Academic literature on the topic 'Threat face'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threat face.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threat face"

1

Barras, Colin. "Astronauts face superbug threat." New Scientist 241, no. 3213 (January 2019): 6. http://dx.doi.org/10.1016/s0262-4079(19)30094-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

CHAFETZ, JANET SALTZMAN, and ANTHONY GARY DWORKIN. "IN THE FACE OF THREAT:." Gender & Society 1, no. 1 (March 1987): 33–60. http://dx.doi.org/10.1177/089124387001001003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lesté-Lasserre, Christa. "Donkeys face worldwide existential threat." Science 366, no. 6471 (December 12, 2019): 1294–95. http://dx.doi.org/10.1126/science.366.6471.1294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

de Laine, Michael. "Labs face threat of closure." Physics World 15, no. 10 (October 2002): 12. http://dx.doi.org/10.1088/2058-7058/15/10/19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stokstad, Erik. "Vultures face new toxic threat." Science 373, no. 6560 (September 10, 2021): 1187. http://dx.doi.org/10.1126/science.acx9048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miles, Edward W., Jeff Schatten, and Elizabeth Chapman. "How face threat sensitivity affects proactive negotiation behavior." Organization Management Journal 17, no. 1 (March 19, 2020): 2–14. http://dx.doi.org/10.1108/omj-05-2019-0725.

Full text
Abstract:
Purpose Face threat sensitivity (FTS) has been found to influence objective negotiated outcomes when the threat to face is activated. The purpose of this study is to extend that research by testing whether FTS – which is defined as a propensity to act – is associated with the outcomes of negotiators when the threat has not been specifically activated. Face theory specifies that face threats can cause individuals to take proactive steps to avoid threats before they might occur. Design/methodology/approach Drawing on face theory and social role theory, the authors conduct a negotiation experiment and use hierarchical regression to test hypotheses concerning the relationship between FTS for sellers and buyers on negotiated outcomes in both distributive and integrative negotiations. The authors also use moderated regression to test if gender moderates the relationship between buyer and seller FTS and negotiation outcomes. Findings Results show that, when the threat is not activated, high FTS buyers pay more than low FTS buyers. Consistent with face theory and social role theory, this effect is moderated by gender, with the association being stronger for women buyers than for men buyers. Originality/value This paper exhibits that FTS can influence negotiator behavior even when FTS is not activated. This is valuable to negotiation scholars and practitioners who are interested in the role that individual characteristics play in negotiation behavior.
APA, Harvard, Vancouver, ISO, and other styles
7

Åsli, Ole, Henriette Michalsen, and Morten Øvervoll. "In Your Face: Startle to Emotional Facial Expressions Depends on Face Direction." i-Perception 8, no. 1 (January 2017): 204166951769439. http://dx.doi.org/10.1177/2041669517694396.

Full text
Abstract:
Although faces are often included in the broad category of emotional visual stimuli, the affective impact of different facial expressions is not well documented. The present experiment investigated startle electromyographic responses to pictures of neutral, happy, angry, and fearful facial expressions, with a frontal face direction (directed) and at a 45° angle to the left (averted). Results showed that emotional facial expressions interact with face direction to produce startle potentiation: Greater responses were found for angry expressions, compared with fear and neutrality, with directed faces. When faces were averted, fear and neutrality produced larger responses compared with anger and happiness. These results are in line with the notion that startle is potentiated to stimuli signaling threat. That is, a forward directed angry face may signal a threat toward the observer, and a fearful face directed to the side may signal a possible threat in the environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Wojewidka, John. "The deepfake threat to face biometrics." Biometric Technology Today 2020, no. 2 (February 2020): 5–7. http://dx.doi.org/10.1016/s0969-4765(20)30023-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wehde, Ed. "DVD hack distributors face court threat." Computer Fraud & Security 2000, no. 2 (February 2000): 6. http://dx.doi.org/10.1016/s1361-3723(00)02014-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Feldman, Ofer, and Ken Kinoshita. "Expanding factors in threat to face." Language and Dialogue 7, no. 3 (November 27, 2017): 336–59. http://dx.doi.org/10.1075/ld.7.3.02fel.

