grouse (Lagopus lagopus scotica) and Eurasian Skylark (Alauda arvensis) (habitat loss). Our method correctly identified the process driving population decline for over 90% of time series simulated under moderate to severe threat scenarios. Successful identification of threats approached 100% for severe exploitation and habitat loss scenarios. Our method identified threats less successfully when threatening processes were weak and when populations were simultaneously affected by multiple threats. Our method selected the presumed true threat model for all real-world case studies, although results were somewhat ambiguous in the case of the Eurasian Skylark. In the latter case, incorporation of an ancillary source of information (records of land-use change) increased the weight assigned to the presumed true model from 70% to 92%, illustrating the value of the proposed framework in bringing diverse sources of

  3. Characteristics of structural loess strength and preliminary framework for joint strength formula

    Institute of Scientific and Technical Information of China (English)

    Rong-jian LI; Jun-ding LIU; Rui YAN; Wen ZHENG; Sheng-jun SHAO

    2014-01-01

    The strength of structural loess consists of the shear strength and tensile strength. In this study, the stress path, the failure envelope of principal stress ( Kf line), and the strength failure envelope of structurally intact loess and remolded loess were analyzed through three kinds of tests:the tensile strength test, the uniaxial compressive strength test, and the conventional triaxial shear strength test. Then, in order to describe the tensile strength and shear strength of structural loess comprehensively and reasonably, a joint strength formula for structural loess was established. This formula comprehensively considers tensile and shear properties. Studies have shown that the tensile strength exhibits a decreasing trend with increasing water content. When the water content is constant, the tensile strength of the structurally intact soil is greater than that of remolded soil. In the studies, no loss of the originally cured cohesion in the structurally intact soil samples was observed, given that the soil samples did not experience loading disturbance during the uniaxial compressive strength test, meaning there is a high initial structural strength. The results of the conventional triaxial shear strength test show that the water content is correlated with the strength of the structural loess. When the water content is low, the structural properties are strong, and when the water content is high, the structural properties are weak, which means that the water content and the ambient pressure have significant effects on the stress-strain relationship of structural loess. The established joint strength formula of structural loess effectively avoids overestimating the role of soil tensile strength in the traditional theory of Mohr-Coulomb strength.

  4. Threat by association: do distant intergroup threats carry-over into local intolerance?

    Science.gov (United States)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-09-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the threatening group, carry over to other groups that individuals actually do encounter in their local environment (e.g., immigrants). The main goal of our studies was to experimentally identify this carry-over effect of intergroup threat. Specifically, we hypothesized that (by definition relatively abstract) symbolic threats (e.g., threats to the ingroup's worldview) have an especially strong carry-over potential because those threats can be easily attributed to other outgroups. We tested these predictions in one correlational and two experimental studies. The results of all three studies confirmed our hypothesis that particularly distant symbolic threats were predictive of intolerance towards local outgroups.

  5. Precision Metrology Using Weak Measurements

    Science.gov (United States)

    Zhang, Lijian; Datta, Animesh; Walmsley, Ian A.

    2015-05-01

    Weak values and measurements have been proposed as a means to achieve dramatic enhancements in metrology based on the greatly increased range of possible measurement outcomes. Unfortunately, the very large values of measurement outcomes occur with highly suppressed probabilities. This raises three vital questions in weak-measurement-based metrology. Namely, (Q1) Does postselection enhance the measurement precision? (Q2) Does weak measurement offer better precision than strong measurement? (Q3) Is it possible to beat the standard quantum limit or to achieve the Heisenberg limit with weak measurement using only classical resources? We analyze these questions for two prototypical, and generic, measurement protocols and show that while the answers to the first two questions are negative for both protocols, the answer to the last is affirmative for measurements with phase-space interactions, and negative for configuration space interactions. Our results, particularly the ability of weak measurements to perform at par with strong measurements in some cases, are instructive for the design of weak-measurement-based protocols for quantum metrology.

  6. Precision metrology using weak measurements.

    Science.gov (United States)

    Zhang, Lijian; Datta, Animesh; Walmsley, Ian A

    2015-05-29

    Weak values and measurements have been proposed as a means to achieve dramatic enhancements in metrology based on the greatly increased range of possible measurement outcomes. Unfortunately, the very large values of measurement outcomes occur with highly suppressed probabilities. This raises three vital questions in weak-measurement-based metrology. Namely, (Q1) Does postselection enhance the measurement precision? (Q2) Does weak measurement offer better precision than strong measurement? (Q3) Is it possible to beat the standard quantum limit or to achieve the Heisenberg limit with weak measurement using only classical resources? We analyze these questions for two prototypical, and generic, measurement protocols and show that while the answers to the first two questions are negative for both protocols, the answer to the last is affirmative for measurements with phase-space interactions, and negative for configuration space interactions. Our results, particularly the ability of weak measurements to perform at par with strong measurements in some cases, are instructive for the design of weak-measurement-based protocols for quantum metrology.

  7. Acute muscular weakness in children

    Directory of Open Access Journals (Sweden)

    Ricardo Pablo Javier Erazo Torricelli

    Full Text Available ABSTRACT Acute muscle weakness in children is a pediatric emergency. During the diagnostic approach, it is crucial to obtain a detailed case history, including: onset of weakness, history of associated febrile states, ingestion of toxic substances/toxins, immunizations, and family history. Neurological examination must be meticulous as well. In this review, we describe the most common diseases related to acute muscle weakness, grouped into the site of origin (from the upper motor neuron to the motor unit. Early detection of hyperCKemia may lead to a myositis diagnosis, and hypokalemia points to the diagnosis of periodic paralysis. Ophthalmoparesis, ptosis and bulbar signs are suggestive of myasthenia gravis or botulism. Distal weakness and hyporeflexia are clinical features of Guillain-Barré syndrome, the most frequent cause of acute muscle weakness. If all studies are normal, a psychogenic cause should be considered. Finding the etiology of acute muscle weakness is essential to execute treatment in a timely manner, improving the prognosis of affected children.

  8. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology.

  9. Water storage equity and safety assurance policy to mitigate potential 'dual-extreme cumulative threats' in agricultural catchments

    Science.gov (United States)

    Pisaniello, John D.; Tingey-Holyoak, Joanne L.

    2017-02-01

    Farm dams that are not managed properly at the individual level can create water storage equity and safety threats to downstream communities and the environment that aggregate at the catchment level: a potential 'dual-extreme cumulative' problem. The paper provides indicative evidence and develops understanding of this novel phenomenon and associated policy needs within the Australian setting comprising dual hydrologic extremes of floods and droughts, further exacerbated by climate change. This is achieved through comparative case studies involving surveys of both dam owner perceptions and dam management practices in four States representing a complete range of integrated policy approaches from weak to strong. Survey results find most farmers do not believe dam maintenance is important, will undertake spillway blocking and do not plan for emergencies. These results are supported by physical on-site findings of farmers neglecting dams and blocking or under-designing spillways, in turn storing more water than they are entitled and creating unsafe dams at both the individual and cumulative levels. From detailed cross-case comparative assessment against policy context, it emerges that on-farm perceptions and practices form a range of 'acceptability' of dam management that directly reflects policy strength and integration in each setting. The paper advances the international small dams policy, agricultural water management and hydrology literatures, evidencing the need for effective integrated policy to mitigate dual extreme cumulative threats. Importantly, guidance is provided to jurisdictions internationally with high inter-annual rainfall variation on how best to design integrated policy that can achieve both water storage equity and safety in agricultural catchments.

  10. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.

    2006-01-01

    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat

  11. Vibrotactile and visual threat cueing with high g threat intercept in dynamic flight simulation

    NARCIS (Netherlands)

    Eriksson, L.; Erp, J.B.F. van; Carlander, O.; Levin, B.; Veen, H.A.H.C. van; Veltman, J.E.

    2006-01-01

    In a TNO and FOI joint study, nine fighter pilots participated in a threat detection and intercept experiment in the Swedish Dynamic Flight Simulator. Visual threat cueing with a simulated Gripen aircraft head-up display (HUD) symbology was compared with combined visual and vibrotactile threat cuein

  12. Threat by association : Do distant intergroup threats carry-over into local intolerance?

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2014-01-01

    Individuals are often confronted with intergroup threats, yet many of these threats emanate from distant groups that most individuals are unlikely to encounter in their local environment. An important yet unanswered question is whether reactions to those threats, such as intolerance towards the thre

  13. The balance of weak and strong interactions in genetic networks.

    Directory of Open Access Journals (Sweden)

    Juan F Poyatos

    Full Text Available Genetic interactions are being quantitatively characterized in a comprehensive way in several model organisms. These data are then globally represented in terms of genetic networks. How are interaction strengths distributed in these networks? And what type of functional organization of the underlying genomic systems is revealed by such distribution patterns? Here, I found that weak interactions are important for the structure of genetic buffering between signaling pathways in Caenorhabditis elegans, and that the strength of the association between two genes correlates with the number of common interactors they exhibit. I also determined that this network includes genetic cascades balancing weak and strong links, and that its hubs act as particularly strong genetic modifiers; both patterns also identified in Saccharomyces cerevisae networks. In yeast, I further showed a relation, although weak, between interaction strengths and some phenotypic/evolutionary features of the corresponding target genes. Overall, this work demonstrates a non-random organization of interaction strengths in genetic networks, a feature common to other complex networks, and that could reflect in this context how genetic variation is eventually influencing the phenotype.

  14. Percolation on networks with weak and heterogeneous dependency

    Science.gov (United States)

    Kong, Ling-Wei; Li, Ming; Liu, Run-Ran; Wang, Bing-Hong

    2017-03-01

    In real networks, the dependency between nodes is ubiquitous; however, the dependency is not always complete and homogeneous. In this paper, we propose a percolation model with weak and heterogeneous dependency; i.e., dependency strengths could be different between different nodes. We find that the heterogeneous dependency strength will make the system more robust, and for various distributions of dependency strengths both continuous and discontinuous percolation transitions can be found. For Erdős-Rényi networks, we prove that the crossing point of the continuous and discontinuous percolation transitions is dependent on the first five moments of the dependency strength distribution. This indicates that the discontinuous percolation transition on networks with dependency is determined not only by the dependency strength but also by its distribution. Furthermore, in the area of the continuous percolation transition, we also find that the critical point depends on the first and second moments of the dependency strength distribution. To validate the theoretical analysis, cases with two different dependency strengths and Gaussian distribution of dependency strengths are presented as examples.

  15. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  16. Perception of the Threat of Terrorism.

    Science.gov (United States)

    Cohen-Louck, Keren

    2016-04-28

    In light of the tense and ongoing security situation in Israel, one important issue that needs to be analyzed and understood is the perception of terrorism threats. Most studies focused mainly on the psychological implications of terrorist acts; this study examines the complexity of the manner in which the individual perceives the threat of terrorism. In all, 40 Israeli adults (22 women and 18 men) were interviewed using semistructured in-depth interviews. Qualitative analysis indicates that the components of the perception of terrorism that construct the evaluation and subjective perception of the participants are as follows: (a) perception of control, which is a feeling of loss of control and helplessness due to uncertainty, inability to predict threats, and the vagueness of the threat; (b) perception of vulnerability to the threat, such as a feeling of vulnerability to and potential victimization by terrorism; and (c) perception of fear of terrorism that includes responses of fear, anxiety, feeling of danger, and emotional distress. In addition, gender differences were found in the analysis. The findings of this study help gain a better understanding as to how people perceive the threat of terrorism. The findings also enable an understanding of the complexity of living under ongoing terrorism threats and may assist in understanding how citizens cope with and adjust to this threat. © The Author(s) 2016.

  17. Sociocultural perspectives on threats, risks, and health

    Science.gov (United States)

    Patricia L. Winter; Jonathan W. Long; Frank K. Lake

    2014-01-01

    Sociocultural perspectives on threats, risks, and health are explored in this chapter. The authors begin with a discussion of the linkages between well-being in the Sierra Nevada ecosystem and public health and well-being to set the context of socioecological resilience. This is followed by a summary of how trust and confidence influence the management of threats and...

  18. Target threat assessment using fuzzy sets theory

    Directory of Open Access Journals (Sweden)

    Ehsan Azimirad

    2015-08-01

    Full Text Available The threat evaluation is significant component in target classification process and is significant in military and non military applications. Small errors or mistakes in threat evaluation and target classification especial in military applications can result in huge damage of life and property. Threat evaluation helps in case of weapon assignment, and intelligence sensor support system. It is very important factor to analyze the behavior of enemy tactics as well as our surveillance. This paper represented a precise description of the threat evaluation process using fuzzy sets theory. A review has been carried out regarding which parameters that have been suggested for threat value calculation. For the first time in this paper, eleven parameters are introduced for threat evaluation so that this parameters increase the accuracy in designed system. The implemented threat evaluation system has been applied to a synthetic air defense scenario and four real time dynamic air defense scenarios. The simulation results show the correctness, accuracy, reliability and minimum errors in designing of threat evaluation system

  19. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  20. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  1. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  2. Cosmic Impacts: The DoomsDay Threat

    Science.gov (United States)

    McGaha, J.

    1998-07-01

    Recent science fiction movies (Deep Impact and Armageddon) have brought public attention to the threat of possible impacts from space. Just how real is this threat and what would be the consequences of such an impact? Can we do anything to prevent it? The survival of civilization may depend on it.

  3. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  4. Weakness

    Science.gov (United States)

    ... stroke After injury to a nerve During a flare-up of multiple sclerosis (MS) You may feel ... Duchenne) Myotonic dystrophy POISONING Botulism Poisoning ( insecticides , nerve gas) Shellfish poisoning OTHER Not enough healthy red blood ...

  5. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Science.gov (United States)

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  6. Security threats categories in healthcare information systems.

    Science.gov (United States)

    Samy, Ganthan Narayana; Ahmad, Rabiah; Ismail, Zuraini

    2010-09-01

    This article attempts to investigate the various types of threats that exist in healthcare information systems (HIS). A study has been carried out in one of the government-supported hospitals in Malaysia.The hospital has been equipped with a Total Hospital Information System (THIS). The data collected were from three different departments, namely the Information Technology Department (ITD), the Medical Record Department (MRD), and the X-Ray Department, using in-depth structured interviews. The study identified 22 types of threats according to major threat categories based on ISO/IEC 27002 (ISO 27799:2008). The results show that the most critical threat for the THIS is power failure followed by acts of human error or failure and other technological factors. This research holds significant value in terms of providing a complete taxonomy of threat categories in HIS and also an important component in the risk analysis stage.

  7. Percolation on networks with weak and heterogeneous dependency

    CERN Document Server

    Kong, Ling-Wei; Liu, Run-Ran; Wang, Bing-Hong

    2016-01-01

    In real networks, the dependency between nodes is ubiquitous, however, the dependency is not always complete and homogeneous. In this paper, we propose a percolation model with weak and heterogeneous dependency, i.e., different nodes could have different dependency. We find that the heterogeneous dependency strength will make the system more robust, and for various distributions of dependency strengths both the continuous and discontinuous percolation transitions can be found. For Erd\\H{o}s-R\\'{e}nyi networks, we prove that the crossing point of the continuous and discontinuous percolation transitions is dependent on the first, second and third moments of the dependency strength distribution. This indicates that the discontinuous percolation transition on networks with dependency is not only determined by the dependency strength but also its distribution. Furthermore, in the area of the continuous percolation transition, we also find that the critical point depends on the first and second moments of the depen...

  8. Conformational transitions of a weak polyampholyte

    KAUST Repository

    Narayanan Nair, Arun Kumar

    2014-10-07

    Using grand canonical Monte Carlo simulations of a flexible polyelectrolyte where the charges are in contact with a reservoir of constant chemical potential given by the solution pH, we study the behavior of weak polyelectrolytes in poor and good solvent conditions for polymer backbone. We address the titration behavior and conformational properties of a flexible diblock polyampholyte chain formed of two oppositely charged weak polyelectrolyte blocks, each containing equal number of identical monomers. The change of solution pH induces charge asymmetry in a diblock polyampholyte. For diblock polyampholyte chains in poor solvents, we demonstrate that a discontinuous transition between extended (tadpole) and collapsed (globular) conformational states is attainable by varying the solution pH. The double-minima structure in the probability distribution of the free energy provides direct evidence for the first-order like nature of this transition. At the isoelectric point electrostatically driven coil-globule transition of diblock polyampholytes in good solvents is found to consist of different regimes identified with increasing electrostatic interaction strength. At pH values above or below the isoelectric point diblock chains are found to have polyelectrolyte-like behavior due to repulsion between uncompensated charges along the chain.

  9. Influence of environmental noise on the weak value amplification

    Science.gov (United States)

    Zhu, Xuannmin; Zhang, Yu-Xiang

    2016-08-01

    Quantum systems are always disturbed by environmental noise. We have investigated the influence of the environmental noise on the amplification in weak measurements. Three typical quantum noise processes are discussed in this article. The maximum expectation values of the observables of the measuring device decrease sharply with the strength of the depolarizing and phase damping channels, while the amplification effect of weak measurement is immune to the amplitude damping noise. To obtain significantly amplified signals, we must ensure that the preselection quantum systems are kept away from the depolarizing and phase damping processes.

  10. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  11. Stereotype threat prevents perceptual learning.

    Science.gov (United States)

    Rydell, Robert J; Shiffrin, Richard M; Boucher, Kathryn L; Van Loo, Katie; Rydell, Michael T

    2010-08-10

    Stereotype threat (ST) refers to a situation in which a member of a group fears that her or his performance will validate an existing negative performance stereotype, causing a decrease in performance. For example, reminding women of the stereotype "women are bad at math" causes them to perform more poorly on math questions from the SAT and GRE. Performance deficits can be of several types and be produced by several mechanisms. We show that ST prevents perceptual learning, defined in our task as an increasing rate of search for a target Chinese character in a display of such characters. Displays contained two or four characters and half of these contained a target. Search rate increased across a session of training for a control group of women, but not women under ST. Speeding of search is typically explained in terms of learned "popout" (automatic attraction of attention to a target). Did women under ST learn popout but fail to express it? Following training, the women were shown two colored squares and asked to choose the one with the greater color saturation. Superimposed on the squares were task-irrelevant Chinese characters. For women not trained under ST, the presence of a trained target on one square slowed responding, indicating that training had caused the learning of an attention response to targets. Women trained under ST showed no slowing, indicating that they had not learned such an attention response.

  12. Peripheral facial weakness (Bell's palsy).

    Science.gov (United States)

    Basić-Kes, Vanja; Dobrota, Vesna Dermanović; Cesarik, Marijan; Matovina, Lucija Zadro; Madzar, Zrinko; Zavoreo, Iris; Demarin, Vida

    2013-06-01

    Peripheral facial weakness is a facial nerve damage that results in muscle weakness on one side of the face. It may be idiopathic (Bell's palsy) or may have a detectable cause. Almost 80% of peripheral facial weakness cases are primary and the rest of them are secondary. The most frequent causes of secondary peripheral facial weakness are systemic viral infections, trauma, surgery, diabetes, local infections, tumor, immune disorders, drugs, degenerative diseases of the central nervous system, etc. The diagnosis relies upon the presence of typical signs and symptoms, blood chemistry tests, cerebrospinal fluid investigations, nerve conduction studies and neuroimaging methods (cerebral MRI, x-ray of the skull and mastoid). Treatment of secondary peripheral facial weakness is based on therapy for the underlying disorder, unlike the treatment of Bell's palsy that is controversial due to the lack of large, randomized, controlled, prospective studies. There are some indications that steroids or antiviral agents are beneficial but there are also studies that show no beneficial effect. Additional treatments include eye protection, physiotherapy, acupuncture, botulinum toxin, or surgery. Bell's palsy has a benign prognosis with complete recovery in about 80% of patients, 15% experience some mode of permanent nerve damage and severe consequences remain in 5% of patients.

  13. Topic Detection Based on Weak Tie Analysis: A Case Study of LIS Research

    Directory of Open Access Journals (Sweden)

    Ling Wei

    2016-11-01

    Full Text Available Purpose: Based on the weak tie theory, this paper proposes a series of connection indicators of weak tie subnets and weak tie nodes to detect research topics, recognize their connections, and understand their evolution. Design/methodology/approach: First, keywords are extracted from article titles and preprocessed. Second, high-frequency keywords are selected to generate weak tie co-occurrence networks. By removing the internal lines of clustered sub-topic networks, we focus on the analysis of weak tie subnets' composition and functions and the weak tie nodes' roles. Findings: The research topics' clusters and themes changed yearly; the subnets clustered with technique-related and methodology-related topics have been the core, important subnets for years; while close subnets are highly independent, research topics are generally concentrated and most topics are application-related; the roles and functions of nodes and weak ties are diversified. Research limitations: The parameter values are somewhat inconsistent; the weak tie subnets and nodes are classified based on empirical observations, and the conclusions are not verified or compared to other methods. Practical implications: The research is valuable for detecting important research topics as well as their roles, interrelations, and evolution trends. Originality/value: To contribute to the strength of weak tie theory, the research translates weak and strong ties concepts to co-occurrence strength, and analyzes weak ties' functions. Also, the research proposes a quantitative method to classify and measure the topics' clusters and nodes.

  14. Warping the Weak Gravity Conjecture

    Directory of Open Access Journals (Sweden)

    Karta Kooner

    2016-08-01

    Full Text Available The Weak Gravity Conjecture, if valid, rules out simple models of Natural Inflation by restricting their axion decay constant to be sub-Planckian. We revisit stringy attempts to realise Natural Inflation, with a single open string axionic inflaton from a probe D-brane in a warped throat. We show that warped geometries can allow the requisite super-Planckian axion decay constant to be achieved, within the supergravity approximation and consistently with the Weak Gravity Conjecture. Preliminary estimates of the brane backreaction suggest that the probe approximation may be under control. However, there is a tension between large axion decay constant and high string scale, where the requisite high string scale is difficult to achieve in all attempts to realise large field inflation using perturbative string theory. We comment on the Generalized Weak Gravity Conjecture in the light of our results.

  15. Interpolation for weak Orlicz spaces with condition

    Institute of Scientific and Technical Information of China (English)

    JIAO Yong; PENG LiHua; LIU PeiDe

    2008-01-01

    An interpolation theorem for weak Orlicz spaces generalized by N-functions satisfying M△ condition is given.It is proved to be true for weak Orlicz martingale spaces by weak atomic decomposition of weak Hardy martingale spaces.And applying the interpolation theorem,we obtain some embedding relationships among weak Orlicz martingale spaces.

  16. Towards securing SCADA systems against process-related threats

    NARCIS (Netherlands)

    Hadziosmanovic, Dina; Bolzoni, Damiano; Hartel, Pieter

    2010-01-01

    We propose a tool-assisted approach to address process-related threats on SCADA systems. Process-related threats have not been addressed before in a systematic manner. Our approach consists of two steps: threat analysis and threat mitigation. For the threat analysis, we combine two methodologies (PH

  17. Nutritional status and weakness following pediatric hematopoietic cell transplantation.

    Science.gov (United States)

    Bouma, Sandra; Peterson, Mark; Gatza, Erin; Choi, Sung Won

    2016-12-01

    Survivorship after pediatric HCT has increased over the past decade. Focus on long-term care and well-being remains critical due to risk of poor dietary habits and exaggerated sedentary behavior, which can lead to muscle weakness, increased risk for obesity, and cardiometabolic disorders. Nutrition and physical activity are key factors in survivorship; however, data are limited. Comprehensive nutritional assessments, including nutrition-focused physical examination, grip strength, and food/activity surveys, were completed in 36 pediatric HCT survivors (aged 2-25 years). Patients were divided into undernutrition, normal-nutrition, and overnutrition categories. Fifty percent of participants were classified as normal nutrition, 22% undernutrition, and 28% overnutrition. Few patients met the U.S. Dietary Guidelines recommended intake for vegetables, fiber, saturated fat, and So FAS. Patients in the undernutrition group demonstrated significantly lower grip strength than those in the normal- and overnutrition groups. When grip strength was normalized to body mass, patients in the overnutrition group had the highest prevalence of weakness. Using NHANES reference data, maximum grip strength and NGS cutoffs were identified that could significantly distinguish the nutrition groups. Comprehensive nutritional assessments and grip strength measurements are feasible, non-invasive, easy to perform, and inform both under- and overnutrition in pediatric HCT survivors. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  18. Electromagnetism in nonleptonic weak interactions

    Energy Technology Data Exchange (ETDEWEB)

    Ecker, G. E-mail: ecker@doppler.thp.univie.ac.at; Isidori, G.; Mueller, G.; Neufeld, H.; Pich, A

    2000-12-18

    We construct a low-energy effective field theory that permits the complete treatment of isospin-breaking effects in nonleptonic weak interactions to next-to-leading order. To this end, we enlarge the chiral Lagrangian describing strong and {delta}S=1 weak interactions by including electromagnetic terms with the photon as additional dynamical degree of freedom. The complete and minimal list of local terms at next-to-leading order is given. We perform the one-loop renormalization at the level of the generating functional and specialize to K{yields}{pi}{pi} decays.

  19. Cosmology and the weak interaction

    Energy Technology Data Exchange (ETDEWEB)

    Schramm, D.N. (Fermi National Accelerator Lab., Batavia, IL (USA)):(Chicago Univ., IL (USA))

    1989-12-01

    The weak interaction plays a critical role in modern Big Bang cosmology. This review will emphasize two of its most publicized cosmological connections: Big Bang nucleosynthesis and Dark Matter. The first of these is connected to the cosmological prediction of Neutrino Flavours, N{sub {nu}} {approximately} 3 which is now being confirmed at SLC and LEP. The second is interrelated to the whole problem of galaxy and structure formation in the universe. This review will demonstrate the role of the weak interaction both for dark matter candidates and for the problem of generating seeds to form structure. 87 refs., 3 figs., 5 tabs.

  20. Weak disorder in Fibonacci sequences

    Energy Technology Data Exchange (ETDEWEB)

    Ben-Naim, E [Theoretical Division and Center for Nonlinear Studies, Los Alamos National Laboratory, Los Alamos, NM 87545 (United States); Krapivsky, P L [Department of Physics and Center for Molecular Cybernetics, Boston University, Boston, MA 02215 (United States)

    2006-05-19

    We study how weak disorder affects the growth of the Fibonacci series. We introduce a family of stochastic sequences that grow by the normal Fibonacci recursion with probability 1 - {epsilon}, but follow a different recursion rule with a small probability {epsilon}. We focus on the weak disorder limit and obtain the Lyapunov exponent that characterizes the typical growth of the sequence elements, using perturbation theory. The limiting distribution for the ratio of consecutive sequence elements is obtained as well. A number of variations to the basic Fibonacci recursion including shift, doubling and copying are considered. (letter to the editor)

  1. Sex difference in attractiveness perceptions of strong and weak male walkers.

    Science.gov (United States)

    Fink, Bernhard; André, Selina; Mines, Johanna S; Weege, Bettina; Shackelford, Todd K; Butovskaya, Marina L

    2016-11-01

    Men and women accurately assess male physical strength from facial and body morphology cues. Women's assessments of male facial attractiveness, masculinity, and dominance correlate positively with male physical strength. A positive relationship also has been reported between physical strength and attractiveness of men's dance movements. Here, we investigate men's and women's attractiveness, dominance, and strength assessments from brief samples of male gait. Handgrip strength (HGS) was measured in 70 heterosexual men and their gait was motion-captured. Men and women judged 20 precategorized strong (high HGS) and weak (low HGS) walkers on attractiveness, dominance, and strength, and provided a measure of their own HGS. Both men and women judged strong walkers higher on dominance and strength than weak walkers. Women but not men judged strong walkers more attractive than weak walkers. These effects were independent of observers' physical strength. Male physical strength is conveyed not only through facial and body morphology, but also through body movements. We discuss our findings with reference to studies suggesting that physical strength provides information about male quality in contexts of inter- and intrasexual selection. Am. J. Hum. Biol. 28:913-917, 2016. © 2016Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  2. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  3. Experimental test of error-disturbance uncertainty relations by weak measurement.

    Science.gov (United States)

    Kaneda, Fumihiro; Baek, So-Young; Ozawa, Masanao; Edamatsu, Keiichi

    2014-01-17

    We experimentally test the error-disturbance uncertainty relation (EDR) in generalized, strength-variable measurement of a single photon polarization qubit, making use of weak measurement that keeps the initial signal state practically unchanged. We demonstrate that the Heisenberg EDR is violated, yet the Ozawa and Branciard EDRs are valid throughout the range of our measurement strength.

  4. Character strengths and virtues

    Directory of Open Access Journals (Sweden)

    Mariana Gancedo

    2015-09-01

    Full Text Available The target of this work is to carry out a critical analysis about some of the underlying epistemological assumptions in Peterson and Seligman’s book Character Strengths and Virtues. A handbook and classifications (2004. This is a theoretical investigation that belongs to the epistemology of psychology field. According to the theory proposed by Serroni Copello (2003, a critic progress rational criterion is methodologically applied. The analysis points out some epistemological weakness that leads to incongruences in the statements and conclusions of the investigations, such as: the absence of a unified theory, a candid search of objectivity, and the superposition of implicit paradigms. It also takes notice of a causal and elementary logic -which goes against today’s scientific paradigm-, and the strong American culture zeitgeist present in the principles of Positive Psychology. Finally, some ethic problems are displayed, in particular the step taken from a descriptive attitude –characteristic of science- toward a prescriptive attitude –characteristic of moral codes-. 