Full text
Abstract:
Abstract This paper details aspects related to the “face” – one’s social standing, reputation, and dignity – during interactions between interviewers and interviewees (both politicians and nonpoliticians) in more than 5,000 questions posed during three different broadcast interview programs aired throughout 2012–2013 in Japan. The interactions between interviewers and interviewees are also considered as a dialogic phenomenon in which interlocutors are actors who act and react. By examining the toughness of questions posed in these programs the paper explores their extent of threat to face of the interviewees and the facets associated with this threat, including features related to the interviewees themselves. The results indicate strong evidence of socio-cultural norms and values that affect interviewers’ relationship with politicians and other sources.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Threat face"

1

Eickholt, Molly S. "FACE THREAT, FACE SUPPORT, AND ADVICE EFFECTIVENESS FOLLOWING INFIDELITY." UKnowledge, 2013. http://uknowledge.uky.edu/comm_etds/15.

Full text
Abstract:
This study examined advice interactions following infidelity. Participants (N = 213) completed a survey concerning an instance on infidelity and a subsequent advice interaction. Injured party perceptions of advice interactions were measured by examining advice messages, perceived face threat, and perceived face support, in addition to perceived effectiveness of the advice message. Results from this study showed no significant differences in perceived face threat, perceived face support, or advice effectiveness between different advice messages. Results also indicated both positive and negative face threat as negative predictors of advice effectiveness. While negative face support was a positive predictor of advice effectiveness, positive face support was a negative predictor. When controlling for relational closeness, negative face support was the only significant predictor of advice effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Anjelica Marie. "The Deliberative Potential of Social Media: Face Threat and Face Support in Online Political Expression." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/73670.

Full text
Abstract:
Engaging in productive political discussion has long been a valued aspect of American democratic life. Due to ease of access and the potential for exposure to diverse views, the Internet and social media may support mediated political talk. Literature on the concept of face and politeness theory provides a framework for understanding interpersonal interactions, both online and offline. To understand if social media has the potential to host political discussion among millennials, a survey (N = 352) of undergraduate students examined social media use and political interaction experiences. Facebook was the most popular platform for exposure to others' political opinions and political self-expression. Facebook users with more diverse networks engaged in more political expression. Across numerous platforms, participants reported frequently being exposed to others' political opinions but infrequently sharing their own views. Negative and positive political interactions on Facebook and Twitter were explored for their threat to and support of negative face (need for autonomy) and positive face (need for validation). Findings indicate that engaging in negative interactions leads to more face threat while observing negative interactions solicits more face support. Engaging in positive interactions results in more face support and observing positive interactions leads to more face threat. Across interaction type and platform, participants who actively engaged in political interactions as opposed to merely observing them reported significantly more subsequent online political engagement. Future research on political interactions across various social media platforms and the application of interpersonal communication theory to the study of mediated political talk is warranted.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
3

Reid, Chelsea. "ATTITUDE ALIGNMENT AMONG COUPLES IN THE FACE OF BELONGING THREAT." VCU Scholars Compass, 2011. http://scholarscompass.vcu.edu/etd/208.

Full text
Abstract:
The present research sought to expand upon previous research demonstrating that individuals shift their attitudes to match the attitudes of their romantic partner. This research examined whether attitude alignment is influenced, in part, by belonging threats. Participants reported their attitudes about social issues and were randomly assigned to receive a belonging threat (or acceptance) in the form of feedback about their future relationships prior to discussing issues about which they disagreed with their partner. Partners discussed issues that were central to self - peripheral to partner and peripheral to self - central to partner. Attitude alignment was measured following discussion and at a one-week follow-up. Attitude alignment was expected to vary as a function of belonging threat, centrality of issue, and strength of unit relationship. Results did not support hypotheses, but did reveal noteworthy points to be considered for future work in this area.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Hong, and 王紅. "Help seeking tendency in situation of threat to self-esteem and face-losing." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B3124371X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Hong. "Help seeking tendency in situation of threat to self-esteem and face-losing /." Hong Kong : University of Hong Kong, 2002. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2470927x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Spikes, Antonio L. "CLASSROOM RACIAL POLITICS, FACEWORK, AND FACE THREAT: THE IDENTITY MANAGEMENT PRACTICES OF BLACK MALE TEACHERS." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/dissertations/1708.