  5. Weak bond detection in composites using highly nonlinear solitary waves

    Science.gov (United States)

    Singhal, Taru; Kim, Eunho; Kim, Tae-Yeon; Yang, Jinkyu

    2017-05-01

    We experimentally investigate a diagnostic technique for identifying a weak bond in composites using highly nonlinear solitary waves (HNSWs). We set up a one-dimensional chain of granular crystals, consisting of spherical particles with nonlinear interactions, to generate HNSWs. These solitary wave packets are transmitted into an inspection area of composites by making a direct contact with the chain. We demonstrate that a strong type of solitary waves injected to the weak bond area can break the weak bond of laminates, thereby causing delamination. Then, to identify the creation of the delamination, we transmit a weak type of solitary waves by employing the same apparatus, and measure the solitary waves reflected from the specimens. By analyzing these reflected solitary waves, we differentiate the weak bond samples with the pristine bond ones in an efficient and fast manner. The diagnostic results based on the proposed method are compared with the strength and energy release rate at bond interfaces, which are measured via standard testing methods such as three point bending and end notched flexure tests. This study shows the potential of solitary wave-based detection of weak bonds for hot spot monitoring of composite-based structures.

  6. Growth and decay of weak shock waves in magnetogasdynamics

    Science.gov (United States)

    Singh, L. P.; Singh, D. B.; Ram, S. D.

    2016-11-01

    The purpose of the present study is to investigate the problem of the propagation of weak shock waves in an inviscid, electrically conducting fluid under the influence of a magnetic field. The analysis assumes the following two cases: (1) a planar flow with a uniform transverse magnetic field and (2) cylindrically symmetric flow with a uniform axial or varying azimuthal magnetic field. A system of two coupled nonlinear transport equations, governing the strength of a shock wave and the first-order discontinuity induced behind it, are derived that admit a solution that agrees with the classical decay laws for a weak shock. An analytic expression for the determination of the shock formation distance is obtained. How the magnetic field strength, whether axial or azimuthal, influences the shock formation is also assessed.

  7. Magnetorotational instability in stratified, weakly ionised accretion discs

    CERN Document Server

    Salmeron, Roberto Aureliano; Salmeron, Raquel; Wardle, Mark

    2003-01-01

    We present a linear analysis of the vertical structure and growth of the magnetorotational instability in stratified, weakly ionised accretion discs, such as protostellar and quiescent dwarf novae systems. The method includes the effects of the magnetic coupling, the conductivity regime of the fluid and the strength of the magnetic field, which is initially vertical. The conductivity is treated as a tensor and assumed constant with height. We obtained solutions for the structure and growth rate of global unstable modes for different conductivity regimes, strengths of the initial magnetic field and coupling between ionised and neutral components of the fluid. The envelopes of short-wavelenght perturbations are determined by the action of competing local growth rates at different heights, driven by the vertical stratification of the disc. Ambipolar diffusion perturbations peak consistently higher above the midplane than modes including Hall conductivity. For weak coupling, perturbations including the Hall effec...

  8. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  9. Identity threat and stigma in cancer patients

    Directory of Open Access Journals (Sweden)

    Sarah Knapp

    2014-09-01

    Full Text Available Cancer stigma has undergone an important transformation in recent decades. In general, this disease no longer fits squarely into Goffman’s classic taxonomy of stigmatized conditions. This review will demonstrate that, with important adaptations, an identity-threat model of stigma can be used to organize cancer stigma research post-Goffman. This adapted model postulates that one’s personal attributions, responses to situational threat, and disease/treatment characteristics can be used to predict identity threat and well-being of individuals with cancer. Implications for further research and clinical practice are discussed.

  10. Emerging oomycete threats to plants and animals.

    Science.gov (United States)

    Derevnina, Lida; Petre, Benjamin; Kellner, Ronny; Dagdas, Yasin F; Sarowar, Mohammad Nasif; Giannakopoulou, Artemis; De la Concepcion, Juan Carlos; Chaparro-Garcia, Angela; Pennington, Helen G; van West, Pieter; Kamoun, Sophien

    2016-12-05

    Oomycetes, or water moulds, are fungal-like organisms phylogenetically related to algae. They cause devastating diseases in both plants and animals. Here, we describe seven oomycete species that are emerging or re-emerging threats to agriculture, horticulture, aquaculture and natural ecosystems. They include the plant pathogens Phytophthora infestans, Phytophthora palmivora, Phytophthora ramorum, Plasmopara obducens, and the animal pathogens Aphanomyces invadans, Saprolegnia parasitica and Halioticida noduliformans For each species, we describe its pathology, importance and impact, discuss why it is an emerging threat and briefly review current research activities.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'.

  11. The cohomology group of weak entwining structure

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    In this paper, we reveal that a weak entwining structure admits a rich cohomology theory. As an application we compute the cohomology of a weak entwining structure associated to a weak coalgebra-Galois extension.

  12. Second threshold in weak interactions

    NARCIS (Netherlands)

    Veltman, M.J.G.

    1977-01-01

    The point of view that weak interactions must have a second threshold below 300 – 600 GeV is developed. Above this threshold new physics must come in. This new physics may be the Higgs system, or some other nonperturbative system possibly having some similarities to the Higgs system. The limit of la

  13. Beam splitting on weak illumination.

    Science.gov (United States)

    Snyder, A W; Buryak, A V; Mitchell, D J

    1998-01-01

    We demonstrate, in both two and three dimensions, how a self-guided beam in a non-Kerr medium is split into two beams on weak illumination. We also provide an elegant physical explanation that predicts the universal character of the observed phenomenon. Possible applications of our findings to guiding light with light are also discussed.

  14. Weak measurements and supraluminal communication

    CERN Document Server

    Belinsky, A V

    2016-01-01

    There is suggested a version of the experiment with a correlated pair of particles in the entangled state. The experiment demonstrates that, in the case of weak and/or non-demolition measurements of one of the particles, it is possible to transmit information with a speed not limited by velocity of light.

  15. On Weak-BCC-Algebras

    Science.gov (United States)

    Thomys, Janus; Zhang, Xiaohong

    2013-01-01

    We describe weak-BCC-algebras (also called BZ-algebras) in which the condition (x∗y)∗z = (x∗z)∗y is satisfied only in the case when elements x, y belong to the same branch. We also characterize ideals, nilradicals, and nilpotent elements of such algebras. PMID:24311983

  16. Eldercare at Home: Bone Weakness

    Science.gov (United States)

    ... socialize. This can make exercising fun. If you don't exercise, your bones and muscles will become weak and your chances of falling will increase. Let’s exercise together. I will pick you up and we will go to the mall and walk for a little ...

  17. Submanifolds Weakly Associated with Graphs

    Indian Academy of Sciences (India)

    A Carriazo; L M Fernández; A Rodríguez-Hidalgo

    2009-06-01

    We establish an interesting link between differential geometry and graph theory by defining submanifolds weakly associated with graphs. We prove that, in a local sense, every submanifold satisfies such an association, and other general results. Finally, we study submanifolds associated with graphs either in low dimensions or belonging to some special families.

  18. Increased inspiratory and expiratory muscle strength following respiratory muscle strength training (RMST) in two patients with late-onset Pompe disease.

    Science.gov (United States)

    Jones, Harrison N; Moss, Tronda; Edwards, Laurie; Kishnani, Priya S

    2011-11-01

    Respiratory muscle strength training (RMST) is an exercise-based intervention which targets respiratory muscle weakness. We implemented RMST in two patients with late-onset Pompe disease (LOPD), both who had received long-term enzyme replacement therapy and had severe respiratory weakness. Over 16-32 weeks, inspiratory muscle strength increased by 73-74%. Expiratory muscle strength increased 31-48% over 12-22 weeks. These findings suggest that RMST may increase respiratory muscle strength, even in the setting of LOPD and severe baseline weakness.

  19. Social identity threat motivates science-discrediting online comments.

    Science.gov (United States)

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  20. On the weak project construction cost management

    Institute of Scientific and Technical Information of China (English)

    高守刚; 姜婧; 李玲

    2013-01-01

    the weak cost management is the most talked about topics in the weak industry, but also the basis of the weak construction business management and focus. With the increasingly fierce market competition, weak construction enterprises, the competition among enterprises wil gradual y transition from product quality competition to price competition. To strengthen the management of the weak construction enterprises cost, cut public spending ef iciency, improve market competitiveness, wil be the main way most weak construction corporate earnings and long-term business strategy. Based on the to weak project construction cost management based on analysis of the type of project construction costs, and further proposed the weak project construction cost management measures.

  1. Advantages of nonclassical pointer states in postselected weak measurements

    CERN Document Server

    Turek, Yusuf; Shikano, Yutaka; Sun, Chang-Pu; Al-Amri, M

    2015-01-01

    We investigate, within the weak measurement theory, the advantages of non-classical pointer states over semi-classical ones for coherent, squeezed vacuum, and Schr\\"{o}inger cat states. These states are utilized as pointer state for the system operator $\\hat{A}$ with property $\\hat{A}^{2}=\\hat{I}$, where $\\hat{I}$ represents the identity operator. We calculate the ratio between the signal-to-noise ratio (SNR) of non-postselected and postselected weak measurements. The latter is used to find the quantum Fisher information for the above pointer states. The average shifts for those pointer states with arbitrary interaction strength are investigated in detail. One key result is that we find the postselected weak measurement scheme for non-classical pointer states to be superior to semi-classical ones. This can improve the precision of measurement process.

  2. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  3. Need threat can motivate performance after ostracism.

    Science.gov (United States)

    Jamieson, Jeremy P; Harkins, Stephen G; Williams, Kipling D

    2010-05-01

    Ostracism threatens fundamental needs of belonging, self-esteem, control, and meaningful existence, which should motivate participants to respond to this threat. However, research has yet to examine the role of need threat in producing motivation after ostracism. In the current work, participants completed a "cognitive ability" (antisaccade) task following Cyberball-induced ostracism or inclusion. In two experiments, it was found that when ostracized, participants do not see antisaccade performance as a means of responding to the concerns produced by need threat; they respond only to the social threat, leading to worse performance than included participants (Experiments 1 and 2). However, when participants see an avenue of response (the Cyberball players can compare antisaccade performances), ostracized participants outperform included participants (Experiment 2). Moreover, this effect was mediated by the need for belonging, suggesting that ostracized participants were motivated to elevate their inclusionary status by demonstrating their worth on the cognitive ability task.

  4. Cyber Threats In Social Networking Websites

    Directory of Open Access Journals (Sweden)

    Wajeb Ghari

    2012-02-01

    Full Text Available A social network is a social structure made up of individuals or organizations called nodes, which areconnected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sitesare not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

  5. Childhood maltreatment and threats with weapons.

    Science.gov (United States)

    Casiano, Hygiea; Mota, Natalie; Afifi, Tracie O; Enns, Murray W; Sareen, Jitender

    2009-11-01

    The relationship between childhood maltreatment and future threats with weapons is unknown. We examined data from the nationally representative National Comorbidity Survey Replication (n = 5692) and conducted multiple logistic regression analyses to determine the association between childhood maltreatment and lifetime behavior of threatening others with a gun or other weapon. After adjusting for sociodemographic variables, physical abuse, sexual abuse, and witnessing domestic violence were significantly associated with threats made with a gun (adjusted odds ratios [AOR] ranging between 3.38 and 4.07) and other weapons (AOR ranging between 2.16 and 2.83). The greater the number of types of maltreatment experienced, the stronger the association with lifetime threats made to others with guns and any weapons. Over 94% of respondents who experienced maltreatment and made threats reported that the maltreatment occurred prior to threatening others with weapons. Prevention efforts that reduce exposure to maltreatment may reduce violent behavior in later life.

  6. Current Computer Network Security Issues/Threats

    National Research Council Canada - National Science Library

    Ammar Yassir; Alaa A K Ismaeel

    2016-01-01

    Computer network security has been a subject of concern for a long period. Many efforts have been made to address the existing and emerging threats such as viruses and Trojan among others without any significant success...

  7. Cyber threats in social networking websites

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websi...

  8. Antimicrobial Resistance: A Global Public Health Threat

    African Journals Online (AJOL)

    Antibiotic resistance is a global threat and has reached ... and World Health Organization (WHO) have taken ... and 5) Education of the public. .... to decrease transmission of microbes and ... interventions are designed for behavioral change.

  9. Extreme Heat in Southwest a Deadly Threat

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_166797.html Extreme Heat in Southwest a Deadly Threat Here's how to ... t take off in Phoenix on Tuesday, the heat wave scorching the Southwest for the next week ...

  10. One-Sided Weakness Admitted with Hypokalemic Periodic Paralysis

    Directory of Open Access Journals (Sweden)

    Fatih Yaman

    2014-04-01

    Full Text Available Hypokalemic periodic paralysis (HPP is a genetic disorder that characterized by recurrent attacks of skeletal muscle weakness with associated hypokalemia which is precipitated by hypotermia, stress, infection, carbonhydrate load, glucose infusion, metabolic alkalosis, general anesthesia, steroids and licorice root. 52-year-old male patient while working in a cold enviroment, began to complain of weakness in the arms and legs. The patient was brought to the emergency department due to the continuation of weakness complaints in the left arm and leg.The neurological examination had 5/5 strength in the upper-right and lower-right extremities, 3/5 strength in the upper-left and lower-left extremities. Serum electrolytes: Potassium: 2.7 mEq/L, 1.9 mEq/L control. There was no evidence of bleeding and infarction in Computerized Brain Tomography and Brain MR. After intravenous infusion of potassium, at the third hour the patient%u2019s neurological symptoms resolved completely, patient was mobilized. In this case we present one-sided weakness admitted to the emergency department, the diagnosis of patient with HPP. We aimed to emphasize that this diagnosis should be keeping in mind that among the causes paralysis and delayed diagnose and treatment may be mortal in HPP.

  11. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  12. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  13. Mechanisms behind Estrogens’ Beneficial Effect on Muscle Strength in Females

    Science.gov (United States)

    Lowe, Dawn A.; Baltgalvis, Kristen A.; Greising, Sarah M.

    2010-01-01

    Muscle weakness ensues when serum testosterone declines with age in men. Testosterone’s female counterpart, estrogen, has also been implicated in age-related strength loss but these results are less conclusive. Our working hypothesis is that estrogens do benefit muscle strength, and that the underlying mechanism involves estrogen receptors to improve muscle quality more so than quantity. PMID:20335737

  14. Effect of Fluid Dynamic Viscosity on the Strength of Chalk

    DEFF Research Database (Denmark)

    Hedegaard, K.; Fabricius, Ida Lykke

    The mechanical strength of high porosity and weakly cemented chalk is affected by the fluid in the pores. In this study, the effect of the dynamic viscosity of non-polar fluids has been measured on outcrop chalk from Sigerslev Quarry, Stevns, Denmark. The outcome is that the measured strength...