Full text
Abstract:
The purpose of this dissertation is to improve the racial conditions of USAmerican education and to highlight how racial politics influence the facework practices of Black male teachers, their perceptions of and responses to face threats, and how the classroom, as a context, shapes perceptions and issues of face, facework, and face threat. I utilized identity management theory to examine how Black male teachers construct facework and face threat within the classroom. Additionally, I used semi-structured respondent interviewing and grounded theory as my method and analytical method (respectively) to complete my study. Using key concepts, such as positive face, negative face, face threat, and identity freezing, I concluded that perceptions of racism and racial stereotypes that are sometimes contingent on their gender identity impact how they constructed positive and negative face. Additionally, racism and racial stereotypes shaped which facework strategies the interview participants utilized, what they considered face threatening situations, how they responded to face threatening situations, and what they considered identity freezing situations. Overall, their constructions of facework and face threat were utilized to avoid stereotypes that depicted them as angry and incompetent. Considering the positive potential of this study, I concluded with how this research can help administrators and colleagues to improve the education system for Black male teachers.
APA, Harvard, Vancouver, ISO, and other styles
7

Hadden, Alexis A. "Face Threat Mitigation in Feedback: An Examination of Student Apprehension, Self-Efficacy, and Perceived Emotional Support." UKnowledge, 2017. http://uknowledge.uky.edu/comm_etds/59.

Full text
Abstract:
This experimental study examined the effects of an instructor’s face threat mitigation tactics on student self-efficacy for learning and perceived emotional support from the instructor in a written feedback setting. Participants (N = 401) were randomly assigned to one of four feedback scenarios in which level of face threat mitigation and instructor age and status were manipulated. Student grade orientation and state feedback apprehension were measured prior to being exposed to the feedback scenario. Results indicate that high face threat mitigation is positively associated with student self-efficacy for learning and perceived emotional support from the instructor. Results also revealed that state feedback apprehension predicts self-efficacy for learning and perceived emotional support from the instructor. Grade orientation predicted self-efficacy for learning but did not significantly predict perceived emotional support from the instructor providing feedback. Finally, scenarios manipulated for instructor age and status did not significantly differ in self-efficacy for learning or perceived emotional support from the instructor. Implications regarding theory, the measurement of feedback apprehension, and student-instructor communication are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Juth, Pernilla. "Finding the emotional face in the crowd and the role for threat-biased attention in social anxiety." Stockholm : Department of Clinical Neuroscience, Karolinska Institutet, 2010. http://diss.kib.ki.se/2010/978-91-7409-746-7/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lindersson, Carl. "Threatening Measures, at Face Value : Electrophysiology Indicating Confounds of the Facial Width-to-Height Ratio." Thesis, Högskolan i Skövde, Institutionen för biovetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17350.

Full text
Abstract:
Previous studies support that the relative width of the upper face (facial width-to-height ratio; fWHR) has evolved to signal threat, but these studies rely greatly on subjective facial ratings and measurements prone to confounds. The present study objectively quantifies threat perception to the magnitude of the observers’ electrophysiological reaction, specifically the event-related potential (ERP) called the late positive potential (LPP), and investigate if brow height and jaw width could have confounded previous fWHR studies. Swedish and international students (N = 30, females = 11, Mage = 24 years, SDage = 2.9) were shown computer-generated neutral faces created with the underlying skeletal morphology varying in brow ridge height, cheekbone width and jaw width. Participants first rated how threatening each face was and then viewed 12 blocks of 64 faces while their electroencephalography (EEG) was recorded. The results supported that the LPP could be used to index threat perception and showed that only brow height significantly affected both facial ratings (p < .001, ɳp2 = .698) and magnitude of the LPP within the 400 to 800 ms latency (p = .02, d = .542). Hence, brow height, not facial width, could explain previous findings. The results contradict the hypothesis that fWHR is an evolved cue of threat and instead support the overgeneralisation hypothesis in that faces with similar features to anger will be perceived as more threatening.
APA, Harvard, Vancouver, ISO, and other styles
10

Trad, Laura. "The Effect of Face Threat Mitigation on Instructor Credibility and Student Motivation in the Absence of Instructor Nonverbal Immediacy." Master's thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5877.

Full text
Abstract:
Many years of communication research have shown that an increase in immediacy has been a major factor that affects students' perceptions of instructor credibility which in turn affects, both students' cognitive and affective learning, student state motivation and a variety of other positive outcomes. However, in order for immediacy to be effective, instructor and student must be in the same location at the same time. With the recent push toward on-line classes, what can we find to act like immediacy in a text based format? This research suggests that face threat mitigation can be used in a text-based environment, to achieve the pro-social goals of instructor credibility and student state motivation to the same extent as it does when coupled with immediacy. This study is a replication of a study done by Witt and Kerssen-Griep (2012). In the original study face threat mitigation (FTM) was coupled with instructor nonverbal immediacy (NVI) and they examined the impact these factors had on instructor credibility (i.e., competence, character, and caring) and student state motivation in a video simulated feedback situation. This study surveyed 218 undergraduate students in an introductory communication course. Students were randomly assigned to read hypothetical scenarios in which FTM was manipulated in a manner similar to Witt and Kerssen-Griep's study. They responded to three scales. The current study removed the instructor by using a simulated electronic feedback correspondence. Results of a MANCOVA and four separate ANOVAs were similar to those of the original findings. FTM was found to have a significant positive relationship with instructor credibility (i.e., competence, character, and caring) and student state motivation.
M.A.
Masters
Communication
Sciences
Communication; Interpersonal Communication
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Threat face"

1

April, Henry, ed. Face of betrayal: A triple threat novel. Nashville, Tenn: Thomas Nelson, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

The changing face of terrorism: How real is the threat from biological, chemical, and nuclear weapons? London: I.B. Tauris, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bill, Gunston. Warplanes of the future: The most exciting combat aircraft being designed today to face the threat of wars tomorrow. New York: Crescent Books, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bill, Gunston. Warplanes of the future: The most exciting combat aircraft being designed today to face the threat of wars tomorrow. London: Salamander, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

April, Henry, ed. Hand of fate: A triple threat novel. Nashville, Tenn: Thomas Nelson, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Face To Face: 43 Light Street - 13. Toronto: Harlequin Books, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Case, William. Populist Threats and Democracy’s Fate in Southeast Asia. Abingdon, Oxon ; New York : Routledge, 2017. | Series: Routledge contemporary Asia series ; 59: Routledge, 2017. http://dx.doi.org/10.4324/9781315188140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mary, Sharpe, and Agboluaje Abimbola, eds. Science and society in the face of the new security threats. Amsterdam: IOS Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gurr, Nadine. The new face of terrorism: Threats from weapons of mass destruction. London: I.B. Tauris, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

White, Jerry E. Dangers men face: Overcoming the five greatest threats to living life well. Colorado Springs, Colo: NavPress, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Threat face"

1

Arora, Geetika, Kamlesh Tiwari, and Phalguni Gupta. "Liveness and Threat Aware Selfie Face Recognition." In Selfie Biometrics, 197–210. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Heper, Metin. "Does Secularism Face a Serious Threat in Turkey?" In Secular State and Religious Society, 79–94. New York: Palgrave Macmillan US, 2012. http://dx.doi.org/10.1057/9781137010643_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Casaca, Paulo. "Conclusions: How to Face the Present Fanatic Threat?" In Terrorism Revisited, 219–23. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55690-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tiwari, Kamlesh, Suresh Kumar Choudhary, and Phalguni Gupta. "An Efficient Face Recognition System with Liveness and Threat Detection for Smartphones." In Intelligent Computing Theories and Application, 397–406. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42294-7_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Russell, Bartlett A. H., and Bradley D. Hatfield. "Controlling Attention in the Face of Threat: A Method for Quantifying Endogenous Attentional Control." In Foundations of Augmented Cognition, 591–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39454-6_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Bongcheol, Seungmin Oh, and Wonsug Jung. "V-Line (Lower Face)." In The Art and Science of Thread Lifting, 185–88. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-0614-3_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Freedman, Lawrence. "Introduction—The Evolution of Deterrence Strategy and Research." In NL ARMS, 1–10. The Hague: T.M.C. Asser Press, 2020. http://dx.doi.org/10.1007/978-94-6265-419-8_1.

Full text
Abstract:
AbstractThe concept of deterrence has dominated Western strategic thought for some seven decades. It shows no signs of easing its grip. In the face of any new security threat, such as terrorism or cyber-attacks, one of the first questions to be asked is ‘can this be deterred?’ Even when the answer is not very encouraging the inclination is to persevere until some way is found at least to reduce if not remove the threat through some form of deterrence. This may have less to do with deterrence’s reliability or effectiveness as a strategy and more because of its inherent normative appeal. When a state adopts a deterrence strategy it signals that it does not seek a fight but still considers some interests to be so vital that they are worth fighting for. It implies a defensive intent without weakness. It seeks to prevent aggression while being non-aggressive. It sustains rather than disrupts the status quo. For these reasons, it has positive associations that other potential strategies lack. Appeasement as a deliberate strategy has been discredited since the 1930s; conquering other states is now seen to be as demanding as it is illegal. There is no dishonour in deterrence.
APA, Harvard, Vancouver, ISO, and other styles
8