  15. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  16. Nuclear Threat Intelligence, Surveillance, and Reconnaissance

    Science.gov (United States)

    Kuliasha, Michael

    2012-03-01

    The National Security Strategy states that the greatest threat to the American people is ``the pursuit of nuclear weapons by violent extremists and their proliferation to additional states.'' The Global Nuclear Detection Architecture (GNDA) addresses a key portion of that threat by focusing on detecting nuclear and radiological materials that are out of regulatory control within permissive operating environments. However, the force protection requirements of the Department of Defense (DoD) range across a wider mission space from permissive environments, where nuclear and radiological materials can be monitored while under regulatory control, to hostile environments where nuclear and radiological materials exist in defiance of international regulations and agreements. This wider range of operating environments and the inherent physics limitations on the range of radiation detection pose great challenges to radiation detection-focused approaches to nuclear threat detection. Consequently, DoD is in the process of defining an intelligence, surveillance, and reconnaissance approach to countering nuclear threats that considers the observable signatures of all elements that comprise a potential threat; information, funds, people, material, equipment, and infrastructure. This strategy represents a shift from radiation detection as the primary sensing modality to radiation detection as one of many sensing modalities, including the human dimension, with a heavy emphasis on data fusion. This presentation will describe the attributes of a layered sensing approach to nuclear threat detection, illustrate the approach with examples, define potential building blocks, and discuss technical challenges.

  17. The Weak Scale from BBN

    CERN Document Server

    Hall, Lawrence J; Ruderman, Joshua T

    2014-01-01

    The measured values of the weak scale, $v$, and the first generation masses, $m_{u,d,e}$, are simultaneously explained in the multiverse, with all these parameters scanning independently. At the same time, several remarkable coincidences are understood. Small variations in these parameters away from their measured values lead to the instability of hydrogen, the instability of heavy nuclei, and either a hydrogen or a helium dominated universe from Big Bang Nucleosynthesis. In the 4d parameter space of $(m_u,m_d,m_e,v)$, catastrophic boundaries are reached by separately increasing each parameter above its measured value by a factor of $(1.4,1.3,2.5,\\sim5)$, respectively. The fine-tuning problem of the weak scale in the Standard Model is solved: as $v$ is increased beyond the observed value, it is impossible to maintain a significant cosmological hydrogen abundance for any values of $m_{u,d,e}$ that yield both hydrogen and heavy nuclei stability. For very large values of $v$ a new regime is entered where weak in...

  18. The Influence of Stereotype Threat on Immigrants: Review and Meta-Analysis

    Directory of Open Access Journals (Sweden)

    Markus eAppel

    2015-07-01

    Full Text Available In many regions around the world students with certain immigrant backgrounds underachieve in educational settings. This paper provides a review and meta-analysis on one potential source of the immigrant achievement gap: stereotype threat, a situational predicament that may prevent students to perform up to their full abilities. A meta-analysis of 19 experiments suggests an overall mean effect size of .63 (random effects model in support of stereotype threat theory. The results are complemented by moderator analyses with regard to circulation (published or unpublished research, cultural context (US vs. Europe, age of immigrants, type of stereotype threat manipulation, dependent measures, and means for identification of immigrant status; evidence on the role of ethnic identity strength is reviewed. Theoretical and practical implications of the findings are discussed.

  19. Asteroid airburst altitude vs. strength

    Science.gov (United States)

    Robertson, Darrel; Wheeler, Lorien; Mathias, Donovan

    2016-10-01

    Small NEO asteroids (<Ø140m) may not be a threat on a national or global level but can still cause a significant amount of local damage as demonstrated by the Chelyabinsk event where there was over $33 million worth of damage (1 billion roubles) and 1500 were injured, mostly due to broken glass. The ground damage from a small asteroid depends strongly on the altitude at which they "burst" where most of the energy is deposited in the atmosphere. The ability to accurately predict ground damage is useful in determining appropriate evacuation or shelter plans and emergency management.Strong asteroids, such as a monolithic boulder, fail and create peak energy deposition close to the altitude at which ram dynamic pressure exceeds the material cohesive strength. Weaker asteroids, such as a rubble pile, structurally fail at higher altitude, but it requires the increased aerodynamic pressure at lower altitude to disrupt and disperse the rubble. Consequently the resulting airbursts have a peak energy deposition at similar altitudes.In this study hydrocode simulations of the entry and break-up of small asteroids were performed to examine the effect of strength, size, composition, entry angle, and speed on the resulting airburst. This presentation will show movies of the simulations, the results of peak burst height, and the comparison to semi-analytical models.

  20. FATIGUE STRENGTH OF HIGH-STRENGTH STEEL,

    Science.gov (United States)

    coldhardened by deforming to 83%. It was found that it has low static notch sensitivity (lower than that of heat-treated steels), that static strength ...is raised appreciably by increased cold plastic deformation, and that its fatigue strength is raised substantially by mechanical polishing. (Author)

  1. Cohesive strength of iron ore granules

    Directory of Open Access Journals (Sweden)

    Contreras Rafael Jaimes

    2017-01-01

    Full Text Available We present an experimental and numerical investigation of the mechanical strength of crude iron ore (Hematite granules in which capillary bonds between primary particles are the source of internal cohesion. The strength is measured by subjecting the granules to vertical compression between two plates. We show that the behavior of the granules is ductile with a well-defined plastic threshold which increases with the amount of water. It is found that the compressive strength scales with capillary cohesion with a pre-factor that is nearly independent of size polydispersity for the investigated range of parameters but increases with friction coefficient between primary particles. This weak dependence may be attributed to the class of fine particles which, due to their large number, behaves as a cohesive matrix that controls the strength of the granule.

  2. Cohesive strength of iron ore granules

    Science.gov (United States)

    Contreras, Rafael Jaimes; Berger, Nicolas; Izard, Edouard; Douce, Jean-François; Koltsov, Alexey; Delenne, Jean-Yves; Azema, Emilien; Nezamabadi, Saeid; van Loo, Frédéric; Pellenq, Roland; Radjai, Farhang

    2017-06-01

    We present an experimental and numerical investigation of the mechanical strength of crude iron ore (Hematite) granules in which capillary bonds between primary particles are the source of internal cohesion. The strength is measured by subjecting the granules to vertical compression between two plates. We show that the behavior of the granules is ductile with a well-defined plastic threshold which increases with the amount of water. It is found that the compressive strength scales with capillary cohesion with a pre-factor that is nearly independent of size polydispersity for the investigated range of parameters but increases with friction coefficient between primary particles. This weak dependence may be attributed to the class of fine particles which, due to their large number, behaves as a cohesive matrix that controls the strength of the granule.

  3. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  4. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight... upon receiving information that an act or suspected act of air piracy has been committed, the...

  5. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless...

  6. Weak Precedence Story Parsing Grammar

    Institute of Scientific and Technical Information of China (English)

    张松懋

    1995-01-01

    Story understanding is one of the important branches of natural language understanding research in AI techniques.The story understanding approach based on Story Parsing Grammar (SPG) involves that SPG is used to represent different abstracting processes of stories with different levels in story understanding and that the story understanding process is converted to the recognition process of stories using the syntactic parser of SPG.This kind of story understanding is called story parsing.In this paper,firstly a subclass of SPG,called Weak Precedence SPG(WPSPG),is defined.Afterwards the syntactic parsing algorithm of WPSPG is studied.An example of story parsing is also given.

  7. Weakly distributive domains(Ⅱ)

    Institute of Scientific and Technical Information of China (English)

    JIANG Ying; ZHANG Guo-Qiang

    2007-01-01

    In our previous work(Inform.and Comput.,2005,202:87-103),we have shown that for any ω-algebraic meet-cpo D,if all higher-order stable function spaces built from D are ω-algebraic,then D is finitary.This accomplishes the first of a possible,two-step process in solving the problem raised(LNCS,1991,530:16-33;Domainsand lambda-calculi,Cambridge Univ.Press,1998)whetherthe category of stable bifinite domains of Amadio-Droste-G(o)bel(LNCS,1991,530:16-33;Theor.Comput.Sci.,1993,111:89-101)is the largest cartesian closed full subcategory within the category of ω-algebraic meet-cpos with stable functions.This paper presents the results of the second step,which is to show that for any ω-algebraic meet-cpo D satisfying axioms M and I to be contained in a cartesian closed full sub-category using ω-algebraic meet-cpos with stable functions,it must not violate M I∞.We introduce a new class of domains called weakly distributive domains and show that for these domains to be in a cartesian closed category using ω-algebraic meet-cpos,property M I must not be violated.Further,we demonstrate that principally distributive domains(those for which each principle ideal is distributive)form a proper subclass of weakly distributive domains,and Birkhoff's M3 and N5(Introduction to Lattices and order,Cambridge Univ.Press,2002)are weakly distributive(but non-distributive).Then,we establish characterization results for weakly distributive domains.We also introduce the notion of meet-generators in constructing stable functions and show that if an ω-algebraic meet-cpo D contains an infinite number of meet-generators,then[D→D]fails I.However,the original problem of Amadio and Curien remains open.

  8. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    above, these responses included: • “The unsettled dirt,” • “ Grassy area,” and • “Weapons not held properly.” We hypothesized that training would...alternative explanation is that with training, participants narrow their choices to threat relevant cues rather than identifying all possible threats

  9. Relaxion monodromy and the Weak Gravity Conjecture

    Science.gov (United States)

    Ibáñez, L. E.; Montero, M.; Uranga, A. M.; Valenzuela, I.

    2016-04-01

    The recently proposed relaxion models require extremely large trans-Planckian axion excursions as well as a potential explicitly violating the axion shift symmetry. The latter property is however inconsistent with the axion periodicity, which corresponds to a gauged discrete shift symmetry. A way to make things consistent is to use monodromy, i.e. both the axion and the potential parameters transform under the discrete shift symmetry. The structure is better described in terms of a 3-form field C μνρ coupling to the SM Higgs through its field strength F 4. The 4-form also couples linearly to the relaxion, in the Kaloper-Sorbo fashion. The extremely small relaxion-Higgs coupling arises in a see-saw fashion as g ≃ F 4 /f , with f being the axion decay constant. We discuss constraints on this type of constructions from membrane nucleation and the Weak Gravity Conjecture. The latter requires the existence of membranes, whose too fast nucleation could in principle drive the theory out of control, unless the cut-off scale is lowered. This allows to rule out the simplest models with the QCD axion as relaxion candidate on purely theoretical grounds. We also discuss possible avenues to embed this structure into string theory.

  10. Epidemiology today: Mitigating threats to an ecosystem.

    Science.gov (United States)

    Kreiger, Nancy

    2016-06-27

    Ecosystems comprise all the living and non-living things in a particular area (e.g., rain forest, desert), which interact and maintain equilibrium. Loss of equilibrium (e.g., clear-cutting trees in a rain forest) can mean the decline of the ecosystem, unless it is able to adapt to the new circumstances. The term "knowledge ecosystem" describes an approach to managing knowledge in a particular field; the components of this system include the people, the technological skills and resources, and information or data. Epidemiology can be thought of as a knowledge ecosystem and, like ecological systems, its existence can be threatened, from both internal and external forces that may alter its equilibrium. This paper describes some threats to the epidemiology knowledge ecosystem, how these threats came about, and what responses we can make that may serve to mitigate those threats.

  11. Insider Threat Assessment: Model, Analysis and Tool

    Science.gov (United States)

    Chinchani, Ramkumar; Ha, Duc; Iyer, Anusha; Ngo, Hung Q.; Upadhyaya, Shambhu

    Insider threat is typically attributed to legitimate users who maliciously leverage their system privileges, and familiarity and proximity to their computational environment to compromise valuable information or inflict damage. According to the annual CSI/FBI surveys conducted since 1996, internal attacks and insider abuse form a significant portion of reported incidents. The strongest indication yet that insider threat is very real is given by the recent study [2] jointly conducted by CERT and the US Secret Service; the first of its kind, which provides an in-depth insight into the problem in a real-world setting. However, there is no known body of work which addresses this problem effectively. There are several challenges, beginning with understanding the threat.

  12. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  13. Weakly circadian cells improve resynchrony.

    Directory of Open Access Journals (Sweden)

    Alexis B Webb

    Full Text Available The mammalian suprachiasmatic nuclei (SCN contain thousands of neurons capable of generating near 24-h rhythms. When isolated from their network, SCN neurons exhibit a range of oscillatory phenotypes: sustained or damping oscillations, or arrhythmic patterns. The implications of this variability are unknown. Experimentally, we found that cells within SCN explants recover from pharmacologically-induced desynchrony by re-establishing rhythmicity and synchrony in waves, independent of their intrinsic circadian period We therefore hypothesized that a cell's location within the network may also critically determine its resynchronization. To test this, we employed a deterministic, mechanistic model of circadian oscillators where we could independently control cell-intrinsic and network-connectivity parameters. We found that small changes in key parameters produced the full range of oscillatory phenotypes seen in biological cells, including similar distributions of period, amplitude and ability to cycle. The model also predicted that weaker oscillators could adjust their phase more readily than stronger oscillators. Using these model cells we explored potential biological consequences of their number and placement within the network. We found that the population synchronized to a higher degree when weak oscillators were at highly connected nodes within the network. A mathematically independent phase-amplitude model reproduced these findings. Thus, small differences in cell-intrinsic parameters contribute to large changes in the oscillatory ability of a cell, but the location of weak oscillators within the network also critically shapes the degree of synchronization for the population.

  14. Optimal Weak Lensing Skewness Measurements

    CERN Document Server

    Zhang, T J; Zhang, P; Dubinski, J; Zhang, Tong-Jie; Pen, Ue-Li; Zhang, Pengjie; Dubinski, John

    2003-01-01

    Weak lensing measurements are entering a precision era to statistically map the distribution of matter in the universe. The most common measurement has been of the variance of the projected surface density of matter, which corresponds to the induced correlation in alignments of background galaxies. This measurement of the fluctuations is insensitive to the total mass content, like using waves on the ocean to measure its depths. But when the depth is shallow as happens near a beach, waves become skewed. Similarly, a measurement of skewness in the projected matter distribution directly measures the total matter content of the universe. While skewness has already been convincingly detected, its constraint on cosmology is still weak. We address optimal analyses for the CFHT Legacy Survey in the presence of noise. We show that a compensated Gaussian filter with a width of 2.5 arc minutes optimizes the cosmological constraint, yielding $\\Delta \\Omega_m/\\Omega_m\\sim 10%$. This is significantly better than other filt...

  15. The weak scale from BBN

    Science.gov (United States)

    Hall, Lawrence J.; Pinner, David; Ruderman, Joshua T.

    2014-12-01

    The measured values of the weak scale, v, and the first generation masses, m u, d, e , are simultaneously explained in the multiverse, with all these parameters scanning independently. At the same time, several remarkable coincidences are understood. Small variations in these parameters away from their measured values lead to the instability of hydrogen, the instability of heavy nuclei, and either a hydrogen or a helium dominated universe from Big Bang Nucleosynthesis. In the 4d parameter space of ( m u , m d , m e , v), catastrophic boundaries are reached by separately increasing each parameter above its measured value by a factor of (1.4, 1.3, 2.5, ˜ 5), respectively. The fine-tuning problem of the weak scale in the Standard Model is solved: as v is increased beyond the observed value, it is impossible to maintain a significant cosmological hydrogen abundance for any values of m u, d, e that yield both hydrogen and heavy nuclei stability.

  16. Weak Quasielastic Production of Hyperons

    CERN Document Server

    Athar, M Sajjad; Alam, M Rafi; Chauhan, S; Singh, S K

    2016-01-01

    We present the results for antineutrino induced quasielastic hyperon production from nucleon and nuclear targets \\cite{Alam:2014bya,Singh:2006xp}. The inputs are the nucleon-hyperon(N--Y) transition form factors determined from the analysis of neutrino-nucleon scattering and semileptonic decays of neutron and hyperons using SU(3) symmetry. The calculations for the nuclear targets are done in local density approximation. The nuclear medium effects(NME) like Fermi motion, Pauli blocking and final state interaction(FSI) effects due to hyperon-nucleon scattering have been taken into account. The hyperons giving rise to pions through weak decays also contribute to the weak pion production in addition to the $\\Delta$ excitation mechanism which dominates in the energy region of $<$ 0.7 GeV. We also present the results of longitudinal and perpendicular components of polarization of final hyperon \\cite{Akbar:2016awk}. These measurements in the future accelerator experiments with antineutrinos may give some informat...

  17. Weak lensing and cosmological investigation

    CERN Document Server

    Acquaviva, V

    2005-01-01

    In the last few years the scientific community has been dealing with the challenging issue of identifying the dark energy component. We regard weak gravitational lensing as a brand new, and extremely important, tool for cosmological investigation in this field. In fact, the features imprinted on the cosmic microwave background radiation by the lensing from the intervening distribution of matter represent a pretty unbiased estimator, and can thus be used for putting constraints on different dark energy models. This is true in particular for the magnetic-type B-modes of CMB polarization, whose unlensed spectrum at large multipoles (l approximately=1000) is very small even in presence of an amount of gravitational waves as large as currently allowed by the experiments: therefore, on these scales the lensing phenomenon is the only responsible for the observed power, and this signal turns out to be a faithful tracer of the dark energy dynamics. We first recall the formal apparatus of the weak lensing in extended t...

  18. Political corruption and weak state

    Directory of Open Access Journals (Sweden)

    Stojiljković Zoran

    2013-01-01

    Full Text Available The author starts from the hypothesis that it is essential for the countries of the region to critically assess the synergy established between systemic, political corruption and a selectively weak, “devious” nature of the state. Moreover, the key dilemma is whether the expanded practice of political rent seeking supports the conclusion that the root of all corruption is in the very existence of the state - particularly in excessive, selective and deforming state interventions and benefits that create a fertile ground for corruption? The author argues that the destructive combination of weak government and rampant political corruption is based on scattered state intervention, while also rule the parties cartel in the executive branch subordinate to parliament, the judiciary and the police. Corrupt exchange takes place with the absence of strong institutional framework and the precise rules of the political and electoral games, control of public finances and effective political and anti-monopoly legislation and practice included. Exit from the current situation can be seen in the realization of effective anti­corruption strategy that integrates preventive and repressive measures and activities and lead to the establishment of principles of good governance. [Projekat Ministarstva nauke Republike Srbije, br. 179076: Politički identitet Srbije u regionalnom i globalnom kontekstu

  19. Time—periodic weak solutions

    Directory of Open Access Journals (Sweden)

    Eliana Henriques de Brito

    1990-01-01

    Full Text Available In continuing from previous papers, where we studied the existence and uniqueness of the global solution and its asymptotic behavior as time t goes to infinity, we now search for a time-periodic weak solution u(t for the equation whose weak formulation in a Hilbert space H isddt(u′,v+δ(u′,v+αb(u,v+βa(u,v+(G(u,v=(h,vwhere: ′=d/dt; (′ is the inner product in H; b(u,v, a(u,v are given forms on subspaces U⊂W, respectively, of H; δ>0, α≥0, β≥0 are constants and α+β>0; G is the Gateaux derivative of a convex functional J:V⊂H→[0,∞ for V=U, when α>0 and V=W when α=0, hence β>0; v is a test function in V; h is a given function of t with values in H.

  20. Strength and Balance Exercises

    Science.gov (United States)

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Strength and Balance Exercises Updated:Sep 8,2016 If ... Be Safe While Being Active - Stretching & Flexibility Exercises - Strength & Balance Exercises - Problems & Solutions for Being Active - FAQs ...

  1. Experimental evidence of threat-sensitive collective avoidance responses in a large wild-caught herring school.

    Directory of Open Access Journals (Sweden)

    Guillaume Rieucau

    Full Text Available Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus when in a large school (approximately 60,000 individuals. By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage, we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the "threat-sensitive hypothesis".

  2. Experimental evidence of threat-sensitive collective avoidance responses in a large wild-caught herring school.

    Science.gov (United States)

    Rieucau, Guillaume; Boswell, Kevin M; De Robertis, Alex; Macaulay, Gavin J; Handegard, Nils Olav

    2014-01-01

    Aggregation is commonly thought to improve animals' security. Within aquatic ecosystems, group-living prey can learn about immediate threats using cues perceived directly from predators, or from collective behaviours, for example, by reacting to the escape behaviours of companions. Combining cues from different modalities may improve the accuracy of prey antipredatory decisions. In this study, we explored the sensory modalities that mediate collective antipredatory responses of herring (Clupea harengus) when in a large school (approximately 60,000 individuals). By conducting a simulated predator encounter experiment in a semi-controlled environment (a sea cage), we tested the hypothesis that the collective responses of herring are threat-sensitive. We investigated whether cues from potential threats obtained visually or from the perception of water displacement, used independently or in an additive way, affected the strength of the collective avoidance reactions. We modified the sensory nature of the simulated threat by exposing the herring to 4 predator models differing in shape and transparency. The collective vertical avoidance response was observed and quantified using active acoustics. The combination of sensory cues elicited the strongest avoidance reactions, suggesting that collective antipredator responses in herring are mediated by the sensory modalities involved during threat detection in an additive fashion. Thus, this study provides evidence for magnitude-graded threat responses in a large school of wild-caught herring which is consistent with the "threat-sensitive hypothesis".

  3. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  4. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  5. Nash bargaining with a nondeterministic threat

    CERN Document Server

    Soileau, Kerry Michael

    2008-01-01

    We consider bargaining problems which involve two participants, with a nonempty closed, bounded convex bargaining set of points in the real plane representing all realizable bargains. We also assume that there is no definite threat or disagreement point which will provide the default bargain if the players cannot agree on some point in the bargaining set. However, there is a nondeterministic threat: if the players fail to agree on a bargain, one of them will be chosen at random with equal probability, and that chosen player will select any realizable bargain as the solution, subject to a reasonable restriction.

  6. Bioterrorism: is it a real threat?

    Science.gov (United States)

    Gottschalk, René; Preiser, Wolfgang

    2005-05-01

    The Geneva Protocol of 1925 commits the signatory nations to refraining from the use of biological weapons. However, the terrorist assaults of September 2001 and, subsequently, the anthrax-containing letters are cause for great concerns: new threats to the security of nations are expected, as terrorist organizations seem to increasingly explore novel ways of spreading terror. In this context, naturally emerging diseases such as SARS, monkeypox or West Nile fever assume new importance because it is difficult to distinguish between natural epidemics and possible bioweapon assaults. Great efforts on the part of governments and public health authorities are necessary to counteract these threats.

  7. Strength Training for Girls.

    Science.gov (United States)

    Connaughton, Daniel; Connaughton, Angela; Poor, Linda

    2001-01-01

    Strength training can be fun, safe, and appropriate for young girls and women and is an important component of any fitness program when combined with appropriate cardiovascular and flexibility activities. Concerns and misconceptions regarding girls' strength training are discussed, presenting general principles of strength training for children…

  8. Strength Training for Girls.

    Science.gov (United States)

    Connaughton, Daniel; Connaughton, Angela; Poor, Linda

    2001-01-01

    Strength training can be fun, safe, and appropriate for young girls and women and is an important component of any fitness program when combined with appropriate cardiovascular and flexibility activities. Concerns and misconceptions regarding girls' strength training are discussed, presenting general principles of strength training for children…

  9. Casimir torque in weak coupling

    CERN Document Server

    Milton, Kimball A; Long, William

    2013-01-01

    In this paper, dedicated to Johan H{\\o}ye on the occasion of his 70th birthday, we examine manifestations of Casimir torque in the weak-coupling approximation, which allows exact calculations so that comparison with the universally applicable, but generally uncontrolled, proximity force approximation may be made. In particular, we examine Casimir energies between planar objects characterized by $\\delta$-function potentials, and consider the torque that arises when angles between the objects are changed. The results agree very well with the proximity force approximation when the separation distance between the objects is small compared with their sizes. In the opposite limit, where the size of one object is comparable to the separation distance, the shape dependence starts becoming irrelevant. These calculations are illustrative of what to expect for the torques between, for example, conducting planar objects, which eventually should be amenable to both improved theoretical calculation and experimental verific...

  10. New Weak Keys in RSA

    Institute of Scientific and Technical Information of China (English)

    WANG Baocang; LIU Shuanggen; HU Yupu

    2006-01-01

    The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown that the RSA number n=pq can be easily factored if p and q have the special form of p=as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).

  11. Defensive activation to (un)predictable interoceptive threat: The NPU respiratory threat test (NPUr).

    Science.gov (United States)

    Schroijen, Mathias; Fantoni, Simona; Rivera, Carmen; Vervliet, Bram; Schruers, Koen; van den Bergh, Omer; van Diest, Ilse

    2016-06-01

    Potentially life-threatening interoceptive sensations easily engage the behavioral defensive system. Resulting fear and anxiety toward interoceptive threat are functionally distinct states that are hypothesized to play a prominent role in the etiology of panic disorder. The present study aimed to investigate whether fear- and anxiety-potentiated startle responses occur to predictable and unpredictable interoceptive threat, respectively. Therefore, we modified the NPU threat test (Schmitz & Grillon, ) and replaced the aversive electrocutaneous stimulus with an aversive interoceptive stimulus (a breathing occlusion, making it briefly impossible to breathe). Healthy participants (N = 48) underwent three instructed conditions. A visual cue signaled the occlusion in the predictable condition (P), whereas another cue was unrelated to the occurrence of the occlusion in the unpredictable condition (U). The safe condition (N) also had a visual cue, but no occlusion. Both fear- and anxiety-potentiated startle blink responses were observed in response to predictable and unpredictable respiratory threat, respectively. The current study presents and validates the NPU respiratory threat test (NPUr) as an ecologically valid paradigm to study both anxiety and fear in response to a panic-relevant interoceptive threat. The paradigm allows future testing of contextual generalization, investigation of different clinical groups, and more explicit comparisons of defensive responding to interoceptive versus exteroceptive threats.

  12. Using the threat probability task to assess anxiety and fear during uncertain and certain threat.

    Science.gov (United States)

    Bradford, Daniel E; Magruder, Katherine P; Korhumel, Rachel A; Curtin, John J

    2014-09-12

    Fear of certain threat and anxiety about uncertain threat are distinct emotions with unique behavioral, cognitive-attentional, and neuroanatomical components. Both anxiety and fear can be studied in the laboratory by measuring the potentiation of the startle reflex. The startle reflex is a defensive reflex that is potentiated when an organism is threatened and the need for defense is high. The startle reflex is assessed via electromyography (EMG) in the orbicularis oculi muscle elicited by brief, intense, bursts of acoustic white noise (i.e., "startle probes"). Startle potentiation is calculated as the increase in startle response magnitude during presentation of sets of visual threat cues that signal delivery of mild electric shock relative to sets of matched cues that signal the absence of shock (no-threat cues). In the Threat Probability Task, fear is measured via startle potentiation to high probability (100% cue-contingent shock; certain) threat cues whereas anxiety is measured via startle potentiation to low probability (20% cue-contingent shock; uncertain) threat cues. Measurement of startle potentiation during the Threat Probability Task provides an objective and easily implemented alternative to assessment of negative affect via self-report or other methods (e.g., neuroimaging) that may be inappropriate or impractical for some researchers. Startle potentiation has been studied rigorously in both animals (e.g., rodents, non-human primates) and humans which facilitates animal-to-human translational research. Startle potentiation during certain and uncertain threat provides an objective measure of negative affective and distinct emotional states (fear, anxiety) to use in research on psychopathology, substance use/abuse and broadly in affective science. As such, it has been used extensively by clinical scientists interested in psychopathology etiology and by affective scientists interested in individual differences in emotion.

  13. Strength Modeling Report

    Science.gov (United States)

    Badler, N. I.; Lee, P.; Wong, S.

    1985-01-01

    Strength modeling is a complex and multi-dimensional issue. There are numerous parameters to the problem of characterizing human strength, most notably: (1) position and orientation of body joints; (2) isometric versus dynamic strength; (3) effector force versus joint torque; (4) instantaneous versus steady force; (5) active force versus reactive force; (6) presence or absence of gravity; (7) body somatotype and composition; (8) body (segment) masses; (9) muscle group envolvement; (10) muscle size; (11) fatigue; and (12) practice (training) or familiarity. In surveying the available literature on strength measurement and modeling an attempt was made to examine as many of these parameters as possible. The conclusions reached at this point toward the feasibility of implementing computationally reasonable human strength models. The assessment of accuracy of any model against a specific individual, however, will probably not be possible on any realistic scale. Taken statistically, strength modeling may be an effective tool for general questions of task feasibility and strength requirements.

  14. The strength compass

    DEFF Research Database (Denmark)

    Ledertoug, Mette Marie

    Individual paper presentation: The ‘Strength Compass’. The results of a PhDresearch project among schoolchildren (age 6-16) identifying VIAstrengths concerning age, gender, mother-tongue-langue and possible child psychiatric diagnosis. Strengths-based interventions in schools have a theoretical...... foundation in research in VIA-strengths by Seligman & Peterson (2004) and in research on strengths by Linley (2008). Based on this research the VIA-test was created for adults and later for children and youths from the age of 10. For children younger than 10 years of age Peterson & Park (2011) have made...... interviews with the parents. For younger children there has been no possibility to test for strengths. In a Danish PhD project a tool to map children’s strengths was needed for children aged 6-16 and with permission from the VIA-institute ‘The Strength Compass’ was made in cooperation with The Danish...

  15. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... resistant Staphylococcus aureus (MRSA) [page 77] Drug-resistant Streptococcus pneumoniae [page 79] Drug-resistant tuberculosis [page 81] Microorganisms with a Threat Level of Concerning Vancomycin-resistant Staphylococcus aureus ... Streptococcus [page 87] Clindamycin-resistant Group B Streptococcus [page ...

  16. Southern Africa’s Transnational Threats

    Science.gov (United States)

    2013-04-01

    smuggling of rare species and resources , money laundering, and smuggling of stolen vehicles. All of these events share a common trait. They each imply a...and Instability in Central Africa” A Threat Assesment , October 2011, linked from United Nations Office on Drugs and Crime home page at “Annual

  17. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  18. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  19. Dismount Threat Recognition through Automatic Pose Identification

    Science.gov (United States)

    2012-03-01

    camera and joint estimation software of the Kinect for Xbox 360. A threat determination is made based on the pose identified by the network. Ac- curacy...mapping produced by the Kinect sensor [3]. . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.5. Test subject and generated model. The subject is...16 3.2. Joint position estimates extracted from Kinect . Example of col- lecting orthogonal poses

  20. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  1. The Missing Piece in Threat Intelligence

    Directory of Open Access Journals (Sweden)

    Frank Denis

    2016-03-01

    Full Text Available Common systems for sharing intelligence on security threats have not been designed to efficiently process feedback from infrastructure providers. In order to fill this gap, we introduce DIP, a new description language to expose changes being made on a network that are relevant to security research and prevention.

  2. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We the

  3. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  4. Hostile Intelligence Threat U.S. Technology

    Science.gov (United States)

    1988-11-01

    Assistant Secretary of Defense for DoD 5200.1-PH-2 Command, Control, Comunnications , and Intelligence (703) 695-2686 DEPARTMENT OF DEFENSE DTIC...intelligence threat: "* PROGRAM MANAGER Telephone: "* INSTALLATION SECURITY OFFICE Telephone: "* LOCAL DIS COGNIZANT SECURITY OFFICE (Industrial

  5. Global threat to agriculture from invasive species.

    Science.gov (United States)

    Paini, Dean R; Sheppard, Andy W; Cook, David C; De Barro, Paul J; Worner, Susan P; Thomas, Matthew B

    2016-07-05

    Invasive species present significant threats to global agriculture, although how the magnitude and distribution of the threats vary between countries and regions remains unclear. Here, we present an analysis of almost 1,300 known invasive insect pests and pathogens, calculating the total potential cost of these species invading each of 124 countries of the world, as well as determining which countries present the greatest threat to the rest of the world given their trading partners and incumbent pool of invasive species. We find that countries vary in terms of potential threat from invasive species and also their role as potential sources, with apparently similar countries sometimes varying markedly depending on specifics of agricultural commodities and trade patterns. Overall, the biggest agricultural producers (China and the United States) could experience the greatest absolute cost from further species invasions. However, developing countries, in particular, Sub-Saharan African countries, appear most vulnerable in relative terms. Furthermore, China and the United States represent the greatest potential sources of invasive species for the rest of the world. The analysis reveals considerable scope for ongoing redistribution of known invasive pests and highlights the need for international cooperation to slow their spread.

  6. Threats and Vulnerabilities of RFID and Beyond

    NARCIS (Netherlands)

    Hoepman, J.H.; Veugen, P.J.M.

    2009-01-01

    This chapter discusses both security and privacy threats to RFID systems, in a balanced way. We first outline the general architecture of an RFID system, the stakeholders managing the different components, and identify the specific properties of RFID systems relevant for privacy and security. We

  7. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available to outsource, as well as the success of an IS outsourcing arrangement. Managing successful IS outsourcing relationships is concerned with exploiting outsourcing opportunities and avoiding outsourcing threats. The aim of this paper is to share the findings of a...

  8. The silent threat of low genetic diversity

    Science.gov (United States)

    Hunter, Margaret E.

    2013-01-01

    Across the Caribbean, protected coastal waters have served as primary feeding and breeding grounds for the endangered Antillean manatee. Unfortunately, these same coastal waters are also a popular “habitat” for humans. In the past, the overlap between human and manatee habitat allowed for manatee hunting and threatened the survival of these gentle marine mammals. Today, however, threats are much more inadvertent and are often related to coastal development, degraded habitats and boat strikes. In the state of Florida, decades of research on the species’ biological needs have helped conservationists address threats to its survival. For example, low wake zones and boater education have protected manatees from boat strikes, and many of their critical winter refuges are now protected. The Florida population has grown steadily, thus increasing from approximately 1,200 in 1991 to more than 5,000 in 2010. It is conceivable that in Florida manatees may one day be reclassified as “threatened” rather than “endangered.” Yet, in other parts of the Caribbean, threats still loom. This includes small, isolated manatee populations found on islands that can be more susceptible to extinction and lack of genetic diversity. To ensure the species’ long-term viability, scientists have turned their sights to the overall population dynamics of manatees throughout the Caribbean. Molecular genetics has provided new insights into long-term threats the species faces. Fortunately, the emerging field of conservation genetics provides managers with tools and strategies for protecting the species’ long-term viability.

  9. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  10. Patriotism and the impact on perceived threat and immigration attitudes.

    Science.gov (United States)

    Willis-Esqueda, Cynthia; Delgado, Rosa Hazel; Pedroza, Karina

    2017-01-01

    Patriotism and threat have been shown to predict immigration attitudes. We suggest that patriotism is influential in producing threat, and such threat drives anti-immigration attitudes, but this relationship is different for Whites and Latinos. All participants completed a patriotism scale (blind and constructive patriotism measures), a threat scale (realistic and symbolic threat), and anti-immigration attitude scale. Latinos showed lower blind patriotism, realistic threat, symbolic threat, and anti-immigration attitudes compared to Whites, with no differences in constructive patriotism. Threat partially mediated the relationship between blind patriotism and anti-immigration attitudes for Whites and fully mediated the relationship for Latinos. Threat partially mediated the relationship for cultural patriotism and anti-immigration attitude for Whites but not for Latinos. Implications for public policy and education concerning immigrant attitudes are discussed.

  11. On fuzzy weakly-closed sets

    OpenAIRE

    Mahanta, J.; P. K. Das

    2012-01-01

    A new class of fuzzy closed sets, namely fuzzy weakly closed set in a fuzzy topological space is introduced and it is established that this class of fuzzy closed sets lies between fuzzy closed sets and fuzzy generalized closed sets. Alongwith the study of fundamental results of such closed sets, we define and characterize fuzzy weakly compact space and fuzzy weakly closed space.

  12. Twisting theory for weak Hopf algebras

    Institute of Scientific and Technical Information of China (English)

    CHEN Ju-zhen; ZHANG Yan; WANG Shuan-hong

    2008-01-01

    The main aim of this paper is to study the twisting theory of weak Hopf algebras and give an equivalence between the (braided) monoidal categories of weak Hopf bimodules over the original and the twisted weak Hopf algebra to generalize the result from Oeckl (2000).

  13. Reconstruction of weak quasi-Hopf algebras

    CERN Document Server

    Häring, Reto Andreas

    1995-01-01

    All rational semisimple braided tensor categories are representation categories of weak quasi Hopf algebras. To proof this result we construct for any given category of this kind a weak quasi tensor functor to the category of finite dimensional vector spaces. This allows to reconstruct a weak quasi Hopf algebra with the given category as its representation category.

  14. Migrant networks and international migration: testing weak ties.

    Science.gov (United States)

    Liu, Mao-Mei

    2013-08-01

    This article examines the role of migrant social networks in international migration and extends prior research by testing the strength of tie theory, decomposing networks by sources and resources, and disentangling network effects from complementary explanations. Nearly all previous empirical research has ignored friendship ties and has largely neglected extended-family ties. Using longitudinal data from the Migration between Africa and Europe project collected in Africa (Senegal) and Europe (France, Italy, and Spain), this article tests the robustness of network theory-and in particular, the role of weak ties-on first-time migration between Senegal and Europe. Discrete-time hazard model results confirm that weak ties are important and that network influences appear to be gendered, but they do not uphold the contention in previous literature that strong ties are more important than weak ties for male and female migration. Indeed, weak ties play an especially important role in male migration. In terms of network resources, having more resources as a result of strong ties appears to dampen overall migration, while having more resources as a result of weaker ties appears to stimulate male migration. Finally, the diversity of resources has varied effects for male and female migration.

  15. Open string T-duality in a weakly curved background

    Energy Technology Data Exchange (ETDEWEB)

    Davidovic, Ljubica [University of Belgrade, Institute of Physics, Belgrade (Serbia)

    2016-12-15

    We consider a theory of an open string moving in a weakly curved background, composed of a constant metric and a linearly coordinate dependent Kalb-Ramond field with an infinitesimal field strength. We find its T-dual using the generalized Buscher procedure developed for the closed string moving in a weakly curved background, and the fact that solving the boundary conditions, the open string theory transforms to the effective closed string theory. So, T-dualizing the effective theory along all effective directions we obtain its T-dual theory and resume the open string theory which has such an effective theory. In this way we obtain the open string theory T-dual. (orig.)

  16. Weak gravitational lensing by fourth order gravity black holes

    CERN Document Server

    Horváth, Zsolt; Hobill, David; Capozziello, Salvatore; De Laurentis, Mariafelicia

    2012-01-01

    We discuss weak lensing characteristics for black holes in a fourth order f(R) gravity theory, characterized by a gravitational strength parameter $\\sigma $ and a distance scale $r_{c}$. Above $r_{c}$ gravity is strengthened and as a consequence weak lensing features are modified compared to the Schwarzschild case. We find a critical impact parameter (depending upon $r_{c}$) for which the behavior of the deflection angle changes. Using the Virbhadra-Ellis lens equation we improve the computation of the image positions, Einstein ring radii, magnification factors and the magnification ratio. We demonstrate that the magnification ratio as function of image separation has a different power-law dependence for each parameter $\\sigma $. As these are the lensing quantities most conveniently determined by direct measurements, future lensing surveys will be able to constrain the parameter $\\sigma $ based on this prediction.

  17. Open string T-duality in a weakly curved background

    Science.gov (United States)

    Davidović, Ljubica

    2016-12-01

    We consider a theory of an open string moving in a weakly curved background, composed of a constant metric and a linearly coordinate dependent Kalb-Ramond field with an infinitesimal field strength. We find its T-dual using the generalized Buscher procedure developed for the closed string moving in a weakly curved background, and the fact that solving the boundary conditions, the open string theory transforms to the effective closed string theory. So, T-dualizing the effective theory along all effective directions we obtain its T-dual theory and resume the open string theory which has such an effective theory. In this way we obtain the open string theory T-dual.

  18. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere.

    Science.gov (United States)

    Zhang, T L; Baumjohann, W; Russell, C T; Luhmann, J G; Xiao, S D

    2016-03-24

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth's twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander.

  19. Weak, Quiet Magnetic Fields Seen in the Venus Atmosphere

    Science.gov (United States)

    Zhang, T. L.; Baumjohann, W.; Russell, C. T.; Luhmann, J. G.; Xiao, S. D.

    2016-01-01

    The existence of a strong internal magnetic field allows probing of the interior through both long term changes of and short period fluctuations in that magnetic field. Venus, while Earth’s twin in many ways, lacks such a strong intrinsic magnetic field, but perhaps short period fluctuations can still be used to probe the electrical conductivity of the interior. Toward the end of the Venus Express mission, an aerobraking campaign took the spacecraft below the ionosphere into the very weakly electrically conducting atmosphere. As the spacecraft descended from 150 to 140 km altitude, the magnetic field became weaker on average and less noisy. Below 140 km, the median field strength became steady but the short period fluctuations continued to weaken. The weakness of the fluctuations indicates they might not be useful for electromagnetic sounding of the atmosphere from a high altitude platform such as a plane or balloon, but possibly could be attempted on a lander. PMID:27009234

  20. Defense Business Transformation: DOD Has Taken Some Steps to Address Weaknesses, but Additional Actions Are Needed

    Science.gov (United States)

    2015-02-01

    cover all key attributes of successful performance, we feel they are important for accurately assessing the strengths and weaknesses of performance...an agency strategic plan which will lay out a strategy for addressing business transformation weaknesses and identifying cost savings and...areas and that management is held accountable for producing results. DOD’s current CMO, who is also the Deputy Secretary of Defense, has brought an

  1. Using SWOT Analysis for Promoting the Accounting Program.

    Science.gov (United States)

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  2. Using SWOT Analysis for Promoting the Accounting Program.

    Science.gov (United States)

    Sawyer, Joe E.

    2001-01-01

    Describes how SWOT (strengths, weaknesses, opportunities, threats) analysis can be used by business educators to find the best match between environmental trends (opportunities and threats) and internal departmental capabilities (strengths and weaknesses). An example from accounting education is provided. (JOW)

  3. Weakly Distributive Modules. Applications to Supplement Submodules

    Indian Academy of Sciences (India)

    Engin Büyükaşik; Yilmaz M Demirci

    2010-11-01

    In this paper, we define and study weakly distributive modules as a proper generalization of distributive modules. We prove that, weakly distributive supplemented modules are amply supplemented. In a weakly distributive supplemented module every submodule has a unique coclosure. This generalizes a result of Ganesan and Vanaja. We prove that -projective duo modules, in particular commutative rings, are weakly distributive. Using this result we obtain that in a commutative ring supplements are unique. This generalizes a result of Camillo and Lima. We also prove that any weakly distributive $\\oplus$-supplemented module is quasi-discrete.

  4. Weakly relativistic dispersion of Bernstein waves

    Science.gov (United States)

    Robinson, P. A.

    1988-01-01

    Weakly relativistic effects on the dispersion of Bernstein waves are investigated for waves propagating nearly perpendicular to a uniform magnetic field in a Maxwellian plasma. Attention is focused on those large-wave-vector branches that are either weakly damped or join continuously onto weakly damped branches since these are the modes of most interest in applications. The transition between dispersion at perpendicular and oblique propagation is examined and major weakly relativistic effects can dominate even in low-temperature plasmas. A number of simple analytic criteria are obtained which delimit the ranges of harmonic number and propagation angle within which various types of weakly damped Bernstein modes can exist.

  5. Weakly relativistic dispersion of Bernstein waves

    Science.gov (United States)

    Robinson, P. A.

    1988-01-01

    Weakly relativistic effects on the dispersion of Bernstein waves are investigated for waves propagating nearly perpendicular to a uniform magnetic field in a Maxwellian plasma. Attention is focused on those large-wave-vector branches that are either weakly damped or join continuously onto weakly damped branches since these are the modes of most interest in applications. The transition between dispersion at perpendicular and oblique propagation is examined and major weakly relativistic effects can dominate even in low-temperature plasmas. A number of simple analytic criteria are obtained which delimit the ranges of harmonic number and propagation angle within which various types of weakly damped Bernstein modes can exist.

  6. Muscle weakness, afferent sensory dysfunction and exercise in knee osteoarthritis

    DEFF Research Database (Denmark)

    Roos, Ewa M.; Herzog, Walter; Block, Joel A

    2011-01-01

    Lower-extremity muscle strength and afferent sensory dysfunction, such as reduced proprioceptive acuity, are potentially modifiable putative risk factors for knee osteoarthritis (OA). Findings from current studies suggest that muscle weakness is a predictor of knee OA onset, while there is confli...... with previous knee injuries) are easily identified, and may benefit from exercise interventions to prevent or delay OA onset....... a possibility for achieving preventive structure or load modifications. In contrast, large randomized controlled trials of patients with established OA have failed to demonstrate beneficial effects of strengthening exercises. Subgroups of individuals who are at increased risk of knee OA (such as those...

  7. A Universe without Weak Interactions

    Energy Technology Data Exchange (ETDEWEB)

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-04-07

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical ''Weakless Universe'' is matched to our Universe by simultaneously adjusting Standard Model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the Weakless Universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multi-parameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  8. A universe without weak interactions

    Science.gov (United States)

    Harnik, Roni; Kribs, Graham D.; Perez, Gilad

    2006-08-01

    A universe without weak interactions is constructed that undergoes big-bang nucleosynthesis, matter domination, structure formation, and star formation. The stars in this universe are able to burn for billions of years, synthesize elements up to iron, and undergo supernova explosions, dispersing heavy elements into the interstellar medium. These definitive claims are supported by a detailed analysis where this hypothetical “weakless universe” is matched to our Universe by simultaneously adjusting standard model and cosmological parameters. For instance, chemistry and nuclear physics are essentially unchanged. The apparent habitability of the weakless universe suggests that the anthropic principle does not determine the scale of electroweak breaking, or even require that it be smaller than the Planck scale, so long as technically natural parameters may be suitably adjusted. Whether the multiparameter adjustment is realized or probable is dependent on the ultraviolet completion, such as the string landscape. Considering a similar analysis for the cosmological constant, however, we argue that no adjustments of other parameters are able to allow the cosmological constant to raise up even remotely close to the Planck scale while obtaining macroscopic structure. The fine-tuning problems associated with the electroweak breaking scale and the cosmological constant therefore appear to be qualitatively different from the perspective of obtaining a habitable universe.

  9. Weak homology of elliptical galaxies

    CERN Document Server

    Bertin, G; Principe, M D

    2002-01-01

    We start by studying a small set of objects characterized by photometric profiles that have been pointed out to deviate significantly from the standard R^{1/4} law. For these objects we confirm that a generic R^{1/n} law, with n a free parameter, can provide superior fits (the best-fit value of n can be lower than 2.5 or higher than 10), better than those that can be obtained by a pure R^{1/4} law, by an R^{1/4}+exponential model, and by other dynamically justified self--consistent models. Therefore, strictly speaking, elliptical galaxies should not be considered homologous dynamical systems. Still, a case for "weak homology", useful for the interpretation of the Fundamental Plane of elliptical galaxies, could be made if the best-fit parameter n, as often reported, correlates with galaxy luminosity L, provided the underlying dynamical structure also follows a systematic trend with luminosity. We demonstrate that this statement may be true even in the presence of significant scatter in the correlation n(L). Pr...

  10. Testing the weak equivalence principle

    Science.gov (United States)

    Nobili, Anna M.; Comandi, Gian Luca; Pegna, Raffaello; Bramanti, Donato; Doravari, Suresh; Maccarone, Francesco; Lucchesi, David M.

    2010-01-01

    The discovery of Dark Energy and the fact that only about 5% of the mass of the universe can be explained on the basis of the current laws of physics have led to a serious impasse. Based on past history, physics might indeed be on the verge of major discoveries; but the challenge is enormous. The way to tackle it is twofold. On one side, scientists try to perform large scale direct observations and measurements - mostly from space. On the other, they multiply their efforts to put to the most stringent tests ever the physical theories underlying the current view of the physical world, from the very small to the very large. On the extremely small scale very exciting results are expected from one of the most impressive experiments in the history of mankind: the Large Hadron Collider. On the very large scale, the universe is dominated by gravity and the present impasse undoubtedly calls for more powerful tests of General Relativity - the best theory of gravity to date. Experiments testing the Weak Equivalence Principle, on which General Relativity ultimately lies, have the strongest probing power of them all; a breakthrough in sensitivity is possible with the “Galileo Galilei” (GG) satellite experiment to fly in low Earth orbit.

  11. The Geometry And Significance Of Weak Energy

    CERN Document Server

    Parks, A D

    2000-01-01

    Summary: The theory of weak values for quantum mechanical observables has come to serve as a useful basis for contemporary discussions concerning such varied topics as the tunnelling-time controversy and quantum stochastic processes. An intrinsic complex-valued weak energy has recently been observed experimentally and reported in the literature. In this paper it is shown that: (a) the real and imaginary valued parts of this weak energy have geometric interpretations related to a phase acquired from parallel transport in Hilbert space and the variational dynamics occurring in the associated projective Hilbert space, respectively; (b) the weak energy defines functions which translate correlation amplitudes and probabilities in time; (c) correlation probabilities can be controlled by manipulating the weak energy and there exists a condition of weak stationarity that guarantees their time invariance; and (d) a time-weak energy uncertainty relation of the usual form prevails when a suitable set of dynamical constr...

  12. Creep Strength of Discontinuous Fibre Composites

    DEFF Research Database (Denmark)

    Pedersen, Ole Bøcker

    1974-01-01

    relation between stress and strain rate. Expressions for the interface stress, the creep velocity profile adjacent to the fibres and the creep strength of the composite are derived. Previous results for the creep strength, sc = aVfs0 ( \\frac[( Î )\\dot] [( Î )\\dot] 0 )1/nr1 + 1/n c=Vf001n1+1n in which[( Î...... )\\dot] is the composite creep rate,V f is the fibre volume fraction,sgr 0,epsi 0 andn are the constants in the matrix creep law. The creep strength coefficient agr is found to be very weakly dependent onV f and practically independent ofn whenn is greater than about 6....

  13. Severe Weather and Weak Waterspout Checklist in MIDDS

    Science.gov (United States)

    Wheeler, Mark M.

    2009-01-01

    The goal of this task was to migrate the functionality of the AMU web-based Severe Weather Forecast Decision Aid and the 45 WS Weak Waterspout Checklist to MIDDS, the operational data ingest and display system of the 45 WS. Forecasting the occurrence and timing of warm season severe weather and weak waterspouts is challenging for 45 WS operational personnel. These interactive tools assist forecasters in determining the probability of issuing severe weather watches and warnings for the day. MIDDS is able retrieve many of the needed parameter values for the worksheet automatically. The AMU was able to develop user-friendly tools in MIDDS for both of these tools using McBASI coded programs. The tools retrieve needed values from MIDDS automatically, and require the forecaster to answer a few subjective questions. Both tools were tested and previewed to the 45 WS on MIDDS. In their previous forms, the forecasters enter values into both tools manually to output a threat index. Making these tools more automatic will reduce the possibility of human error and increase efficiency.

  14. Strength of Plastics,

    Science.gov (United States)

    evaluating the strength of structural elements is examined. The book is intended for design engineers, factory laboratory personnel, scientific research workers, and the design institutes. (Author-PL)

  15. Identifying Weak Ties from Publicly Available Social Media Data in an Event

    DEFF Research Database (Denmark)

    Prakash Gupta, Jayesh; Menon, Karan; Kärkkäinen, Hannu

    2016-01-01

    or potential weak ties using publicly available social media data in the context of an event. Our case study environment is community managers' online discussions in social media in connection to the yearly-organized Community Manager Appreciation Day (CMAD 2016) event in Finland. We were able to identify...... potential weak ties using the conversation based structural holes, making use of social network analysis methods (like clustering) and content analysis in the context of events. We add to the understanding of and useful data sources for the Strength of weak ties theory originated from Granovetter...

  16. Violation of the Leggett-Garg inequality with weak measurements of photons.

    Science.gov (United States)

    Goggin, M E; Almeida, M P; Barbieri, M; Lanyon, B P; O'Brien, J L; White, A G; Pryde, G J

    2011-01-25

    By weakly measuring the polarization of a photon between two strong polarization measurements, we experimentally investigate the correlation between the appearance of anomalous values in quantum weak measurements and the violation of realism and nonintrusiveness of measurements. A quantitative formulation of the latter concept is expressed in terms of a Leggett-Garg inequality for the outcomes of subsequent measurements of an individual quantum system. We experimentally violate the Leggett-Garg inequality for several measurement strengths. Furthermore, we experimentally demonstrate that there is a one-to-one correlation between achieving strange weak values and violating the Leggett-Garg inequality.

  17. Improving the fidelity of teleportation through noisy channels using weak measurement

    Energy Technology Data Exchange (ETDEWEB)

    Pramanik, T., E-mail: tanu.pram99@bose.res.in; Majumdar, A.S., E-mail: archan@bose.res.in

    2013-12-13

    We employ the technique of weak measurement in order to enable preservation of teleportation fidelity for two-qubit noisy channels. We consider one or both qubits of a maximally entangled state to undergo amplitude damping, and show that the application of weak measurement and a subsequent reverse operation could lead to a fidelity greater than 2/3 for any value of the decoherence parameter. The success probability of the protocol decreases with the strength of weak measurement, and is lower when both the qubits are affected by decoherence. Finally, our protocol is shown to work for the Werner state too.

  18. Strength Training and Your Child

    Science.gov (United States)

    ... Feeding Your 1- to 2-Year-Old Strength Training and Your Child KidsHealth > For Parents > Strength Training ... prevent injuries and speed up recovery. About Strength Training Strength training is the practice of using free ...

  19. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  20. Securing Infrastructure from High Explosive Threats

    Energy Technology Data Exchange (ETDEWEB)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  1. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  2. Detecting underwater improvised explosive threats (DUIET)

    Science.gov (United States)

    Feeley, Terry

    2010-04-01

    Improvised Explosive Devices (IEDs) have presented a major threat in the wars in Afghanistan and Iraq. These devices are powerful homemade land mines that can be small and easily hidden near roadsides. They are then remotely detonated when Coalition Forces pass by either singly or in convoys. Their rapid detection, classification and destruction is key to the safety of troops in the area. These land based bombs will have an analogue in the underwater theater especially in ports, lakes, rivers and streams. These devices may be used against Americans on American soil as an element of the global war on terrorism (GWOT) Rapid detection and classification of underwater improvised explosive devices (UIED) is critical to protecting innocent lives and maintaining the day to day flow of commerce. This paper will discuss a strategy and tool set to deal with this potential threat.

  3. Weak* convergence of operator means

    Energy Technology Data Exchange (ETDEWEB)

    Romanov, Alexandr V [Moscow State Institute of Electronics and Mathematics (Technical University), Moscow (Russian Federation)

    2011-12-31

    For a linear operator U with ||U'n||{<=}const on a Banach space X we discuss conditions for the convergence of ergodic operator nets T{sub {alpha}} corresponding to the adjoint operator U* of U in the W*O-topology of the space EndX*. The accumulation points of all possible nets of this kind form a compact convex set L in EndX*, which is the kernel of the operator, where {Gamma}{sub 0}={l_brace}U{sub n}*, n{>=}0{r_brace}. It is proved that all ergodic nets T{sub {alpha}} weakly* converge if and only if the kernel L consists of a single element. In the case of X=C({Omega}) and the shift operator U generated by a continuous transformation {phi} of a metrizable compactum {Omega} we trace the relationships among the ergodic properties of U, the structure of the operator semigroups L, G and {Gamma}={Gamma}-bar{sub 0}, and the dynamical characteristics of the semi-cascade ({phi},{Omega}). In particular, if cardL=1, then a) for any {omega} element of {Omega} the closure of the trajectory {l_brace}{phi}{sup n}{omega}, n{>=}0{r_brace} contains precisely one minimal set m, and b) the restriction ({phi},m) is strictly ergodic. Condition a) implies the W*O-convergence of any ergodic sequence of operators T{sub n} element of EndX* under the additional assumption that the kernel of the enveloping semigroup E({phi},{Omega}) contains elements obtained from the 'basis' family of transformations {l_brace}{phi}{sup n}, n{>=}0{r_brace} of the compact set {Omega} by using some transfinite sequence of sequential passages to the limit.

  4. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.)...

  5. Common Viruses a Deadly Threat At Nursing Homes

    Science.gov (United States)

    ... 163048.html Common Viruses a Deadly Threat at Nursing Homes RSV and human metapneumovirus need to be ... News) -- Common viruses pose a serious threat in nursing homes, often sabotaging standard infection control measures, a ...

  6. Threat Modeling-Oriented Attack Path Evaluating Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Xiaohong; LIU Ran; FENG Zhiyong; HE Ke

    2009-01-01

    In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.

  7. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  8. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Europe , immigrant children consistently underperformed in reading. This disparity suggests that immigrant children will have lower literacy rates, less...OF IMMIGRATION IN EUROPE by Andrew J. Sheehan Lars W. Lilleby December 2012 Thesis Advisor: Gordon McCormick Second Reader: Anna...COVERED Master’s Thesis 4. TITLE AND SUBTITLE The Divisive Threat of Immigration in Europe 5. FUNDING NUMBERS 6. AUTHOR(S) Lars W. Lilleby

  9. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    trained practitioners and even skilled security experts can miss key threats or misunderstand the impact of breaches. Our goal is to automate and...attack risk is $1000 × 0.05, or $50. If the company grows to 10 employees and the probability any one of the employees is untrustworthy is again 0.05...then the expected loss per year is roughly $400, assuming the employees operate independently (Figure 9). This amount will certainly lead to loss of

  10. HYPERSONIC THREATS TO THE HOMELAND STRATEGIC OPTIONS

    Science.gov (United States)

    2017-03-28

    Fighter Squadron, Homestead Air Reserve Base Florida, Director of Operations 80th Fighter Squadron, 8 FW, Kunsan AB, Korea. Lt Col Jeffress...homeland, safeguards the decision space of our nation’s leaders and potentially strengthens military, diplomatic and economic instruments of power... leaders cannot default on their oath to support and defend the constitution against this emergent threat as they prioritize tasks for the administration

  11. Handsets Malware Threats and Facing Techniques

    CERN Document Server

    Elfattah, Marwa M A; Sarhan, Ebada

    2012-01-01

    Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

  12. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  13. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  14. Bot armies as threats to network security

    Science.gov (United States)

    Banks, Sheila B.; Stytz, Martin R.

    2007-04-01

    "Botnets", or "bot armies", are large groups of remotely controlled malicious software. Bot armies pose one of the most serious security threats to all networks. Botnets, remotely controlled and operated by botmasters or botherders, can launch massive denial of service attacks, multiple penetration attacks, or any other malicious network activity on a massive scale. While bot army activity has, in the past, been limited to fraud, blackmail, and other forms of criminal activity, their potential for causing large-scale damage to the entire internet; for launching large-scale, coordinated attacks on government computers and networks; and for large-scale, coordinated data gathering from thousands of users and computers on any network has been underestimated. This paper will not discuss how to build bots but the threats they pose. In a "botnet" or "bot army", computers can be used to spread spam, launch denial-of-service attacks against Web sites, conduct fraudulent activities, and prevent authorized network traffic from traversing the network. In this paper we discuss botnets and the technologies that underlie this threat to network and computer security. The first section motivates the need for improved protection against botnets, their technologies, and for further research about botnets. The second contains background information about bot armies and their key underlying technologies. The third section presents a discussion of the types of attacks that botnets can conduct and potential defenses against them. The fourth section contains a summary and suggestions for future research and development.

  15. Mere effort and stereotype threat performance effects.

    Science.gov (United States)

    Jamieson, Jeremy P; Harkins, Stephen G

    2007-10-01

    Although the fact that stereotype threat impacts performance is well established, the underlying process(es) is(are) not clear. Recently, T. Schmader and M. Johns (2003) argued for a working memory interference account, which proposes that performance suffers because cognitive resources are expended on processing information associated with negative stereotypes. The antisaccade task provides a vehicle to test this account because optimal performance requires working memory resources to inhibit the tendency to look at an irrelevant, peripheral cue (the prepotent response) and to generate volitional saccades to the target. If stereotype threat occupies working memory resources, then the ability to inhibit the prepotent response and to launch volitional saccades will be impaired, and performance will suffer. In contrast, S. Harkins's (2006) mere effort account argues that stereotype threat participants are motivated to perform well, which potentiates the prepotent response, but also leads to efforts to counter this tendency if participants recognize that the response is incorrect, know the correct response, and have the opportunity to make it. Results from 4 experiments support the mere effort but not the working memory interference account.

  16. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  17. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  18. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Strengths of Remarried Families.

    Science.gov (United States)

    Knaub, Patricia Kain; And Others

    1984-01-01

    Focuses on remarried families' (N=80) perceptions of family strengths, marital satisfaction, and adjustment to the remarried situation. Results indicated that although most would like to make some changes, scores on the measurements used were high. A supportive environment was the most important predictor of family strength and success. (JAC)

  20. Building on Our Strengths.

    Science.gov (United States)

    Hill, Robert

    1978-01-01

    Comments on the feeling that the American family is disintegrating, and that many criticisms traditionally made about Black families are now made about White families. Suggests that people need to stress family strengths. As an example, five major strengths of Black families are described: flexibility, work and achievement ethics, religiosity, and…

  1. Death Threat and Death Concerns in the College Student.

    Science.gov (United States)

    Tobacyk, Jerome; Eckstein, Daniel

    1980-01-01

    Thanatology students reported significantly lesser death threat and significantly greater death concerns. Trait anxiety was found to be a significant predictor of change in death threat in the Thanatology Group, with lesser anxiety associated with greater decline in death threat. (Author)

  2. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  3. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  4. Fall 2014 SEI Research Review Insider Threat Mitigation LINE Project

    Science.gov (United States)

    2014-10-01

    Fall 2014 SEI Research Review Moore, 28-30 October 2014 © 2014 Carnegie Mellon University Contact Information Slide Format Presenter / Point of...published • Threat models published in book: CERT Guide to Insider Threats (2012) • Pattern-Based Design of Insider Threat Programs: Forthcoming 12

  5. Threat model framework and methodology for personal networks (PNs)

    DEFF Research Database (Denmark)

    Prasad, Neeli R.

    2007-01-01

    is to give a structured, convenient approach for building threat models. A framework for the threat model is presented with a list of requirements for methodology. The methodology will be applied to build a threat model for Personal Networks. Practical tools like UML sequence diagrams and attack trees have...

  6. Weakly and Strongly Regular Near-rings

    Institute of Scientific and Technical Information of China (English)

    N.Argac; N.J.Groenewald

    2005-01-01

    In this paper, we prove some basic properties of left weakly regular near-rings.We give an affirmative answer to the question whether a left weakly regular near-ring with left unity and satisfying the IFP is also right weakly regular. In the last section, we use among others left 0-prime and left completely prime ideals to characterize strongly regular near-rings.

  7. WEAK CONVERGENCE OF HENSTOCK INTEGRABLE SEQUENCES

    Institute of Scientific and Technical Information of China (English)

    LuisaDiPiazza

    1994-01-01

    Some relationships between pointwise and weak convergence of a sequence of Henstock integrable functions are studied, In particular it is provided an example of a sequence of Henstock integrable functions whose pointwise limit is different from the weak one. By introducing an asymptotic version of the Henstock equiintegrability notion it is given a necessary and sufficient condition in order that a pointwisely convergent sequence of Henstock integrable functions is weakly convergent to its pointwise limit.

  8. Transversality theorems for the weak topology

    OpenAIRE

    2011-01-01

    In his 1979 paper Trotman proves, using the techniques of the Thom transversality theorem, that under some conditions on the dimensions of the manifolds under consideration, openness of the set of maps transverse to a stratification in the strong (Whitney) topology implies that the stratification is $(a)$-regular. Here we first discuss the Thom transversality theorem for the weak topology and then give a similiar kind of result for the weak topology, under very weak hypotheses. Recently sever...

  9. On Weakly P.P. Rings

    Institute of Scientific and Technical Information of China (English)

    Xiang Yue-ming; Ouyang Lun-qun; Wang Shu-gui

    2015-01-01

    We introduce, in this paper, the right weakly p.p. rings as the generaliza-tion of right p.p. rings. It is shown that many properties of the right p.p. rings can be extended onto the right weakly p.p. rings. Relative examples are constructed. As applications, we also characterize the regular rings and the semisimple rings in terms of the right weakly p.p. rings.

  10. Estimation of quantum states by weak and projective measurements

    Science.gov (United States)

    Das, Debmalya; Arvind

    2014-06-01

    We explore the possibility of using "weak" measurements to carry out quantum state tomography via numerical simulations. Given a fixed number of copies of identically prepared states of a qubit, we perform state tomography using weak as well as projective measurements. Due to the collapse of the state after measurement, we cannot reuse the state after a projective measurement. If the coupling strength between the quantum system and the measurement device is made weaker, the disturbance caused to the state can be lowered. This then allows us to reuse the same member of the ensemble for further measurements and thus extract more information from the system. However, this happens at the cost of getting imprecise information from the first measurement. We implement this scheme for a single qubit and show that under certain circumstances, it can outperform the projective measurement-based tomography scheme. This opens up the possibility of new ways of extracting information from quantum ensembles. We study the efficacy of this scheme for different coupling strengths and different ensemble sizes.

  11. Traits, States, and Attentional Gates: Temperament and Threat Relevance as Predictors of Attentional Bias to Social Threat

    OpenAIRE

    2009-01-01

    This study investigated the influence of situational and dispositional factors on attentional biases toward social threat, and the impact of these attentional biases on distress in a sample of adolescents. Results suggest greater biases for personally-relevant threat cues, as individuals reporting high social stress were vigilant to subliminal social threat cues, but not physical threat cues, and those reporting low social stress showed no attentional biases. Individual differences in fearful...

  12. Weak measurements with a qubit meter

    DEFF Research Database (Denmark)

    Wu, Shengjun; Mølmer, Klaus

    2009-01-01

    We derive schemes to measure the so-called weak values of quantum system observables by coupling of the system to a qubit meter system. We highlight, in particular, the meaning of the imaginary part of the weak values, and show how it can be measured directly on equal footing with the real part...... of the weak value. We present compact expressions for the weak value of single qubit observables and of product observables on qubit pairs. Experimental studies of the results are suggested with cold trapped ions....

  13. When threats foreign turn domestic : Two ways for distant realistic intergroup threats to carry over into local intolerance

    NARCIS (Netherlands)

    Bouman, Thijs; van Zomeren, Martijn; Otten, Sabine

    2015-01-01

    In times of economic downturn, perceived realistic intergroup threats (e.g., labour competition) often dominate political and media discourse. Although local outgroups (e.g., local immigrants) can be experienced as sources of realistic threats, we propose that such threats can also be perceived to b

  14. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  15. On pillar design for weak floor strata conditions

    Energy Technology Data Exchange (ETDEWEB)

    Pytel, W.M. (Southern Illinois University at Carbondale, Carbondale, IL (United States). Dept. of Mining Engineering)

    1994-06-01

    The paper deals with the rational techniques that are available and currently utilized in engineering practice to design pillars associated with weak floor strata. All methods applied to determine the ultimate brearing capacity of floor strata are reviewed, including a more general, recently developed technique which treats weak floor strata as a two-layer rock system characterized by cohesion (c) and the angle of internal friction ([phi]) for both layers. Using foundation engineering analysis techniques, the effect of adjacent pillars on ultimate bearing capacity of weak floor strata underneath pillars in a panel was also considered. Based on the limit states theory, the upper-bound for capacity factors of an anisotopric non-homogeneous floor strata system were determined to estimate the effect of rock anisotropy on floor strata stability. Sensitivity analyses were also performaed in order to determine the relative importance of all parameters affecting floor strata strength underneath rectangular pillars. The design approaches presented are illustrated with step by step solutions for physical problems, and the appropriateness of all available design methods is estimated through field observations performed in two coal mines. 11 refs., 17 figs., 3 tabs.

  16. Changing the flux flow state in weak pinning superconducting films

    Energy Technology Data Exchange (ETDEWEB)

    Leo, A., E-mail: antoleo@sa.infn.it [Physics Department E.R. Caianiello, University of Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy); CNR-SPIN Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy); Grimaldi, G. [CNR-SPIN Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy); Nigro, A. [Physics Department E.R. Caianiello, University of Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy); CNR-SPIN Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy); Bruno, E.; Priolo, F. [Matis IMM-CNR and Physics-Astronomy Department, Catania University, CT 95123 (Italy); Pace, S. [Physics Department E.R. Caianiello, University of Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy); CNR-SPIN Salerno, Via Giovanni Paolo II, 132, Stecca 9, I-84084 Fisciano, SA (Italy)

    2014-08-15

    Highlights: • We analyzed the effect of light ion irradiation on weak pinning superconductors. • We found the light ion irradiation has a strong impact on current currying stability. • We compared the results to the ones of the case of moderate strong pinning materials. - Abstract: The current carrying dissipative state well above the critical current it is known to be related to the pinning properties of the material and to the microscopic mechanisms of vortex dynamics. Moreover, it has been demonstrated that in low temperature superconducting films exhibiting moderately strong pinning the light ion irradiation has the effect of changing the distribution of the pinning centers without changing their pinning strength and this results into an increase of current stability in the flux flow state. Here we present the results of light ion irradiation on weak pinning superconducting films focusing on the influence of pinning properties of the material in the flux flow state. We realize that the possibility to switch to low dissipations by changing weak pinning is not straightforward.

  17. Effect of bolting on roadway support in extremely weak rock.

    Science.gov (United States)

    Li, Qinghai; Shi, Weiping; Qin, Zhongcheng

    2016-01-01

    In mine roadway support operations, floor bolting not only played a role in floor heave control, but also in reinforcing roof and its two sides. Correspondingly, bolting of roof and two sides also played a part in floor heave control. To quantify the effect of such bolting, based on roadway support in extremely weak rock, three physical models were produced and tested in laboratory. Through comparison of their displacements in three physical simulation experiments, the reinforcing effect of bolting in extremely weak rock roadways was quantified. Reinforcing coefficients was defined as displacement ratio between original support and new support regime. Results indicated that the reinforcing coefficients, for bolting of roof and its two sides, on floor, two sides, and roof reached 2.18, 3.56, and 1.81 respectively. The reinforcing coefficients for floor bolting on floor, two sides, and roof reached 3.06, 2.34, and 1.39 respectively. So in this extremely weak rock, the surrounding rock should be considered as an integral structure in any support operation: this allows for better local strength improvement, and provided future design guidance.

  18. Evolution, Punctuational Crises and the Threat to Civilization

    Science.gov (United States)

    Clube, S. V. M.

    1996-02-01

    The relationship between “punctuated equilibrium” and “impact crises” is critically examined in the light of our present knowledge of asteroids and comets. It turns out that the emphasis on relatively narrow epochs associated with occasional “NEO” impacts is probably misplaced. Rather priority should be given to the wider and more frequent epochs associated with multiple “NEO” debris impacts which result in so-called “punctuational crises” afflicting the planets. These comprise the global coolings, super-Tunguska events and generally enhanced fireball flux produced by the larger orbital debris whenever an active, dormant or dead comet fragments and produces a trail. Taken as a whole and in conjunction with the target, the response function is inevitably complex. Nevertheless we broadly expect that the strength of a punctuational crisis will vary as the progenitor comet mass, the inverse dispersion of its debris and the inverse delay since fragmentation. The encounter of P/SL-9 with Jupiter may be taken as representing an extreme punctuational crisis where the dispersion and delay were exceptionally small. The more familiar crises affecting the Earth with less extreme values of dispersion and delay, which have resulted in civilization being disturbed a good many times during recent millennia, are no less important however. Indeed, the next such threat to civilization ostensibly has a roughly 1 in 4 lifetime chance. Any support for the Spaceguard programme which detracts from consideration of these punctuational crises, whatever their strength, would seem now to be peculiarly wide of the mark.

  19. Interaction of a hydophobic weak polyelectrolyte star with an apolar surface

    NARCIS (Netherlands)

    Rudd, O.V.; Leermakers, F.A.M.; Birshtein, T.M.

    2014-01-01

    We consider star-like polymers with weak, that is, pH-dependent, hydrophobic polyelectrolyte arms. For low ionic strength conditions, a microphase-segregated quasimicellar structure is found, for which the star features a compact apolar core and a charged and swollen corona. This state is jump-like

  20. Influence of Anion Hydrophilicity on the Conformation of a Hydrophobic Weak Polyelectrolyte Brush

    NARCIS (Netherlands)

    Murdoch, Timothy J.; Willott, Joshua David; de Vos, Wiebe Matthijs; Nelson, Andrew; Prescott, Stuart W.; Wanless, Erica J.; Webber, Grant B.

    2016-01-01

    The conformation of a hydrophobic, weak cationic poly(2-diisopropylamino)ethyl methacrylate (PDPA) brush was studied using neutron reflectometry as a function of aqueous solution pH, ionic strength, and anion identity. In pH 4, 10 mM potassium nitrate the brush is highly charged, resulting in an