Bronstein, Alexander, Michael Bronstein, and Ron Kimmel. "Three dimensional Face Recognition." In Numerical Geometry of Non-Rigid Shapes, 261–75. New York, NY: Springer New York, 2008. http://dx.doi.org/10.1007/978-0-387-73301-2_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mpiperis, Iordanis, Sotiris Malassiotis, and Michael G. Strintzis. "Three Dimensional Face Recognition." In Encyclopedia of Multimedia, 860–61. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-78414-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sobieraj, Sarah. "Hostile Speaking Environment." In Credible Threat, 22–39. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190089283.003.0002.

Full text
Abstract:
Women who attempt to participate in public discussions about political and social issues online confront a hostile speaking environment analogous to the hostile work environments identified in policies addressing sexual harassment in the workplace. This chapter draws on interviews with women who have been attacked by strangers online, showing that the digital abuse women face is hostile (ad hominem, hateful, and discriminatory, rather than interested in promoting dialogue), offensive (riddled with obscenity, misogyny, racism, xenophobia, etc.), and intimidating (punctuated by threats of physical violence), consistent with the key characteristics of unlawful hostile work environments as outlined in US and EU social policy. What’s more, it shows that the discrete attacks coalesce into an overall climate that is more cumbersome and frightening than the sum of its individual parts.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threat face"

1

Durdona, Irgasheva, Islomov Shahboz, Davronova Lola, and Rustamova Sanobar. "Face Sketch Recognition Threat Model." In 2020 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2020. http://dx.doi.org/10.1109/icisct50599.2020.9351369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rathgeb, Christian, Katrin Poppelmann, and Christoph Busch. "Face Morphing Attacks: A Threat to eLearning?" In 2021 IEEE Global Engineering Education Conference (EDUCON). IEEE, 2021. http://dx.doi.org/10.1109/educon46332.2021.9454128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alonso-Almeida, María del Mar, Maria Escat, and Perez-Encinas Adriana. "COWORKING SPACES: THREAT OR OPPORTUNITY TO FACE CRISIS SITUATIONS." In The 3rd International Electronic Conference on Environmental Research and Public Health —Public Health Issues in the Context of the COVID-19 Pandemic. Basel, Switzerland: MDPI, 2021. http://dx.doi.org/10.3390/ecerph-3-09099.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sarma, M. Subrahmanya, Y. Srinivas, M. Abhiram, Lakshminarayana Ullala, M. Sahithi Prasanthi, and J. Rojee Rao. "Insider Threat Detection with Face Recognition and KNN User Classification." In 2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM). IEEE, 2017. http://dx.doi.org/10.1109/ccem.2017.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Andreevsky, E., M. Akhmedkhanov, and Yu Daneykin. "Method of express-diagnosis for accelerated staffing of force structures in the face of external aggression or terroristic threat." In International Scientific Conference "On the Way to a Stable World: Security and Sustainable Development". Global partnership on Development of Scientific Cooperation Limited Liability Company; Ron Bee & Associates, 2015. http://dx.doi.org/10.17809/02(2015)-06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Matic, Peter, Alex E. Moser, and Robert N. Saunders. "Combat Helmet Design Incorporating Multiple Ballistic Threats, Brain Functional Areas and Injury Considerations." In ASME 2016 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/imece2016-67364.

Full text
Abstract:
Combat helmet protection zone parametric design is presented for small arms and explosive device ballistic threat notional spatial distributions. The analysis is conducted using a computer aided design software application developed to evaluate ballistic threats, helmet design parameters, and a standard set of common brain injuries associated with head impacts. The analysis helps to define the helmet trade space, facilitates prototyping, and supports helmet design optimization. Direct head impacts and helmet impacts, with and without helmet back face contact to the head, are tabulated. Head strikes are assumed to produce critical or fatal penetrating injuries. Helmet back face deflections and impact generated projectile-helmet-head motions are determined. Helmet impact obliquity is accounted for by attenuating back face deflection. Head injury estimates for ten common focal and diffuse head injuries are determined from the back face deflections and the head injury criteria. These, in turn, are related to the abbreviated injury score and associated radiographic dimensional diagnostic criteria and loss of consciousness diagnostic criteria from the trauma literature.
APA, Harvard, Vancouver, ISO, and other styles
7

Heidarzadeh, Mohammad, Moharram D. Pirooz, and Nasser H. Zaker. "Tsunami Hazards in the Northwestern Indian Ocean." In ASME 2008 27th International Conference on Offshore Mechanics and Arctic Engineering. ASMEDC, 2008. http://dx.doi.org/10.1115/omae2008-57837.

Full text
Abstract:
Although northwestern Indian Ocean has experienced some deadly tsunamis in the past, this region remains one of the least studied regions in the world and little research work has been devoted to its tsunami hazard assessment. In this study, we compile and analyze historical tsunami in the northwestern Indian Ocean and present a tsunami list for this region. Then, a deterministic method has been employed to give a preliminary estimation of the tsunami hazard faced by different coastlines in this region. Different source scenarios are considered and for each scenario, numerical modeling of tsunami is performed. For each case, the maximum positive tsunami wave heights along the coasts are calculated which provide a preliminary estimation of tsunami hazard and show which locations face the greatest threat from a large tsunami.
APA, Harvard, Vancouver, ISO, and other styles
8

Kostadinov, Venceslav, Stojan Petelin, and Andrej Stritar. "Developing Procedure for Nuclear Regulatory Vulnerability Assessment of Nuclear Power Plants." In ASME 2004 International Mechanical Engineering Congress and Exposition. ASMEDC, 2004. http://dx.doi.org/10.1115/imece2004-59774.

Full text
Abstract:
First attempts of developing the procedure and adopting the methodology for nuclear regulatory vulnerability assessment of nuclear power plants are presented. The development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities on external and internal threats. In the situation where different and hidden threat sources throughout the world are dispersed, the assessments of security and safe operation of nuclear power plants are very important. Most risk assessments of nuclear power plants emphasize probability more than consequences. In addition, the probabilities omit terrorists. As of 09/11/2001, the emphasis has changed and this paper tries to show how to do this. Probabilities are enhanced by showing they are dynamic, interactive, and include countermeasures. Consequences are also enhanced by their dynamic nature dividing them on short, intermediate and long term effects. Risk is enhanced by creatively distinguishing between perceived and estimated.
APA, Harvard, Vancouver, ISO, and other styles
9

Chhabra, Saheb, Richa Singh, Mayank Vatsa, and Gaurav Gupta. "Anonymizing k Facial Attributes via Adversarial Perturbations." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/91.

Full text
Abstract:
A face image not only provides details about the identity of a subject but also reveals several attributes such as gender, race, sexual orientation, and age. Advancements in machine learning algorithms and popularity of sharing images on the World Wide Web, including social media websites, have increased the scope of data analytics and information profiling from photo collections. This poses a serious privacy threat for individuals who do not want to be profiled. This research presents a novel algorithm for anonymizing selective attributes which an individual does not want to share without affecting the visual quality of images. Using the proposed algorithm, a user can select single or multiple attributes to be surpassed while preserving identity information and visual content. The proposed adversarial perturbation based algorithm embeds imperceptible noise in an image such that attribute prediction algorithm for the selected attribute yields incorrect classification result, thereby preserving the information according to user's choice. Experiments on three popular databases i.e. MUCT, LFWcrop, and CelebA show that the proposed algorithm not only anonymizes \textit{k}-attributes, but also preserves image quality and identity information.
APA, Harvard, Vancouver, ISO, and other styles
10

Hong, Sung-Gul, Namhee K. Hong, and In-Young Gu. "Application of ultra-high performance concrete for thermal resistance materials." In IABSE Congress, New York, New York 2019: The Evolving Metropolis. Zurich, Switzerland: International Association for Bridge and Structural Engineering (IABSE), 2019. http://dx.doi.org/10.2749/newyork.2019.0263.

Full text
Abstract:
<p>This paper investigates the thermal resistance of ultra-high performance concrete (UHPC) composites using different fillers of low thermal conductivity. The development of new concrete for energy saving facilities is more demanding for climate change threat to human. The use of UHPC composite with expanded polystyrene (EPS) beads as well as different fillers of low thermal conductivity has shown a viable option of architectural sandwich walls of insulation. The optimum fillers of thermal resistance for UHPC are determined by the tradeoff of compressive strength between heat conductivity. Better thermal properties of some UHPC composites make lower compressive strength of UHPC. To evaluate the varying thermal and mechanical characteristics of UHPC composites with the quantity of fillers, the method of volumetric substitution for UHPC was investigated in this paper. The UHPC composite of thermal resistance with comparable compressive strength can be possibly used for concrete blocks to transfer flexural compression force in efficient thermal breaker systems. Test results show that the strength of the concrete is greatly influenced by the curing method and the most important factors affecting the strength of concrete are curing temperature and curing time. Structural UHPC walls of thermal resistance serve as both load transfer and barrier to external temperature. To investigate the mechanical behavior of composite sandwich panels, the panels for the study are fabricated by new concrete as core and face sheets and the influence of the three components – the mechanical properties of the core material, the strength of the face sheet material, and the bond strength adhesive material – was evaluated. The flexural capacity of the specimens UHPC with EPS core showed high strength in a stable linear behavior before core cracking.</p>
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threat face"

1

Werne, R. Deterrence and National Security in the Face of an Amorphous Threat. Office of Scientific and Technical Information (OSTI), January 2001. http://dx.doi.org/10.2172/15007271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trinque, Derek A. Sea Basing: Persistent Power Projection in the Face of the Naval Mine Threat. Fort Belvoir, VA: Defense Technical Information Center, February 2004. http://dx.doi.org/10.21236/ada422745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barnes, R., B. Schneier, C. Jennings, T. Hardie, B. Trammell, C. Huitema, and D. Borkmann. Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement. RFC Editor, August 2015. http://dx.doi.org/10.17487/rfc7624.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Steindl, David F. Maximizing Operational Protection in the Face of the Theater Ballistic Missile Threat: 1996-2006. Fort Belvoir, VA: Defense Technical Information Center, February 1996. http://dx.doi.org/10.21236/ada307605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Ayesha. Supporting Women’s Empowerment in Pakistan: Lessons for Donors. Institute of Development Studies (IDS), January 2021. http://dx.doi.org/10.19088/ids.2021.001.

Full text
Abstract:
In a context where democratic culture and civil society space are under threat, rights-based organisations face increased restrictions on their activities, and donors are finding it harder to engage with them. However, findings show that donor support is crucial for successful women’s empowerment initiatives. Our research on women’s activism in Pakistan suggests donors should strategically support women’s social and political action for empowerment and accountability by continuing to support advocacy organisations, which develop women’s skills to engage with participatory political processes.
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Ayesha. Supporting Women’s Empowerment in Pakistan: Lessons for Donors. Institute of Development Studies (IDS), January 2021. http://dx.doi.org/10.19088/ids.2021.001.

Full text
Abstract:
In a context where democratic culture and civil society space are under threat, rights-based organisations face increased restrictions on their activities, and donors are finding it harder to engage with them. However, findings show that donor support is crucial for successful women’s empowerment initiatives. Our research on women’s activism in Pakistan suggests donors should strategically support women’s social and political action for empowerment and accountability by continuing to support advocacy organisations, which develop women’s skills to engage with participatory political processes.
APA, Harvard, Vancouver, ISO, and other styles
7

Maheshwar, Seema. Experiences of Intersecting Inequalities for Poor Hindu Women in Pakistan. Institute of Development Studies (IDS), December 2020. http://dx.doi.org/10.19088/creid.2020.012.

Full text
Abstract:
Through first-hand accounts of marginalisation and discrimination, the research paper in question explores the reality of life in Pakistan for poor Hindu women and girls who face intersecting and overlapping inequalities due to their religious identity, their gender and their caste. They carry a heavy burden among the marginalised groups in Pakistan, facing violence, discrimination and exclusion, lack of access to education, transportation and health care, along with occupational discrimination and a high threat of abduction, forced conversion and forced marriage.
APA, Harvard, Vancouver, ISO, and other styles
8

Hurst, Cindy. The Terrorist Threat to Liquefied Natural Gas: Fact or Fiction? Fort Belvoir, VA: Defense Technical Information Center, February 2008. http://dx.doi.org/10.21236/ada477550.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Steele, Robert D. The New Craft of Intelligence: Achieving Asymmetric Advantage in the Face of Nontraditional Threats. Fort Belvoir, VA: Defense Technical Information Center, February 2002. http://dx.doi.org/10.21236/ada400814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Juarez, Anthony. Remixing the ‘Appropriate Mix’: Reassessing NATO’s Deterrence and Defense Posture in the Face of New Threats. Office of Scientific and Technical Information (OSTI), May 2016. http://dx.doi.org/10.2172/1332468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography