Sample records for clandestine production covert

  1. Proliferation Risks of Fusion Energy: Clandestine Production, Covert Production, and Breakout

    International Nuclear Information System (INIS)

    Goldston, R.J.; Glaser, A.; Ross, A.F.


    Nuclear proliferation risks from fusion associated with access to weapon-usable material can be divided into three main categories: (1) clandestine production of fissile material in an undeclared facility, (2) covert production of such material in a declared and safeguarded facility, and (3) use of a declared facility in a breakout scenario, in which a state begins production of fissile material without concealing the effort. In this paper we address each of these categories of risk from fusion. For each case, we find that the proliferation risk from fusion systems can be much lower than the equivalent risk from fission systems, if commercial fusion systems are designed to accommodate appropriate safeguards

  2. On the production of clandestine dis/abled bodies

    DEFF Research Database (Denmark)

    Galis, Vasilis; Tzokas, Spyros; Tympas, Aristotle

    paper makes a notice of this literature but moves on to discuss the co-production of technological borders and migrants with dis/abilities. In this case, dis/ability may be a cause or consequence of migration, and may become a barrier to both accessing protection and to entering a country. Nonetheless...... of policing technologies, repressive techniques and military technics. Instead, however, of staying at the technology of a fast patrolling boat with electronic eyes, we move on to show how exactly this EU electronic boat has clashed with a humble migrant floating device. We are interested...

  3. Dietary supplements: International legal framework and adulteration profiles, and characteristics of products on the Brazilian clandestine market. (United States)

    da Justa Neves, Diana Brito; Caldas, Eloisa Dutra


    The objectives of this work were to evaluate current legislation on dietary supplements in the United States, the European Union and Brazil, and the profile of adulterated and/or irregular products on these markets. Due to a less restrictive legal framework, a supplement product that is freely available in the US may be considered a drug or even be proscribed in the EU and Brazil, thus giving rise to a clandestine market based on smuggling. From 2007 to 2014, the United States Food and Drug Administration reported 572 cases of supplement adulterations in the country, mainly products for sexual enhancement (41.6%). Data from the European Union Rapid Alert System for Food and Feed showed 929 adulterations during the same period, over 40% due to unauthorized ingredients or undeclared medicines. From 2007 to 2013, the Brazilian Federal Police Department seized 5470 supplement products, 92.2% with an American-declared origin. Qualitative chemical analyses performed on 2898 products found 180 adulterations, 41.1% due to undeclared drugs, mainly anabolic steroids, anorectics and products for erectile dysfunction, all considered medicines in Brazil. Educating the public regarding the potential risks they are taking when consuming adulterated or irregular products is necessary to protect the health of consumers. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Trace-Level Screening of Chemicals Related to Clandestine Desomorphine Production with Ambient Sampling, Portable Mass Spectrometry


    Hall, Seth E.; O’Leary, Adam E.; Lawton, Zachary E.; Bruno, Alessandra M.; Mulligan, Christopher C.


    Desomorphine is a semisynthetic opioid that is responsible for the psychoactive effects of a dangerous homemade injectable mixture that goes by street name “Krokodil.” Desorption electrospray ionization (DESI) and paper spray ionization (PSI) are implemented on a portable mass spectrometer for the direct analysis of desomorphine and precursor reagent codeine from multiple substrates of potential relevance to clandestine drug laboratory synthesis and paraphernalia seizure. Minimal sample prepa...

  5. Trace-Level Screening of Chemicals Related to Clandestine Desomorphine Production with Ambient Sampling, Portable Mass Spectrometry

    Directory of Open Access Journals (Sweden)

    Seth E. Hall


    Full Text Available Desomorphine is a semisynthetic opioid that is responsible for the psychoactive effects of a dangerous homemade injectable mixture that goes by street name “Krokodil.” Desorption electrospray ionization (DESI and paper spray ionization (PSI are implemented on a portable mass spectrometer for the direct analysis of desomorphine and precursor reagent codeine from multiple substrates of potential relevance to clandestine drug laboratory synthesis and paraphernalia seizure. Minimal sample preparation required for analysis and portability of the instrument suggest the potential for rapid, on-site analysis of evidence, a highly desired benefit for forensic science and law enforcement practitioners. Both DESI-MS and PSI-MS can generate spectra consistent with preceding data obtained using traditional ionization methods, while demonstrating detection limits in the low- to sub-ng levels.

  6. Fate of 1-(1′,4′-cyclohexadienyl)-2-methylaminopropane (CMP) in soil: Route-specific by-product in the clandestine manufacture of methamphetamine

    International Nuclear Information System (INIS)

    Pal, Raktim; Megharaj, Mallavarapu; Kirkbride, K. Paul; Naidu, Ravi


    We investigated the fate of 1-(1′,4′-cyclohexadienyl)-2-methylaminopropane (CMP) in soil. CMP is the major route-specific byproduct in the clandestine manufacture of methamphetamine (MAP) by the use of excess alkali metal (e.g., lithium) in liquid ammonia, which is commonly referred to as the “Nazi method”. This is one of the most common methods used in many countries for the illicit production of MAP. Knowledge on the fate of CMP in the terrestrial environment is essential to combat potential threats arising from illegal dumping of clandestine laboratory wastes. We report on the sorption–desorption, degradation, and metabolism patterns of CMP in three South Australian soils investigated in laboratory scale. CMP sorption in the test soils followed a Freundlich isotherm in the concentration range of 5 to 100 μg mL −1 . Degradation studies showed that CMP was fairly unstable in both non-sterile and sterile soils, with half-life values typically less than one week. The role of biotic and abiotic soil processes in the degradation of CMP also varied significantly between the different soils, and with the length of the incubation period. Interestingly, but not surprisingly, the results showed that the CMP was not actually degraded to any simpler compounds but transformed to more persistent MAP. Thus, the main concern with Nazi method is the potential hazard from MAP rather than CMP if wastes are disposed of into the environment. - Highlights: ► This study investigated the fate of 1-(1′,4′-cyclohexadienyl)-2-methylaminopropane (CMP) in soils. ► CMP was fairly unstable in both non-sterile and sterile soils, with half-life values less than a week. ► CMP transforms to more persistent methylamphetamine (MAP) in soils which is a major environmental concern.

  7. Fate of 1-(1 Prime ,4 Prime -cyclohexadienyl)-2-methylaminopropane (CMP) in soil: Route-specific by-product in the clandestine manufacture of methamphetamine

    Energy Technology Data Exchange (ETDEWEB)

    Pal, Raktim [Centre for Environmental Risk Assessment and Remediation, University of South Australia, Mawson Lakes, Adelaide, South Australia, Australia-5095 and CRC for Contamination Assessment and Remediation of the Environment, University of South Australia (Australia); Megharaj, Mallavarapu, E-mail: [Centre for Environmental Risk Assessment and Remediation, University of South Australia, Mawson Lakes, Adelaide, South Australia, Australia-5095 and CRC for Contamination Assessment and Remediation of the Environment, University of South Australia (Australia); Kirkbride, K. Paul [Australian Federal Police Forensic and Data Centres, Canberra (Australia); Naidu, Ravi [Centre for Environmental Risk Assessment and Remediation, University of South Australia, Mawson Lakes, Adelaide, South Australia, Australia-5095 and CRC for Contamination Assessment and Remediation of the Environment, University of South Australia (Australia)


    We investigated the fate of 1-(1 Prime ,4 Prime -cyclohexadienyl)-2-methylaminopropane (CMP) in soil. CMP is the major route-specific byproduct in the clandestine manufacture of methamphetamine (MAP) by the use of excess alkali metal (e.g., lithium) in liquid ammonia, which is commonly referred to as the 'Nazi method'. This is one of the most common methods used in many countries for the illicit production of MAP. Knowledge on the fate of CMP in the terrestrial environment is essential to combat potential threats arising from illegal dumping of clandestine laboratory wastes. We report on the sorption-desorption, degradation, and metabolism patterns of CMP in three South Australian soils investigated in laboratory scale. CMP sorption in the test soils followed a Freundlich isotherm in the concentration range of 5 to 100 {mu}g mL{sup -1}. Degradation studies showed that CMP was fairly unstable in both non-sterile and sterile soils, with half-life values typically less than one week. The role of biotic and abiotic soil processes in the degradation of CMP also varied significantly between the different soils, and with the length of the incubation period. Interestingly, but not surprisingly, the results showed that the CMP was not actually degraded to any simpler compounds but transformed to more persistent MAP. Thus, the main concern with Nazi method is the potential hazard from MAP rather than CMP if wastes are disposed of into the environment. - Highlights: Black-Right-Pointing-Pointer This study investigated the fate of 1-(1 Prime ,4 Prime -cyclohexadienyl)-2-methylaminopropane (CMP) in soils. Black-Right-Pointing-Pointer CMP was fairly unstable in both non-sterile and sterile soils, with half-life values less than a week. Black-Right-Pointing-Pointer CMP transforms to more persistent methylamphetamine (MAP) in soils which is a major environmental concern.

  8. Examination of the potential for diversion or clandestine dual use of a pebble-bed reactor to produce plutonium

    International Nuclear Information System (INIS)

    Ougouag, A.M.; Terry, W.K.; Gougar, H.D.


    This paper explores the susceptibility of Pebble-Bed Reactors (PBRs) to be used overtly or covertly for the production of plutonium for nuclear weapons. The basic assumption made for the consideration of overt production is that a country would purchase a PBR with the ostensible motive of producing electric power; then, after the power plant was built, the country would divert the facility entirely to the production of weapons material. It is assumed that the country would then have to manufacture production pebbles from natural uranium. The basic assumption made for covert production is that the country would obtain and use a PBR for power production, but that it would clandestinely feed plutonium production pebbles through the reactor in such small numbers that the perturbation on power plant operation would be very difficult to detect. This paper shows the potential rate of plutonium production under such constraints. It is demonstrated that the PBR is a very poor choice for either form of proliferation-intent use. (author)

  9. Characterisation of aqueous waste produced during the clandestine production of amphetamine following the Leuckart route utilising solid-phase extraction gas chromatography-mass spectrometry and capillary electrophoresis with contactless conductivity detection. (United States)

    Hauser, Frank M; Hulshof, Janneke W; Rößler, Thorsten; Zimmermann, Ralf; Pütz, Michael


    Chemical waste from the clandestine production of amphetamine is of forensic and environmental importance due to its illegal nature which often leads to dumping into the environment. In this study, 27 aqueous amphetamine waste samples from controlled Leuckart reactions performed in Germany, the Netherlands, and Poland were characterised to increase knowledge about the chemical composition and physicochemical characteristics of such waste. Aqueous waste samples from different reaction steps were analysed to determine characteristic patterns which could be used for classification. Conductivity, pH, density, ionic load, and organic compounds were determined using different analytical methods. Conductivity values ranged from 1 to over 200 mS/cm, pH values from 0 to 14, and densities from 1.0 to 1.3 g/cm 3 . A capillary electrophoresis method with contactless conductivity detection (CE-C 4 D) was developed and validated to quantify chloride, sulphate, formate, ammonium, and sodium ions which were the most abundant ions in the investigated waste samples. A solid-phase extraction sample preparation was used prior to gas chromatography-mass spectrometry analysis to determine the organic compounds. Using the characterisation data of the known samples, it was possible to assign 16 seized clandestine waste samples from an amphetamine production to the corresponding synthesis step. The data also allowed us to draw conclusions about the synthesis procedure and used chemicals. The presented data and methods could support forensic investigations by showing the probative value of synthesis waste when investigating the illegal production of amphetamine. It can also act as starting point to develop new approaches to tackle the problem of clandestine waste dumping. Copyright © 2018 John Wiley & Sons, Ltd.

  10. Visible Fists, Clandestine Kicks, and Invisible Elbows: Three Forms of Regulating Neoliberal Poverty

    Directory of Open Access Journals (Sweden)

    Javier Auyero


    Full Text Available Argentina In a preliminary attempt to understand the daily production of poor people’s subordination in contemporary Argentina, this paper explores the workings of overt and covert forms of state violence against the urban destitute and of more subtle modes of domination. Attention to the simultaneous operation of what this paper calls visible fists, clandestine kicks, and invisible elbows in the daily life of the dispossessed serves to a better integrate violence into the study of popular politics, and b cast light on the productive (and not merely repressive nature of state power.   Resumen: Puños visibles, patadas clandestinas y codos invisibles: tres formas de regulación de la pobreza neoliberal En un acercamiento preliminar a la producción cotidiana de la subordinación de los pobres urbanos en la Argentina contemporánea, este artículo explora las formas abiertas y encubiertas de violencia estatal contra los más destituidos y las modalidades más sutiles de dominación. Una atención simultánea a lo que el artículo denomina puños visibles, patadas clandestinas, y codos invisibles en la vida cotidiana de los desposeídos es útil a los efectos de: a integrar la violencia en el estudio de la política popular, y b iluminar la naturaleza productiva (y no meramente represiva del poder estatal.

  11. Investigating effectiveness of clandestine advertisement and organizational strategy in brand management

    Directory of Open Access Journals (Sweden)

    M. R. Shojaei


    Full Text Available This investigation tries to examine correlation between clandestine advertisement and organizational strategy in brand management via available sources and by using a field study. In fact, it intends to raise the question “Are clandestine advertisement and organizational strategy effective in management of products brands?” This is an applied and descriptive-approaching study. The study chooses a sample of 171 regular customers who do their day-to-day banking business activities through an Iranian bank named Sepah bank in city of Tehran, Iran. Using structural equation modeling, the study confirms a positive and meaningful relationship between clandestine advertisement and organizational strategy in brand management.

  12. The clandestine organs of the endocrine system. (United States)

    Garcia-Reyero, Natàlia


    This review analyzes what could be regarded as the "clandestine organs" of the endocrine system: the gut microbiome, the immune system, and the stress system. The immune system is very closely related to the endocrine system, with many intertwined processes and signals. Many researchers now consider the microbiome as an 'organ' that affects the organism at many different levels. While stress is certainly not an organ, it affects so many processes, including endocrine-related processes, that the stress response system deserved a special section in this review. Understanding the connections, effects, and feedback mechanisms between the different "clandestine organs" and the endocrine system will provide us with a better understanding of how an organism functions, as well as reinforce the idea that there are no independent organs or systems, but a complex, interacting network of molecules, cells, tissues, signaling pathways, and mechanisms that constitute an individual. Published by Elsevier Inc.

  13. Negative induced mood influences word production: An event-related potentials study with a covert picture naming task. (United States)

    Hinojosa, J A; Fernández-Folgueiras, U; Albert, J; Santaniello, G; Pozo, M A; Capilla, A


    The present event-related potentials (ERPs) study investigated the effects of mood on phonological encoding processes involved in word generation. For this purpose, negative, positive and neutral affective states were induced in participants during three different recording sessions using short film clips. After the mood induction procedure, participants performed a covert picture naming task in which they searched letters. The negative compared to the neutral mood condition elicited more negative amplitudes in a component peaking around 290ms. Furthermore, results from source localization analyses suggested that this activity was potentially generated in the left prefrontal cortex. In contrast, no differences were found in the comparison between positive and neutral moods. Overall, current data suggest that processes involved in the retrieval of phonological information during speech generation are impaired when participants are in a negative mood. The mechanisms underlying these effects were discussed in relation to linguistic and attentional processes, as well as in terms of the use of heuristics. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Imaging in covert ectopic ACTH secretion: a CT pictorial review

    Energy Technology Data Exchange (ETDEWEB)

    Sookur, Paul A.; Sahdev, Anju; Rockall, Andrea G.; Reznek, Rodney H. [St Bartholomew' s Hospital, Department of Academic Radiology, Dominion House, London (United Kingdom); Isidori, Andrea M. [Sapienza University of Rome, Department of Medical Pathophysiology, Rome (Italy); Monson, John P.; Grossman, Ashley B. [St Bartholomew' s Hospital, Department of Endocrinology, London (United Kingdom)


    The syndrome of ectopic adrenocorticotrophin secretion (EAS) is rare and is due to excess adrenocorticotrophin (ACTH) production from a nonpituitary tumour. These tumours can be covert, where the tumours are not readily apparent, and very small making them challenging to image. It is clinically and biochemically difficult to distinguish between covert EAS and Cushing's disease. The first-line investigation in locating the source of ACTH production is computed tomography (CT). The aim of this pictorial review is to illustrate the likely covert sites and related imaging findings. We review the CT appearances of tumours resulting in covert EAS and the associated literature. The most common tumours were bronchial carcinoid tumours, which appear as small, well-defined, round or ovoid pulmonary lesions. Rarer causes included thymic carcinoids, gastrointestinal carcinoids and pancreatic neuroendocrine tumours. Awareness of the imaging characteristics will aid identification of the source of ACTH production and allow potentially curative surgical resection. (orig.)

  15. The Evolution of Covert Signaling. (United States)

    Smaldino, Paul E; Flamson, Thomas J; McElreath, Richard


    Human sociality depends upon the benefits of mutual aid and extensive communication. However, diverse norms and preferences complicate mutual aid, and ambiguity in meaning hinders communication. Here we demonstrate that these two problems can work together to enhance cooperation through the strategic use of deliberately ambiguous signals: covert signaling. Covert signaling is the transmission of information that is accurately received by its intended audience but obscured when perceived by others. Such signals may allow coordination and enhanced cooperation while also avoiding the alienation or hostile reactions of individuals with different preferences. Although the empirical literature has identified potential mechanisms of covert signaling, such as encryption in humor, there is to date no formal theory of its dynamics. We introduce a novel mathematical model to assess when a covert signaling strategy will evolve, as well as how receiver attitudes coevolve with covert signals. Covert signaling plausibly serves an important function in facilitating within-group cooperative assortment by allowing individuals to pair up with similar group members when possible and to get along with dissimilar ones when necessary. This mechanism has broad implications for theories of signaling and cooperation, humor, social identity, political psychology, and the evolution of human cultural complexity.

  16. Social Networks and Decision Making for Clandestine Unsafe ...

    African Journals Online (AJOL)

    AJRH Managing Editor

    networks play in decision making for and facilitation of clandestine abortions. It was a mixed ... Keywords: abortion decisions, social influence, health seeking behavior. Résumé ..... Special attention is given to young women who depend more ...

  17. Remediation of Manufactured Methamphetamine in Clandestine Laboratories. A Literature Review (United States)

    The purpose of the current literature review was to identify, collect, review, and organize all available information concerning the remediation of methamphetamine found in clandestine laboratories through an analysis of routinely collected data sources. There were numerous peer ...

  18. Rethinking covert stuttering. (United States)

    Constantino, Christopher Dominick; Manning, Walter H; Nordstrom, Susan Naomi


    The experience of passing as fluent, also called covert stuttering, has been uncritically framed as an inherently negative pursuit. Historically passing has been understood as a repression of one's true, authentic self in response to either psychological distress or social discrimination. The authors of this paper seek a more nuanced understanding of passing. We ask, how must a person relate to herself in order to pass as fluent? This is a qualitative research study in which the authors utilized the ethical theories of philosopher Michel Foucault to contextualize data obtained from semi-structured interviews with nine participants who pass as fluent. Rather than a repression of an authentic self our data suggests passing is more usefully understood as a form of resistance by people who stutter to a hostile society. Participants learned from experiences of delegitimization that their stuttering had ethical ramifications. Consequently, they used a variety of self-forming practices to pass and thereby achieve the privileges that come with perceived able-bodiedness. Passing as fluent is not an inauthentic form of stuttering but a form of stuttering that is produced through the use of specific technologies of communication. These technologies of communication are constituted by the unique ethical relationship of the person who stutters with herself. Passing can be understood as an active form of resistance rather than a passive form of repression. By theorizing passing as fluent as an ethical relationship, we open up the possibility of changing the relationship and performing it differently. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Clandestine laboratory scene investigation and processing using portable GC/MS (United States)

    Matejczyk, Raymond J.


    This presentation describes the use of portable gas chromatography/mass spectrometry for on-scene investigation and processing of clandestine laboratories. Clandestine laboratory investigations present special problems to forensic investigators. These crime scenes contain many chemical hazards that must be detected, identified and collected as evidence. Gas chromatography/mass spectrometry performed on-scene with a rugged, portable unit is capable of analyzing a variety of matrices for drugs and chemicals used in the manufacture of illicit drugs, such as methamphetamine. Technologies used to detect various materials at a scene have particular applications but do not address the wide range of samples, chemicals, matrices and mixtures that exist in clan labs. Typical analyses performed by GC/MS are for the purpose of positively establishing the identity of starting materials, chemicals and end-product collected from clandestine laboratories. Concerns for the public and investigator safety and the environment are also important factors for rapid on-scene data generation. Here is described the implementation of a portable multiple-inlet GC/MS system designed for rapid deployment to a scene to perform forensic investigations of clandestine drug manufacturing laboratories. GC/MS has long been held as the 'gold standard' in performing forensic chemical analyses. With the capability of GC/MS to separate and produce a 'chemical fingerprint' of compounds, it is utilized as an essential technique for detecting and positively identifying chemical evidence. Rapid and conclusive on-scene analysis of evidence will assist the forensic investigators in collecting only pertinent evidence thereby reducing the amount of evidence to be transported, reducing chain of custody concerns, reducing costs and hazards, maintaining sample integrity and speeding the completion of the investigative process.

  20. Persistence, impacts and environmental drivers of covert infections in invertebrate hosts

    Directory of Open Access Journals (Sweden)

    Inês Fontes


    Full Text Available Abstract Background Persistent covert infections of the myxozoan, Tetracapsuloides bryosalmonae, in primary invertebrate hosts (the freshwater bryozoan, Fredericella sultana have been proposed to represent a reservoir for proliferative kidney disease in secondary fish hosts. However, we have limited understanding of how covert infections persist and vary in bryozoan populations over time and space and how they may impact these populations. In addition, previous studies have likely underestimated covert infection prevalence. To improve our understanding of the dynamics, impacts and implications of covert infections we employed a highly sensitive polymerase chain reaction (PCR assay and undertook the first investigation of covert infections in the field over an annual period by sampling bryozoans every 45 days from three populations within each of three rivers. Results Covert infections persisted throughout the year and prevalence varied within and between rivers, but were often > 50%. Variation in temperature and water chemistry were linked with changes in prevalence in a manner consistent with the maintenance of covert infections during periods of low productivity and thus poor growth conditions for both bryozoans and T. bryosalmonae. The presence and increased severity of covert infections reduced host growth but only when bryozoans were also investing in the production of overwintering propagules (statoblasts. However, because statoblast production is transitory, this effect is unlikely to greatly impact the capacity of bryozoan populations to act as persistent sources of infections and hence potential disease outbreaks in farmed and wild fish populations. Conclusions We demonstrate that covert infections are widespread and persist over space and time in bryozoan populations. To our knowledge, this is the first long-term study of covert infections in a field setting. Review of the results of this and previous studies enables us to identify

  1. Neuroscientific Measures of Covert Behavior (United States)

    Ortu, Daniele


    In radical behaviorism, the difference between overt and covert responses does not depend on properties of the behavior but on the sensitivity of the measurement tools employed by the experimenter. Current neuroscientific research utilizes technologies that allow measurement of variables that are undetected by the tools typically used by behavior…

  2. Covert Binary Communications through the Application of Chaos Theory: Three Novel Approaches

    Directory of Open Access Journals (Sweden)

    Kyle J. Bradbury


    Full Text Available Today, most covert communications systems use a spreadspectrum approach to ensure that transmissions remain clandestine. This paper expands beyond traditional spreadspectrum schemes and into chaos theory in communications by presenting a novel design for a covert noncoherent binary communication system that uses chaotic signals. Three techniques are developed, with varying performance. Each system uses two chaotic signals with antipodal attractors as the information carriers. Although the two chaotic signals used are continuously generated from random starting values without containing repetitious patterns, the receiver requires neither those initial values nor does it require synchronization with the transmitter. The chaotic signals used are both spreadspectrum in the frequency domain and undetectable using matched-filter receivers, thereby achieving a level of covertness. The signal-to-noise ratio performance is presented through simulated receiver operating characteristic (ROC curves for a comparison to binary phase shift keying. This system provides a binary communication scheme which is not detectable by standard matched filtering techniques and has noise-like spectra, requiring a new receiver configuration and yielding security.

  3. Moral perspectives on covert research

    Directory of Open Access Journals (Sweden)

    Anton van Niekerk


    Full Text Available The term ‘covert research’ refers to research on human subjects for which informed consent is not, and allegedly cannot, be solicited – not because of wilful negligence or the deliberate transgression of research ethics guidelines on the part of the researcher(s, but because the revelation of the nature of the research to the involved research participants would necessarily invalidate the research results. While covert research is deemed necessary in a number of sciences, such as ethnography, such research nevertheless elicits major ethical concern due to the fact that it seemingly violates the values of respect for autonomy and the protection of research subjects – values that have, since the first formulations of the Nuremberg Code, the Belmont Declaration and the series of Helsinki accords, become almost axiomatic in our understanding of the basic tenets of responsible and ethical research on human subjects. In this article, I contend that while subject autonomy is a pivotal value in morally legitimate research generally, there is more to morally legitimate research than informed consent. I conclude by formulating a few guidelines for the identification of circumstances under which covert research might and might not be morally in order.

  4. Bayesian accounts of covert selective attention: A tutorial review. (United States)

    Vincent, Benjamin T


    Decision making and optimal observer models offer an important theoretical approach to the study of covert selective attention. While their probabilistic formulation allows quantitative comparison to human performance, the models can be complex and their insights are not always immediately apparent. Part 1 establishes the theoretical appeal of the Bayesian approach, and introduces the way in which probabilistic approaches can be applied to covert search paradigms. Part 2 presents novel formulations of Bayesian models of 4 important covert attention paradigms, illustrating optimal observer predictions over a range of experimental manipulations. Graphical model notation is used to present models in an accessible way and Supplementary Code is provided to help bridge the gap between model theory and practical implementation. Part 3 reviews a large body of empirical and modelling evidence showing that many experimental phenomena in the domain of covert selective attention are a set of by-products. These effects emerge as the result of observers conducting Bayesian inference with noisy sensory observations, prior expectations, and knowledge of the generative structure of the stimulus environment.

  5. Controlling covert integration in EU politics

    NARCIS (Netherlands)

    Adriaensen, J.; Coremans, E.; Bursens, Peter; De Landtsheer, Christl; Braeckmans, Luc; Segaert, Barbara


    Without the prospect of new treaty revisions, integration in the European Union is often believed to come at a standstill. However, recent research suggests that deepening integration still continues, albeit in more covert ways. The risk associated with such covert integration is that it is not

  6. Leaderless Covert Networks : A Quantitative Approach

    NARCIS (Netherlands)

    Husslage, B.G.M.; Lindelauf, R.; Hamers, H.J.M.


    Abstract: Lindelauf et al. (2009a) introduced a quantitative approach to investigate optimal structures of covert networks. This approach used an objective function which is based on the secrecy versus information trade-off these organizations face. Sageman (2008) hypothesized that covert networks

  7. Secret-key expansion from covert communication (United States)

    Arrazola, Juan Miguel; Amiri, Ryan


    Covert communication allows the transmission of messages in such a way that it is not possible for adversaries to detect that the communication is occurring. This provides protection in situations where knowledge that two parties are talking to each other may be incriminating to them. In this work, we study how covert communication can be used for a different purpose: secret key expansion. First, we show that any message transmitted in a secure covert protocol is also secret and therefore unknown to an adversary. We then propose a covert communication protocol where the amount of key consumed in the protocol is smaller than the transmitted key, thus leading to secure secret key expansion. We derive precise conditions for secret key expansion to occur, showing that it is possible when there are sufficiently low levels of noise for a given security level. We conclude by examining how secret key expansion from covert communication can be performed in a computational security model.

  8. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis


    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  9. The EU Migration Regime and West African Clandestine Migrants

    Directory of Open Access Journals (Sweden)

    Hannah M. Cross


    Full Text Available This article examines the relationship between the EU migration regime and clandestine migration from West Africa to Europe. A review of the development of EU border and immigration policy reveals significant and sustained moves towards securitisation of migrants and the externalisation of border controls to countries of origin and transit. This emphasis on repression limits the scope of cooperation with ‘third countries’ (those outside Europe in co-development, labour mobility, sea patrols and repatriation, which are examined separately as deterrents to uncontrolled emigration. This paper then analyses the motivations and intentions of Senegalese youth around the Cap Vert peninsula. This analysis includes the role of emigration in development and more recently, the impact of human losses and repatriations resulting from the clandestine journey by pirogue (open fishing boat to the Canary Islands. This article argues that in this case, youth are excluded both from labour and asylum policies and instead are managed as a security threat, contradicting the factors driving this journey.

  10. Covert Marketing: A Virtual Media Communication Vehicle

    Directory of Open Access Journals (Sweden)

    Pradeep Kautish


    Full Text Available Consumers' suspicion towards traditional marketing techniques, led marketers to try the virtual media communication form called disguise advertising as other forms of messages. The examples include making advertisements resemble news items (Aditya 2001; Levine 1993; Richards 1992, the infomercials in the '90s that disguise advertising as TV programs (Levine 1993; Lacher and Rotfeld 1994, making celebrities use the products in their real lives or in films (Aditya2001, feeding media information using public relations (PR activities like brib- ing journalists with gifts and making TV stations use the footages from press releases (Gillin 2006. Because of the prevalence of virtual media, the marketing practices that conceal the real sources (marketers with disguised sources haveposed both ethical and policy concerns. This article proposed a new typology that covered the comprehensive scope of disguised marketing practices, discussed the deceptive nature of this marketing technique from the consumer behavioral view- points, and conducted a 2 x 3 experiment to test the hypothesized relationships.The results suggest that an implicit message, disguised source’s preference, is likely to be conveyed in covert marketing and thus results in high a deceptive tendency.

  11. Effects of stimulus response compatibility on covert imitation of vowels. (United States)

    Adank, Patti; Nuttall, Helen; Bekkering, Harold; Maegherman, Gwijde


    When we observe someone else speaking, we tend to automatically activate the corresponding speech motor patterns. When listening, we therefore covertly imitate the observed speech. Simulation theories of speech perception propose that covert imitation of speech motor patterns supports speech perception. Covert imitation of speech has been studied with interference paradigms, including the stimulus-response compatibility paradigm (SRC). The SRC paradigm measures covert imitation by comparing articulation of a prompt following exposure to a distracter. Responses tend to be faster for congruent than for incongruent distracters; thus, showing evidence of covert imitation. Simulation accounts propose a key role for covert imitation in speech perception. However, covert imitation has thus far only been demonstrated for a select class of speech sounds, namely consonants, and it is unclear whether covert imitation extends to vowels. We aimed to demonstrate that covert imitation effects as measured with the SRC paradigm extend to vowels, in two experiments. We examined whether covert imitation occurs for vowels in a consonant-vowel-consonant context in visual, audio, and audiovisual modalities. We presented the prompt at four time points to examine how covert imitation varied over the distracter's duration. The results of both experiments clearly demonstrated covert imitation effects for vowels, thus supporting simulation theories of speech perception. Covert imitation was not affected by stimulus modality and was maximal for later time points.

  12. Noiseless Steganography The Key to Covert Communications

    CERN Document Server

    Desoky, Abdelrahman


    Among the features that make Noiseless Steganography: The Key to Covert Communications a first of its kind: The first to comprehensively cover Linguistic Steganography The first to comprehensively cover Graph Steganography The first to comprehensively cover Game Steganography Although the goal of steganography is to prevent adversaries from suspecting the existence of covert communications, most books on the subject present outdated steganography approaches that are detectable by human and/or machine examinations. These approaches often fail because they camouflage data as a detectable noise b

  13. Covert Censorship in Libraries: A Discussion Paper (United States)

    Moody, Kim


    Librarians, through their professional associations, have long been committed to the social justice principle embedded in the concept of "free access to information". External censorship challenges to library collections threaten this principle overtly. However, censorship can also occur in libraries in various covert and often unconscious ways.…

  14. A controlled monitoring study of simulated clandestine graves using 3D ground penetrating radar

    CSIR Research Space (South Africa)

    van Schoor, Michael


    Full Text Available A controlled three-dimensional ground penetrating radar monitoring study over simulated clandestine graves was conducted near Pretoria, South Africa, in which the detectability of graves as a function of post-burial interval was assessed...

  15. [Attendance at a health center by clandestine prostitutes in Djibouti]. (United States)

    Philippon, M; Saada, M; Kamil, M A; Houmed, H M


    The extent of clandestine prostitution in Djibouti is difficult to evaluate. Due to the secrecy of the prostitutes and often their low level of education, the follow-up of these patients is also difficult. A sexually transmitted disease clinic specialized in the treatment of prostitutes and their customers has been established in Djibouti since 1963. We tried to evaluate the available data on the clandestine prostitutes attendance at the center. The population was young with a mean age of 23 years. Fifty percent had children and 60% were divorced or separated. Ninety-one percent were Ethiopian and 73% lived in the same district of the city of Djibouti. Almost half of them were HIV positive. The duration of residence in Djibouti before the first visit to the clinic varied widely with a median of 12 months. However, the total duration of prostitution before the first visit was shorter with a median of 3 months. The complaint at the first visit was most often minor. Among the prostitutes who first came to the center in 1993, half of them came only once. The overall duration of follow-up was 8 months, for an average of 3.7 visits per patient. Alternatively, 20 patients had more than 10 consultations and this represented one third of the consultations given to previous patients. This last group is the only one which tended to respect the monthly visits proposed to each patient at the first consultation. The other patients seemed to come only when they felt ill. The routine statistical activities which separately counted the new and previous patients gave an optimistic but faulty impression: these showed an increase in the total number of patients and also an increase in the percentage of previous patients visiting (from 42 to 69% between 1988 and 1994). It is difficult to evaluate the follow-up of such a mobile population. The few patients known for their fidelity contrasted with the fact that half of the patients had visited the center only once. This low frequency of

  16. Clandestineness and armed struggle: a look from the gender. the case of "Mery" in militancy clandestine Frente Patriótico Manuel Rodríguez

    Directory of Open Access Journals (Sweden)

    Javiera Libertad Robles Recabarren


    Full Text Available This paper focuses its concern on the participation of women in the struggle against the military dictatorship in Chile (1973 - 1988, with the aim of revealing my gender relations established within the clandestine militancy. To realize this, we turn to memoria suelta of a woman activist Frente Patriótico Manuel Rodríguez, who through the testimony of their experience exposes militant aspects of life from his position as woman, mother and clandestine, allowing unveil the place occupied by women in the armed wing of the Communist Party of Chile.

  17. Covert face recognition in congenital prosopagnosia: a group study. (United States)

    Rivolta, Davide; Palermo, Romina; Schmalzl, Laura; Coltheart, Max


    Even though people with congenital prosopagnosia (CP) never develop a normal ability to "overtly" recognize faces, some individuals show indices of "covert" (or implicit) face recognition. The aim of this study was to demonstrate covert face recognition in CP when participants could not overtly recognize the faces. Eleven people with CP completed three tasks assessing their overt face recognition ability, and three tasks assessing their "covert" face recognition: a Forced choice familiarity task, a Forced choice cued task, and a Priming task. Evidence of covert recognition was observed with the Forced choice familiarity task, but not the Priming task. In addition, we propose that the Forced choice cued task does not measure covert processing as such, but instead "provoked-overt" recognition. Our study clearly shows that people with CP demonstrate covert recognition for faces that they cannot overtly recognize, and that behavioural tasks vary in their sensitivity to detect covert recognition in CP. Copyright © 2011 Elsevier Srl. All rights reserved.

  18. Are Covert Saccade Functionally Relevant in Vestibular Hypofunction? (United States)

    Hermann, R; Pelisson, D; Dumas, O; Urquizar, Ch; Truy, E; Tilikete, C


    The vestibulo-ocular reflex maintains gaze stabilization during angular or linear head accelerations, allowing adequate dynamic visual acuity. In case of bilateral vestibular hypofunction, patients use saccades to compensate for the reduced vestibulo-ocular reflex function, with covert saccades occurring even during the head displacement. In this study, we questioned whether covert saccades help maintain dynamic visual acuity, and evaluated which characteristic of these saccades are the most relevant to improve visual function. We prospectively included 18 patients with chronic bilateral vestibular hypofunction. Subjects underwent evaluation of dynamic visual acuity in the horizontal plane as well as video recording of their head and eye positions during horizontal head impulse tests in both directions (36 ears tested). Frequency, latency, consistency of covert saccade initiation, and gain of covert saccades as well as residual vestibulo-ocular reflex gain were calculated. We found no correlation between residual vestibulo-ocular reflex gain and dynamic visual acuity. Dynamic visual acuity performance was however positively correlated with the frequency and gain of covert saccades and negatively correlated with covert saccade latency. There was no correlation between consistency of covert saccade initiation and dynamic visual acuity. Even though gaze stabilization in space during covert saccades might be of very short duration, these refixation saccades seem to improve vision in patients with bilateral vestibular hypofunction during angular head impulses. These findings emphasize the need for specific rehabilitation technics that favor the triggering of covert saccades. The physiological origin of covert saccades is discussed.

  19. Visualization and Analysis of Complex Covert Networks

    DEFF Research Database (Denmark)

    Memon, Bisharat

    systems that are covert and hence inherently complex. My Ph.D. is positioned within the wider framework of CrimeFighter project. The framework envisions a number of key knowledge management processes that are involved in the workflow, and the toolbox provides supporting tools to assist human end......This report discusses and summarize the results of my work so far in relation to my Ph.D. project entitled "Visualization and Analysis of Complex Covert Networks". The focus of my research is primarily on development of methods and supporting tools for visualization and analysis of networked......-users (intelligence analysts) in harvesting, filtering, storing, managing, structuring, mining, analyzing, interpreting, and visualizing data about offensive networks. The methods and tools proposed and discussed in this work can also be applied to analysis of more generic complex networks....

  20. Design of Transport Layer Based Hybrid Covert Channel Detection Engine


    K, Anjan; Abraham, Jibi; Jadhav V, Mamatha


    Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called "Covert Channel". The word "Covert" stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitimate network communication that clearly violates security policies laid down. The non-transparency in cov...

  1. The Technique to Prevent the Data Leakage using Covert Channels

    Directory of Open Access Journals (Sweden)

    Anna Vasilievna Arkhangelskaya


    Full Text Available The purpose of the article was to analyze technique to prevent information leakage using covert channels. The main steps are as follows: involving covert channels identification, data throughput estimation, its elimination or limitation, audit and detection. Three schemes of identification had been analyzed: shared resources methodology, covert flow tree method, message sequence diagram method. Ways of guarantee information delivery from systems with low security level to systems with high security level have been investigated.

  2. Critical Perspectives on Clandestine Migration Facilitation: An Overview of Migrant Smuggling Research

    Directory of Open Access Journals (Sweden)

    Gabriella Sanchez


    The dichotomist script of smugglers as predators and migrants and asylum seekers as victims that dominates narratives of clandestine migration has often obscured the perspectives of those who rely on smugglers for their mobility. This has not only silenced migrants and asylum seekers’ efforts to reach safety, but also the collective knowledge their communities use to secure their mobility amid increased border militarization and migration controls. This paper provides an overview of contemporary, empirical scholarship on clandestine migration facilitation.  It then argues that the processes leading to clandestine or irregular migration are not merely the domain of criminal groups. Rather, they also involve a series of complex mechanisms of protection crafted within migrant and refugee communities as attempts to reduce the vulnerabilities known to be inherent to clandestine journeys. Both criminal and less nefarious efforts are shaped by and in response to enforcement measures worldwide on the part of nation-states to control migration flows. Devised within migrant and refugee communities, and mobilized formally and informally among their members, strategies to facilitate clandestine or irregular migration constitute a system of human security rooted in generations-long, historical notions of solidarity, tradition, reciprocity, and affect (Khosravi 2010. Yet amid concerns over national and border security, and the reemergence of nationalism, said strategies have become increasingly stigmatized, traveling clandestinely being perceived as an inherently — and uniquely — criminal activity.  This contribution constitutes an attempt to critically rethink the framework present in everyday narratives of irregular migration facilitation. It is a call to incorporate into current protection dialogues the perceptions of those who rely on criminalized migration mechanisms to fulfill mobility goals, and in so doing, articulate and inform solutions towards promoting

  3. EEG predictors of covert vigilant attention (United States)

    Martel, Adrien; Dähne, Sven; Blankertz, Benjamin


    Objective. The present study addressed the question whether neurophysiological signals exhibit characteristic modulations preceding a miss in a covert vigilant attention task which mimics a natural environment in which critical stimuli may appear in the periphery of the visual field. Approach. Subjective, behavioural and encephalographic (EEG) data of 12 participants performing a modified Mackworth Clock task were obtained and analysed offline. The stimulus consisted of a pointer performing regular ticks in a clockwise sequence across 42 dots arranged in a circle. Participants were requested to covertly attend to the pointer and press a response button as quickly as possible in the event of a jump, a rare and random event. Main results. Significant increases in response latencies and decreases in the detection rates were found as a function of time-on-task, a characteristic effect of sustained attention tasks known as the vigilance decrement. Subjective sleepiness showed a significant increase over the duration of the experiment. Increased activity in the α-frequency range (8-14 Hz) was observed emerging and gradually accumulating 10 s before a missed target. Additionally, a significant gradual attenuation of the P3 event-related component was found to antecede misses by 5 s. Significance. The results corroborate recent findings that behavioural errors are presaged by specific neurophysiological activity and demonstrate that lapses of attention can be predicted in a covert setting up to 10 s in advance reinforcing the prospective use of brain-computer interface (BCI) technology for the detection of waning vigilance in real-world scenarios. Combining these findings with real-time single-trial analysis from BCI may pave the way for cognitive states monitoring systems able to determine the current, and predict the near-future development of the brain's attentional processes.

  4. CovertCast: Using Live Streaming to Evade Internet Censorship

    Directory of Open Access Journals (Sweden)

    McPherson Richard


    Full Text Available We design, implement, and evaluate CovertCast, a censorship circumvention system that broadcasts the content of popular websites in real-time, encrypted video streams on common live-streaming services such as YouTube. CovertCast does not require any modifications to the streaming service and employs the same protocols, servers, and streaming software as any other user of the service. Therefore, CovertCast cannot be distinguished from other live streams by IP address filtering or protocol fingerprinting, raising the bar for censors.

  5. Calling Out Cheaters : Covert Security with Public VerifiabilitySecurity

    DEFF Research Database (Denmark)

    Asharov, Gilad; Orlandi, Claudio


    We introduce the notion of covert security with public verifiability, building on the covert security model introduced by Aumann and Lindell (TCC 2007). Protocols that satisfy covert security guarantee that the honest parties involved in the protocol will notice any cheating attempt with some...... constant probability ε. The idea behind the model is that the fear of being caught cheating will be enough of a deterrent to prevent any cheating attempt. However, in the basic covert security model, the honest parties are not able to persuade any third party (say, a judge) that a cheating occurred. We...... propose (and formally define) an extension of the model where, when an honest party detects cheating, it also receives a certificate that can be published and used to persuade other parties, without revealing any information about the honest party’s input. In addition, malicious parties cannot create fake...

  6. A New Sensors-Based Covert Channel on Android

    Directory of Open Access Journals (Sweden)

    Ahmed Al-Haiqi


    Full Text Available Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5–5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.

  7. A new sensors-based covert channel on android. (United States)

    Al-Haiqi, Ahmed; Ismail, Mahamod; Nordin, Rosdiadee


    Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5-5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications.

  8. Covert Channel Pada Aliran Data Websocket untuk Komunikasi Messaging XMPP

    Directory of Open Access Journals (Sweden)

    Yoga Dwitya Pramudita


    Abstract Instant Messaging communication services provide a variety of communication features that can be used by the user, such as text messaging (text messages both online and offline. One of the standard protocol that supports this service is XMPP (Extensible Messaging and Presence Protocol. XMPP communication using XML documents, making it vulnerable to passive attacks monitoring content of  communications. To overcome this drawback the solution is encrypted communications. The other solutions that try to offer in this research is the use of a covert channel to send hidden messages. In this research will create a browser based XMPP client application that is capable to deliver XMPP communication and also provide covert channel communication. XMPP communication can be built on a web-based application using WebSocket protocol. This protocol will exploit field masking-key to load the covert channel messages that is sent during the session XMPP communication takes place. From the test results, the client application is able to produce a covert channel communication with a data width of 3 bytes in each packet. The client application is also able to perform covert communication channel in a communication link with the condition of the probability of packet loss rate below 10%.   Keywords— WebSocket, XMPP, masking-key, Covert Channel, browser based application.

  9. A New Sensors-Based Covert Channel on Android (United States)


    Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security. Now is the time for Android platform to analyze its security model, in particular the two key principles: process-isolation and the permissions system. Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. Still no universal solution can countermeasure this sort of attack unless the covert channels are known. This paper is an attempt to reveal a new covert channel, not only being specific to smartphones, but also exploiting an unusual resource as a vehicle to carry covert information: sensors data. Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. However, if the vibration motor on the device is used properly, programmatically produced vibration patterns can encode stolen data and hence an application can cause discernible effects on acceleration data to be received and decoded by another application. Our evaluations confirmed a real threat where strings of tens of characters could be transmitted errorless if the throughput is reduced to around 2.5–5 bps. The proposed covert channel is very stealthy as no unusual permissions are required and there is no explicit communication between the colluding applications. PMID:25295311

  10. [Understanding and reaching young clandestine sex workers in Burkina Faso to improve response to HIV]. (United States)

    Berthé, Abdramane; Huygens, Pierre; Ouattara, Cécile; Sanon, Anselme; Ouédraogo, Abdoulaye; Nagot, Nicolas


    In 1998, researchers in Burkina Faso enrolled 300 women more or less involved in commercial sex work in an open cohort to determine whether adequate management of their sexually transmitted infections and exposure to well-designed, well-delivered, and plentiful communication for behaviour change (CBC) might reduce their vulnerability to HIV. In 2000, they observed that the non-professional sex workers (occasional or clandestine sex workers) were more difficult to reach, to mobilize and to keep involved in the project's different activities. This group was also infected at the same or higher rates than professional sex workers because they did not use condoms routinely. To accomplish the project objectives, they therefore chose to recruit more non-professional sex workers in the new cohort of 700 women. This social-anthropological study was conducted to help them to enrol young clandestine sex workers. The overall objective of this study was to understand the life of this category of sex workers and to identify strategic actors to reach them. Using a qualitative method, social anthropologists reviewed literature, identified and geo-referenced all local places suitable to encountering these women, obtained life stories from some of them and interviewed key informants and participants in the field. The results showed that in Bobo-Dioulasso (Burkina Faso): - most young women who are clandestine sex workers are Burkinabe, and girls entering the sex trade are increasingly young and increasingly uneducated; - most of them come from families with low capital (financial, cultural, or social). The parents' socioeconomic status (contextual poverty) results in unmet financial needs, which in turn exposes them to starting work early, including commercial sex work; - of all the income-generating activities available to unskilled young girls, commercial sex work is one of the most profitable and easily accessible; - in the three-fold context of an HIV epidemic, poverty, and

  11. Playing it Safe: Legal and Clandestine Abortions Among Adolescents in Ethiopia. (United States)

    Sully, Elizabeth; Dibaba, Yohannes; Fetters, Tamara; Blades, Nakeisha; Bankole, Akinrinola


    The 2005 expansion of the Ethiopian abortion law provided minors access to legal abortions, yet little is known about abortion among adolescents. This paper estimates the incidence of legal and clandestine abortions and the severity of abortion-related complications among adolescent and nonadolescent women in Ethiopia in 2014. This paper uses data from three surveys: a Health Facility Survey (n = 822) to collect data on legal abortions and postabortion complications, a Health Professionals Survey (n = 82) to estimate the share of clandestine abortions that resulted in treated complications, and a Prospective Data Survey (n = 5,604) to collect data on abortion care clients. An age-specific variant of the Abortion Incidence Complications Method was used to estimate abortions by age-group. Adolescents have the lowest abortion rate among all women below age 35 (19.6 per 1,000 women). After adjusting for lower levels of sexual activity among adolescents however, we find that adolescents have the highest abortion rate among all age-groups. Adolescents also have the highest proportion (64%) of legal abortions compared with other age-groups. We find no differences in the severity of abortion-related complications between adolescent and nonadolescent women. We find no evidence that adolescents are more likely than older women to have clandestine abortions. However, the higher abortion and pregnancy rates among sexually active adolescents suggest that they face barriers in access to and use of contraceptive services. Further work is needed to address the persistence of clandestine abortions among adolescents in a context where safe and legal abortion is available. Copyright © 2018 The Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  12. Natural language metaphors covertly influence reasoning.

    Directory of Open Access Journals (Sweden)

    Paul H Thibodeau

    Full Text Available Metaphors pervade discussions of social issues like climate change, the economy, and crime. We ask how natural language metaphors shape the way people reason about such social issues. In previous work, we showed that describing crime metaphorically as a beast or a virus, led people to generate different solutions to a city's crime problem. In the current series of studies, instead of asking people to generate a solution on their own, we provided them with a selection of possible solutions and asked them to choose the best ones. We found that metaphors influenced people's reasoning even when they had a set of options available to compare and select among. These findings suggest that metaphors can influence not just what solution comes to mind first, but also which solution people think is best, even when given the opportunity to explicitly compare alternatives. Further, we tested whether participants were aware of the metaphor. We found that very few participants thought the metaphor played an important part in their decision. Further, participants who had no explicit memory of the metaphor were just as much affected by the metaphor as participants who were able to remember the metaphorical frame. These findings suggest that metaphors can act covertly in reasoning. Finally, we examined the role of political affiliation on reasoning about crime. The results confirm our previous findings that Republicans are more likely to generate enforcement and punishment solutions for dealing with crime, and are less swayed by metaphor than are Democrats or Independents.

  13. Overt and covert attention to location-based reward. (United States)

    McCoy, Brónagh; Theeuwes, Jan


    Recent research on the impact of location-based reward on attentional orienting has indicated that reward factors play an influential role in spatial priority maps. The current study investigated whether and how reward associations based on spatial location translate from overt eye movements to covert attention. If reward associations can be tied to locations in space, and if overt and covert attention rely on similar overlapping neuronal populations, then both overt and covert attentional measures should display similar spatial-based reward learning. Our results suggest that location- and reward-based changes in one attentional domain do not lead to similar changes in the other. Specifically, although we found similar improvements at differentially rewarded locations during overt attentional learning, this translated to the least improvement at a highly rewarded location during covert attention. We interpret this as the result of an increased motivational link between the high reward location and the trained eye movement response acquired during learning, leading to a relative slowing during covert attention when the eyes remained fixated and the saccade response was suppressed. In a second experiment participants were not required to keep fixated during the covert attention task and we no longer observed relative slowing at the high reward location. Furthermore, the second experiment revealed no covert spatial priority of rewarded locations. We conclude that the transfer of location-based reward associations is intimately linked with the reward-modulated motor response employed during learning, and alternative attentional and task contexts may interfere with learned spatial priorities. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. Neural foundations of overt and covert actions. (United States)

    Simos, Panagiotis G; Kavroulakis, Eleftherios; Maris, Thomas; Papadaki, Efrosini; Boursianis, Themistoklis; Kalaitzakis, Giorgos; Savaki, Helen E


    We used fMRI to assess the human brain areas activated for execution, observation and 1st person motor imagery of a visually guided tracing task with the index finger. Voxel-level conjunction analysis revealed several cortical areas activated in common across all three motor conditions, namely, the upper limb representation of the primary motor and somatosensory cortices, the dorsal and ventral premotor, the superior and inferior parietal cortices as well as the posterior part of the superior and middle temporal gyrus including the temporo-parietal junction (TPj) and the extrastriate body area (EBA). Functional connectivity analyses corroborated the notion that a common sensory-motor fronto-parieto-temporal cortical network is engaged for execution, observation, and imagination of the very same action. Taken together these findings are consistent with the more parsimonious account of motor cognition provided by the mental simulation theory rather than the recently revised mirror neuron view Action imagination and observation were each associated with several additional functional connections, which may serve the distinction between overt action and its covert counterparts, and the attribution of action to the correct agent. For example, the central position of the right middle and inferior frontal gyrus in functional connectivity during motor imagery may reflect the suppression of movements during mere imagination of action, and may contribute to the distinction between 'imagined' and 'real' action. Also, the central role of the right EBA in observation, assessed by functional connectivity analysis, may be related to the attribution of action to the 'external agent' as opposed to the 'self'. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Encryption of covert information into multiple statistical distributions

    International Nuclear Information System (INIS)

    Venkatesan, R.C.


    A novel strategy to encrypt covert information (code) via unitary projections into the null spaces of ill-conditioned eigenstructures of multiple host statistical distributions, inferred from incomplete constraints, is presented. The host pdf's are inferred using the maximum entropy principle. The projection of the covert information is dependent upon the pdf's of the host statistical distributions. The security of the encryption/decryption strategy is based on the extreme instability of the encoding process. A self-consistent procedure to derive keys for both symmetric and asymmetric cryptography is presented. The advantages of using a multiple pdf model to achieve encryption of covert information are briefly highlighted. Numerical simulations exemplify the efficacy of the model

  16. Electrophysiological dynamics of covert and overt visual attention

    DEFF Research Database (Denmark)

    Ordikhani-Seyedlar, Mehdi

    Attention is a key neural function for choosing certain information to receive more processing than others. Attention is allocated either by directly looking at the target (overt) or without eye movement towards the target (covert). The current study was designed to extract relevant features...... by using steady-state visual evoked potentials (SSVEP) task. SSVEP task was presented to subjects at the same time that the electroencephalography (EEG) signals were recorded by the scalp electrodes. Subjects were instructed to respond to a certain stimulus by pressing a button. This way attention...... was measure in continuous manner. Results showed that the amplitude of SSVEP frequencies is higher in overt than covert attention. This indicates that by overt attention events are registered with larger power. However, exploring the harmonics of frequencies showed that covert attention generates larger 2nd...

  17. CFCC: A Covert Flows Confinement Mechanism for Virtual Machine Coalitions (United States)

    Cheng, Ge; Jin, Hai; Zou, Deqing; Shi, Lei; Ohoussou, Alex K.

    Normally, virtualization technology is adopted to construct the infrastructure of cloud computing environment. Resources are managed and organized dynamically through virtual machine (VM) coalitions in accordance with the requirements of applications. Enforcing mandatory access control (MAC) on the VM coalitions will greatly improve the security of VM-based cloud computing. However, the existing MAC models lack the mechanism to confine the covert flows and are hard to eliminate the convert channels. In this paper, we propose a covert flows confinement mechanism for virtual machine coalitions (CFCC), which introduces dynamic conflicts of interest based on the activity history of VMs, each of which is attached with a label. The proposed mechanism can be used to confine the covert flows between VMs in different coalitions. We implement a prototype system, evaluate its performance, and show that our mechanism is practical.

  18. Acute and chronic environmental effects of clandestine methamphetamine waste. (United States)

    Kates, Lisa N; Knapp, Charles W; Keenan, Helen E


    The illicit manufacture of methamphetamine (MAP) produces substantial amounts of hazardous waste that is dumped illegally. This study presents the first environmental evaluation of waste produced from illicit MAP manufacture. Chemical oxygen demand (COD) was measured to assess immediate oxygen depletion effects. A mixture of five waste components (10mg/L/chemical) was found to have a COD (130 mg/L) higher than the European Union wastewater discharge regulations (125 mg/L). Two environmental partition coefficients, K(OW) and K(OC), were measured for several chemicals identified in MAP waste. Experimental values were input into a computer fugacity model (EPI Suite™) to estimate environmental fate. Experimental log K(OW) values ranged from -0.98 to 4.91, which were in accordance with computer estimated values. Experimental K(OC) values ranged from 11 to 72, which were much lower than the default computer values. The experimental fugacity model for discharge to water estimates that waste components will remain in the water compartment for 15 to 37 days. Using a combination of laboratory experimentation and computer modelling, the environmental fate of MAP waste products was estimated. While fugacity models using experimental and computational values were very similar, default computer models should not take the place of laboratory experimentation. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. Covert Conditioning: Case Studies in Self-Management. (United States)

    Yager, Geoffrey G.

    The self-management of thoughts and mental images was used in a series of empirical case studies to influence behavior changes. The target behaviors in the cases reported were smoking, overeating, fingernail biting, thinking self-depreciative thoughts, and responding assertively. Self-monitoring, covert positive reinforcement, covert…

  20. Covert Channels in SIP for VoIP Signalling (United States)

    Mazurczyk, Wojciech; Szczypiorski, Krzysztof

    In this paper, we evaluate available steganographic techniques for SIP (Session Initiation Protocol) that can be used for creating covert channels during signaling phase of VoIP (Voice over IP) call. Apart from characterizing existing steganographic methods we provide new insights by introducing new techniques. We also estimate amount of data that can be transferred in signalling messages for typical IP telephony call.

  1. Predicting Overt and Covert Antisocial Behaviors: Parents, Peers, and Homelessness (United States)

    Tompsett, Carolyn J.; Toro, Paul A.


    Parental deviance, parental monitoring, and deviant peers were examined as predictors of overt and covert antisocial behaviors. Homeless (N=231) and housed (N=143) adolescents were assessed in adolescence and again in early adulthood. Homelessness predicted both types of antisocial behaviors, and effects persisted in young adulthood. Parental…

  2. From Passive to Covert Security at Low Cost

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Nielsen, Jesper Buus


    . In this paper, we show how to compile a passively secure protocol for honest majority into one that is secure against covert attacks, again for honest majority and catches cheating with probability 1/4. The cost of the modified protocol is essentially twice that of the original plus an overhead that only...

  3. A Comparison of Three Covert Assertion Training Procedures. (United States)

    Twentyman, Craig T.; And Others


    Assessed the effectiveness of covert modification procedures in an assertion training program. All treatment groups were superior to the control in behavioral ratings of assertiveness during the posttest in those situations that had been employed previously in treatment; two were superior in those that had not been used, providing evidence of…

  4. Covert medication in psychiatric emergencies: is it ever ethically permissible? (United States)

    Hung, Erick K; McNiel, Dale E; Binder, Renée L


    Covert administration of medications to patients, defined as the administration of medication to patients without their knowledge, is a practice surrounded by clinical, legal, ethics-related, and cultural controversy. Many psychiatrists would be likely to advocate that the practice of covert medication in emergency psychiatry is not clinically, ethically, or legally acceptable. This article explores whether there may be exceptions to this stance that would be ethical. We first review the standard of emergency psychiatric care. Although we could identify no published empirical studies of covert administration of medicine in emergency departments, we review the prevalence of this practice in other clinical settings. While the courts have not ruled with respect to covert medication, we discuss the evolving legal landscape of informed consent, competency, and the right to refuse treatment. We discuss dilemmas regarding the ethics involved in this practice, including the tensions among autonomy, beneficence, and duty to protect. We explore how differences between cultures regarding the value placed on individual versus family autonomy may affect perspectives with regard to this practice. We investigate how consumers view this practice and their treatment preferences during a psychiatric emergency. Finally, we discuss psychiatric advance directives and explore how these contracts may affect the debate over the practice.

  5. A GIS-based Quantitative Approach for the Search of Clandestine Graves, Italy. (United States)

    Somma, Roberta; Cascio, Maria; Silvestro, Massimiliano; Torre, Eliana


    Previous research on the RAG color-coded prioritization systems for the discovery of clandestine graves has not considered all the factors influencing the burial site choice within a GIS project. The goal of this technical note was to discuss a GIS-based quantitative approach for the search of clandestine graves. The method is based on cross-referenced RAG maps with cumulative suitability factors to host a burial, leading to the editing of different search scenarios for ground searches showing high-(Red), medium-(Amber), and low-(Green) priority areas. The application of this procedure allowed several outcomes to be determined: If the concealment occurs at night, then the "search scenario without the visibility" will be the most effective one; if the concealment occurs in daylight, then the "search scenario with the DSM-based visibility" will be most appropriate; the different search scenarios may be cross-referenced with offender's confessions and eyewitnesses' testimonies to verify the veracity of their statements. © 2017 American Academy of Forensic Sciences.

  6. Trading secrets: Jews and the early modern quest for clandestine knowledge. (United States)

    Jütte, Daniel


    This essay explores the significance and function of secrecy and secret sciences in Jewish-Christian relations and in Jewish culture in the early modern period. It shows how the trade in clandestine knowledge and the practice of secret sciences became a complex, sometimes hazardous space for contact between Jews and Christians. By examining this trade, the essay clarifies the role of secrecy in the early modern marketplace of knowledge. The attribution of secretiveness to Jews was a widespread topos in early modern European thought. However, relatively little is known about the implications of such beliefs in science or in daily life. The essay pays special attention to the fact that trade in secret knowledge frequently offered Jews a path to the center of power, especially at court. Furthermore, it becomes clear that the practice of secret sciences, the trade in clandestine knowledge, and a mercantile agenda were often inextricably interwoven. Special attention is paid to the Italian-Jewish alchemist, engineer, and entrepreneur Abramo Colorni (ca. 1544-1599), whose career illustrates the opportunities provided by the marketplace of secrets at that time. Much scholarly (and less scholarly) attention has been devoted to whether and what Jews "contributed" to what is commonly called the "Scientific Revolution." This essay argues that the question is misdirected and that, instead, we should pay more attention to the distinctive opportunities offered by the early modern economy of secrecy.

  7. Management of clandestine drug laboratories: need for evidence-based environmental health policies. (United States)

    Al-Obaidi, Tamara A; Fletcher, Stephanie M


    Clandestine drug laboratories (CDLs) have been emerging and increasing as a public health problem in Australia, with methamphetamine being the dominant illegally manufactured drug. However, management and remediation of contaminated properties are still limited in terms of regulation and direction, especially in relation to public and environmental health practice. Therefore, this review provides an update on the hazards and health effects associated with CDLs, with a specific look at the management of these labs from an Australian perspective. Particularly, the paper attempts to describe the policy landscape for management of CDLs, and identifies current gaps and how further research may be utilised to advance understanding and management of CDLs and inform public health policies. The paper highlights a significant lack of evidence-based policies and guidelines to guide regulatory authority including environmental health officers in Australia. Only recently, the national Clandestine Drug Laboratory Guidelines were developed to assist relevant authority and specialists manage and carry out investigations and remediation of contaminated sites. However, only three states have developed state-based guidelines, some of which are inadequate to meet environmental health requirements. The review recommends well-needed inter-sectoral collaborations and further research to provide an evidence base for the development of robust policies and standard operating procedures for safe and effective environmental health management and remediation of CDLs.

  8. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method

    Directory of Open Access Journals (Sweden)

    Kuang Tsan Lin


    Full Text Available The Rivest-Shamir-Adleman (RSA encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matrix holographic image contain seven groups of codes used for reconstructing the covert image. The seven groups of codes are identification codes, covert-image dimension codes, covert-image graylevel codes, pre-RSA bit number codes, RSA key codes, post-RSA bit number codes, and information codes. The reconstructed covert image derived from the dot-matrix holographic image and the original covert image are exactly the same.

  9. Clandestine induced abortion: prevalence, incidence and risk factors among women in a Latin American country. (United States)

    Bernabé-Ortiz, Antonio; White, Peter J; Carcamo, Cesar P; Hughes, James P; Gonzales, Marco A; Garcia, Patricia J; Garnett, Geoff P; Holmes, King K


    Clandestine induced abortions are a public health problem in many developing countries where access to abortion services is legally restricted. We estimated the prevalence and incidence of, and risk factors for, clandestine induced abortions in a Latin American country. We conducted a large population-based survey of women aged 18-29 years in 20 cities in Peru. We asked questions about their history of spontaneous and induced abortions, using techniques to encourage disclosure. Of 8242 eligible women, 7992 (97.0%) agreed to participate. The prevalence of reported induced abortions was 11.6% (95% confidence interval [CI] 10.9%-12.4%) among the 7962 women who participated in the survey. It was 13.6% (95% CI 12.8%-14.5%) among the 6559 women who reported having been sexually active. The annual incidence of induced abortion was 3.1% (95% CI 2.9%-3.3%) among the women who had ever been sexually active. In the multivariable analysis, risk factors for induced abortion were higher age at the time of the survey (odds ratio [OR] 1.11, 95% CI 1.07-1.15), lower age at first sexual intercourse (OR 0.87, 95% CI 0.84-0.91), geographic region (highlands: OR 1.56, 95% CI 1.23-1.97; jungle: OR 1.81, 95% CI 1.41-2.31 [v. coastal region]), having children (OR 0.82, 95% CI 0.68-0.98), having more than 1 sexual partner in lifetime (2 partners: OR 1.61, 95% CI 1.23-2.09; > or = 3 partners: OR 2.79, 95% CI 2.12-3.67), and having 1 or more sexual partners in the year before the survey (1 partner: OR 1.36, 95% CI 1.01-1.72; > or = 2 partners: OR 1.54, 95% CI 1.14-2.02). Overall, 49.0% (95% CI 47.6%-50.3%) of the women who reported being currently sexually active were not using contraception. The incidence of clandestine, potentially unsafe induced abortion in Peru is as high as or higher than the rates in many countries where induced abortion is legal and safe. The provision of contraception and safer-sex education to those who require it needs to be greatly improved and could potentially

  10. Patterns of resistance and transgression in Eastern Indonesia: single women's practices of clandestine courtship and cohabitation. (United States)

    Bennett, Linda Rae


    This paper explores how single women in the regional Indonesian city of Mataram express sexual desire in a social, cultural and political climate that idealizes the confinement of female sexuality within marriage. It is based on 21 months of ethnographic fieldwork conducted with single women, their families and health care providers. Success for young women in negotiating sexual desire is dependent upon their ability to maintain a faultless public reputation and mediate between their desires and those of men. Many single women find ways to pursue their desires by bending the rules of courtship conventions, performing sexual purity in public, while resisting from within the hegemonic sexual culture. However, women who visibly transgress dominant sexual ideals (and in doing so offend the status quo) are stigmatized and ostracized. Single women's practice of resistance and sexual transgression in premarital relationships are represented using the examples of pacaran backstreet (clandestine courtship) and cohabitation prior to marriage.

  11. Spatially distributed encoding of covert attentional shifts in human thalamus

    DEFF Research Database (Denmark)

    Hulme, Oliver J; Whiteley, Louise Emma; Shipp, Stewart


    /central-intralaminar (oculomotor thalamus), caudal intralaminar/parafascicular, suprageniculate/limitans, and medial pulvinar/lateral posterior. Hence, the cortical network generating a top-down control signal for relocating attention acts in concert with a spatially selective thalamic apparatus-the set of active nuclei mirroring...... the thalamic territory of cortical "eye-field" areas, thus supporting theories which propose the visuomotor origins of covert attentional selection.......Spatial attention modulates signal processing within visual nuclei of the thalamus--but do other nuclei govern the locus of attention in top-down mode? We examined functional MRI (fMRI) data from three subjects performing a task requiring covert attention to 1 of 16 positions in a circular array...

  12. Effects of environmental support on overt and covert visuospatial rehearsal. (United States)

    Lilienthal, Lindsey; Myerson, Joel; Abrams, Richard A; Hale, Sandra


    People can rehearse to-be-remembered locations either overtly, using eye movements, or covertly, using only shifts of spatial attention. The present study examined whether the effectiveness of these two strategies depends on environmental support for rehearsal. In Experiment 1, when environmental support (i.e., the array of possible locations) was present and participants could engage in overt rehearsal during retention intervals, longer intervals resulted in larger spans, whereas in Experiment 2, when support was present but participants could only engage in covert rehearsal, longer intervals resulted in smaller spans. When environmental support was absent, however, longer retention intervals resulted in smaller memory spans regardless of which rehearsal strategies were available. In Experiment 3, analyses of participants' eye movements revealed that the presence of support increased participants' fixations of to-be-remembered target locations more than fixations of non-targets, and that this was associated with better memory performance. Further, although the total time fixating targets increased, individual target fixations were actually briefer. Taken together, the present findings suggest that in the presence of environmental support, overt rehearsal is more effective than covert rehearsal at maintaining to-be-remembered locations in working memory, and that having more time for overt rehearsal can actually increase visuospatial memory spans.

  13. Multi-Use seismic stations offer strong deterrent to clandestine nuclear weapons testing (United States)

    Hennet, C. B.; Van der Vink, G. E.; Richards, P. G.; Adushkin, V. V.; Kopnichev, Y. F.; Geary, R.

    As the United States and other nations push for the signing of a Comprehensive Test Ban Treaty, representatives are meeting in Geneva this year to develop an International Seismic Monitoring System to verify compliance with the treaty's restrictions. In addition to the official monitoring system, regional networks developed for earthquake studies and basic research can provide a strong deterrent against clandestine testing. The recent release of information by the U.S. Department of Energy (DoE) on previously unannounced nuclear tests provides an opportunity to assess the ability of multi-use seismic networks to help monitor nuclear testing across the globe.Here we look at the extent to which the formerly unannounced tests were recorded and identified on the basis of publicly available seismographic data recorded by five seismic networks. The data were recorded by networks in southern Nevada and northern California at stations less than 1500 km from the Nevada Test Site (NTS), and two networks in the former Soviet Union at stations farther than 1500 km from the NTS.

  14. Comparison of Individualized Covert Modeling, Self-Control Desensitization, and Study Skills Training for Alleviation of Test Anxiety. (United States)

    Harris, Gina; Johhson, Suzanne Bennett


    Individualized covert modeling and self-control desensitization substantially reduced self-reported test anxiety. However, the individualized covert modeling group was the only treatment group that showed significant improvement in academic performance. (Author)

  15. Maternal Smoking during Pregnancy and Offspring Overt and Covert Conduct Problems: A Longitudinal Study (United States)

    Monuteaux, Michael C.; Blacker, Deborah; Biederman, Joseph; Fitzmaurice, Garrett; Buka, Stephen L.


    Background: Empirical evidence demonstrates that conduct disorder (CD) symptoms tend to cluster into covert and overt domains. We hypothesized that overt and covert CD symptoms may be distinct constructs with distinct risk factors. An important risk factor for CD is maternal smoking during pregnancy. We further investigated this association,…

  16. The Effect of Covert Modeling on Communication Apprehension, Communication Confidence, and Performance. (United States)

    Nimocks, Mittie J.; Bromley, Patricia L.; Parsons, Theron E.; Enright, Corinne S.; Gates, Elizabeth A.

    This study examined the effect of covert modeling on communication apprehension, public speaking anxiety, and communication competence. Students identified as highly communication apprehensive received covert modeling, a technique in which one first observes a model doing a behavior, then visualizes oneself performing the behavior and obtaining a…

  17. One-mode projection analysis and design of covert affiliation networks

    NARCIS (Netherlands)

    Lindelauf, R.; Borm, P.E.M.; Hamers, H.J.M.


    Within the field of national security and counterterrorism a great need exists to understand covert organizations. To better understand these cellular structures we model and analyze these cells as a collection of subsets of all participants in the covert organization, i.e., as hypergraphs or

  18. Group Systematic Desensitization Versus Covert Positive Reinforcement in the Reduction of Test Anxiety (United States)

    Kostka, Marion P.; Galassi, John P.


    The study compared modified versions of systematic desensitization and covert positive reinforcement to a no-treatment control condition in the reduction of test anxiety. On an anagrams performance test, the covert reinforcement and control groups were superior to the desensitization group. (Author)

  19. A Network Steganography Lab on Detecting TCP/IP Covert Channels (United States)

    Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert


    This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…

  20. Evidence on unusual way of cocaine smuggling: cocaine-polymethyl methacrylate (PMMA) solid solution--study of clandestine laboratory samples. (United States)

    Gostic, T; Klemenc, S


    An abandoned clandestine laboratory was seized in Slovenia. All confiscated exhibits were analysed in a forensic laboratory, where the following analytical methods were applied: capillary gas chromatography coupled with mass spectrometry (GC-MS) combined also by solid-phase micro extraction (SPME) and pyrolysis (Py) technique, Fourier transform infrared spectrometry (FTIR) and scanning electron microscopy with energy dispersive X-ray detector (SEM-EDX). The most interesting analytical findings can be summarised as follows: at the crime scene some plastic pieces, which contained cocaine dissolved (as solid solution) in polymethyl methacrylate-plexiglass (PMMA), were found. The highest cocaine concentration measured in the plastic sample was about 15% by weight. Two larger lumps of material (12 and 3 kg) were composed mainly of PMMA and CaCO3 and contained only 0.4 and 0.5% of cocaine, respectively. As for the low cocaine concentration, we assume that those two lumps of material represent discarded waste product--residue after the isolation of cocaine from plastic. Higher quantities of pure solvents (41 l) and solvent mixtures (87 l) were seized. We identified three types of pure solvents (acetone, gasoline and benzine) and two different types of solvent mixtures (benzine/acetone and gasoline/acetone). The total seized volume (87 l) of solvent mixtures holds approximately 395 g of solid residue formed mainly of PMMA and cocaine. Obviously solvent mixtures were used for isolation of cocaine from the plastic. Small quantities of relatively pure cocaine base were identified on different objects. There were two cotton sheets, most probably used for filtration. One sheet had traces of cocaine base (76% purity) on the surface, while cocaine in hydrochloride form (96%) was identified on the other sheet. GC-MS analyses of micro traces isolated from analytical balances showed the presence of cocaine and some common adulterants: phenacetine, lidocaine and procaine. A cocaine

  1. Covert Medications: Act of Compassion or Conspiracy of Silence? (United States)

    Macauley, Robert C


    As the population in the United States gets older, more people suffer from dementia, which often causes neuropsychiatric symptoms such as agitation and paranoia. This can lead patients to refuse medications, prompting consideration of covert administration (that is, concealing medication in food or drink). While many condemn this practice as paternalistic, deceptive, and potentially harmful, the end result of assuming the "moral high ground" can be increased suffering for patients and families. This article addresses common criticisms of covert medication and presents a detailed algorithm by which to determine whether the practice is ethically permissible in specific cases. It also explores why so little attention has been paid in the U.S. to this presumably common practice, and reviews professional statements from Europe that endorse the practice. Finally, it presents a compelling argument for the role of Ulysses clauses in advance care planning, not only for patients with psychiatric illness but also for those who may suffer from dementia, which is far more common. Copyright 2016 The Journal of Clinical Ethics. All rights reserved.

  2. Simulations of Atmospheric Krypton-85 to Assess the Detectability of Clandestine Nuclear Reprocessing

    International Nuclear Information System (INIS)

    Ross, O.; Ahlswede, J.; Annewandter, R.; Kalinowski, M.B.; Rast, S.; Schluenzen, K.H.


    The results of this study were achieved in the project 'Simulation of Atmospheric Noble Gas Concentrations to Assess Sampling Procedures for the Detection of Clandestine Nuclear Reprocessing' (IAEA GER 1643) in the joint programme of IAEA and Federal Government of Germany. In the first year of the project the detectability of additional krypton-85 sources was investigated using atmospheric transport modelling. Krypton-85 is released into the air during reprocessing of spent nuclear fuel rods. Therefore the krypton-85 signature can possibly be used for the detection of undeclared plutonium separation. First, the global krypton-85 background produced by known reprocessing facilities from 1971 until 2006 was simulated with the atmospheric general circulation model ECHAM5 using annual emission data. The model results were evaluated by extensive comparison with measurements performed by the German Federal Office for Radiation Protection. Of particular interest for an assessment of the detectability of unknown sources is the background variability. The variability of concentrations is very high over central Europe, where the large reprocessing plants La Hague and Sellafield are located, and it is very low on the Southern Hemisphere, where no nuclear reprocessing takes place. The analysis of concentration time series on various time scales allows partly a distinction between fluctuations caused by the variability of the sources from variations due to atmospheric dynamics. Furthermore the detection sensitivity to a set of arbitrarily specified source locations is analysed with a Lagrangian particle dispersion model. This, in combination with the location specific background variability, is giving first benchmarks on the capability of using krypton-85 for IAEA Safeguards based on the Additional Protocols foreseeing environmental sampling. (author)

  3. The effect of offset cues on saccade programming and covert attention. (United States)

    Smith, Daniel T; Casteau, Soazig


    Salient peripheral events trigger fast, "exogenous" covert orienting. The influential premotor theory of attention argues that covert orienting of attention depends upon planned but unexecuted eye-movements. One problem with this theory is that salient peripheral events, such as offsets, appear to summon attention when used to measure covert attention (e.g., the Posner cueing task) but appear not to elicit oculomotor preparation in tasks that require overt orienting (e.g., the remote distractor paradigm). Here, we examined the effects of peripheral offsets on covert attention and saccade preparation. Experiment 1 suggested that transient offsets summoned attention in a manual detection task without triggering motor preparation planning in a saccadic localisation task, although there were a high proportion of saccadic capture errors on "no-target" trials, where a cue was presented but no target appeared. In Experiment 2, "no-target" trials were removed. Here, transient offsets produced both attentional facilitation and faster saccadic responses on valid cue trials. A third experiment showed that the permanent disappearance of an object also elicited attentional facilitation and faster saccadic reaction times. These experiments demonstrate that offsets trigger both saccade programming and covert attentional orienting, consistent with the idea that exogenous, covert orienting is tightly coupled with oculomotor activation. The finding that no-go trials attenuates oculomotor priming effects offers a way to reconcile the current findings with previous claims of a dissociation between covert attention and oculomotor control in paradigms that utilise a high proportion of catch trials.

  4. Freely chosen cadence during a covert manipulation of ambient temperature. (United States)

    Hartley, Geoffrey L; Cheung, Stephen S


    The present study investigated relationships between changes in power output (PO) to torque (TOR) or freely chosen cadence (FCC) during thermal loading. Twenty participants cycled at a constant rating of perceived exertion while ambient temperature (Ta) was covertly manipulated at 20-min intervals of 20 °C, 35 °C, and 20 °C. The magnitude responses of PO, FCC and TOR were analyzed using repeated-measures ANOVA, while the temporal correlations were analyzed using Auto-Regressive Integrated Moving Averages (ARIMA). Increases in Ta caused significant thermal strain (p FCC remained unchanged (p = .51). ARIMA indicates that changes in PO were highly correlated to TOR (stationary r2 = .954, p = .04), while FCC was moderately correlated (stationary r2 = .717, p = .01) to PO. In conclusion, changes in PO are caused by a modulation in TOR, whereas FCC remains unchanged and therefore, unaffected by thermal stressors.

  5. Covert hepatic encephalopathy: not as minimal as you might think. (United States)

    Kappus, Matthew R; Bajaj, Jasmohan S


    Hepatic encephalopathy (HE) is a serious neuropsychiatric and neurocognitive complication of acute and chronic liver disease. Symptoms are often overt (confusion, disorientation, ataxia, or coma) but can also be subtle (difficulty with cognitive abilities such as executive decision-making and psychomotor speed). There is consensus that HE is characterized as a spectrum of neuropsychiatric symptoms in the absence of brain disease, ranging from overt HE (OHE) to minimal HE (MHE). The West Haven Criteria are most often used to grade HE, with scores ranging from 0-4 (4 being coma). However, it is a challenge to diagnose patients with MHE or grade 1 HE; it might be practical to combine these entities and name them covert HE for clinical use. The severity of HE is associated with the stage of liver disease. Although the pathologic mechanisms of HE are not well understood, they are believed to involve increased levels of ammonia and inflammation, which lead to low-grade cerebral edema. A diagnosis of MHE requires dedicated psychometric tests and neurophysiological techniques rather than a simple clinical assessment. Although these tests can be difficult to perform in practice, they are cost effective and important; the disorder affects patients' quality of life, socioeconomic status, and driving ability and increases their risk for falls and the development of OHE. Patients with MHE are first managed by excluding other causes of neurocognitive dysfunction. Therapy with gut-specific agents might be effective. We review management strategies and important areas of research for MHE and covert HE. Copyright © 2012 AGA Institute. Published by Elsevier Inc. All rights reserved.

  6. The clandestine multiple graves in Malaysia: The first mass identification operation of human skeletal remains. (United States)

    Mohd Noor, Mohd Suhani; Khoo, Lay See; Zamaliana Alias, Wan Zafirah; Hasmi, Ahmad Hafizam; Ibrahim, Mohamad Azaini; Mahmood, Mohd Shah


    The first ever mass identification operation of skeletal remains conducted for the clandestine graves in Malaysia consisted of 165 individuals unearthed from 28 human trafficking transit camps located in Wang Kelian, along the Thai-Malaysia border. A DVI response was triggered in which expert teams comprising of pathologists, anthropologists, odontologists, radiologists and DNA experts were gathered at the identified operation centre. The Department of Forensic Medicine, Hospital Sultanah Bahiyah, Alor Star, Kedah, located approximately 75km away from Wang Kelian, was temporarily converted into a victim identification centre (VIC) as it is the nearest available forensic facility to the mass grave site. The mortuary operation was conducted over a period of 3 months from June to September 2015, and was divided into two phases; phase 1 involving the postmortem examination of the remains of 116 suspected individuals and for phase 2 the remains of 49 suspected individuals. The fact that the graves were of unknown individuals afforded the mass identification operation a sufficient duration of 2 weeks as preparatory phase enabling procedurals and daily victim identification workflow to be established, and the setting up of a temporary body storage for the designated mortuary. The temporary body storage has proven to be a significant factor in enabling the successful conclusion of the VIC operation to the final phase of temporary controlled burials. Recognition from two international observers, Mr. Andréas Patiño Umaña, from the International Committee of Red Cross (ICRC) and Prof. Noel Woodford from Victoria Institute of Forensic Medicine (VIFM) had proven the mortuary operation was in compliance to the international quality and standards. The overall victim identification and mortuary operation identified a number of significant challenges, in particular the management of commingled human remains as well as the compilation of postmortem data in the absence of

  7. Researching of Covert Timing Channels Based on HTTP Cache Headers in Web API

    Directory of Open Access Journals (Sweden)

    Denis Nikolaevich Kolegov


    Full Text Available In this paper, it is shown how covert timing channels based on HTTP cache headers can be implemented using different Web API of Google Drive, Dropbox and Facebook  Internet services.

  8. Covert Action: Cold War Dinosaur or "Tool" for the 21st Century?

    National Research Council Canada - National Science Library

    Bonham, Gordon C


    .... During the height of the Cold War, while "Mission Impossible" and "Secret Agent" dominated television viewing, covert operations were frequently the instrument of choice to achieve foreign policy objectives...

  9. Present and future potential of krypton-85 for the detection of clandestine reprocessing plants for treaty verification. (United States)

    Schoeppner, Michael; Glaser, Alexander


    Burnup calculations are applied to determine the amount of krypton-85 that is produced during the irradiation of nuclear fuel. Since krypton-85 is most likely released into the atmosphere during reprocessing to separate plutonium, atmospheric transport modeling is used to calculate the worldwide distribution of krypton-85 concentrations stemming from emissions from declared reprocessing plants. The results are the basis for scenarios in which emissions from clandestine reprocessing facilities have to be detected against various background levels. It is concluded that today's background imposes heavily on the ability to detect small and medium plutonium separation rates; only high separation rates of 1 SQ per week and higher have a chance to be detected with feasible outlay. A fixed network of monitoring stations seems too costly; instead the high number of samples that are required rather calls for mobile sampling procedures, where air samples are collected at random locations over the world and are analyzed in regional laboratories for their krypton-85 concentration. Further, it is argued that krypton-85 emissions from declared reprocessing activities have to be significantly lowered to enable a worldwide verification of the absence of even smaller clandestine reprocessing. For each scenario the number of samples that have to be taken for probable detection is calculated. Copyright © 2016 Elsevier Ltd. All rights reserved.

  10. Pupillary correlates of covert shifts of attention during working memory maintenance. (United States)

    Unsworth, Nash; Robison, Matthew K


    The pupillary light reflex (PLR) was used to track covert shifts of attention to items maintained in visual working memory (VWM). In three experiments, participants performed a change detection task in which rectangles appeared on either side of fixation and at test participants indicated if the cued rectangle changed its orientation. Prior to presentation or during the delay, participants were cued to the light or dark side of the screen. When cued to the light side, the pupil constricted, and when cued to the dark side, the pupil dilated, suggesting that the PLR tracked covert shifts of attention. Similar covert shifts of attention were seen when the target stimuli remained onscreen and during a blank delay period, suggesting similar effects for attention to perceptual stimuli and attention to stimuli maintained in VWM. Furthermore, similar effects were demonstrated when participants were pre-cued or retro-cued to the prioritized location, suggesting that shifts of covert attention can occur both before and after target presentation. These results are consistent with prior research, suggesting an important role of covert shifts of attention during VWM maintenance and that the PLR can be used to track these covert shifts of attention.

  11. Schweizer RU-38A Twin-Condor: covert surveillance aircraft (United States)

    O'Toole, Michael J.; Schweizer, Paul H.


    The world order has changed and with it, governments are now faced with waging a new type of `ware.' Regional instability, drug trafficking, environmental issues, international terrorism, and illegal immigration are examples of escalating problems that cross international boundaries and threaten the security of nations. The first and most important element in coping with these illegal activities is the ability to detect and monitor events in a timely and secure fashion. Conventional means of gathering intelligence such as large airborne collection systems and satellites lack the flexibility, dwell times, and cost effectiveness to meet many of today's needs. There is a growing requirement for airborne platforms that can covertly perform surveillance missions during either day or night and in a cost effective manner. To meet this need, Schweizer Aircraft has recently developed the RU-38A twin-engine surveillance aircraft. This paper discusses the evolution and principle design concepts of this aircraft and how its unique performance enables the RU-38A to achieve new levels of surveillance capability.

  12. Combining overt and covert anti-counterfeiting technologies for securities (United States)

    Uematsu, Tsuyoshi


    The National Printing Bureau of Japan has been developing new anti-counterfeiting technologies as a banknote printer. Some of our technologies have already been effectively introduced into Japan's new banknote series. Anti-counterfeiting technologies can be applied not only to banknotes but also to other security documents depending on desired features. In this presentation, I will introduce three of our newly developed overt and covert security techniques, which are intended for document security and brand protection, as well as banknotes. "Metallic View" is mainly for offset printing. "Copy Check" (micro-structural lines involving luminescence) is for plate making technology. "ImageSwitch" is for a new security solution which has unlimited printing applications. All three techniques create "latent images" (some of which may be better known as "carrier screen images") that are useful in preventing counterfeiting. While each of the techniques is effective by itself, all are more effective when applied together. Combining these techniques could make all security documents harder to copy using IT scanners, and provide cost-effective anti-counterfeiting solutions for all security users.

  13. Heat strain evaluation of overt and covert body armour in a hot and humid environment. (United States)

    Pyke, Andrew J; Costello, Joseph T; Stewart, Ian B


    The aim of this study was to elucidate the thermophysiological effects of wearing lightweight non-military overt and covert personal body armour (PBA) in a hot and humid environment. Eight healthy males walked on a treadmill for 120 min at 22% of their heart rate reserve in a climate chamber simulating 31 °C (60%RH) wearing either no armour (control), overt or covert PBA in addition to a security guard uniform, in a randomised controlled crossover design. No significant difference between conditions at the end of each trial was observed in core temperature, heart rate or skin temperature (P > 0.05). Covert PBA produced a significantly greater amount of body mass change (-1.81 ± 0.44%) compared to control (-1.07 ± 0.38%, P = 0.009) and overt conditions (-1.27 ± 0.44%, P = 0.025). Although a greater change in body mass was observed after the covert PBA trial; based on the physiological outcome measures recorded, the heat strain encountered while wearing lightweight, non-military overt or covert PBA was negligible compared to no PBA. The wearing of bullet proof vests or body armour is a requirement of personnel engaged in a wide range of occupations including police, security, customs and even journalists in theatres of war. This randomised controlled crossover study is the first to examine the thermophysiological effects of wearing lightweight non-military overt and covert personal body armour (PBA) in a hot and humid environment. We conclude that the heat strain encountered while wearing both overt and covert lightweight, non-military PBA was negligible compared to no PBA. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  14. Pattern-Induced Covert Category Learning in Songbirds. (United States)

    Comins, Jordan A; Gentner, Timothy Q


    Language is uniquely human, but its acquisition may involve cognitive capacities shared with other species. During development, language experience alters speech sound (phoneme) categorization. Newborn infants distinguish the phonemes in all languages but by 10 months show adult-like greater sensitivity to native language phonemic contrasts than non-native contrasts. Distributional theories account for phonetic learning by positing that infants infer category boundaries from modal distributions of speech sounds along acoustic continua. For example, tokens of the sounds /b/ and /p/ cluster around different mean voice onset times. To disambiguate overlapping distributions, contextual theories propose that phonetic category learning is informed by higher-level patterns (e.g., words) in which phonemes normally occur. For example, the vowel sounds /Ι/ and /e/ can occupy similar perceptual spaces but can be distinguished in the context of "with" and "well." Both distributional and contextual cues appear to function in speech acquisition. Non-human species also benefit from distributional cues for category learning, but whether category learning benefits from contextual information in non-human animals is unknown. The use of higher-level patterns to guide lower-level category learning may reflect uniquely human capacities tied to language acquisition or more general learning abilities reflecting shared neurobiological mechanisms. Using songbirds, European starlings, we show that higher-level pattern learning covertly enhances categorization of the natural communication sounds. This observation mirrors the support for contextual theories of phonemic category learning in humans and demonstrates a general form of learning not unique to humans or language. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Brain Training with Video Games in Covert Hepatic Encephalopathy. (United States)

    Bajaj, Jasmohan S; Ahluwalia, Vishwadeep; Thacker, Leroy R; Fagan, Andrew; Gavis, Edith A; Lennon, Michael; Heuman, Douglas M; Fuchs, Michael; Wade, James B


    Despite the associated adverse outcomes, pharmacologic intervention for covert hepatic encephalopathy (CHE) is not the standard of care. We hypothesized that a video game-based rehabilitation program would improve white matter integrity and brain connectivity in the visuospatial network on brain magnetic resonance imaging (MRI), resulting in improved cognitive function in CHE subjects on measures consistent with the cognitive skill set emphasized by the two video games (e.g., IQ Boost-visual working memory, and Aim and Fire Challenge-psychomotor speed), but also generalize to thinking skills beyond the focus of the cognitive training (Hopkins verbal learning test (HVLT)-verbal learning/memory) and improve their health-related quality of life (HRQOL). The trial included three phases over 8 weeks; during the learning phase (cognitive tests administered twice over 2 weeks without intervening intervention), training phase (daily video game training for 4 weeks), and post-training phase (testing 2 weeks after the video game training ended). Thirty CHE patients completed all visits with significant daily achievement on the video games. In a subset of 13 subjects that underwent brain MRI, there was a significant decrease in fractional anisotropy, and increased radial diffusivity (suggesting axonal sprouting or increased cross-fiber formation) involving similar brain regions (i.e., corpus callosum, internal capsule, and sections of the corticospinal tract) and improvement in the visuospatial resting-state connectivity corresponding to the video game training domains. No significant corresponding improvement in HRQOL or HVLT performance was noted, but cognitive performance did transiently improve on cognitive tests similar to the video games during training. Although multimodal brain imaging changes suggest reductions in tract edema and improved neural network connectivity, this trial of video game brain training did not improve the HRQOL or produce lasting improvement in

  16. Brutality under cover of ambiguity: activating, perpetuating, and deactivating covert retributivism. (United States)

    Fincher, Katrina M; Tetlock, Philip E


    Five studies tested four hypotheses on the drivers of punitive judgments. Study 1 showed that people imposed covertly retributivist physical punishments on extreme norm violators when they could plausibly deny that is what they were doing (attributional ambiguity). Studies 2 and 3 showed that covert retributivism could be suppressed by subtle accountability manipulations that cue people to the possibility that they might be under scrutiny. Studies 4 and 5 showed how covert retributivism can become self-sustaining by biasing the lessons people learn from experience. Covert retributivists did not scale back punitiveness in response to feedback that the justice system makes false-conviction errors but they did ramp up punitiveness in response to feedback that the system makes false-acquittal errors. Taken together, the results underscore the paradoxical nature of covert retributivism: It is easily activated by plausible deniability and persistent in the face of false-conviction feedback but also easily deactivated by minimalist forms of accountability. © 2015 by the Society for Personality and Social Psychology, Inc.

  17. Chinese adolescents' reports of covert parental monitoring: Comparisons with overt monitoring and links with information management. (United States)

    Hawk, Skyler T


    This study compared Chinese adolescents' reports of covert parental monitoring with the overt strategies of solicitation and control. We investigated these behaviors in terms of unique associations with adolescents' perceived privacy invasion and the information management behaviors of disclosure and secrecy. High school students (N = 455, 61.5% female; M age  = 17.39, SD = 0.83) from a predominantly rural province of Mainland China reported a high incidence of covert monitoring (60.40%). Covert monitoring predicted privacy invasion more strongly than solicitation or control. Solicitation positively predicted disclosure, while covert monitoring negatively predicted disclosure and positively predicted secrecy. Privacy invasion fully mediated links between covert monitoring and information management. These latter effects were significantly stronger for girls than for boys. Similar to Western adolescents, Chinese youth might apply selective resistance when parents violate their personal domain. The findings suggest linkage between some parental monitoring behaviors and disruptions in Chinese family communication. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  18. Assessing Boundary Conditions of the Testing Effect: On the Relative Efficacy of Covert vs. Overt Retrieval

    Directory of Open Access Journals (Sweden)

    Max L. Sundqvist


    Full Text Available Repeated testing during learning often improves later memory, which is often referred to as the testing effect. To clarify its boundary conditions, we examined whether the testing effect was selectively affected by covert (retrieved but not articulated or overt (retrieved and articulated response format. In Experiments 1 and 2, we compared immediate (5 min and delayed (1 week cued recall for paired associates following study-only, covert, and overt conditions, including two types of overt articulation (typing and writing. A clear testing effect was observed in both experiments, but with no selective effects of response format. In Experiments 3 and 4, we compared covert and overt retrieval under blocked and random list orders. The effect sizes were small in both experiments, but there was a significant effect of response format, with overt retrieval showing better final recall performance than covert retrieval. There were no significant effects of blocked vs. random list orders with respect to the testing effect produced. Taken together, these findings suggest that, under specific circumstances, overt retrieval may lead to a greater testing effect than that of covert retrieval, but because of small effect sizes, it appears that the testing effect is mainly the result of retrieval processes and that articulation has fairly little to add to its magnitude in a paired-associates learning paradigm.

  19. Covert video monitoring in the assessment of medically unexplained symptoms in children. (United States)

    Wallace, Dustin P; Sim, Leslie A; Harrison, Tracy E; Bruce, Barbara K; Harbeck-Weber, Cynthia


    Diagnosis of medically unexplained symptoms (MUS) occurs after thorough evaluations have failed to identify a physiological cause for symptoms. However, families and providers may wonder if something has been missed, leading to reduced confidence in behavioral treatment. Confidence may be improved through the use of technology such as covert video monitoring to better assess functioning across settings. A 12-year-old male presented with progressive neurological decline, precipitated by chronic pain. After thorough evaluation and the failure of standard treatments (medical, rehabilitative, and psychological) covert video monitoring revealed that the patient demonstrated greater abilities when alone in his room. Negative reinforcement was used to initiate recovery, accompanied by positive reinforcement and a rehabilitative approach. Covert video monitoring assisted in three subsequent cases over the following 3 years. In certain complex cases, video monitoring can inform the assessment and treatment of MUS. Discussion includes ethical and practical considerations.

  20. Overt vs. covert speed cameras in combination with delayed vs. immediate feedback to the offender. (United States)

    Marciano, Hadas; Setter, Pe'erly; Norman, Joel


    Speeding is a major problem in road safety because it increases both the probability of accidents and the severity of injuries if an accident occurs. Speed cameras are one of the most common speed enforcement tools. Most of the speed cameras around the world are overt, but there is evidence that this can cause a "kangaroo effect" in driving patterns. One suggested alternative to prevent this kangaroo effect is the use of covert cameras. Another issue relevant to the effect of enforcement countermeasures on speeding is the timing of the fine. There is general agreement on the importance of the immediacy of the punishment, however, in the context of speed limit enforcement, implementing such immediate punishment is difficult. An immediate feedback that mediates the delay between the speed violation and getting a ticket is one possible solution. This study examines combinations of concealment and the timing of the fine in operating speed cameras in order to evaluate the most effective one in terms of enforcing speed limits. Using a driving simulator, the driving performance of the following four experimental groups was tested: (1) overt cameras with delayed feedback, (2) overt cameras with immediate feedback, (3) covert cameras with delayed feedback, and (4) covert cameras with immediate feedback. Each of the 58 participants drove in the same scenario on three different days. The results showed that both median speed and speed variance were higher with overt than with covert cameras. Moreover, implementing a covert camera system along with immediate feedback was more conducive to drivers maintaining steady speeds at the permitted levels from the very beginning. Finally, both 'overt cameras' groups exhibit a kangaroo effect throughout the entire experiment. It can be concluded that an implementation strategy consisting of covert speed cameras combined with immediate feedback to the offender is potentially an optimal way to motivate drivers to maintain speeds at the

  1. The mind-writing pupil : A human-computer interface based on decoding of covert attention through pupillometry

    NARCIS (Netherlands)

    Mathôt, Sebastiaan; Melmi, Jean Baptiste; Van Der Linden, Lotje; Van Der Stigchel, Stefan


    We present a new human-computer interface that is based on decoding of attention through pupillometry. Our method builds on the recent finding that covert visual attention affects the pupillary light response: Your pupil constricts when you covertly (without looking at it) attend to a bright,

  2. Covertly active and progressing neurochemical abnormalities in suppressed HIV infection. (United States)

    Cysique, Lucette A; Jugé, Lauriane; Gates, Thomas; Tobia, Michael; Moffat, Kirsten; Brew, Bruce J; Rae, Caroline


    To assess whether HIV-related brain injury is progressive in persons with suppressed HIV infection. Seventy-three HIV+ virally suppressed men and 35 HIV- men, screened for psychiatric and alcohol/drug use disorders, underwent neuropsychological evaluation and proton magnetic resonance spectroscopy ( 1 H-MRS) at baseline and after and 23 ± 5 months. 1 H-MRS included brain regions known to be vulnerable to HIV and aging: frontal white matter (FWM), posterior cingulate cortex (PCC), and caudate area (CA). Major brain metabolites such as creatine (Cr: marker of cellular energy), N -acetyl aspartate (NAA: marker of neuronal integrity), choline (marker of cellular membrane turnover), glutamate/glutamine (excitatory/inhibitory neurotransmitter), and myo -Inositol (mI: marker of neuroinflammation) were calculated with reference to water signal. Neurocognitive decline was corrected for practice effect and baseline HIV-associated neurocognitive disorder (HAND) status. Across the study period, 44% had intact cognition, 42% stable HAND (including the single case that improved), 10% progressing HAND, and 4% incident HAND. When analyzing the neurochemical data per neurocognitive trajectories, we found decreasing PCC Cr in all subgroups compared with controls ( p < 0.002). In addition, relative to the HIV- group, stable HAND showed decreasing FWM Cr, incident HAND showed steep FWM Cr reduction, whereas progressing HAND had a sharply decreasing PCC NAA and reduced but stable CA NAA. When analyzing the neurochemical data at the group level (HIV+ vs HIV- groups), we found stable abnormal metabolite concentrations over the study period: decreased FWM and PCC Cr (both p < 0.001), decreased PCC NAA and CA NAA (both p < 0.05) and PCC mI increase ( p < 0.05). HIV duration and historical HAND had modest effects on metabolite changes. Our study reveals covertly active or progressing HIV-related brain injury in the majority of this virally suppressed cohort, reflecting ongoing

  3. Hiding a Covert Digital Image by Assembling the RSA Encryption Method and the Binary Encoding Method


    Kuang Tsan Lin; Sheng Lih Yeh


    The Rivest-Shamir-Adleman (RSA) encryption method and the binary encoding method are assembled to form a hybrid hiding method to hide a covert digital image into a dot-matrix holographic image. First, the RSA encryption method is used to transform the covert image to form a RSA encryption data string. Then, all the elements of the RSA encryption data string are transferred into binary data. Finally, the binary data are encoded into the dot-matrix holographic image. The pixels of the dot-matri...

  4. The proportion valid effect in covert orienting: strategic control or implicit learning? (United States)

    Risko, Evan F; Stolz, Jennifer A


    It is well known that the difference in performance between valid and invalid trials in the covert orienting paradigm (i.e., the cueing effect) increases as the proportion of valid trials increases. This proportion valid effect is widely assumed to reflect "strategic" control over the distribution of attention. In the present experiments we determine if this effect results from an explicit strategy or implicit learning by probing participant's awareness of the proportion of valid trials. Results support the idea that the proportion valid effect in the covert orienting paradigm reflects implicit learning not an explicit strategy.

  5. The Factors That Influence and Protect Against Power Imbalance in Covert Bullying Among Preadolescent Children at School: A Thematic Analysis. (United States)

    Nelson, Helen J; Burns, Sharyn K; Kendall, Garth E; Schonert-Reichl, Kimberly A


    In this article, the perceptions of preadolescent children (ages 9-11) regarding factors that influence and protect against power imbalance associated with covert aggression and bullying are explored. In aggression research, the term covert has been typically used to describe relational, indirect, and social acts of aggression that are hidden. These behaviors contrast with overt physical and verbal aggression. Children have previously conveyed their belief that covert aggression is harmful because adults do not see it even though children, themselves, are aware. We used focus groups to explore children's understanding of covert aggression and to identify children's experience and perception of adult support in relation to bullying. Thematic analysis supported the definition of covert aggression as that which is intentionally hidden from adults. Friendship, social exclusion, and secret from teacher were identified as factors that influence power imbalance, while support from friends and adult support protected against power imbalance.

  6. The Covert Use of the Global Special Operations Network and the Militarization of Covert Action in Political Warfare and the Gray Zone (United States)


    methods to deliver the message. MISO uses everything from digital media and social networks, to billboards and airdropped fliers, to word -of- mouth and...overt and covert diplomacy is also beginning. As the digital, social media age continues, the USG is unable to compete with non-state actors...were CIA assassination squads. There may be some truth to that as “in the words of Douglas Valentine, a CIA operations chief in the Northern

  7. College Adjustment Difficulties and the Overt and Covert Forms of Narcissism (United States)

    Weikel, Kim A.; Avara, Renee Mowery; Hanson, Chad A.; Kater, Hope


    Overt narcissism correlated negatively with emotional distress and interpersonal difficulties among female, but not male, students. After controlling for self-esteem, overt narcissism correlated positively with depression among female students and with emotional distress and interpersonal difficulties among male students. Covert narcissism…

  8. A review of Covert Channels in TCP and HTTP protocols | James ...

    African Journals Online (AJOL)

    Covert channels are used by crackers who have breached an organisation's systems to download tools from outside, upload internal data to outside, create virtual network to outside machines and communicate to outside paths. They are also used by internal users who want to use forbidden protocols, who want to have ...

  9. Hidden cameras everything you need to know about covert recording, undercover cameras and secret filming

    CERN Document Server

    Plomin, Joe


    Providing authoritative information on the practicalities of using hidden cameras to expose abuse or wrongdoing, this book is vital reading for anyone who may use or encounter secret filming. It gives specific advice on using phones or covert cameras and unravels the complex legal and ethical issues that need to be considered.

  10. The Effects of Covert Audio Coaching on the Job Performance of Supported Employees (United States)

    Bennett, Kyle; Brady, Michael P.; Scott, Jack; Dukes, Charles; Frain, Michael


    The importance of employment in society is unmistakable, but for many people sustained employment remains elusive. The unemployment rate for individuals with disabilities is staggering, and the consequences of being unemployed affects those individuals, their families, and society. The effects of performance feedback delivered via covert audio…

  11. A covert attention P300-based brain-computer interface: Geospell. (United States)

    Aloise, Fabio; Aricò, Pietro; Schettini, Francesca; Riccio, Angela; Salinari, Serenella; Mattia, Donatella; Babiloni, Fabio; Cincotti, Febo


    The Farwell and Donchin P300 speller interface is one of the most widely used brain-computer interface (BCI) paradigms for writing text. Recent studies have shown that the recognition accuracy of the P300 speller decreases significantly when eye movement is impaired. This report introduces the GeoSpell interface (Geometric Speller), which implements a stimulation framework for a P300-based BCI that has been optimised for operation in covert visual attention. We compared the Geospell with the P300 speller interface under overt attention conditions with regard to effectiveness, efficiency and user satisfaction. Ten healthy subjects participated in the study. The performance of the GeoSpell interface in covert attention was comparable with that of the P300 speller in overt attention. As expected, the effectiveness of the spelling decreased with the new interface in covert attention. The NASA task load index (TLX) for workload assessment did not differ significantly between the two modalities. This study introduces and evaluates a gaze-independent, P300-based brain-computer interface, the efficacy and user satisfaction of which were comparable with those off the classical P300 speller. Despite a decrease in effectiveness due to the use of covert attention, the performance of the GeoSpell far exceeded the threshold of accuracy with regard to effective spelling.

  12. Reducing Covert Self-Injurious Behavior Maintained by Automatic Reinforcement through a Variable Momentary DRO Procedure (United States)

    Toussaint, Karen A.; Tiger, Jeffrey H.


    Covert self-injurious behavior (i.e., behavior that occurs in the absence of other people) can be difficult to treat. Traditional treatments typically have involved sophisticated methods of observation and often have employed positive punishment procedures. The current study evaluated the effectiveness of a variable momentary differential…

  13. Information-Limited Parallel Processing in Difficult Heterogeneous Covert Visual Search (United States)

    Dosher, Barbara Anne; Han, Songmei; Lu, Zhong-Lin


    Difficult visual search is often attributed to time-limited serial attention operations, although neural computations in the early visual system are parallel. Using probabilistic search models (Dosher, Han, & Lu, 2004) and a full time-course analysis of the dynamics of covert visual search, we distinguish unlimited capacity parallel versus serial…

  14. (Covert attention and visual speller design in an ERP-based brain-computer interface

    Directory of Open Access Journals (Sweden)

    Treder Matthias S


    Full Text Available Abstract Background In a visual oddball paradigm, attention to an event usually modulates the event-related potential (ERP. An ERP-based brain-computer interface (BCI exploits this neural mechanism for communication. Hitherto, it was unclear to what extent the accuracy of such a BCI requires eye movements (overt attention or whether it is also feasible for targets in the visual periphery (covert attention. Also unclear was how the visual design of the BCI can be improved to meet peculiarities of peripheral vision such as low spatial acuity and crowding. Method Healthy participants (N = 13 performed a copy-spelling task wherein they had to count target intensifications. EEG and eye movements were recorded concurrently. First, (covert attention was investigated by way of a target fixation condition and a central fixation condition. In the latter, participants had to fixate a dot in the center of the screen and allocate their attention to a target in the visual periphery. Second, the effect of visual speller layout was investigated by comparing the symbol Matrix to an ERP-based Hex-o-Spell, a two-levels speller consisting of six discs arranged on an invisible hexagon. Results We assessed counting errors, ERP amplitudes, and offline classification performance. There is an advantage (i.e., less errors, larger ERP amplitude modulation, better classification of overt attention over covert attention, and there is also an advantage of the Hex-o-Spell over the Matrix. Using overt attention, P1, N1, P2, N2, and P3 components are enhanced by attention. Using covert attention, only N2 and P3 are enhanced for both spellers, and N1 and P2 are modulated when using the Hex-o-Spell but not when using the Matrix. Consequently, classifiers rely mainly on early evoked potentials in overt attention and on later cognitive components in covert attention. Conclusions Both overt and covert attention can be used to drive an ERP-based BCI, but performance is markedly lower

  15. Preliminary results of sequential monitoring of simulated clandestine graves in Colombia, South America, using ground penetrating radar and botany. (United States)

    Molina, Carlos Martin; Pringle, Jamie K; Saumett, Miguel; Hernández, Orlando


    In most Latin American countries there are significant numbers of missing people and forced disappearances, 68,000 alone currently in Colombia. Successful detection of shallow buried human remains by forensic search teams is difficult in varying terrain and climates. This research has created three simulated clandestine burial styles at two different depths commonly encountered in Latin America to gain knowledge of optimum forensic geophysics detection techniques. Repeated monitoring of the graves post-burial was undertaken by ground penetrating radar. Radar survey 2D profile results show reasonable detection of ½ clothed pig cadavers up to 19 weeks of burial, with decreasing confidence after this time. Simulated burials using skeletonized human remains were not able to be imaged after 19 weeks of burial, with beheaded and burnt human remains not being able to be detected throughout the survey period. Horizontal radar time slices showed good early results up to 19 weeks of burial as more area was covered and bi-directional surveys were collected, but these decreased in amplitude over time. Deeper burials were all harder to image than shallower ones. Analysis of excavated soil found soil moisture content almost double compared to those reported from temperate climate studies. Vegetation variations over the simulated graves were also noted which would provide promising indicators for grave detection. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  16. Effect of drug precursors and chemicals relevant to clandestine laboratory investigation on plastic bags used for collection and storage. (United States)

    Michelot, Harmonie; Fu, Shanlin; Stuart, Barbara; Shimmon, Ronald; Raymond, Tony; Crandell, Tony; Roux, Claude


    In the area of clandestine laboratory investigations, plastic bags are used to collect and store evidence, such as solvents, precursors, and other compounds usually employed for the manufacturing of drugs (although liquids may be stored in glass containers within the bags first). In this study, three different types of plastic bags were provided by the NSW Police Force and investigated for their suitability for evidence collection: two different types of low-density polyethylene (LDPE) bags and one type of polyvinyl chloride (PVC) bag. Three different experiments were carried out: (1) storing relevant chemicals in the bags for up to three months; (2) exposing the bags including their content to accelerated conditions using a weatherometer, and (3) simulating an expected real case scenario. This study indicates that drugs and related chemicals stored in plastic bags may lead to a change in the composition of the chemical and an alteration or degradation of the plastic bag. All experiments led to the same conclusion: the polyvinyl chloride bags appeared to be the most affected. LDPE bags seem to be more appropriate for routine use, although it has been established they are not suitable for the collection of liquids (unless pre-packaged in, for instance, a glass container). Copyright © 2017 Elsevier B.V. All rights reserved.

  17. What Lies in the Gutter of a Traumatic Past: Infancia clandestina [Clandestine Childhood], Animated Comics, and the Representation of Violence

    Directory of Open Access Journals (Sweden)

    María Ghiggia


    Full Text Available This essay focuses on the animated comics in the representation of violence in Benjamín Ávila’s Infancia clandestina [Clandestine Childhood] (2011, a cinematic narrative of the seventies in Argentina. Drawing from animation and comic studies and adopting a formalist approach, the following analysis proposes ways in which the remediation of comics in the film underscores traumatic aspects of state terror and revolutionary violence and the problematic intergenerational transmission of memory of the 1970s–1980s militancy. Specifically, I comment on how the switch from photographic film to the animated frames draws attention to the blank space between the frames and thereby hints at the traumatic in what is left out, repressed, or silenced. While the gaps resist the forward motion of closure, paradoxically they allow for the suture of the frames/fragments in a postmemorial narrative, although not without a trace of the traumatic. Finally, extending the concept of the gutter as a liminal space, I analyze the connection between the animated scenes representing violence and the testimonial and documentary elements placed in the closing titles, a connection that asserts the autobiographical component of the film and enacts the conflictive character of intergenerational memory.

  18. SSVEP-modulation by covert and overt attention: Novel features for BCI in attention neuro-rehabilitation

    DEFF Research Database (Denmark)

    Ordikhani-Seyedlar, Mehdi; Sørensen, Helge Bjarup Dissing; Kjaer, Troels W.


    In this pilot study the effect of attention (covert and overt) on the signal detection and classification of steady-state visual-evoked potential (SSVEP) were investigated. Using the SSVEP-based paradigm, data were acquired from 4 subjects using 3 scalp electroencephalography (EEG) electrodes...... located on the visual area. Subjects were instructed to perform the attention task in which they attended covertly or overtly to either of the stimuli flickering with different frequencies (6, 7, 8 and 9Hz). We observed a decrease in signal power in covert compared to the overt attention. However...

  19. A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression

    Directory of Open Access Journals (Sweden)

    Weize Li


    Full Text Available Research on stealthiness has become an important topic in the field of data integrity (DI attacks. To construct stealthy DI attacks, a common assumption in most related studies is that attackers have prior model knowledge of physical systems. In this paper, such assumption is relaxed and a covert agent is proposed based on the least squares support vector regression (LSSVR. By estimating a plant model from control and sensory data, the LSSVR-based covert agent can closely imitate the behavior of the physical plant. Then, the covert agent is used to construct a covert loop, which can keep the controller’s input and output both stealthy over a finite time window. Experiments have been carried out to show the effectiveness of the proposed method.

  20. Emotional responses to a romantic partner's imaginary rejection: the roles of attachment anxiety, covert narcissism, and self-evaluation. (United States)

    Besser, Avi; Priel, Beatriz


    These studies tested the associations between responses to an induced imaginary romantic rejection and individual differences on dimensions of attachment and covert narcissism. In Study 1 (N=125), we examined the associations between attachment dimensions and emotional responses to a vignette depicting a scenario of romantic rejection, as measured by self-reported negative mood states, expressions of anger, somatic symptoms, and self-evaluation. Higher scores on attachment anxiety, but not on attachment avoidance, were associated with stronger reactions to the induced rejection. Moreover, decreased self-evaluation scores (self-esteem and pride) were found to mediate these associations. In Study 2 (N=88), the relative contributions of covert narcissism and attachment anxiety to the emotional responses to romantic rejection were explored. Higher scores on covert narcissism were associated with stronger reactions to the induced rejection. Moreover, covert narcissism seemed to constitute a specific aspect of attachment anxiety.

  1. Reassessment of the wing feathers of Archaeopteryx lithographica suggests no robust evidence for the presence of elongated dorsal wing coverts.

    Directory of Open Access Journals (Sweden)

    Robert L Nudds

    Full Text Available Recently it was proposed that the primary feathers of Archaeopteryx lithographica (HMN1880 were overlaid by long covert feathers, and that a multilayered feathered wing was a feature of early fossils with feathered forelimbs. The proposed long covert feathers of Archaeopteryx were previously interpreted as dorsally displaced remiges or a second set of impressions made by the wing. The following study shows that the qualitative arguments forwarded in support of the elongated covert hypothesis are neither robust nor supported quantitatively. The idea that the extant bird wing with its single layer of overlapping primaries evolved from an earlier multilayered heavily coveted feathered forelimb as seen in Anchiornis huxleyi is reasonable. At this juncture, however, it is premature to conclude unequivocally that the wing of Archaeopteryx consisted of primary feathers overlaid with elongated coverts.

  2. Discovering what is hidden: The role of non-ritualized covert neutralizing strategies in Obsessive-Compulsive Disorder. (United States)

    Belloch, Amparo; Carrió, Carmen; Cabedo, Elena; García-Soriano, Gemma


    Neutralizing strategies are secondary to obsessions and an additional cause of distress and interference, but they have received little attention in theories and research, especially the non-ritualized covert strategies. This study focuses on the comparative impact of non-ritualized covert and compulsive-overt strategies in the course of OCD. Eighty-two OCD adult patients completed measures assessing distress, interference, appraisals and overt and covert neutralizing strategies to control obsessions. Thirty-eight patients who had completed cognitive therapy were assessed again after treatment. Only overt compulsions are associated with OCD severity. Nonetheless, considering the main symptom dimension, covert strategies are also associated with severity in patients with moral-based obsessions. Patients who used covert strategies more frequently, compared to those who use them less, reported more sadness, guilt, control importance, interference, and dysfunctional appraisals. Regarding the overt strategies, patients who used them more reported more anxiety and ascribed more personal meaning to their obsessions than the patients who used them less. After treatment, recovered patients decreased their use of both covert and overt strategies, while non-recovered patients did not. There was a higher rate of non-recovered patients among those who used more non-ritualized covert strategies before treatment. Emotions and appraisals were assessed with a single item. OCD symptom dimensions were only assessed by the Obsessive-Compulsive Inventory. In addition to studying overt compulsions, the impact of covert neutralizing strategies on the OCD course and severity warrants more in-depth study. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Relations of Proactive and Reactive Dimensions of Aggression to Overt and Covert Narcissism in Nonclinical Adolescents (United States)

    Fossati, Andrea; Borroni, Serena; Eisenberg, Nancy; Maffei, Cesare


    In recent years, there has been increasing acknowledgement of the multidimensionality of narcissism and that different types of narcissism may relate differently to other domains of functioning. Similarly, aggression—a frequently discussed correlate of narcissism--is a heterogeneous construct. In the present study, the relations of proactive and reactive aggression with overt and covert manifestations of narcissism were examined in a sample of 674 Italian high school students (mean age = 15.5 years, SD = 2.1 years). Overt narcissism was positively related to both proactive and reactive subtypes of aggression, whereas covert narcissism related only to reactive aggression. Vanity, Authority, Exhibitionism, and Exploitativeness were the components of overt narcissism related to Proactive Aggression (all remained unique correlates when controlling for Reactive Aggression), whereas Reactive Aggression was associated with the Exhibitionism, Superiority, and Entitlement subscales (only the latter was uniquely related when controlling for Proactive Aggression). PMID:19918915

  4. Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Keller, Marcel; Larraia, Enrique


    for distributingBGV secret keys are likely to be of wider applicability than to the SPDZ protocol alone. We then construct both a covertly and actively secure preprocessing phase, both of which compare favourably with previous work in terms of efficiency and provable security. We also build a new online phase...... with SPDZ; and present several theoretical and practical improvements to the protocol. In detail, we start by designing and implementing a covertly secure key generation protocol for distributed BGV secret keys. In prior work this was assumed to be provided by a given setup functionality. Protocols......, which solves a major problem of the SPDZ protocol: namely prior to this work preprocessed data could be used for only one function evaluation and then had to be recomputed from scratch for the next evaluation, while our online phase can support reactive functionalities. This improvement comes mainly...

  5. Lateralization patterns of covert but not overt movements change with age: An EEG neurofeedback study. (United States)

    Zich, Catharina; Debener, Stefan; De Vos, Maarten; Frerichs, Stella; Maurer, Stefanie; Kranczioch, Cornelia


    The mental practice of movements has been suggested as a promising add-on therapy to facilitate motor recovery after stroke. In the case of mentally practised movements, electroencephalogram (EEG) can be utilized to provide feedback about an otherwise covert act. The main target group for such an intervention are elderly patients, though research so far is largely focused on young populations (study therefore aimed to examine the influence of age on the neural correlates of covert movements (CMs) in a real-time EEG neurofeedback framework. CM-induced event-related desynchronization (ERD) was studied in young (mean age: 23.6 years) and elderly (mean age: 62.7 years) healthy adults. Participants performed covert and overt hand movements. CMs were based on kinesthetic motor imagery (MI) or quasi-movements (QM). Based on previous studies investigating QM in the mu frequency range (8-13Hz) QM were expected to result in more lateralized ERD% patterns and accordingly higher classification accuracies. Independent of CM strategy the elderly were characterized by a significantly reduced lateralization of ERD%, due to stronger ipsilateral ERD%, and in consequence, reduced classification accuracies. QM were generally perceived as more vivid, but no differences were evident between MI and QM in ERD% or classification accuracies. EEG feedback enhanced task-related activity independently of strategy and age. ERD% measures of overt and covert movements were strongly related in young adults, whereas in the elderly ERD% lateralization is dissociated. In summary, we did not find evidence in support of more pronounced ERD% lateralization patterns in QM. Our finding of a less lateralized activation pattern in the elderly is in accordance to previous research and with the idea that compensatory processes help to overcome neurodegenerative changes related to normal ageing. Importantly, it indicates that EEG neurofeedback studies should place more emphasis on the age of the potential end

  6. The bureaucratization of war: moral challenges exemplified by the covert lethal drone

    Directory of Open Access Journals (Sweden)

    Richard Adams


    Full Text Available This article interrogates the bureaucratization of war, incarnate in the covert lethal drone. Bureaucracies are criticized typically for their complexity, inefficiency, and inflexibility. This article is concerned with their moral indifference. It explores killing, which is so highly administered, so morally remote, and of such scale, that we acknowledge a covert lethal program. This is a bureaucratized program of assassination in contravention of critical human rights. In this article, this program is seen to compromise the advance of global justice. Moreover, the bureaucratization of lethal force is seen to dissolve democratic ideals from within. The bureaucracy isolates the citizens from lethal force applied in their name. People are killed, in the name of the State, but without conspicuous justification, or judicial review, and without informed public debate. This article gives an account of the risk associated with the bureaucratization of the State's lethal power. Exemplified by the covert drone, this is power with formidable reach. It is power as well, which requires great moral sensitivity. Considering the drone program, this article identifies challenges, which will become more prominent and pressing, as technology advances.

  7. Affective significance enhances covert attention: roles of anxiety and word familiarity. (United States)

    Calvo, Manuel G; Eysenck, Michael W


    To investigate the processing of emotional words by covert attention, threat-related, positive, and neutral word primes were presented parafoveally (2.2 degrees away from fixation) for 150 ms, under gaze-contingent foveal masking, to prevent eye fixations. The primes were followed by a probe word in a lexical-decision task. In Experiment 1, results showed a parafoveal threat-anxiety superiority: Parafoveal prime threat words facilitated responses to probe threat words for high-anxiety individuals, in comparison with neutral and positive words, and relative to low-anxiety individuals. This reveals an advantage in threat processing by covert attention, without differences in overt attention. However, anxiety was also associated with greater familiarity with threat words, and the parafoveal priming effects were significantly reduced when familiarity was covaried out. To further examine the role of word knowledge, in Experiment 2, vocabulary and word familiarity were equated for low- and high-anxiety groups. In these conditions, the parafoveal threat-anxiety advantage disappeared. This suggests that the enhanced covert-attention effect depends on familiarity with words.

  8. Adaptive attunement of selective covert attention to evolutionary-relevant emotional visual scenes. (United States)

    Fernández-Martín, Andrés; Gutiérrez-García, Aída; Capafons, Juan; Calvo, Manuel G


    We investigated selective attention to emotional scenes in peripheral vision, as a function of adaptive relevance of scene affective content for male and female observers. Pairs of emotional-neutral images appeared peripherally-with perceptual stimulus differences controlled-while viewers were fixating on a different stimulus in central vision. Early selective orienting was assessed by the probability of directing the first fixation towards either scene, and the time until first fixation. Emotional scenes selectively captured covert attention even when they were task-irrelevant, thus revealing involuntary, automatic processing. Sex of observers and specific emotional scene content (e.g., male-to-female-aggression, families and babies, etc.) interactively modulated covert attention, depending on adaptive priorities and goals for each sex, both for pleasant and unpleasant content. The attentional system exhibits domain-specific and sex-specific biases and attunements, probably rooted in evolutionary pressures to enhance reproductive and protective success. Emotional cues selectively capture covert attention based on their bio-social significance. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Sexual Harassment in Medical Schools: The Challenge of Covert Retaliation as a Barrier to Reporting. (United States)

    Binder, Renee; Garcia, Paul; Johnson, Bonnie; Fuentes-Afflick, Elena


    Although Title IX, the federal law prohibiting sexual harassment in educational institutions, was enacted in 1972, sexual harassment continues to be distressingly common in medical training. In addition, many women who experience sexual harassment do not report their experiences to authorities within the medical school.In this article, the authors review the literature on the prevalence of sexual harassment in medical schools since Title IX was enacted and on the cultural and legal changes that have occurred during that period that have affected behaviors. These changes include decreased tolerance for harassing behavior, increased legal responsibility assigned to institutions, and a significant increase in the number of female medical students, residents, and faculty. The authors then discuss persisting barriers to reporting sexual harassment, including fears of reprisals and retaliation, especially covert retaliation. They define covert retaliation as vindictive comments made by a person accused of sexual harassment about his or her accuser in a confidential setting, such as a grant review, award selection, or search committee.The authors concluding by highlighting institutional and organizational approaches to decreasing sexual harassment and overt retaliation, and they propose other approaches to decreasing covert retaliation. These initiatives include encouraging senior faculty members to intervene and file bystander complaints when they witness inappropriate comments or behaviors as well as group reporting when multiple women are harassed by the same person.

  10. Building a digital forensic investigation technique for forensically sound analysis of covert channels in IPv6 and ICMPv6, using custom IDS signatures and firewall system logs


    Dominic Savio, Lourdes Gino


    Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in ...

  11. Protocol for the design of an instrument to measure preadolescent children's self-report of covert aggression and bullying (United States)

    Nelson, Helen Jean; Kendall, Garth Edward; Burns, Sharyn; Schonert-Reichl, Kimberly


    Introduction Covert bullying in schools is associated with a range of academic, social, emotional and physical health problems. Much research has focused on bullying, but there remains a gap in understanding about covert aggression and how to most accurately and reliably measure children's own reports of this behaviour. This paper reviews relevant literature and outlines a research project that aims to develop a self-report instrument that effectively measures covert aggression and bullying. It is anticipated that this research will result in a standardised instrument that is suitable for exploring preadolescent children's experiences of covert aggressive behaviour. The data collected by the instrument will enhance health and education professionals understanding of covert bullying behaviours and will inform the design and evaluation of interventions. Methods and analysis Relational developmental systems theory will guide the design of an online self-report instrument. The first phase of the project will include a critical review of the research literature, focus groups with children aged 8–12 years (grades 4–6) in Perth, Western Australia, and expert review. The instrument will be explored for content and face validity prior to the assessment of convergent and discriminant validity, internal consistency and test-retest reliability. Ethics and dissemination The study has been approved by the Curtin University of Human Research Ethics Committee (RDHS-38-15) and by the Executive Principal of the participating school. PMID:26553834

  12. Covert leadership: notes on managing professionals. Knowledge workers respond to inspiration, not supervision. (United States)

    Mintzberg, H


    The orchestra conductor is a popular metaphor for managers today--up there on the podium in complete control. But that image may be misleading, says Henry Mintzberg, who recently spent a day with Bramwell Tovey, conductor of the Winnipeg Symphony Orchestra, in order to explore the metaphor. He found that Tovey does not operate like an absolute ruler but practices instead what Mintzberg calls covert leadership. Covert leadership means managing with a sense of nuances, constraints, and limitations. When a manager like Tovey guides an organization, he leads without seeming to, without his people being fully aware of all that he is doing. That's because in this world of professionals, a leader is not completely powerless--but neither does he have absolute control over others. As knowledge work grows in importance, the way an orchestra conductor really operates may serve as a good model for managers in a wide range of businesses. For example, Mintzberg found that Tovey does a lot more hands-on work than one might expect. More like a first-line supervisor than a hands-off executive, he takes direct and personal charge of what is getting done. In dealing with his musicians, his focus is on inspiring them, not empowering them. Like other professionals, the musicians don't need to be empowered--they're already secure in what they know and can do--but they do need to be infused with energy for the tasks at hand. This is the role of the covert leader: to act quietly and unobtrusively in order to exact not obedience but inspired performance.

  13. The survival time of chocolates on hospital wards: covert observational study. (United States)

    Gajendragadkar, Parag R; Moualed, Daniel J; Nicolson, Phillip L R; Adjei, Felicia D; Cakebread, Holly E; Duehmke, Rudolf M; Martin, Claire A


    To quantify the consumption of chocolates in a hospital ward environment. Multicentre, prospective, covert observational study. Four wards at three hospitals (where the authors worked) within the United Kingdom. Boxes of Quality Street (Nestlé) and Roses (Cadbury) on the ward and anyone eating these chocolates. Observers covertly placed two 350 g boxes of Quality Street and Roses chocolates on each ward (eight boxes were used in the study containing a total of 258 individual chocolates). These boxes were kept under continuous covert surveillance, with the time recorded when each chocolate was eaten. Median survival time of a chocolate. 191 out of 258 (74%) chocolates were observed being eaten. The mean total observation period was 254 minutes (95% confidence interval 179 to 329). The median survival time of a chocolate was 51 minutes (39 to 63). The model of chocolate consumption was non-linear, with an initial rapid rate of consumption that slowed with time. An exponential decay model best fitted these findings (model R(2)=0.844, P<0.001), with a survival half life (time taken for 50% of the chocolates to be eaten) of 99 minutes. The mean time taken to open a box of chocolates from first appearance on the ward was 12 minutes (95% confidence interval 0 to 24). Quality Street chocolates survived longer than Roses chocolates (hazard ratio for survival of Roses v Quality Street 0.70, 95% confidence interval 0.53 to 0.93, P=0.014). The highest percentages of chocolates were consumed by healthcare assistants (28%) and nurses (28%), followed by doctors (15%). From our observational study, chocolate survival in a hospital ward was relatively short, and was modelled well by an exponential decay model. Roses chocolates were preferentially consumed to Quality Street chocolates in a ward setting. Chocolates were consumed primarily by healthcare assistants and nurses, followed by doctors. Further practical studies are needed.

  14. A Covert Disruptive Technology: Test and Development of the Corona Satellite (United States)

    Peebles, Curtis


    The launching by the Soviet Union of the Sputnik satellite in 19457 was an impetuous to the United States. The Intercontinental ballistic Missile (ICBM) that launched the Earth's first satellite, could have been armed with a nuclear warhead, that could destroy an American city. The primary intelligence requirement that the US had was to determine the actual size of the Soviet missile program. To this end, a covert, high-risk photoreconnaissance satellite was developed. The code name of this program was "Corona." This article describes the trials and eventual successes of the Corona program.

  15. Covert Half Duplex Data Link Using Radar-Embedded Communications With Various Modulation Schemes (United States)


    for BPSK are shown in Figure 4.3 with 3 · 1010 samples per SNR. Using 106 MC trials, we show the SER curves for the differing estimator sizes (N = 0, 8...sent during each sample , 35 Figure 4.7. SER Performance of Modied 16QAM as a Function of the Size of the Estimator (N). Figure 4.8. The BPSK Simulink...Further, we explore a qualitative analysis of this communications method to measure its covertness using the signal’s complex plane. 14. SUBJECT

  16. The continuous reaction times method for diagnosing, grading, and monitoring minimal/covert hepatic encephalopathy

    DEFF Research Database (Denmark)

    Lauridsen, Mette Enok Munk; Thiele, Maja; Kimer, N


    Abstract Existing tests for minimal/covert hepatic encephalopathy (m/cHE) are time- and expertise consuming and primarily useable for research purposes. An easy-to-use, fast and reliable diagnostic and grading tool is needed. We here report on the background, experience, and ongoing research......-10) percentile) as a parameter of reaction time variability. The index is a measure of alertness stability and is used to assess attention and cognition deficits. The CRTindex identifies half of patients in a Danish cohort with chronic liver disease, as having m/cHE, a normal value safely precludes HE, it has...

  17. Narcissism and boredom revisited: an exploration of correlates of overt and covert narcissism among Dutch university students. (United States)

    Zondag, Hessel J


    This article presents a study of the relationship between narcissism, overt and covert, and seven aspects of boredom, defined as listlessness, drawn out experience of time, depletion, lack of concentration, restlessness, experience seeking, and lack of interest. The survey was conducted using questionnaires administered to 32 men and 177 women. The mean age of male respondents was 30.9 yr. (SD = 11.9), that of female respondents 30.2 yr. (SD = 12.2). In general terms, covert narcissism was found to be positively, and overt narcissism negatively, associated with boredom. The results showed a more complex pattern than was found in previous research into the relationship between narcissism and boredom and suggest that overt and covert narcissism are at opposite ends of the adjustment continuum.

  18. LATOUCHE, Serge. Cornelius Castoriadis ou l’autonomie radical. Colección: Les précurseurs de la décoissance. Neuvy-en-Champagne. Le passager Clandestin. ISBN: 978-2-36935-008-8.

    Directory of Open Access Journals (Sweden)



    Full Text Available LATOUCHE, Serge. Cornelius Castoriadis ou l’autonomie radical.Colección: Les précurseurs de la décoissance. Neuvy-en-Champagne. Le passager Clandestin. ISBN: 978-2-36935-008-8.

  19. Difference of Sums Containing Products of Binomial Coefficients and Their Logarithms

    National Research Council Canada - National Science Library

    Miller, Allen R; Moskowitz, Ira S


    Properties of the difference of two sums containing products of binomial coefficients and their logarithms which arise in the application of Shannon's information theory to a certain class of covert channels are deduced...

  20. Difference of Sums Containing Products of Binomial Coefficients and their Logarithms

    National Research Council Canada - National Science Library

    Miller, Allen R; Moskowitz, Ira S


    Properties of the difference of two sums containing products of binomial coefficients and their logarithms which arise in the application of Shannon's information theory to a certain class of covert channels are deduced...

  1. Decisional enhancement and autonomy: public attitudes towards overt and covert nudges

    Directory of Open Access Journals (Sweden)

    Gidon Felsen


    Full Text Available Ubiquitous cognitive biases hinder optimal decision making. Recent calls to assist decision makers in mitigating these biases---via interventions commonly called ``nudges''---have been criticized as infringing upon individual autonomy. We tested the hypothesis that such ``decisional enhancement'' programs that target overt decision making---i.e., conscious, higher-order cognitive processes---would be more acceptable than similar programs that affect covert decision making---i.e., subconscious, lower-order processes. We presented respondents with vignettes in which they chose between an option that included a decisional enhancement program and a neutral option. In order to assess preferences for overt or covert decisional enhancement, we used the contrastive vignette technique in which different groups of respondents were presented with one of a pair of vignettes that targeted either conscious or subconscious processes. Other than the nature of the decisional enhancement, the vignettes were identical, allowing us to isolate the influence of the type of decisional enhancement on preferences. Overall, we found support for the hypothesis that people prefer conscious decisional enhancement. Further, respondents who perceived the influence of the program as more conscious than subconscious reported that their decisions under the program would be more ``authentic''. However, this relative favorability was somewhat contingent upon context. We discuss our results with respect to the implementation and ethics of decisional enhancement.

  2. Enhancing Competency in English: The Covert Approach a Complementary to the Overt Approach in Teaching Grammar

    Directory of Open Access Journals (Sweden)

    Hussein Islam Abdullah


    Full Text Available Over the years, there has been a decline in the competency of the English Language in Malaysian schools. Many parties among them the Ministry of Education, relevant NGOs, academicians and people have expressed concern over the matter. The Education Ministry through its transformational policy has taken several measures to overcome the matter. It is employing appropriate strategies to solve the problems. The focus is on learning and teaching strategies as well as the content of the language. There is no doubt that grammar is a very important component in acquiring the language in primary and secondary schools. The English teachers mostly use the communicative approach in teaching grammar. This is in line with the KBSR syllabus in mid 1980s which emphasized on the communicative method. Teachers’ training and materials such as textbooks cater for the covert method. However, some tend to ignore the structural approach which is equally effective and meaningful to increase the level of the students’ proficiency which was popular in the 1960s. The paper discusses on the two different approaches used – the covert and overt approaches – their strengths as well as weaknesses. Application of both approaches is also taken into consideration giving a better view of how grammar should be taught in schools.

  3. An independent brain-computer interface using covert non-spatial visual selective attention (United States)

    Zhang, Dan; Maye, Alexander; Gao, Xiaorong; Hong, Bo; Engel, Andreas K.; Gao, Shangkai


    In this paper, a novel independent brain-computer interface (BCI) system based on covert non-spatial visual selective attention of two superimposed illusory surfaces is described. Perception of two superimposed surfaces was induced by two sets of dots with different colors rotating in opposite directions. The surfaces flickered at different frequencies and elicited distinguishable steady-state visual evoked potentials (SSVEPs) over parietal and occipital areas of the brain. By selectively attending to one of the two surfaces, the SSVEP amplitude at the corresponding frequency was enhanced. An online BCI system utilizing the attentional modulation of SSVEP was implemented and a 3-day online training program with healthy subjects was carried out. The study was conducted with Chinese subjects at Tsinghua University, and German subjects at University Medical Center Hamburg-Eppendorf (UKE) using identical stimulation software and equivalent technical setup. A general improvement of control accuracy with training was observed in 8 out of 18 subjects. An averaged online classification accuracy of 72.6 ± 16.1% was achieved on the last training day. The system renders SSVEP-based BCI paradigms possible for paralyzed patients with substantial head or ocular motor impairments by employing covert attention shifts instead of changing gaze direction.

  4. La migration clandestine mexicaine comme un crime : commentaires sur quelques effets de la loi SB. 1070 de l’État de l’Arizona

    Directory of Open Access Journals (Sweden)

    Philippe Schaffhauser


    Full Text Available Cet article a pour objectif d’analyser les effets réels et possibles de l’entrée en vigueur en 2010 de la loi SB 1070, dite loi Arizona, laquelle se présente comme un dispositif juridique visant à lutter contre la migration clandestine dans cette partie de l’Union Américaine. Or cette loi a pour première conséquence pratique de criminaliser un type de situation migratoire et de stigmatiser ensuite la population mexicaine qui, selon les représentations sociales xénophobes, incarne para « excellence » (i.e. délit de facies, la figure du clandestin aux États-Unis. Être mexicain, dans ce pays, finit par être le commencement d’un délit ou du moins jette un doute sur la situation migratoire de l’ensemble des ressortissants de cette communauté nationale. L’article s’emploie à montrer l’arbitraire (l’État de l’Arizona comme tous les autres États de l’Union n’est pas compétent en matière de migration et la construction artificielle du délit imputé aux sans papiers. En effet, faire de la migration clandestine un crime pose le problème objectif de déterminer qui est la victime réelle d’un tel acte et, selon l’expression consacrée par John Stuart Mill, cette forme de migration apparaît au regard de la philosophie morale comme « crime sans victimes », puisque la seule victime de cette infraction à la loi c’est la société américaine toute entière, ses lois, ses normes, ses valeurs et ses institutions, soit une entité abstraite au regard de ce qui se joue au quotidien en matière migration clandestine et de contrôle policier.This article aims to examine the real effects and possible entry into force in 2010 of the so-called law SB 1070 Arizona law, which presents itself as a legal device to combat against illegal migration in this part of the American Union. However this Act is to first practical consequence criminalize a type of migratory situation and then condemn the Mexican population

  5. 75 FR 4973 - Registration Requirements for Importers and Manufacturers of Prescription Drug Products... (United States)


    ... diverted to the clandestine manufacture of a controlled substance. Most of the ephedrine, pseudoephedrine... for-profit. Other: Not-for-profit, government agencies. Abstract: The Domestic Chemical Diversion... may be diverted in the United States for the production of illicit drugs must register with DEA...

  6. The Relationship between Visual Attention and Visual Working Memory Encoding: A Dissociation between Covert and Overt Orienting (United States)

    Tas, A. Caglar; Luck, Steven J.; Hollingworth, Andrew


    There is substantial debate over whether visual working memory (VWM) and visual attention constitute a single system for the selection of task-relevant perceptual information or whether they are distinct systems that can be dissociated when their representational demands diverge. In the present study, we focused on the relationship between visual attention and the encoding of objects into visual working memory (VWM). Participants performed a color change-detection task. During the retention interval, a secondary object, irrelevant to the memory task, was presented. Participants were instructed either to execute an overt shift of gaze to this object (Experiments 1–3) or to attend it covertly (Experiments 4 and 5). Our goal was to determine whether these overt and covert shifts of attention disrupted the information held in VWM. We hypothesized that saccades, which typically introduce a memorial demand to bridge perceptual disruption, would lead to automatic encoding of the secondary object. However, purely covert shifts of attention, which introduce no such demand, would not result in automatic memory encoding. The results supported these predictions. Saccades to the secondary object produced substantial interference with VWM performance, but covert shifts of attention to this object produced no interference with VWM performance. These results challenge prevailing theories that consider attention and VWM to reflect a common mechanism. In addition, they indicate that the relationship between attention and VWM is dependent on the memorial demands of the orienting behavior. PMID:26854532

  7. The relationship between visual attention and visual working memory encoding: A dissociation between covert and overt orienting. (United States)

    Tas, A Caglar; Luck, Steven J; Hollingworth, Andrew


    There is substantial debate over whether visual working memory (VWM) and visual attention constitute a single system for the selection of task-relevant perceptual information or whether they are distinct systems that can be dissociated when their representational demands diverge. In the present study, we focused on the relationship between visual attention and the encoding of objects into VWM. Participants performed a color change-detection task. During the retention interval, a secondary object, irrelevant to the memory task, was presented. Participants were instructed either to execute an overt shift of gaze to this object (Experiments 1-3) or to attend it covertly (Experiments 4 and 5). Our goal was to determine whether these overt and covert shifts of attention disrupted the information held in VWM. We hypothesized that saccades, which typically introduce a memorial demand to bridge perceptual disruption, would lead to automatic encoding of the secondary object. However, purely covert shifts of attention, which introduce no such demand, would not result in automatic memory encoding. The results supported these predictions. Saccades to the secondary object produced substantial interference with VWM performance, but covert shifts of attention to this object produced no interference with VWM performance. These results challenge prevailing theories that consider attention and VWM to reflect a common mechanism. In addition, they indicate that the relationship between attention and VWM is dependent on the memorial demands of the orienting behavior. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  8. Exercise-Induced Fatigue and Caffeine Supplementation Affect Psychomotor Performance but Not Covert Visuo-Spatial Attention (United States)

    Connell, Charlotte J. W.; Thompson, Benjamin; Kuhn, Gustav; Gant, Nicholas


    Fatigue resulting from strenuous exercise can impair cognition and oculomotor control. These impairments can be prevented by administering psychostimulants such as caffeine. This study used two experiments to explore the influence of caffeine administered at rest and during fatiguing physical exercise on spatial attention—a cognitive function that is crucial for task-based visually guided behavior. In independent placebo-controlled studies, cohorts of 12 healthy participants consumed caffeine and rested or completed 180 min of stationary cycling. Covert attentional orienting was measured in both experiments using a spatial cueing paradigm. We observed no alterations in attentional facilitation toward spatial cues suggesting that covert attentional orienting is not influenced by exercise fatigue or caffeine supplementation. Response times were increased (impaired) after exercise and this deterioration was prevented by caffeine supplementation. In the resting experiment, response times across all conditions and cues were decreased (improved) with caffeine. Covert spatial attention was not influenced by caffeine. Together, the results of these experiments suggest that covert attentional orienting is robust to the effects of fatiguing exercise and not influenced by caffeine. However, exercise fatigue impairs response times, which can be prevented by caffeine, suggesting that pre-motor planning and execution of the motor responses required for performance of the cueing task are sensitive to central nervous system fatigue. Caffeine improves response time in both fatigued and fresh conditions, most likely through action on networks controlling motor function. PMID:27768747

  9. Exercise-Induced Fatigue and Caffeine Supplementation Affect Psychomotor Performance but Not Covert Visuo-Spatial Attention.

    Directory of Open Access Journals (Sweden)

    Charlotte J W Connell

    Full Text Available Fatigue resulting from strenuous exercise can impair cognition and oculomotor control. These impairments can be prevented by administering psychostimulants such as caffeine. This study used two experiments to explore the influence of caffeine administered at rest and during fatiguing physical exercise on spatial attention-a cognitive function that is crucial for task-based visually guided behavior. In independent placebo-controlled studies, cohorts of 12 healthy participants consumed caffeine and rested or completed 180 min of stationary cycling. Covert attentional orienting was measured in both experiments using a spatial cueing paradigm. We observed no alterations in attentional facilitation toward spatial cues suggesting that covert attentional orienting is not influenced by exercise fatigue or caffeine supplementation. Response times were increased (impaired after exercise and this deterioration was prevented by caffeine supplementation. In the resting experiment, response times across all conditions and cues were decreased (improved with caffeine. Covert spatial attention was not influenced by caffeine. Together, the results of these experiments suggest that covert attentional orienting is robust to the effects of fatiguing exercise and not influenced by caffeine. However, exercise fatigue impairs response times, which can be prevented by caffeine, suggesting that pre-motor planning and execution of the motor responses required for performance of the cueing task are sensitive to central nervous system fatigue. Caffeine improves response time in both fatigued and fresh conditions, most likely through action on networks controlling motor function.

  10. Navigating the Complexities at an LGTTQQI-Identified Charter School: An Ethnography of C/Overt Narratives (United States)

    Goodrich, Kristopher M.; Luke, Melissa


    The authors describe ethnographic research exploring the experiences of school stakeholders at a lesbian, gay, bisexual, transgender, queer, questioning, and intersex (LGBTQQI)-identified charter school. Participants evidenced use of an overt and covert narrative that appeared to reflect how they navigated the complexities at the…

  11. Exercise-Induced Fatigue and Caffeine Supplementation Affect Psychomotor Performance but Not Covert Visuo-Spatial Attention. (United States)

    Connell, Charlotte J W; Thompson, Benjamin; Kuhn, Gustav; Gant, Nicholas


    Fatigue resulting from strenuous exercise can impair cognition and oculomotor control. These impairments can be prevented by administering psychostimulants such as caffeine. This study used two experiments to explore the influence of caffeine administered at rest and during fatiguing physical exercise on spatial attention-a cognitive function that is crucial for task-based visually guided behavior. In independent placebo-controlled studies, cohorts of 12 healthy participants consumed caffeine and rested or completed 180 min of stationary cycling. Covert attentional orienting was measured in both experiments using a spatial cueing paradigm. We observed no alterations in attentional facilitation toward spatial cues suggesting that covert attentional orienting is not influenced by exercise fatigue or caffeine supplementation. Response times were increased (impaired) after exercise and this deterioration was prevented by caffeine supplementation. In the resting experiment, response times across all conditions and cues were decreased (improved) with caffeine. Covert spatial attention was not influenced by caffeine. Together, the results of these experiments suggest that covert attentional orienting is robust to the effects of fatiguing exercise and not influenced by caffeine. However, exercise fatigue impairs response times, which can be prevented by caffeine, suggesting that pre-motor planning and execution of the motor responses required for performance of the cueing task are sensitive to central nervous system fatigue. Caffeine improves response time in both fatigued and fresh conditions, most likely through action on networks controlling motor function.

  12. (C)overt attention and visual speller design in an ERP-based brain-computer interface. (United States)

    Treder, Matthias S; Blankertz, Benjamin


    In a visual oddball paradigm, attention to an event usually modulates the event-related potential (ERP). An ERP-based brain-computer interface (BCI) exploits this neural mechanism for communication. Hitherto, it was unclear to what extent the accuracy of such a BCI requires eye movements (overt attention) or whether it is also feasible for targets in the visual periphery (covert attention). Also unclear was how the visual design of the BCI can be improved to meet peculiarities of peripheral vision such as low spatial acuity and crowding. Healthy participants (N = 13) performed a copy-spelling task wherein they had to count target intensifications. EEG and eye movements were recorded concurrently. First, (c)overt attention was investigated by way of a target fixation condition and a central fixation condition. In the latter, participants had to fixate a dot in the center of the screen and allocate their attention to a target in the visual periphery. Second, the effect of visual speller layout was investigated by comparing the symbol Matrix to an ERP-based Hex-o-Spell, a two-levels speller consisting of six discs arranged on an invisible hexagon. We assessed counting errors, ERP amplitudes, and offline classification performance. There is an advantage (i.e., less errors, larger ERP amplitude modulation, better classification) of overt attention over covert attention, and there is also an advantage of the Hex-o-Spell over the Matrix. Using overt attention, P1, N1, P2, N2, and P3 components are enhanced by attention. Using covert attention, only N2 and P3 are enhanced for both spellers, and N1 and P2 are modulated when using the Hex-o-Spell but not when using the Matrix. Consequently, classifiers rely mainly on early evoked potentials in overt attention and on later cognitive components in covert attention. Both overt and covert attention can be used to drive an ERP-based BCI, but performance is markedly lower for covert attention. The Hex-o-Spell outperforms the

  13. The National Counterintelligence Strategy of the United States of America

    National Research Council Canada - National Science Library

    McConnell, J. M


    .... Our adversaries -- foreign intelligence services, terrorists, foreign criminal enterprises and cyber intruders -- use overt, covert, and clandestine activities to exploit and undermine US national security interests...

  14. Algorithm for covert convoy of a moving target using a group of autonomous robots (United States)

    Polyakov, Igor; Shvets, Evgeny


    An important application of autonomous robot systems is to substitute human personnel in dangerous environments to reduce their involvement and subsequent risk on human lives. In this paper we solve the problem of covertly convoying a civilian in a dangerous area with a group of unmanned ground vehicles (UGVs) using social potential fields. The novelty of our work lies in the usage of UGVs as compared to the unmanned aerial vehicles typically employed for this task in the approaches described in literature. Additionally, in our paper we assume that the group of UGVs should simultaneously solve the problem of patrolling to detect intruders on the area. We develop a simulation system to test our algorithms, provide numerical results and give recommendations on how to tune the potentials governing robots' behaviour to prioritize between patrolling and convoying tasks.

  15. Covert shift of attention modulates the value encoding in the orbitofrontal cortex. (United States)

    Xie, Yang; Nie, Chechang; Yang, Tianming


    During value-based decision making, we often evaluate the value of each option sequentially by shifting our attention, even when the options are presented simultaneously. The orbitofrontal cortex (OFC) has been suggested to encode value during value-based decision making. Yet it is not known how its activity is modulated by attention shifts. We investigated this question by employing a passive viewing task that allowed us to disentangle effects of attention, value, choice and eye movement. We found that the attention modulated OFC activity through a winner-take-all mechanism. When we attracted the monkeys' attention covertly, the OFC neuronal activity reflected the reward value of the newly attended cue. The shift of attention could be explained by a normalization model. Our results strongly argue for the hypothesis that the OFC neuronal activity represents the value of the attended item. They provide important insights toward understanding the OFC's role in value-based decision making. © 2018, Xie et al.

  16. Alcaldes mayores y subdelegados frente a la siembra clandestina de tabaco: Papantla, 1765-1806 Alcaldes Mayores and Subdelegados coping with Tobacco Clandestine Sowing: Papantla, 1765-1806

    Directory of Open Access Journals (Sweden)

    Georgina Moreno Coello


    Full Text Available Este trabajo tiene como objeto explorar las estrategias que permitieron la persistencia de la siembra clandestina de tabaco en Nueva España, en particular en la región de Papantla. Analizar las relaciones entre los alcaldes mayores, subdelegados y empleados del monopolio del tabaco, enfatizando la protección informal de la que gozó el cultivo ilegal de parte de las autoridades provinciales y examinar cuál pudo ser el destino del ahorro, así como de las ganancias obtenidas del tabaco ilegal, particularmente en el financiamiento de actividades comerciales y crediticias que llevaban a cabo alcaldes mayores y subdelegados, especialmente en el repartimiento de mercancías.This paper explores the strategies that allowed for a persistent clandestine tobacco sowing in New Spain, mainly in the region of Papantla. It analyzes the relationship between alcaldes mayores, subdelegados and employees of the tobacco monopoly, emphasizing the informal protection given to illegal sowings by provincial authorities. It also examines the potential allocation of savings and profits from illegal tobacco, mainly in the financing of commercial activities undertaken by alcaldes mayores and subdelegados, particularly for the repartimiento.

  17. Alcohol in Mayan Guatemala: consumption, distribution, production and composition of cuxa. (United States)

    Kanteres, Fotis; Lachenmeier, Dirk W; Rehm, Jürgen


    To describe the consumption, distribution, production and chemical composition of alcohol, including cuxa (pronounced 'coo sha'), in Nahualá, a highland Mayan municipality in Guatemala. Cuxa is a sugarcane-derived spirit, in part produced clandestinely, that has been distributed in the community for several decades. Key informant interviews with alcohol distributors and consumers, cuxa producers and health professionals, as well as analyses of questionnaires from a sample of 47 spouses who came to the local health centre for problems related to their husband's drinking. Sampling and chemical analysis of cuxa from 12 of 13 identified sales points in the head-town of Nahualá and its nearby settlements (10 km radius). Fieldwork was conducted between November 2007 and March 2008. Alcohol consumption was found to be integrated culturally in this community. The overall drinking culture was marked by irregular heavy drinking occasions, especially around market days, with substantial inebriation and health problems, especially among street inhabiting drinkers. Cuxa contributed to these problems, and cuxa drinking was socially stigmatized. Cuxa was produced both clandestinely and industrially, and sold legally by taverns and illegally by clandestine distributors. The alcoholic strength of the samples was typically between 17 and 19% vol.; clandestinely produced cuxa samples showed acetaldehyde contamination. Measures should be taken to reduce the harm associated with alcohol in this community, including efforts to reduce acetaldehyde levels in cuxa.

  18. Lexical-Semantic Search Under Different Covert Verbal Fluency Tasks: An fMRI Study

    Directory of Open Access Journals (Sweden)

    Yunqing Li


    Full Text Available Background: Verbal fluency is a measure of cognitive flexibility and word search strategies that is widely used to characterize impaired cognitive function. Despite the wealth of research on identifying and characterizing distinct aspects of verbal fluency, the anatomic and functional substrates of retrieval-related search and post-retrieval control processes still have not been fully elucidated.Methods: Twenty-one native English-speaking, healthy, right-handed, adult volunteers (mean age = 31 years; range = 21–45 years; 9 F took part in a block-design functional Magnetic Resonance Imaging (fMRI study of free recall, covert word generation tasks when guided by phonemic (P, semantic-category (C, and context-based fill-in–the-blank sentence completion (S cues. General linear model (GLM, Independent Component Analysis (ICA, and psychophysiological interaction (PPI were used to further characterize the neural substrate of verbal fluency as a function of retrieval cue type.Results: Common localized activations across P, C, and S tasks occurred in the bilateral superior and left inferior frontal gyrus, left anterior cingulate cortex, bilateral supplementary motor area (SMA, and left insula. Differential task activations were centered in the occipital, temporal and parietal regions as well as the thalamus and cerebellum. The context-based fluency task, i.e., the S task, elicited higher differential brain activity in a lateralized frontal-temporal network typically engaged in complex language processing. P and C tasks elicited activation in limited pathways mainly within the left frontal regions. ICA and PPI results of the S task suggested that brain regions distributed across both hemispheres, extending beyond classical language areas, are recruited for lexical-semantic access and retrieval during sentence completion.Conclusion: Study results support the hypothesis of overlapping, as well as distinct, neural networks for covert word generation when

  19. Comparison of Nonword Repetition Ability of Stuttering and Nonstuttering 5-8 Years Old Children: A Reviw on Covert Repair Hypothesis

    Directory of Open Access Journals (Sweden)

    Mehdi Bakhtiar


    Full Text Available Objective: The goal of this research is to attest Covert Repair Hypothesis (CRH i.e, discovering the phonological loop of the word production process in stuttering children. Materials & Methods: In this analytical (Case – Control research, forty bisyllabic and trisyllabic nonwords were designed. After the pilot study, these nonwords were presented to twelve stuttering children with the ages 5-8 and twelve nonstuttering children by the use of DMDX software. Children were asked to repeat the nonwords immediately after hearing them, the reaction time were recorded by the DMDX. The number of phonological errors and correct responses were determined. Results: Findings proved that stuttering children in all its forms except of reaction time of trisyllabic nonwords had a weak performance. However, the research results were not statistically significant. Conclusion: The study evidences show differences between stuttering and nonstuttering children performances. This may outline the possible of defect in language processes of stuttering children, especially in phonological encoding of word production mechanism. Also, the difference pattern between groups had coordination with CRH assumptions.

  20. Design of a covert RFID tag network for target discovery and target information routing. (United States)

    Pan, Qihe; Narayanan, Ram M


    Radio frequency identification (RFID) tags are small electronic devices working in the radio frequency range. They use wireless radio communications to automatically identify objects or people without the need for line-of-sight or contact, and are widely used in inventory tracking, object location, environmental monitoring. This paper presents a design of a covert RFID tag network for target discovery and target information routing. In the design, a static or very slowly moving target in the field of RFID tags transmits a distinct pseudo-noise signal, and the RFID tags in the network collect the target information and route it to the command center. A map of each RFID tag's location is saved at command center, which can determine where a RFID tag is located based on each RFID tag's ID. We propose the target information collection method with target association and clustering, and we also propose the information routing algorithm within the RFID tag network. The design and operation of the proposed algorithms are illustrated through examples. Simulation results demonstrate the effectiveness of the design.

  1. Gaze-independent brain-computer interfaces based on covert attention and feature attention (United States)

    Treder, M. S.; Schmidt, N. M.; Blankertz, B.


    There is evidence that conventional visual brain-computer interfaces (BCIs) based on event-related potentials cannot be operated efficiently when eye movements are not allowed. To overcome this limitation, the aim of this study was to develop a visual speller that does not require eye movements. Three different variants of a two-stage visual speller based on covert spatial attention and non-spatial feature attention (i.e. attention to colour and form) were tested in an online experiment with 13 healthy participants. All participants achieved highly accurate BCI control. They could select one out of thirty symbols (chance level 3.3%) with mean accuracies of 88%-97% for the different spellers. The best results were obtained for a speller that was operated using non-spatial feature attention only. These results show that, using feature attention, it is possible to realize high-accuracy, fast-paced visual spellers that have a large vocabulary and are independent of eye gaze.

  2. Predicting Individual Action Switching in Covert and Continuous Interactive Tasks Using the Fluid Events Model. (United States)

    Radvansky, Gabriel A; D'Mello, Sidney K; Abbott, Robert G; Bixler, Robert E


    The Fluid Events Model is aimed at predicting changes in the actions people take on a moment-by-moment basis. In contrast with other research on action selection, this work does not investigate why some course of action was selected, but rather the likelihood of discontinuing the current course of action and selecting another in the near future. This is done using both task-based and experience-based factors. Prior work evaluated this model in the context of trial-by-trial, independent, interactive events, such as choosing how to copy a figure of a line drawing. In this paper, we extend this model to more covert event experiences, such as reading narratives, as well as to continuous interactive events, such as playing a video game. To this end, the model was applied to existing data sets of reading time and event segmentation for written and picture stories. It was also applied to existing data sets of performance in a strategy board game, an aerial combat game, and a first person shooter game in which a participant's current state was dependent on prior events. The results revealed that the model predicted behavior changes well, taking into account both the theoretically defined structure of the described events, as well as a person's prior experience. Thus, theories of event cognition can benefit from efforts that take into account not only how events in the world are structured, but also how people experience those events.

  3. Covert Sexual Signaling: Human Flirtation and Implications for other Social Species

    Directory of Open Access Journals (Sweden)

    Andrew Gersick


    Full Text Available According to signaling theory and a large body of supporting evidence, males across many taxa produce courtship signals that honestly advertise their quality. The cost of producing or performing these signals maintains signal honesty, such that females are typically able to choose the best males by selecting those that produce the loudest, brightest, longest, or otherwise highest-intensity signals, using signal strength as a measure of quality. Set against this background, human flirting behavior, characterized by its frequent subtlety or covertness, is mysterious. Here we propose that the explanation for subtle and ambiguous signals in human courtship lies in socially imposed costs that (a vary with social context and (b are amplified by the unusual ways in which language makes all interactions potentially public. Flirting is a class of courtship signaling that conveys the signaler's intentions and desirability to the intended receiver while minimizing the costs that would accompany an overt courtship attempt. This proposal explains humans' taxonomically unusual courtship displays and generates a number of novel predictions for both humans and non-human social animals. Individuals who are courting should vary the intensity of their signals to suit the level of risk attached to the particular social configuration, and receivers may assess this flexible matching of signal to context as an indicator of the signaler's broader behavioral flexibility and social intelligence.

  4. Covert orienting in the split brain: Right hemisphere specialization for object-based attention. (United States)

    Kingstone, Alan


    The present paper takes as its starting point Phil Bryden's long-standing interest in human attention and the role it can play in laterality effects. Past split-brain research has suggested that object-based attention is lateralized to the left hemisphere [e.g., Egly, R., Rafal, R. D., Driver, J., & Starreveld, Y. (1994). Covert orienting in the split brain reveals hemispheric specialization for object-based attention. Psychological Science, 5(6), 380-382]. The task used to isolate object-based attention in that previous work, however, has been found wanting [Vecera, S. P. (1994). Grouped locations and object-based attention: Comment on Egly, Driver, and Rafal (1994). Journal of Experimental Psychology: General, 123(3), 316-320]; and indeed, subsequent research with healthy participants using a different task has suggested that object-based attention is lateralized to the opposite right hemisphere (RH) [Valsangkar-Smyth, M. A., Donovan, C. L., Sinnett, S., Dawson, M. R., & Kingstone, A. (2004). Hemispheric performance in object-based attention. Psychonomic Bulletin & Review, 11(1), 84-91]. The present study tested the same split-brain as Egly, Rafal, et al. (1994) but used the object-based attention task introduced by Valsangkar-Smyth et al. (2004). The results confirm that object-based attention is lateralized to the RH. They also suggest that subcortical interhemispheric competition may occur and be dominated by the RH.

  5. Estimating the location and spatial extent of a covert anthrax release.

    Directory of Open Access Journals (Sweden)

    Judith Legrand


    Full Text Available Rapidly identifying the features of a covert release of an agent such as anthrax could help to inform the planning of public health mitigation strategies. Previous studies have sought to estimate the time and size of a bioterror attack based on the symptomatic onset dates of early cases. We extend the scope of these methods by proposing a method for characterizing the time, strength, and also the location of an aerosolized pathogen release. A back-calculation method is developed allowing the characterization of the release based on the data on the first few observed cases of the subsequent outbreak, meteorological data, population densities, and data on population travel patterns. We evaluate this method on small simulated anthrax outbreaks (about 25-35 cases and show that it could date and localize a release after a few cases have been observed, although misspecifications of the spore dispersion model, or the within-host dynamics model, on which the method relies can bias the estimates. Our method could also provide an estimate of the outbreak's geographical extent and, as a consequence, could help to identify populations at risk and, therefore, requiring prophylactic treatment. Our analysis demonstrates that while estimates based on the first ten or 15 observed cases were more accurate and less sensitive to model misspecifications than those based on five cases, overall mortality is minimized by targeting prophylactic treatment early on the basis of estimates made using data on the first five cases. The method we propose could provide early estimates of the time, strength, and location of an aerosolized anthrax release and the geographical extent of the subsequent outbreak. In addition, estimates of release features could be used to parameterize more detailed models allowing the simulation of control strategies and intervention logistics.

  6. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Nathanael R [ORNL; Shue, Craig [Worcester Polytechnic Institute, Worcester; Taylor, Curtis [Worcester Polytechnic Institute, Worcester


    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  7. Modulation of neuronal responses during covert search for visual feature conjunctions. (United States)

    Buracas, Giedrius T; Albright, Thomas D


    While searching for an object in a visual scene, an observer's attentional focus and eye movements are often guided by information about object features and spatial locations. Both spatial and feature-specific attention are known to modulate neuronal responses in visual cortex, but little is known of the dynamics and interplay of these mechanisms as visual search progresses. To address this issue, we recorded from directionally selective cells in visual area MT of monkeys trained to covertly search for targets defined by a unique conjunction of color and motion features and to signal target detection with an eye movement to the putative target. Two patterns of response modulation were observed. One pattern consisted of enhanced responses to targets presented in the receptive field (RF). These modulations occurred at the end-stage of search and were more potent during correct target identification than during erroneous saccades to a distractor in RF, thus suggesting that this modulation is not a mere presaccadic enhancement. A second pattern of modulation was observed when RF stimuli were nontargets that shared a feature with the target. The latter effect was observed during early stages of search and is consistent with a global feature-specific mechanism. This effect often terminated before target identification, thus suggesting that it interacts with spatial attention. This modulation was exhibited not only for motion but also for color cue, although MT neurons are known to be insensitive to color. Such cue-invariant attentional effects may contribute to a feature binding mechanism acting across visual dimensions.

  8. The dependencies of fronto-parietal BOLD responses evoked by covert visual search suggest eye-centred coding. (United States)

    Atabaki, A; Dicke, P W; Karnath, H-O; Thier, P


    Visual scenes explored covertly are initially represented in a retinal frame of reference (FOR). On the other hand, 'later' stages of the cortical network allocating spatial attention most probably use non-retinal or non-eye-centred representations as they may ease the integration of different sensory modalities for the formation of supramodal representations of space. We tested if the cortical areas involved in shifting covert attention are based on eye-centred or non-eye-centred coding by using functional magnetic resonance imaging. Subjects were scanned while detecting a target item (a regularly oriented 'L') amidst a set of distractors (rotated 'L's). The array was centred either 5° right or left of the fixation point, independent of eye-gaze orientation, the latter varied in three steps: straight relative to the head, 10° left or 10° right. A quantitative comparison of the blood-oxygen-level-dependent (BOLD) responses for the three eye-gaze orientations revealed stronger BOLD responses in the right intraparietal sulcus (IPS) and the right frontal eye field (FEF) for search in the contralateral (i.e. left) eye-centred space, independent of whether the array was located in the right or left head-centred hemispace. The left IPS showed the reverse pattern, i.e. an activation by search in the right eye-centred hemispace. In other words, the IPS and the right FEF, members of the cortical network underlying covert search, operate in an eye-centred FOR. © 2013 Federation of European Neuroscience Societies and Blackwell Publishing Ltd.

  9. Covert rapid action-memory simulation (CRAMS): a hypothesis of hippocampal-prefrontal interactions for adaptive behavior. (United States)

    Wang, Jane X; Cohen, Neal J; Voss, Joel L


    Effective choices generally require memory, yet little is known regarding the cognitive or neural mechanisms that allow memory to influence choices. We outline a new framework proposing that covert memory processing of hippocampus interacts with action-generation processing of prefrontal cortex in order to arrive at optimal, memory-guided choices. Covert, rapid action-memory simulation (CRAMS) is proposed here as a framework for understanding cognitive and/or behavioral choices, whereby prefrontal-hippocampal interactions quickly provide multiple simulations of potential outcomes used to evaluate the set of possible choices. We hypothesize that this CRAMS process is automatic, obligatory, and covert, meaning that many cycles of action-memory simulation occur in response to choice conflict without an individual's necessary intention and generally without awareness of the simulations, leading to adaptive behavior with little perceived effort. CRAMS is thus distinct from influential proposals that adaptive memory-based behavior in humans requires consciously experienced memory-based construction of possible future scenarios and deliberate decisions among possible future constructions. CRAMS provides an account of why hippocampus has been shown to make critical contributions to the short-term control of behavior, and it motivates several new experimental approaches and hypotheses that could be used to better understand the ubiquitous role of prefrontal-hippocampal interactions in situations that require adaptively using memory to guide choices. Importantly, this framework provides a perspective that allows for testing decision-making mechanisms in a manner that translates well across human and nonhuman animal model systems. Copyright © 2014 Elsevier Inc. All rights reserved.

  10. A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy (United States)

    Viecco, Camilo H.; Camp, L. Jean

    Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization that participates in a sensor network risks providing a covert channel to attackers if that organization’s sensor can be identified. While there is benefit for every party when any individual participates in such sensor deployments, there are perverse incentives against individual participation. As a result, Internet sensor networks currently provide limited data. Ensuring anonymity of individual sensors can decrease the risk of participating in a sensor network without limiting data provision.

  11. Clandestine labor migration to Taiwan. (United States)

    Tsay, C


    "Illegal migration to Taiwan is a recent phenomenon but with a rapid rate of increase. Most illegal foreign workers enter on visitor's visas and overstay. This paper's detailed analysis of official data reveals that Malaysia, Philippines, Indonesia and Thailand are the major sources, providing a stock of mostly male workers numbering around 40,000. Sociodemographic and attitudinal changes among Taiwanese workers coupled with labor shortages in low-skilled jobs are pressuring the Taiwanese government to formulate plans for a systematic importation of foreign labor." excerpt

  12. An Overt Chemical Protective Garment Reduces Thermal Strain Compared with a Covert Garment in Warm-Wet but Not Hot-Dry Environments

    Directory of Open Access Journals (Sweden)

    Matthew J. Maley


    Full Text Available Objectives: A commercial chemical, biological, radiological and nuclear (CBRN protective covert garment has recently been developed with the aim of reducing thermal strain. A covert CBRN protective layer can be worn under other clothing, with equipment added for full chemical protection when needed. However, it is unknown whether the covert garment offers any alleviation to thermal strain during work compared with a traditional overt ensemble. Therefore, the aim of this study was to compare thermal strain and work tolerance times during work in an overt and covert ensemble offering the same level of CBRN protection.Methods: Eleven male participants wore an overt (OVERT or covert (COVERT CBRN ensemble and walked (4 km·h−1, 1% grade for a maximum of 120 min in either a wet bulb globe temperature [WBGT] of 21, 30, or 37°C (Neutral, WarmWet and HotDry, respectively. The trials were ceased if the participants' gastrointestinal temperature reached 39°C, heart rate reached 90% of maximum, walking time reached 120 min or due to self-termination.Results: All participants completed 120 min of walking in Neutral. Work tolerance time was greater in OVERT compared with COVERT in WarmWet (P < 0.001, 116.5[9.9] vs. 88.9[12.2] min, respectively, though this order was reversed in HotDry (P = 0.003, 37.3[5.3] vs. 48.4[4.6] min, respectively. The rate of change in mean body temperature and mean skin temperature was greater in COVERT (0.025[0.004] and 0.045[0.010]°C·min−1, respectively compared with OVERT (0.014[0.004] and 0.027[0.007]°C·min−1, respectively in WarmWet (P < 0.001 and P = 0.028, respectively. However, the rate of change in mean body temperature and mean skin temperature was greater in OVERT (0.068[0.010] and 0.170[0.026]°C·min−1, respectively compared with COVERT (0.059[0.004] and 0.120[0.017]°C·min−1, respectively in HotDry (P = 0.002 and P < 0.001, respectively. Thermal sensation, thermal comfort, and ratings of perceived

  13. Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

    Directory of Open Access Journals (Sweden)

    O.V. Kostyrka


    Full Text Available At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed steganography message, significant throughput of a steganography communication channel. Aim: The aim of this research is to modify the steganography method, developed by the author earlier, which will allow to increase the throughput of the corresponding covert communication channel when saving resistance to attacks against the built-in message and perception reliability of the created steganography message, inherent to developed method. Materials and Methods: Modifications of a steganography method that is steady against attacks against the built-in message which is carrying out the inclusion and decoding of the sent (additional information in spatial domain of the image allowing to increase the throughput of the organized communication channel are offered. Use of spatial domain of the image allows to avoid accumulation of an additional computational error during the inclusion/decoding of additional information due to “transitions” from spatial domain of the image to the area of conversion and back that positively affects the efficiency of decoding. Such methods are considered as attacks against the built-in message: imposing of different noise on a steganography message, filtering, lossy compression of a ste-ganography message where the JPEG and JPEG2000 formats with different quality coefficients for saving of a steganography message are used. Results: It is shown that algorithmic implementations of the offered methods modifications remain steady against the perturbing influences, including considerable, provide reliability of perception of the created steganography message, increase the throughput of the created steganography communication channel in comparison with the algorithm implementing

  14. Using task effort and pupil size to track covert shifts of visual attention independently of a pupillary light reflex. (United States)

    Brocher, Andreas; Harbecke, Raphael; Graf, Tim; Memmert, Daniel; Hüttermann, Stefanie


    We tested the link between pupil size and the task effort involved in covert shifts of visual attention. The goal of this study was to establish pupil size as a marker of attentional shifting in the absence of luminance manipulations. In three experiments, participants evaluated two stimuli that were presented peripherally, appearing equidistant from and on opposite sides of eye fixation. The angle between eye fixation and the peripherally presented target stimuli varied from 12.5° to 42.5°. The evaluation of more distant stimuli led to poorer performance than did the evaluation of more proximal stimuli throughout our study, confirming that the former required more effort than the latter. In addition, in Experiment 1 we found that pupil size increased with increasing angle and that this effect could not be reduced to the operation of low-level visual processes in the task. In Experiment 2 the pupil dilated more strongly overall when participants evaluated the target stimuli, which required shifts of attention, than when they merely reported on the target's presence versus absence. Both conditions yielded larger pupils for more distant than for more proximal stimuli, however. In Experiment 3, we manipulated task difficulty more directly, by changing the contrast at which the target stimuli were presented. We replicated the results from Experiment 1 only with the high-contrast stimuli. With stimuli of low contrast, ceiling effects in pupil size were observed. Our data show that the link between task effort and pupil size can be used to track the degree to which an observer covertly shifts attention to or detects stimuli in peripheral vision.

  15. Música y clandestinidad en dictadura: la represión, la circulación de músicas de resistencia y el casete clandestino Music and "clandestinidad" During the Time of the Chilean Dictatorship: Repression and the Circulation of Music of Resistance and Clandestine Cassettes

    Directory of Open Access Journals (Sweden)

    Laura Jordán


    interpretation of the clandestine repressive actions is put forward. Secondly the specifíc dynamics of transiting between what is private and what is public is examined, particularly as it relates to the heterogeneous degrees of exposure and hiding of the members of resistance. Finally the production of clandestine recordings containing material of a clear militant commitment is discussed. The key role of the cassette production is underlined, as the copy and circulation of cassettes became a cultural stronghold of resistance. Each area of this tripartite model presents an inner coherence of its own. Nevertheless the overall consideration of these thee areas serves as the basis of a fírst all encompassing view of the complex relationship between music and "clandestinidad" during the time of dictatorship.

  16. Hazards of Illicit Methamphetamine Production and Efforts at Reduction: Data from the Hazardous Substances Emergency Events Surveillance System (United States)

    Melnikova, Natalia; Welles, Wanda Lizak; Wilburn, Rebecca E.; Rice, Nancy; Wu, Jennifer; Stanbury, Martha


    Objectives. Methamphetamine (meth) is a highly addictive drug of abuse that can easily be made in small illegal laboratories from household chemicals that are highly toxic and dangerous. Meth labs have been found in locations such as homes, outbuildings, motels, and cars. Its production endangers the “cook,” neighbors, responders, and the environment. This article describes surveillance data used to examine the emergence and public health impacts of illicit clandestine meth labs, as well as two states' efforts to thwart lab operations and prevent responder injuries. Methods. We analyzed data collected from 2001 to 2008 by 18 states participating in the Agency for Toxic Substances and Disease Registry's Hazardous Substances Emergency Events Surveillance (HSEES) Program to examine the occurrence and public health impacts of clandestine meth production. Results. HSEES data indicate that the majority of clandestine meth lab events occurred in residential areas. About 15% of meth lab events required evacuation. Nearly one-fourth of these events resulted in injuries, with 902 reported victims. Most victims (61%) were official responders, and one-third were members of the general public. Since 2004, with the implementation of local and federal laws and prevention activities, the number of meth lab events has declined. Increased education and training of first responders has led to decreased injuries among police officers, firefighters, and emergency medical personnel. Conclusions. HSEES data provided a good data source for monitoring the emergence of domestic clandestine meth production, the associated public health effects, and the results of state and federal efforts to promote actions to address the problem. PMID:21563719

  17. New flexible origination technology based on electron-beam lithography and its integration into security devices in combination with covert features based on DNA authentication (United States)

    Drinkwater, John K.; Ryzi, Zbynek; Outwater, Chris S.


    Embossed diffractive optically variable devices are becoming increasingly familiar security items on plastic cards, banknotes, security documents and on branded goods and media to protect against counterfeit, protect copyright and to evidence tamper. Equally as this devices become both more widely available there is a pressing requirement for security technology upgrades to keep ahead of technology advances available to potential counterfeiters. This paper describes a new generation electron beam DOVID origination technology particularly suitable for high security applications. Covert marking of security devices is provided using the DNA matrix by creating and verifying unique DNA sequences. This integration of this into practical security features in combination with covert features based on DNA matrix authentication and other more straightforwardly authenticable features to provide multi- technology security solutions will be described.

  18. Peer Status in Boys With and Without Attention-Deficit Hyperactivity Disorder: Predictions from Overt and Covert Antisocial Behavior, Social Isolation, and Authoritative Parenting Beliefs. (United States)

    Hinshaw, Stephen P; Zupan, Brian A; Simmel, Cassandra; Nigg, Joel T; Melnick, Sharon


    Because of the centrality of peer relationship difficulties for children with attentiondeficit hyperactivity disorder (ADHD), we investigated behavioral (overt and covert antisocial activity), internalizing (self-reports and observed social isolation), and familial (authoritative, authoritarian, and permissive parenting beliefs) predictors of peer sociometric nominations among previously unfamiliar, ethnically diverse ADHD (N=73) and comparison (N=60) boys, aged 6-12 years. Authoritative maternal parenting beliefs and negatively weighted social isolation explained significant variance in positive peer regard; aggression, covert behavior, and authoritative parenting beliefs were the independent predictors of both negative peer status and peer social preference. We extended such predictions with statistical control of (1) child cognitive variables, (2) maternal psychopathology, and (3) ADHD boys, but authoritative parenting beliefs were stronger predictors in ADHD than in comparison youth. We discuss family-peer linkages regarding peer competence.

  19. "It is my business": A Mixed-Methods Analysis of Covert Contraceptive Use among Women in Rakai, Uganda. (United States)

    Heck, Craig J; Grilo, Stephanie A; Song, Xiaoyu; Lutalo, Tom; Nakyanjo, Neema; Santelli, John S


    Covert contraceptive use (CCU) is the use of family planning without a partner's knowledge. This study sought to examine CCU prevalence among women living in Rakai, Uganda, predictors of CCU, and why women resort to CCU. We used data from women (15-49years) currently using contraceptives (oral contraceptives, Depo Provera, implants, intrauterine devices, and periodic abstinence) during Round 15 (2011-2013) of the Rakai Community Cohort Survey (n=2206). We utilized logistic regressions to analyze the association between self-reported CCU and current contraceptive method, sexual activity, experience of violence, and demographic data. We also used data from in-depth interviews (IDI) on HIV and reproductive health conducted in 2013-2016. CCU prevalence was 26%. In the multivariable model, being previously married (aOR=2.2 [1.7-2.9]), having no formal education (aOR=2.1 [1.1-3.9]), and experiencing physical violence (aOR=1.7 [1.3-2.2]) or having more than 1 sex partner (aOR=1.6 [1.2-2.2]) in the past 12months were CCU predictors. Advancing past primary school decreased the odds of CCU (aOR=0.7 [0.6-0.9]). HIV was positively associated with CCU in the unadjusted model, but not the adjusted. In the IDIs, women primarily resorted to CCU because of discordant fertility desires-coupled with financial insecurity, negative stereotypes towards contraceptives use, deteriorating health, and familial pressure to reproduce. One woman employed CCU because she feared being ostracized from her community. CCU is common amongst users of contraception and is used to hide family planning from partners and communities. Women that diverge from Uganda's cultural norms had higher odds of CCU. Clinicians and practitioners should be aware of CCU among their patients and should educate women on the wide variety of contraceptive methods to help them decide if their current covert method is best for their health and safety. Copyright © 2018 Elsevier Inc. All rights reserved.

  20. The influence of method-related partner violence on covert pill use and pill discontinuation among women living in La Paz, El Alto and Santa Cruz, Bolivia. (United States)

    McCarraher, Donna R; Martin, Sandra L; Bailey, Patricia E


    Intimate partner violence is widespread worldwide. While assumed to impact women's ability to use contraceptive methods, few data are available to support this claim. In this study, eight focus group discussions were conducted to guide questionnaire development and to provide contextual information. Participants were women who were currently using the pill and women who had used the pill previously. In addition, 300 women were interviewed who initiated oral contraceptive pill use between December 1995 and April 1996. Participants were interviewed 3-6 months later to investigate the role intimate partner violence played in covert pill use and pill discontinuation. Special study procedures for asking women questions about violence were employed. Nineteen per cent of the women interviewed were using the pill covertly. The odds of covert pill use were four times higher in El Alto and La Paz than in Santa Cruz. Women who used the pill covertly were more likely to have experienced method-related partner violence (OR = 21.27) than women whose partners knew of their pill use. One-third of the women had discontinued pill use at the time of the interview. In the final multivariate analysis, having experienced side-effects (OR = 2.37) was a significant predictor of pill discontinuation and method-related partner violence was marginally predictive (OR = 1.91; 95% CI 1.0-3.66). While efforts are ongoing to incorporate men into family planning programmes, some male partners oppose, and in some situations violently oppose, contraceptive use. The needs of women with these types of partners must not be overlooked.

  1. Moderation of Nicotine Effects on Covert Orienting of Attention Tasks by Poor Placebo Performance and Cue Validity (United States)

    Gilbert, David G.; Rzetelny, Adam; Rabinovich, Norka E.


    Introduction and Rationale Given baseline-dependent effects of nicotine on other forms of attention, there is reason to believe that inconsistent findings for the effects of nicotine on attentional orienting may be partly due to individual differences in baseline (abstinence state) functioning. Individuals with low baseline attention may benefit more from nicotine replacement. Method The effects of nicotine as a function of baseline performance (bottom, middle, and top third of mean reaction times during placebo) were assessed in 52 habitual abstinent smokers (26 females/26 males) utilizing an arrow-cued covert orienting of attention task. Results Compared to a placebo patch, a 14 mg nicotine patch produced faster overall reaction times (RTs). In addition, individuals with slower RTs during the placebo condition benefitted more from nicotine on cued trials than did those who had shorter (faster) RTs during placebo. Nicotine also enhanced the validity effect (shorter RTs to validly vs. invalidly cued targets), but this nicotine benefit did not differ as a function of overall placebo-baseline performance. Conclusions These findings support the view that nicotine enhances cued spatial attentional orienting in individuals who have slower RTs during placebo (nicotine-free) conditions; however, baseline-dependent effects may not generalize to all aspects of spatial attention. These findings are consistent with findings indicating that nicotine’s effects vary as a function of task parameters rather than simple RT speeding or cognitive enhancement. PMID:27461547

  2. Movie moguls: British American Tobacco's covert strategy to promote cigarettes in Eastern Europe. (United States)

    LeGresley, Eric M; Muggli, Monique E; Hurt, Richard D


    Though the cigarette companies have long publicly denied paying for product placement in films, the documentary evidence from the 1950s-1980s overwhelmingly suggests otherwise. Approximately 800,000 pages of previously secret internal corporate British American Tobacco Company documents were reviewed at the Minnesota Tobacco Document Depository from March 2003 through May 2005. Documents were also searched online at the various tobacco document collections between February 2004 and November 2004. A small collection of internal corporate documents from British American Tobacco show that in the late 1990s the company evaluated investing in a movie destined for Eastern Europe. By being an investor, BAT could influence the alteration of the movie script to promote BAT's brands, thus providing marketing opportunities without a clear violation of movie product placement restrictions. Future protocols to the WHO Framework Convention on Tobacco Control should seek to curtail more than just payment for tobacco product placement. More restrictive provisions will be needed to hinder creative strategies by the tobacco industry to continue tobacco promotion and trademark diversification through movies.

  3. Recycling by coverting organic waste to fertilize at Ikata Nuclear Power Station

    International Nuclear Information System (INIS)

    Kubota, T.; Matsuoka, H.


    In order to cope with global- warming and Dioxin issue, we started the Project in which all kinds of organic wastes originated on site are fermented to organic fertilizer with the help of YM bacteria in 2001. And in 2006 our product was officially approved as fertilizer by regulatory body, and then we started to sell these fertilizers to farmers near-by. Among many power stations in Japan, Ikata Nuclear Power Station may be the first plant where organic wastes are totally reused as commercial-based fertilizer. (author)

  4. Flight feather attachment in rock pigeons (Columba livia): covert feathers and smooth muscle coordinate a morphing wing. (United States)

    Hieronymus, Tobin L


    Mechanisms for passively coordinating forelimb movements and flight feather abduction and adduction have been described separately from both in vivo and ex vivo studies. Skeletal coordination has been identified as a way for birds to simplify the neuromotor task of controlling flight stroke, but an understanding of the relationship between skeletal coordination and the coordination of the aerodynamic control surface (the flight feathers) has been slow to materialize. This break between the biomechanical and aerodynamic approaches - between skeletal kinematics and airfoil shape - has hindered the study of dynamic flight behaviors. Here I use dissection and histology to identify previously overlooked interconnections between musculoskeletal elements and flight feathers. Many of these structures are well-placed to directly link elements of the passive musculoskeletal coordination system with flight feather movements. Small bundles of smooth muscle form prominent connections between upper forearm coverts (deck feathers) and the ulna, as well as the majority of interconnections between major flight feathers of the hand. Abundant smooth muscle may play a role in efficient maintenance of folded wing posture, and may also provide an autonomically regulated means of tuning wing shape and aeroelastic behavior in flight. The pattern of muscular and ligamentous linkages of flight feathers to underlying muscle and bone may provide predictable passive guidance for the shape of the airfoil during flight stroke. The structures described here provide an anatomical touchstone for in vivo experimental tests of wing surface coordination in an extensively researched avian model species. © 2016 Anatomical Society.

  5. Validation of EncephalApp, Smartphone-Based Stroop Test, for the Diagnosis of Covert Hepatic Encephalopathy. (United States)

    Bajaj, Jasmohan S; Heuman, Douglas M; Sterling, Richard K; Sanyal, Arun J; Siddiqui, Muhammad; Matherly, Scott; Luketic, Velimir; Stravitz, R Todd; Fuchs, Michael; Thacker, Leroy R; Gilles, HoChong; White, Melanie B; Unser, Ariel; Hovermale, James; Gavis, Edith; Noble, Nicole A; Wade, James B


    Detection of covert hepatic encephalopathy (CHE) is difficult, but point-of-care testing could increase rates of diagnosis. We aimed to validate the ability of the smartphone app EncephalApp, a streamlined version of Stroop App, to detect CHE. We evaluated face validity, test-retest reliability, and external validity. Patients with cirrhosis (n = 167; 38% with overt HE [OHE]; mean age, 55 years; mean Model for End-Stage Liver Disease score, 12) and controls (n = 114) were each given a paper and pencil cognitive battery (standard) along with EncephalApp. EncephalApp has Off and On states; results measured were OffTime, OnTime, OffTime+OnTime, and number of runs required to complete 5 off and on runs. Thirty-six patients with cirrhosis underwent driving simulation tests, and EncephalApp results were correlated with results. Test-retest reliability was analyzed in a subgroup of patients. The test was performed before and after transjugular intrahepatic portosystemic shunt placement, and before and after correction for hyponatremia, to determine external validity. All patients with cirrhosis performed worse on paper and pencil and EncephalApp tests than controls. Patients with cirrhosis and OHE performed worse than those without OHE. Age-dependent EncephalApp cutoffs (younger or older than 45 years) were set. An OffTime+OnTime value of >190 seconds identified all patients with CHE with an area under the receiver operator characteristic value of 0.91; the area under the receiver operator characteristic value was 0.88 for diagnosis of CHE in those without OHE. EncephalApp times correlated with crashes and illegal turns in driving simulation tests. Test-retest reliability was high (intraclass coefficient, 0.83) among 30 patients retested 1-3 months apart. OffTime+OnTime increased significantly (206 vs 255 seconds, P = .007) among 10 patients retested 33 ± 7 days after transjugular intrahepatic portosystemic shunt placement. OffTime+OnTime decreased significantly (242 vs

  6. Organic Phase Change Nanoparticles for in-Product Labeling of Agrochemicals. (United States)

    Wang, Miao; Duong, Binh; Su, Ming


    There is an urgent need to develop in-product covert barcodes for anti-counterfeiting of agrochemicals. This paper reports a new organic nanoparticle-based in-product barcode system, in which a panel of organic phase change nanoparticles is added as a barcode into in a variety of chemicals (herein agrochemicals). The barcode is readout by detecting melting peaks of organic nanoparticles using differential scanning calorimetry. This method has high labeling capacity due to small sizes of nanoparticles, sharp melting peaks, and large scan range of thermal analysis. The in-product barcode can be effectively used to protect agrochemical products from being counterfeited due to its large coding capacity, technical readiness, covertness, and robustness.

  7. Productivity

    DEFF Research Database (Denmark)

    Spring, Martin; Johnes, Geraint; Hald, Kim Sundtoft

    Productivity is increasingly critical for developed economies. It has always been important: as Paul Krugman puts it, “Productivity isn’t everything, but in the long run it is almost everything. A country’s ability to improve its standard of living over time depends almost entirely on its ability...... to raise its output per worker”(Krugman, 1994). Analyses of productivity have, by and large, been the preserve of economists. Operations Management (OM) is rooted in a similar concern for the efficient use of scarce resources; Management Accounting (MA) is concerned with the institutionalised measurement...... and management of productivity. Yet the three perspectives are rarely connected. This paper is a sketch of a literature review seeking to identify, contrast and reconcile these three perspectives. In so doing, it aims to strengthen the connections between policy and managerial analyses of productivity....

  8. Policy implications of Iran's Nuclear Deal in technical terms for the plutonium route, uranium route, covert options, inspections, monitoring and verifications

    Energy Technology Data Exchange (ETDEWEB)

    Pinheiro, Andre Ricardo M., E-mail: [Universidade de São Paulo (USP), SP (Brazil). Departamento de Engenharia Naval; Guimarães, Leonam dos Santos, E-mail: [Eletrobrás Termonuclear S.A. (ELETRONUCLEAR), Rio de Janeiro, RJ (Brazil)


    The present Paper addresses the policy implications of Joint Comprehensive Plan of Action (JCPOA) known as 'Ian Nuclear Deal', implemented on 16{sup th} January of 2016 between the Iran and the P5+1 countries (the U.S., U.K. France, Germany, Russia, and China), along with the EU in technical terms to analyze the Plutonium Route, Uranium Route and the Covert options and Inspections, Monitoring and Verifications. A historical review is presented to understand how the Iranian Nuclear Program is formed. Following is shown the current nuclear facilities in Iran and its capacity to process nuclear materials. It is analyzed the impact of JCPOA in Uranium and Plutonium routes. Covert Options always will be an option, so the most sensitive impact is related to the new monitoring and verification policies that must ensure real control of illegal procedures. The main conclusion is that the deal postpones the Iran's nuclear program for more than a decade (15 years), delaying Iran's nuclear bomb time from a few months to at least one year, although there is a current latent capacity to develop a nuclear bomb in Uranium route. It also gives IAEA inspectors capability to monitor nuclear activities and prevent to possible development to a nuclear bomb. To arrive in this conclusion an extensive technical analyze of impact of JCPOA in Iran's nuclear capabilities was made to discover how effective is the deal to prevent Iran to build, or acquire a nuclear weapon. (author)

  9. Policy implications of Iran's Nuclear Deal in technical terms for the plutonium route, uranium route, covert options, inspections, monitoring and verifications

    International Nuclear Information System (INIS)

    Pinheiro, Andre Ricardo M.


    The present Paper addresses the policy implications of Joint Comprehensive Plan of Action (JCPOA) known as 'Ian Nuclear Deal', implemented on 16 th January of 2016 between the Iran and the P5+1 countries (the U.S., U.K. France, Germany, Russia, and China), along with the EU in technical terms to analyze the Plutonium Route, Uranium Route and the Covert options and Inspections, Monitoring and Verifications. A historical review is presented to understand how the Iranian Nuclear Program is formed. Following is shown the current nuclear facilities in Iran and its capacity to process nuclear materials. It is analyzed the impact of JCPOA in Uranium and Plutonium routes. Covert Options always will be an option, so the most sensitive impact is related to the new monitoring and verification policies that must ensure real control of illegal procedures. The main conclusion is that the deal postpones the Iran's nuclear program for more than a decade (15 years), delaying Iran's nuclear bomb time from a few months to at least one year, although there is a current latent capacity to develop a nuclear bomb in Uranium route. It also gives IAEA inspectors capability to monitor nuclear activities and prevent to possible development to a nuclear bomb. To arrive in this conclusion an extensive technical analyze of impact of JCPOA in Iran's nuclear capabilities was made to discover how effective is the deal to prevent Iran to build, or acquire a nuclear weapon. (author)

  10. On dis/abled clandestine bodies

    DEFF Research Database (Denmark)

    Galis, Vasilis; Tzokas, Spyros; Tympas, Aristotle


    Against what the dominant rhetoric of globalization would led us to assume, we live in a world that is overwhelmed by the presence of borders. Erasing some borders, so as to allow for easier and increased flow of commodities, was frequently coupled by the introduction of additional borders, to di...... against superior EU and Greek detection and ‘push-back’ technology....

  11. Find and neutralize clandestine nuclear weapons

    International Nuclear Information System (INIS)

    Canavan, G.H.


    The objective of finding nuclear material at entry portals is to provide a secure perimeter as large as a weapon damage radius so that operations could be conducted within it relatively unencumbered. The objective of wide area search for nuclear material to provide a safe zone of similar dimensions in an area in which it is not possible to maintain a secure perimeter, to provide assurance for civilians living at an area at risk, or to provide rapid, wide area search of regions that could conceal nuclear threats to forces in the field. This rapid, wide-area, and confident detection of nuclear materials is the essential first step in developing the ability to negate terrorist nuclear assemblies or weapons. The ability to detect and negate nuclear materials are necessary to prevent the forced, massive evacuation of urban populations or the disruption of military operations in response to terrorist threats. This paper describes the limitations to current sensors used for nuclear weapon detection and discusses a novel approach to nuclear weapon detection using a combination of directional information (imaging) and gamma ray energy (color) to produce a gamma ray color camera

  12. Gauging the Commitment of Clandestine Group Members

    National Research Council Canada - National Science Library

    Downs, Doneda D


    .... Until a few years ago, most research on individual commitment and organizational cohesion has been based primarily on questionnaires and open observations on groups that desire to be understood...

  13. Clandestine abortions are not necessarily illegal. (United States)

    Cook, R J


    It is common to find the term illegal abortion misused. Often times this misuse is perpetrated by antiabortion advocates who wish to reinforce negative stereotypes and thus apply pressure on doctors to refrain from performing abortions. Until a practitioner is prosecuted and convicted of performing an abortion contrary to the law, the procedure should not be referred to as illegal. Instead the legally neutral term, abortion, should be used instead. This would better serve the interests of women's reproductive health. There is no legal system that makes abortion illegal in all circumstances. For example, abortion is often legal if the life of the mother in danger. This includes a perception on behalf of the practitioner that the women may be suicidal or attempt to terminate the pregnancy by herself. A practitioner performing an abortion in such circumstances is not doing so illegally. The use of the term illegal abortion ignores the fact that in criminal law one is presumed innocent until proven guilty. A prosecutor must prove 1st that an intervention was performed and 2nd that a criminal intent accompanied the intervention. It is this 2nd criterion that is often the hardest to prove, since the practitioner must only testify that the intervention was indicated by legally allowed circumstances to be innocent. The prosecutor must show bad faith in order to gain a justified conviction. Even abortion by unqualified practitioners may not be illegal if doctors refuse to perform the intervention because it is still indicated. Accurate description of abortions would clarify situations in which abortion can be legally provided.


    Directory of Open Access Journals (Sweden)

    Mirela Janice Eidt


    Full Text Available Infectious agents and veterinary diseases can be disseminated across borders and contribute to change the country sanitary status. The aim of this study was to identify the main animal products intercepted and seized by the agricultural surveillance units. This paper studied three Agricultural Surveillance Units located at land borders in the North region of Brazil: Assis Brasil and Epitaciolândia (Acre State and Pacaraima (Roraima State, respectively borders with Peru, Bolivia and Venezuela. The main animal products confiscated were dairy products, fish, meat, sausage, veterinary products (drugs, animal food (pet foods and apiculture products. Given the clandestine nature of animal transit and its products in these borders, the possibilities of introduction of infectious agents and diseases must be better evaluated, considering the type of products confiscated, as well as the sanitary status of the countries of origin.

  15. Building the "fable hospital"--the CEO's perspective: an interview with Michael H. Covert, president and chief executive officer, Palomar Pomerado Health. Interview by David A Tam. (United States)

    Covert, Michael


    Hospital construction is a significant event in any health system. The financial implications are great, especially at a time of shrinking capital resources. Personnel are affected, as are the processes to perform their tasks. Often, new facilities are catalysts that change organizational culture; it has been clearly shown that new facilities have a positive impact on patient satisfaction scores. The members of the C-suite of a hospital/health system play important roles in construction projects. However, no one is more critical to the success of such major endeavors than the chief executive officer (CEO). The CEO sets the tone for the project, giving direction to the design and construction process that may have implications for the rest of the organization. Palomar Pomerado Health (PPH) is the largest public health district in California. In 2002, the PPH governing board authorized the creation of a new facility master plan for the district, which included the construction of a replacement facility for its tertiary care trauma center. The new Palomar Medical Center is slated to open in August 2012. HERD had the opportunity to speak with PPH CEO Michael H. Covert on the role of the CEO in the building of this "fable hospital".

  16. Differences in detection of Aeromonas salmonicida in covertly infected salmonid fishes by the stress-inducible furunculosis test and culture-based assays (United States)

    Cipriano, R.C.; Ford, L.A.; Smith, D.R.; Schachte, J.H.; Petrie, C.J.


    Accurate detection of Aeromonas salmonicida subsp. salmonicida (the cause of furunculosis disease) in covertly infected salmonids is difficult and is a cause of concern for those involved in fish health inspection and resource management programs. In this study, we examined populations of brook trout Salvelinus fontinalis, Atlantic salmon Salmo salar, and lake trout Salvelinus namaycush that previously sustained natural episodes of furunculosis. Consequently, the sampled fish were presumed to harbor latent infections. Mucus, gill, liver, kidney, heart, spleen, and intestine samples (N = 100 fish per group sampled) were processed and examined by (1) direct dilution counts and (2) quadrant streaking after a 48-h pre-enrichment in trypticase soy broth (TSB). Another subsample of fish from each group was then subjected to stress-inducible furunculosis tests. Stress tests detected A. salmonicida in three of four groups of fish that were examined whereas the pathogen was detected in only two of the groups analyzed with culture-based assays. Although pre-enrichment in TSB enhanced detection within internal sampling sites including the liver, heart, spleen, and kidney, enrichment did not enhance detection from mucus, gill, or intestinal samples.

  17. The effect of covert changes in energy density of preloads on subsequent ad libitum energy intake in lean and obese human subjects. (United States)

    Durrant, M L; Royston, J P; Wloch, R T; Garrow, J S


    1. Covert changes in energy intake were made by giving preloads of disguised energy density three times daily to 14 obese and 6 lean subjects. 2. The preloads contained 2.51 MJ (600 kcal)/d on days 2 and 3 and either 3.77 MJ (900 kcal)/d or 1.26 MJ (300 kcal/d) on days 4 and 5 and 1.26 MJ (300 kcal)/d or 3.77 MJ (900 kcal)/d on days 6 and 7. The order of testing was alternated for each subject. 3. Subsequent energy intake at each meal (lunch, dinner and breakfast) was measured with an automated food-dispensing machine. 4. Overall the obese subjects ate significantly less from the machine, 3.28 +/- 1.89 MJ (785 +/- 452 kcal)/d, than the lean subjects, 6.03 +/- 1.26 MJ (1442 +/- 300 kcal)/d. 5. Both groups of subjects adjusted their energy intake in the right direction to counterbalance the effect of the preloads but the lean subjects changed their intake by an average of 0.74 MJ (176 kcal)/d compared with the obese subjects who changed their intake by an average of 0.29 MJ (70 kcal)/d. 6. Although the lean subjects were better at adjusting their energy intake than the obese subjects, regulation was still imprecise relative to the 2.51 MJ (600 kcal)/d difference in energy intake that was imposed. 7. There were no significant differences in hunger or appetite between subjects or test situations.

  18. Eating carbohydrate mostly at lunch and protein mostly at dinner within a covert hypocaloric diet influences morning glucose homeostasis in overweight/obese men. (United States)

    Alves, Raquel Duarte Moreira; de Oliveira, Fernanda Cristina Esteves; Hermsdorff, Helen Hermana Miranda; Abete, Itziar; Zulet, María Angeles; Martínez, José Alfredo; Bressan, Josefina


    To evaluate the effects of two dietary patterns in which carbohydrates and proteins were eaten mostly at lunch or dinner on body weight and composition, energy metabolism, and biochemical markers in overweight/obese men. Fifty-eight men (30.0 ± 7.4 years; 30.8 ± 2.4 kg/m(2)) followed a covert hypocaloric balanced diet (-10 % of daily energy requirements) during 8 weeks. Subjects were randomly assigned to three groups: control diet (CT); diurnal carbohydrate/nocturnal protein (DCNP); and nocturnal carbohydrate/diurnal protein (NCDP). Main analyzed outcomes were weight loss, body composition, diet-induced thermogenesis (DIT), and glucose/lipid profile. In all groups, a significant decrease in body weight, BMI, and fat mass (kg and %) was verified, without differences between groups. Interestingly, within group analyses showed that the fat-free mass (kg) significantly decreased in NCDP and in CT after 8-week intervention, but not in DCNP. A detrimental increase in fasting glucose, insulin, and homeostasis model assessment of insulin resistance (HOMAIR) was verified only in DCNP, while NCDP and CT groups presented a non-significant reduction. Moreover, significant differences between DCNP and the other groups were detected for fasting insulin and HOMAIR. After the adjustments, NCDP presented a significantly higher DIT and energy expenditure after lunch, compared with DCNP, but after dinner, there were no differences among groups. Eating carbohydrates mostly at dinner and protein mostly at lunch within a hypocaloric balanced diet had similar effect on body composition and biochemical markers, but higher effect on DIT compared with control diet. Moreover, eating carbohydrates mostly at lunch and protein mostly at dinner had a deleterious impact on glucose homeostasis.

  19. Temporal dynamics of sensorimotor integration in speech perception and production: Independent component analysis of EEG data

    Directory of Open Access Journals (Sweden)

    David eJenson


    Full Text Available Activity in premotor and sensorimotor cortices is found in speech production and some perception tasks. Yet, how sensorimotor integration supports these functions is unclear due to a lack of data examining the timing of activity from these regions. Beta (~20Hz and alpha (~10Hz spectral power within the EEG µ rhythm are considered indices of motor and somatosensory activity, respectively. In the current study, perception conditions required discrimination (same/different of syllables pairs (/ba/ and /da/ in quiet and noisy conditions. Production conditions required covert and overt syllable productions and overt word production. Independent component analysis was performed on EEG data obtained during these conditions to 1 identify clusters of µ components common to all conditions and 2 examine real-time event-related spectral perturbations (ERSP within alpha and beta bands. 17 and 15 out of 20 participants produced left and right µ-components, respectively, localized to precentral gyri. Discrimination conditions were characterized by significant (pFDR<.05 early alpha event-related synchronization (ERS prior to and during stimulus presentation and later alpha event-related desynchronization (ERD following stimulus offset. Beta ERD began early and gained strength across time. Differences were found between quiet and noisy discrimination conditions. Both overt syllable and word productions yielded similar alpha/beta ERD that began prior to production and was strongest during muscle activity. Findings during covert production were weaker than during overt production. One explanation for these findings is that µ-beta ERD indexes early predictive coding (e.g., internal modeling and/or overt and covert attentional / motor processes. µ-alpha ERS may index inhibitory input to the premotor cortex from sensory regions prior to and during discrimination, while µ-alpha ERD may index re-afferent sensory feedback during speech rehearsal and production.

  20. New Covert Channels in HTTP


    Bauer, Matthias


    This paper presents new methods enabling anonymous communication on the Internet. We describe a new protocol that allows us to create an anonymous overlay network by exploiting the web browsing activities of regular users. We show that the overlay network provides an anonymity set greater than the set of senders and receivers in a realistic threat model. In particular, the protocol provides unobservability in our threat model.

  1. Covert Action: A Systems Approach (United States)


    THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...21st Century Problems (Boca Rotan, FL: CRC Press, 2008), xix. 21 cognizing, analyzing, and synthesizing to ruminate on the systems that confront us...took great interest in their content .122 The surprise attack on Pearl Harbor in 1941 made BSC’s

  2. Artisanal alcohol production in Mayan Guatemala: Chemical safety evaluation with special regard to acetaldehyde contamination

    International Nuclear Information System (INIS)

    Kanteres, Fotis; Rehm, Juergen; Lachenmeier, Dirk W.


    There is a lack of knowledge regarding the composition, production, distribution, and consumption of artisanal alcohol, particularly in the developing world. In Nahuala, an indigenous Mayan municipality located in highland Guatemala, heavy alcohol consumption appears to have had a significant negative impact on health, a major role in cases of violence and domestic abuse, and a link to street habitation. Cuxa, an artisanally, as well as commercially produced sugarcane alcohol, is widely consumed by heavy drinkers in this community. Cuxa samples from all distribution points in the community were obtained and chemically analyzed for health-relevant constituents and contaminants including methanol, acetaldehyde, higher alcohols, and metals. From those, only acetaldehyde was confirmed to be present in unusually high levels (up to 126 g/hl of pure alcohol), particularly in samples that were produced clandestinely. Acetaldehyde has been evaluated as 'possibly carcinogenic' and has also been identified as having significant human exposure in a recent risk assessment. This study explores the reasons for the elevated levels of acetaldehyde, through both sampling and analyses of raw and intermediary products of cuxa production, as well as interviews from producers of the clandestine alcohol. For further insight, we experimentally produced this alcohol in our laboratory, based on the directions provided by the producers, as well as materials from the town itself. Based on these data, the origin of the acetaldehyde contamination appears to be due to chemical changes induced during processing, with the major causative factors consisting of poor hygiene, aerobic working conditions, and inadequate yeast strains, compounded by flawed distillation methodology that neglects separation of the first fractions of the distillate. These results indicate a preventable public health concern for consumers, which can be overcome through education about good manufacturing practices, as well

  3. Artisanal alcohol production in Mayan Guatemala: Chemical safety evaluation with special regard to acetaldehyde contamination

    Energy Technology Data Exchange (ETDEWEB)

    Kanteres, Fotis [Centre for Addiction and Mental Health (CAMH), 33 Russell Street, ARF 2035, Toronto, ON, Canada, M5S 2 S1 (Canada); Rehm, Juergen [Centre for Addiction and Mental Health (CAMH), 33 Russell Street, ARF 2035, Toronto, ON, Canada, M5S 2 S1 (Canada); Dalla Lana School of Public Health, University of Toronto, 155 College Street, Toronto, ON, Canada, M5T 3 M7 (Canada); Institute for Clinical Psychology and Psychotherapy, TU Dresden, Chemnitzer Strasse 46, D-01187 Dresden (Germany); Lachenmeier, Dirk W., E-mail: [Chemisches und Veterinaeruntersuchungsamt (CVUA) Karlsruhe, Weissenburger Strasse 3, D-76187 Karlsruhe (Germany)


    There is a lack of knowledge regarding the composition, production, distribution, and consumption of artisanal alcohol, particularly in the developing world. In Nahuala, an indigenous Mayan municipality located in highland Guatemala, heavy alcohol consumption appears to have had a significant negative impact on health, a major role in cases of violence and domestic abuse, and a link to street habitation. Cuxa, an artisanally, as well as commercially produced sugarcane alcohol, is widely consumed by heavy drinkers in this community. Cuxa samples from all distribution points in the community were obtained and chemically analyzed for health-relevant constituents and contaminants including methanol, acetaldehyde, higher alcohols, and metals. From those, only acetaldehyde was confirmed to be present in unusually high levels (up to 126 g/hl of pure alcohol), particularly in samples that were produced clandestinely. Acetaldehyde has been evaluated as 'possibly carcinogenic' and has also been identified as having significant human exposure in a recent risk assessment. This study explores the reasons for the elevated levels of acetaldehyde, through both sampling and analyses of raw and intermediary products of cuxa production, as well as interviews from producers of the clandestine alcohol. For further insight, we experimentally produced this alcohol in our laboratory, based on the directions provided by the producers, as well as materials from the town itself. Based on these data, the origin of the acetaldehyde contamination appears to be due to chemical changes induced during processing, with the major causative factors consisting of poor hygiene, aerobic working conditions, and inadequate yeast strains, compounded by flawed distillation methodology that neglects separation of the first fractions of the distillate. These results indicate a preventable public health concern for consumers, which can be overcome through education about good manufacturing practices

  4. Uranium and thorium mining and milling: material security and risk assessment

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Zaitseva, L.


    Full text: At present physical protection for the front end of the nuclear fuel cycle is typically at a significantly lower level than at any other part of the nuclear fuel cycle. In view of past experiences (Israel, South Africa, Pakistan, India) it is feasible to take into consideration some generic threat scenarios, potentially resulting in loss of control over uranium or thorium, respectively their concentrates, such as: illegal mining of an officially closed uranium- or thorium mine; covert diversion of uranium- or thorium ore whilst officially mining another ore; covert transport of radioactive ore or product, using means of public rail, road, ship, or air transport; covert en route diversion of an authorized uranium- or thorium transport; covert removal of uranium-or thorium ore or concentrate from an abandoned facility. The Stanford-Salzburg database on nuclear smuggling, theft, and orphan radiation sources (DSTO) contains information on trafficking incidents involving mostly uranium, but also some thorium, from 30 countries in five continents with altogether 113 incidents in the period 1991 to 2004. These activities range from uranium transported in backpacks by couriers in Afghanistan, to a terrorist organization purchasing land in order to mine covertly for uranium in Australia, and the clandestine shipment of almost two tons of uranium hexafluoride from Asia to Africa, using the services of a national airline. Potential participants in such illegal operations range from entrepreneurs to members of organized crime, depending on the level of sophistication of the operation. End-users and 'customers' of such illegal operations are suspected to be non-state actors, organizations or governments involved in a covert operation with the ultimate aim to acquire a sufficient amount of nuclear material for a nuclear device. The actual risk for these activities to succeed in the acquisition of an adequate amount of suitable radioactive material depends on one or

  5. Kr-85 signatures for various plutonium production schemes

    Energy Technology Data Exchange (ETDEWEB)

    Stanoszek, Paul [Carl Friedrich von Weizsaecker-Centre for Science and Peace Research (Germany)


    Kr-85 is considered to be the best atmospheric indicator of unreported weapon-grade material production. This fact is based on the half-life of 10.76 years of Kr-85 and its chemical inactivity, which makes it even detectable after extended periods of cooling time. Kr-85 is produced as fission product during nuclear reactor operation and remains in the fuel until reprocessing starts. In order to determine the detectability of plutonium production the Kr-85 source term has to be assessed. The important issue of this presentation is the question on the minimum signal that an inspector can expect under the assumption that a proliferator minimizes his Kr-85 generation in order to circumvent a Kr-85 detection. A further assumption is that for nuclear weapon production a burn-up of typically around 2 MWd/kg is used. In addition, if clandestine plutonium production takes place, the source term might be used to estimate the amount of separated plutonium. The methodology of this study is based on a linkage between MCNPX and MATLAB. All results for actinide concentrations and Kr-85 are evaluated for different enrichments of U-235 and compared to known literature data. The Kr-85 source term per kilogram plutonium depends on the enrichments. As a result the lowest Kr-85 source term is found for depleted uranium.

  6. Clandestine Readers: Boys and Girls Going "Undercover" in School Spaces (United States)

    Scholes, Laura


    Exploring the diverse nature of students' interpretations of their reading experiences, this study moves beyond broad generalizations about boys and girls to consider complexities inherent in the social processes that influence students' engagement in reading. While the study aimed to develop understandings about the ways notions of masculinity…

  7. Control and repression on clandestine immigration from North Africa


    María José Rodríguez Mesa


    By its geographic position, Spain is the forced way of thousands of North African and Sub-Saharan citizens who try to arrive and to settle in Europe. But, in addition, in the last years, Spain has become a receiving country of foreign citizens who, in a situation of regularity or of administrative irregularity remain more or less continuously in its territory. This fact, along with the restrictive criteria imposed by the European norms and the visa requirement from May 1991 for Moroccan subje...

  8. Clandestine nuclear trade and the threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Spector, L.S.


    The nuclear netherworld may ultimately contribute to the danger of nuclear terrorism in at least three ways. First, as national governments exploit this underground market and nuclear weapons spread to additional states, the possibility that terrorists will gain access to them will grow. Such weapons in nuclear threshold countries are likely to be more vulnerable to terrorist seizure than they are in today's more advanced nuclear weapons states. Second, terrorist groups might seek to exploit the nuclear gray market themselves, using the same subterfuges that national governments use. Although in today's nuclear netherworld, subnational groups cannot obtain nuclear arms or nuclear weapons material and cannot hope to build the complex installations needed to produce the latter, they might be able to engage in a form of barter with sympathetic emerging nuclear states (for example, offering raw materials or needed nuclear hardware in return for nuclear weapons material. Finally, there is always the risk that nuclear arms or nuclear weapon materials will someday become available on the nuclear black market. There is evidence indicating that terrorist organizations might well be interested in acquiring such items. Understanding underground nuclear commerce in its current form is essential to prevent such future dangers

  9. A System Shock Approach to Modelling Clandestine Network Disruption

    National Research Council Canada - National Science Library

    Dipper, Tamlan


    .... This model took as its focus the disruption of successful terrorist operations. In doing so it drew upon operational art, group behavioural studies, and psychological research into problem solving...

  10. Clandestine Bushmeat Trade in Cross River State, Nigeria ...

    African Journals Online (AJOL)

    This paper surveyed the herp species traded in secret bush meat markets of Cross River State, with the view of assessing their conservation status and uses they are put to. The study mainly focused on six selected communities in Akamkpa Local Government Area (LGA) of Cross Rivers State, Nigeria – the host LGA of ...

  11. Recreational drug discovery: natural products as lead structures for the synthesis of smart drugs. (United States)

    Appendino, Giovanni; Minassi, Alberto; Taglialatela-Scafati, Orazio


    Covering: up to December 2013. Over the past decade, there has been a growing transition in recreational drugs from natural materials (marijuana, hashish, opium), natural products (morphine, cocaine), or their simple derivatives (heroin), to synthetic agents more potent than their natural prototypes, which are sometimes less harmful in the short term, or that combine properties from different classes of recreational prototypes. These agents have been named smart drugs, and have become popular both for personal consumption and for collective intoxication at rave parties. The reasons for this transition are varied, but are mainly regulatory and commercial. New analogues of known illegal intoxicants are invisible to most forensic detection techniques, while the alleged natural status and the lack of avert acute toxicity make them appealing to a wide range of users. On the other hand, the advent of the internet has made possible the quick dispersal of information among users and the on-line purchase of these agents and/or the precursors for their synthesis. Unlike their natural products chemotypes (ephedrine, mescaline, cathinone, psilocybin, THC), most new drugs of abuse are largely unfamiliar to the organic chemistry community as well as to health care providers. To raise awareness of the growing plague of smart drugs we have surveyed, in a medicinal chemistry fashion, their development from natural products leads, their current methods of production, and the role that clandestine home laboratories and underground chemists have played in the surge of popularity of these drugs.

  12. Computationally-generated nuclear forensic characteristics of early production reactors with an emphasis on sensitivity and uncertainty

    International Nuclear Information System (INIS)

    Redd, Evan M.; Sjoden, Glenn; Erickson, Anna


    Highlights: •X-10 reactor is used as a case study for nuclear forensic signatures. •S/U analysis is conducted to derive statistically relevant markers. •Computationally-generated signatures aid with proliferation pathway identification. •Highest uncertainty in total plutonium production originates from 238 Pu and 242 Pu. -- Abstract: With nuclear technology and analysis advancements, site access restrictions, and ban on nuclear testing, computationally-generated nuclear forensic signatures are becoming more important in gaining knowledge to a reclusive country’s weapon material production capabilities. In particular, graphite-moderated reactors provide an appropriate case study for isotopics relevant in Pu production in a clandestine nuclear program due to the ease of design and low thermal output. We study the production characteristics of the X-10 reactor with a goal to develop statistically-relevant nuclear forensic signatures from early Pu production. In X-10 reactor, a flat flux gradient and low burnup produce exceptionally pure Pu as evident by the 240 Pu/ 239 Pu ratio. However, these design aspects also make determining reactor zone attribution, done with the 242 Pu/ 240 Pu ratio, uncertain. Alternatively, the same ratios produce statistically differentiable results between Manhattan Project and post-Manhattan Project reactor configurations, allowing for attribution conclusions.

  13. Understanding the role of speech production in reading: Evidence for a print-to-speech neural network using graphical analysis. (United States)

    Cummine, Jacqueline; Cribben, Ivor; Luu, Connie; Kim, Esther; Bahktiari, Reyhaneh; Georgiou, George; Boliek, Carol A


    The neural circuitry associated with language processing is complex and dynamic. Graphical models are useful for studying complex neural networks as this method provides information about unique connectivity between regions within the context of the entire network of interest. Here, the authors explored the neural networks during covert reading to determine the role of feedforward and feedback loops in covert speech production. Brain activity of skilled adult readers was assessed in real word and pseudoword reading tasks with functional MRI (fMRI). The authors provide evidence for activity coherence in the feedforward system (inferior frontal gyrus-supplementary motor area) during real word reading and in the feedback system (supramarginal gyrus-precentral gyrus) during pseudoword reading. Graphical models provided evidence of an extensive, highly connected, neural network when individuals read real words that relied on coordination of the feedforward system. In contrast, when individuals read pseudowords the authors found a limited/restricted network that relied on coordination of the feedback system. Together, these results underscore the importance of considering multiple pathways and articulatory loops during language tasks and provide evidence for a print-to-speech neural network. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  14. GC-MS quantitative analysis of black market pharmaceutical products containing anabolic androgenic steroids seized by the Brazilian Federal Police. (United States)

    Neves, Diana Brito da Justa; Caldas, Eloisa Dutra


    The use of counterfeit or substandard medicines can have an important health impact, resulting in therapeutic failure, be toxic or even cause death. Anabolic steroids are a frequent target for counterfeiters worldwide, being the second most frequent counterfeited class in Brazil. The aims of this work were to optimize and validate a GC-MS method for the quantitative determination of anabolic steroids in tablet, aqueous suspension and oil solution forms, and to analyze pharmaceutical products sent to Brazilian Federal Police (BFP) for forensic analysis. Sample preparation included extraction with methanol in ultrasonic bath followed by centrifugation. The method was successfully validated and 345 samples of pharmaceutical products were analyzed (328 medicines and 17 dietary supplements). About 42% of the medicines were counterfeits, 28.7% of tablets, 12.0% of suspensions and 65.2% of oil solutions; 11% were considered substandards. Five dietary supplements contained undeclared anabolic steroids, including two containing methandrostenolone at 5.4 and 5.8mg/capsule, equivalent to levels found in medicines. The proposed method is suitable for implementation in routine analysis for identification of counterfeits and substandard products. The analytical results show the need to raise awareness of consumers over the risks from the consumption of anabolic steroids from the clandestine market and for more incisive actions from government agencies aiming at decreasing the availability of these products. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Cachexia and anorexia: cancer's covert killer. (United States)

    Davis, M P; Dickerson, D


    Cachexia and anorexia are often not observed at the time of diagnosis of cancer. While the initial medical intervention for cancer patients includes antitumor therapy and pain management, the consequences of cachexia and anorexia may be ignored, to the detriment of the patient's quality of life and his or her potential response to chemotherapy. The importance of a well-defined therapeutic strategy to treat cachexia is in order if the patient's overall wellbeing is to improve. Presented is a review of the pharmacological management of anorexia and cachexia, including a four-step ladder approach to medical management.

  16. Behavior Modification Through Covert Semantic Desensitization (United States)

    Hekmat, Hamid; Vanian, Daniel


    Results support the hypothesized relationship between meaning and phobia. Semantic desensitization techniques based on counter conditioning of meaning were significantly effective in altering the semantic value of the word from unpleasantness to neutrality. (Author)

  17. Scalable System Design for Covert MIMO Communications (United States)


    Vehicles US United States VHDL VHSIC Hardware Description Language VLSI Very Large Scale Integration WARP Wireless open-Access Research Platform WLAN ...communications, satellite radio and Wireless Local Area Network ( WLAN ) OFDM has been utilized for its multi-path resistance. OFDM relies on the...develop hardware specific to the application provides faster computation times, making FPGA development a very powerful tool. 2.5.1 MIMO Receiver Latency

  18. A multi-objective particle swarm optimization for production-distribution planning in supply chain network

    Directory of Open Access Journals (Sweden)

    Alireza Pourrousta


    Full Text Available Integrated supply chain includes different components of order, production and distribution and it plays an important role on reducing the cost of manufacturing system. In this paper, an integrated supply chain in a form of multi-objective decision-making problem is presented. The proposed model of this paper considers different parameters with uncertainty using trapezoid numbers. We first implement a ranking method to covert the fuzzy model into a crisp one and using multi-objective particle swarm optimization, we solve the resulted model. The results are compared with the performance of NSGA-II for some randomly generated problems and the preliminary results indicate that the proposed model of the paper performs better than the alternative method.

  19. A Theory of Dark Network Design (United States)


    nuances of clandestine and covert activities, see James McCargar, "Part 1: Fundementals and Forms of Action," in A Short Course in the Secret War, 15– setting for business operations due to their overall level of munificence and richness in investment and marketing opportunities. A light...unprofitable while at the same time curbing long term financial investment in our country. 171 John Horgan, and

  20. Small scale production of vegetal coal in the state of Amazonas, Brazil: legal and social-economical aspects; Producao de carvao vegetal em pequena escala no Amazonas: aspectos legais e socio-ambientais

    Energy Technology Data Exchange (ETDEWEB)

    Lima, Roberto Ferreira de; Souza, Rubem Cesar Rodrigues de [Amazonas Univ., Manaus, AM (Brazil). Nucleo de Eficiencia Energetica (NEFEN)]. E-mail:


    Being a form of cheap energy, abundant and accessible, the vegetable coal is quite often used generally in the urban and rural areas in the Amazonas state, domestic and commercial use as well. Several families live of the production activity and commercialization of vegetable coal inside the State of Amazonas. However, actions of government organs of the environment area turn more and more difficult the exercise of those activities, creating a situation of clandestine production and in some cases making unfeasible the only form of subsistence of several families. Besides the legal aspect there exist the low technological level, being the production of vegetable coal done in ovens of the type 'hot tail', which cause problems for the users health. The mentioned subjects are discussed in that work based on the study accomplished at three places producing the vegetable coal in the the State of Amazonas hinter side, in the proximities of Manaus. Through the information obtained in the communities a proposal is presented for the small scale production of vegetable coal in a economical, social and environmentally self sustainable way. (author)

  1. HelioTrope: An innovative and efficient prototype for solar power production

    Directory of Open Access Journals (Sweden)

    Papageorgiou George


    Full Text Available The solar energy alternative could provide us with all the energy we need as it exist in vast quantities all around us. We only should be innovative enough in order to improve the efficiency of our systems in capturing and converting solar energy in usable forms of power. By making a case for the solar energy alternative, we identify areas where efficiency can be improved and thereby Solar Energy can become a competitive energy source. This paper suggests an innovative approach to solar energy power production, which is manifested in a prototype given the name HelioTrope. The Heliotrope Solar Energy Production prototype is tested on its' capabilities to efficiently covert solar energy to generation of electricity and other forms of energy for storage or direct use. HelioTrope involves an innovative Stirling engine design and a parabolic concentrating dish with a sun tracking system implementing a control algorithm to maximize the capturing of solar energy. Further, it utilizes a patent developed by the authors where a mechanism is designed for the transmission of reciprocating motion of variable amplitude into unidirectional circular motion. This is employed in our prototype for converting linear reciprocating motion into circular for electricity production, which gives a significant increase in efficiency and reduces maintenance costs. Preliminary calculations indicate that the Heliotrope approach constitutes a competitive solution to solar power production.

  2. Identification of Eight Synthetic Cannabinoids, Including 5F-AKB48 in Seized Herbal Products Using DART-TOF-MS and LC-QTOF-MS as Nontargeted Screening Methods. (United States)

    Moore, Katherine N; Garvin, Demetra; Thomas, Brian F; Grabenauer, Megan


    Synthetic cannabinoids are sprayed onto plant material and smoked for their marijuana-like effects. Clandestine manufacturers modify synthetic cannabinoid structures by creating closely related analogs. Forensic laboratories are tasked with detection of these analog compounds, but targeted analytical methods are often thwarted by the structural modifications. Here, direct analysis in real time coupled to accurate mass time-of-flight mass spectrometry (DART-TOF-MS) in combination with liquid chromatography quadruple time-of-flight mass spectrometry (LC-QTOF-MS) are presented as a screening and nontargeted confirmation method, respectively. Methanol extracts of herbal material were run using both methods. Spectral data from four different herbal products were evaluated by comparing fragmentation pattern, accurate mass and retention time to available reference standards. JWH-018, JWH-019, AM2201, JWH-122, 5F-AKB48, AKB48-N-(4-pentenyl) analog, UR144, and XLR11 were identified in the products. Results demonstrate that DART-TOF-MS affords a useful approach for rapid screening of herbal products for the presence and identification of synthetic cannabinoids. © 2017 American Academy of Forensic Sciences.

  3. Tobacco Products (United States)

    ... Exposure is High in Multiunit Housing Smokeless Products Electronic Cigarettes Youth Tobacco Prevention Tobacco Products Tobacco Ingredient ... Tweet Share Compartir Find Fact Sheets on Products (Cigars, Bidis and Betel Quid with Tobacco (Gutka) and ...

  4. Production of Modularised Product Systems

    DEFF Research Database (Denmark)

    Jacobsen, Peter


    but a solution. Modularisation is one tool used in designing the products. Designing and controlling a production system making customized products in an economical way is not an easy task. In order to fulfil the Lean and Agile manufacturing philosophies the production is often carried out in networks. Here...

  5. Normalization of NDVI from Different Sensor System using MODIS Products as Reference

    International Nuclear Information System (INIS)

    Wenxia, Gan; Liangpei, Zhang; Wei, Gong; Huanfeng, Shen


    Medium Resolution NDVI(Normalized Difference Vegetation Index) from different sensor systems such as Landsat, SPOT, ASTER, CBERS and HJ-1A/1B satellites provide detailed spatial information for studies of ecosystems, vegetation biophysics, and land cover. Limitation of sensor designs, cloud contamination, and sensor failure highlighted the need to normalize and integrate NDVI from multiple sensor system in order to create a consistent, long-term NDVI data set. In this paper, we used a reference-based method for NDVI normalization. And present an application of this approach which covert Landsat ETM+ NDVI calculated by digital number (NDVI DN ) to NDVI calculated by surface reflectance (NDVI SR ) using MODIS products as reference, and different cluster was treated differently. Result shows that this approach can produce NDVI with highly agreement to NDVI calculated by surface reflectance from physical approaches based on 6S (Second Simulation of the satellite Signal in the Solar Spectrum). Although some variability exists, the cluster specified reference based approach shows considerable potential for NDVI normalization. Therefore, NDVI products in MODIS era from different sources can be combined for time-series analysis, biophysical parameter retrievals, and other downstream analysis

  6. Product Customization

    DEFF Research Database (Denmark)

    Hvam, Lars; Mortensen, Niels Henrik; Riis, Jesper

    For the majority of industrial companies, customizing products and services is among the most critical means to deliver true customer value and achieve superior competitive advantage. The challenge is not to customize products and services in itself – but to do it in a profitable way...... from more than 40 product configuration projects in companies providing customer tailored products and services........ The implementation of a product configuration system is among the most powerful ways of achieving this in practice, offering a reduction of the lead time for products and quotations, faster and more qualified responses to customer inquiries, fewer transfers of responsibility and fewer specification mistakes...

  7. Workforce productivity. (United States)

    Williams, Ruth


    Managers who are responsible for delivering the workforce productivity element of the Quality, Innovation, Productivity and Prevention (QIPP) programme can network and share best practice through a dedicated NHS Employers webpage.

  8. Primary productivity

    Digital Repository Service at National Institute of Oceanography (India)

    Verlecar, X.N.; Parulekar, A.H.

    Photosynthetic production in the oceans in relation to light, nutrients and mixing processes is discussed. Primary productivity in the estuarine region is reported to be high in comparison to coastal and oceanic waters. Upwelling phenomenon...

  9. Technologies for the Detection and Monitoring of Clandestine Underground Tunnels, Fall 2007 - Project 07-03 (United States)


    entrepreneurial skills, and provide microfinance loans to them to start new businesses.178 These initiatives can help provide more opportunities for Mexican... tubes from a tunnel complex.”192 On December 15, 2007, the U.S. military reported that a search operation northwest of Baghdad discovered tunnels with

  10. Simulation of atmospheric krypton-85 transport to assess the detectability of clandestine nuclear reprocessing

    Energy Technology Data Exchange (ETDEWEB)

    Ross, Jens Ole


    The radioactive noble gas krypton-85 is released into the atmosphere during reprocessing of spent nuclear fuel or irradiated breeding targets. This is a necessary step for plutonium separation. Therefore the {sup 85}Kr signature of reprocessing could possibly be used for the detection of undeclared nuclear facilities producing nuclear weaponusable material. The {sup 85}Kr content of the atmosphere has grown over the last decades as the emissions from military and civilian nuclear industry could not be compensated by the decay with a half-life of 10.76 years. In this study, the global {sup 85}Kr background distribution due to emissions of known reprocessing facilities for the period from 1971 until 2006 was simulated using the atmospheric general circulation model ECHAM5 applying the newest available annual emission data. The convective tracer transport scheme and the operator splitting for the physical calculations in the model were modified in order to guarantee physically correct results for tracer point sources, in particular non negative concentrations. An on-line routine controlling the {sup 85}Kr -budget in the model enforced exact mass conservation. The results of the simulation were evaluated by extensive comparison with measurements performed by the German Federal Office for Radiation Protection with very good agreement at most observation sites except those in the direct vicinity of {sup 85}Kr sources. Of particular interest for the {sup 85}Kr detection potential was the variability of {sup 85}Kr background concentrations which was evaluated for the first time in a global model. In addition, the interhemispheric transport as simulated by ECHAM5 was analyzed using a two-box model providing a mean exchange time of τ {sub ex} = 10.5 months. The analysis of τ{sub ex} over simulated 35 years indicates that in years with strong South Asian or African Monsoon the interhemispheric transport is faster during the monsoon season. A correlation analysis of interhemispheric transport time with the Southern Oscillation Index and other climate indices over the 35 year period does not show statistically significant correlations. The potential detectability of emissions from a set of specified source locations was investigated for a hypothetical inspection scenario which allows to take samples close to the concentration maximum of the plumes. For this part of the study, the Lagrangian particle dispersion model HYSPLIT was used. In combination with the location specific background variability derived from ECHAM5, minimum detectable {sup 85}Kr releases are calculated depending on the time after release and the distance of the plume center from the hypothetical source location. The results show that the smallest of the {sup 85}Kr reference releases, 3.2 TBq, is potentially detectable within 24 hours after stop of release in most cases. The detection probability decreases significantly during the following days. In presence of favorable background conditions as predicted on the Southern Hemisphere, {sup 85}Kr plumes stay detectable even about several thousand kilometers from the source location in some cases. These results serve as first benchmark on the capability of using {sup 85}Kr for IAEA Safeguards on the Non-Proliferation Treaty and its possible contribution to the verification of a future Fissile Material Cut-off Treaty.

  11. Surface Coatings as Xenon Diffusion Barriers for Improved Detection of Clandestine Nuclear Explosions


    Bläckberg, Lisa


    This thesis investigates surface coatings as xenon diffusion barriers on plastic scintillators. The motivation for the work is improved radioxenon detection systems, used within the verification regime of the Comprehensive Nuclear-Test-Ban Treaty (CTBT). One type of radioxenon detection systems used in this context is the Swedish SAUNA system. This system uses a cylindrical plastic scintillator cell to measure the beta decay from radioxenon isotopes. The detector cell also acts as a container...


    Directory of Open Access Journals (Sweden)

    Ali Faleh


    Full Text Available La migración irregular llega a ser la forma dominante de los flujos migratorios con destino a los países de la Unión Europea, y altera las relaciones entre las dos riveras del Estrecho de Gibraltar: Marruecos y España. El presente artículo aborda el análisis del fl ujo migratorio subsahariano en tránsito por Marruecos, la descripción del perfil sociodemográfico de los migrantes, así como el conocimiento de los motivos de partida, itinerarios y condiciones de vida en Marruecos de los retornados subsaharianos así como sus aspiraciones.

  13. Examining Clandestine Social Networks for the Presence of Non-Random Structure

    National Research Council Canada - National Science Library

    Seder, Joshua S


    .... The proposed hypothesis testing framework is employed to statistically quantify a given partition's relativity in explaining the variability in the observed adjacency matrix relative to what can be explained by chance...

  14. Product (RED)

    DEFF Research Database (Denmark)

    Ponte, Stefano


    ) and the consumers who buy iconic brand products to help ‘distant others’. While in many other forms of causumerism, labels or certification systems ‘prove’ that a product is just, in RED, aid celebrities provide the proof. From the consumer point of view both labels and celebrities provide a similar simplification...... of complex social, economic, and environmental processes. At the same time, we argue that there are important distinctions as well—labels and certifications are ultimately about improving the conditions of production, whereas RED is about accepting existing production and trade systems and donating......(PRODUCT)RED™ (hereafter RED) is a cobranding initiative launched in 2006 by the aid celebrity Bono to raise money from product sales to support The Global Fund to Fight AIDS, Tuberculosis and Malaria. In this paper we argue that RED is shifting the boundaries of ‘causumerism’ (shopping...

  15. Generalized product


    Greco, Salvatore; Mesiar, Radko; Rindone, Fabio


    Aggregation functions on [0,1] with annihilator 0 can be seen as a generalized product on [0,1]. We study the generalized product on the bipolar scale [–1,1], stressing the axiomatic point of view. Based on newly introduced bipolar properties, such as the bipolar increasingness, bipolar unit element, bipolar idempotent element, several kinds of generalized bipolar product are introduced and studied. A special stress is put on bipolar semicopulas, bipolar quasi-copulas and bipolar copulas.

  16. Swine production. (United States)

    Plain, Ronald L; Lawrence, John D


    The US swine industry is large and growing. The quantity of pork desired by consumers of US pork is growing at the rate of 1.5%/y. New production systems and new technology have enabled production per sow to grow at a rate of 4% annually in recent years. Consequently, the number of sows in the United States is declining. Because productivity growth is outpacing demand growth, the deflated price of hogs and pork is declining. Hog production and prices continue to exhibit strong seasonal and cyclic patterns. Pork production is usually lowest in the summer and highest in the fall. Production and prices tend to follow 4-year patterns. The US swine industry continues to evolve toward fewer and larger producers who rely on contracts for both hog production and marketing. In 2000, over half of the hogs marketed were from approximately 156 firms marketing more than 50,000 head annually. These producers finished 60% of their production in contract facilities. Over 90% of their marketings were under contract or were owned by a packer. These producers expressed a high level of satisfaction with hog production. Both they and their contract growers were satisfied with production contracts. These large producers were satisfied with their marketing contracts and planned to continue them in the future. The hog industry has changed a great deal in the last decade. There is little reason to believe this rapid rate of change will not continue. This swine industry is highly competitive and profit driven. Profit margins are too small to allow producers the luxury of ignoring new technology and innovative production systems. Consequently, hog production will continue its rapid evolution from traditional agriculture to typical industry.

  17. Biomass production from electricity using ammonia as an electron carrier in a reverse microbial fuel cell.

    Directory of Open Access Journals (Sweden)

    Wendell O Khunjar

    Full Text Available The storage of renewable electrical energy within chemical bonds of biofuels and other chemicals is a route to decreasing petroleum usage. A critical challenge is the efficient transfer of electrons into a biological host that can covert this energy into high energy organic compounds. In this paper, we describe an approach whereby biomass is grown using energy obtained from a soluble mediator that is regenerated electrochemically. The net result is a separate-stage reverse microbial fuel cell (rMFC that fixes CO₂ into biomass using electrical energy. We selected ammonia as a low cost, abundant, safe, and soluble redox mediator that facilitated energy transfer to biomass. Nitrosomonas europaea, a chemolithoautotroph, was used as the biocatalyst due to its inherent capability to utilize ammonia as its sole energy source for growth. An electrochemical reactor was designed for the regeneration of ammonia from nitrite, and current efficiencies of 100% were achieved. Calculations indicated that overall bioproduction efficiency could approach 2.7±0.2% under optimal electrolysis conditions. The application of chemolithoautotrophy for industrial bioproduction has been largely unexplored, and results suggest that this and related rMFC platforms may enable biofuel and related biochemical production.

  18. Antiproton production

    International Nuclear Information System (INIS)

    Allaby, J.V.


    The basic definitions used in the physics literature on particle production are reviewed. The data on anti p production are interpreted in order to provide an estimate of the yield of anti p's from typical target at the antiproton accumulator, including the effects of re-absorption in the target. (orig.)

  19. Radioisotope production

    International Nuclear Information System (INIS)


    The trial production runs started in the previous report period were continued and have been extended to 67 Ga, 81 Rb/ 81m Kr and 111 In, the production of which will be taken over from the Pretoria cyclotron at the end of this year, when that machine is scheduled to be shut down. After commissioning of the target water cooling system and the helium cooling system for beam foil windows at the beginning of this year, these production runs could also be extended to high beam currents (up to 50 μA). Test consignments of a number of products have been supplied to various potential future users, and 123 I, in the form of Na 123 I capsules as well as 123 I-sodium hippurate, and 52 Fe-citrate have actually been used with success in trial diagnostic studies on patients. A procedure for labelling IPPA and 3-IPMPA with 123 I has been developed, while initial work has also been done on the radioiodination of monoclonal antifibrine antibodies. The last major facility needed for the commencement of the routine radioisotope production programme, namely the multiple-target facility, is now ready for installation in the production vault within the next few weeks, and routine production runs are expected to start in November 1988. 4 figs., 18 refs

  20. Ethanol production

    Energy Technology Data Exchange (ETDEWEB)

    Kolleurp, F; Daugulis, A J


    Extractive fermentation is a technique that can be used to reduce the effect of end-product inhibition through the use of a water-immiscible phase which removes fermentation products in situ. This has the beneficial effect of not only removing inhibitory products as they are formed (thus keeping reaction rates high) but also has the potential for reducing product recovery costs. We have chosen to examine the ethanol fermentation as a model system for end product inhibition and extractive fermentation, and have developed a computer model predicting the productivity enhancement possible with this technique. The model predicts an ethanol productivity of 82.6 g/L-h if a glucose feed of 750 g/L is fermented with a solvent having a distribution coefficient of 0.5 at a dilution rate of 5.0 h . This is more than 10 times higher than for a conventional chemostat fermentation of a 250 g/L glucose feed. In light of this, a systematic approach to extractive fermentation has been undertaken involving the screening of more than 1,000 solvents for their extractive properties. UNIFAC and UNIQUAC estimates of distribution coefficients and selectivities were compiled and ranked in a database, together with other important physical properties, such as density, surface tension and viscosity. Preliminary shake-flask and chemostat biocompatibility studies on the most promising solvents have been undertaken. The previous predictive, data base and experimental results are discussed.

  1. Product plots. (United States)

    Wickham, Hadley; Hofmann, Heike


    We propose a new framework for visualising tables of counts, proportions and probabilities. We call our framework product plots, alluding to the computation of area as a product of height and width, and the statistical concept of generating a joint distribution from the product of conditional and marginal distributions. The framework, with extensions, is sufficient to encompass over 20 visualisations previously described in fields of statistical graphics and infovis, including bar charts, mosaic plots, treemaps, equal area plots and fluctuation diagrams. © 2011 IEEE

  2. Tanning Products (United States)

    ... must obtain a signed, FDA-prescribed risk acknowledgement certification before use that states that they have been informed of the risks to health that may result from use of sunlamp products. Using tanning lamps, booths, or beds: If you ...

  3. Bc production

    International Nuclear Information System (INIS)

    Lusignoli, M.; Masetti, M.; Petrarca, S.


    The pseudoscalar meson B c is the simplest particle containing more than one heavy quark of different flavours. Its production cross sections at accelerators presently running or in project are estimated using the HERWIG parton shower Monte Carlo code. (orig.)

  4. Production models

    DEFF Research Database (Denmark)

    Svensson, Carsten


    The Project is co-financed with Nilpeter A/S and investigates the industrialization of build to order production. Project content: - Enterprise engineering - Specification processes - Mass Customization/ Build To Order - Knowledge/information management - Configuration - Supply Chain Management...

  5. Marketplace Products (United States)

    U.S. Department of Health & Human Services — The Office of Enterprise Data and Analytics, within the Centers for Medicare aqnd Medicaid Services (CMS), has developed a set of information products and analytics...

  6. Lean production


    Veselková, Jana


    The goal of this Bachelor's Thesis is to describe the general principles of lean production and afterwards apply these principles in a particular company. Due to the changing conditions on the world market is among companies growing concern about such innovative business systems. The theoretical part of this work deals with the general characteristics of lean production, including their history and focus on Toyota, as the originator of most lean systems. Mentioned are also the economic aspect...

  7. Productive Gaming


    Brandstätter , Ulrich; Sommerer , Christa


    Part 4: Short Papers; International audience; Video games can be appropriated for productive purposes. Commercial games and game engines are often used for video productions, and game development companies provide development kits and modding environments to gaming communities and independent developers. With gamification, game principles are deployed in non-game contexts for benefits beyond pure entertainment. Most approaches are more focused on using games and their design elements rather t...

  8. Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles


    de Fuentes, Jose Maria; Blasco, Jorge; González-Tablas, Ana Isabel; González-Manzano, Lorena


    Vehicular ad hoc networks (VANETs) are a new communication scenario in which vehicles take an active part. Real-time reporting of misbehaving vehicles by surrounding ones is enabled by in-vehicle sensors and VANETs. Thus, sensors allow detecting the misbehavior whereas VANETs allow sending the report to the authority. Nevertheless, these reports should pass unnoticed by the reported driver to avoid his/her potential reprisals. Information hiding techniques could be used to allow vehicles to t...

  9. Covert Channels and Simple Timed Mix-Firewalls

    National Research Council Canada - National Science Library

    Newman, Richard


    Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a particular message (anonymity set size...

  10. Investigation on Covert Channel Attacks and Countermeasures in the Cloud (United States)


    security and privacy in general are major concerns that impede enterprise adaptation of shared or public cloud computing . Specifically, the concern of...transformative rethinking of the current information security and privacy issues in the cloud beyond traditional detection and prevention techniques. 2...Journal on Selected Areas in Communications (JSAC), Special Issue on Networking Challenges in Cloud Computing Sys- tems and Applications, December 2013

  11. Schizophrenia, Obsessive Covert Mental Rituals and Social Anxiety: Case Report (United States)

    Tully, Phillip J.; Edwards, Christopher J.


    This case study reports the outcomes of cognitive therapy for social anxiety in a 45-year-old man with a 27-year history of paranoid schizophrenia. The intervention targeted the overlapping and interrelated symptoms of social anxiety and delusional beliefs. After 11 sessions of treatment, the patient showed no improvement in social anxiety,…

  12. Lateralized electrical brain activity reveals covert attention allocation during speaking

    NARCIS (Netherlands)

    Rommers, J.; Meyer, A.S.; Praamstra, P.


    Speakers usually begin to speak while only part of the utterance has been planned. Earlier work has shown that speech planning processes are reflected in speakers' eye movements as they describe visually presented objects. However, to-be-named objects can be processed to some extent before they have

  13. Covert spatial attention is functionally intact in amblyopic human adults


    Roberts, Mariel; Cymerman, Rachel; Smith, R. Theodore; Kiorpes, Lynne; Carrasco, Marisa


    Certain abnormalities in behavioral performance and neural signaling have been attributed to a deficit of visual attention in amblyopia, a neurodevelopmental disorder characterized by a diverse array of visual deficits following abnormal binocular childhood experience. Critically, most have inferred attention's role in their task without explicitly manipulating and measuring its effects against a baseline condition. Here, we directly investigate whether human amblyopic adults benefit from cov...

  14. Covert Channels and Simple Timed Mix-Firewalls

    National Research Council Canada - National Science Library

    Newman, Richard


    .... Initial work considered a simple model where an observer (Eve) was restricted to counting the number of messages leaving a Mix configured as a firewall guarding the enclave with one malicious sender (Alice) and some other naive senders (Clueless's). Here, we consider the case where Eve can distinguish between multiple destinations, and the senders can select to which destination their message (if any) is sent each clock tick.

  15. Content-Based Covert Group Detection in Social Networks (United States)


    The students took courses in natural language processing, data mining in various multi-media data sets, text retrieval, text summarization and... mining in social media including: we performed work, on (a) diffusion in social networks, (b) influence maximization in signed social networks, (c...Learning, Information Retrieval, Data Mining and Database. There are 8,293 messages. Our method outperformed state of the art methods based on content

  16. Covert brand recognition engages emotion-specific brain networks. (United States)

    Casarotto, Silvia; Ricciardi, Emiliano; Romani, Simona; Dalli, Daniele; Pietrini, Pietro


    Consumer goods' brands have become a major driver of consumers' choice: they have got symbolic, relational and even social properties that add substantial cultural and affective value to goods and services. Therefore, measuring the role of brands in consumers' cognitive and affective processes would be very helpful to better understand economic decision making. This work aimed at finding the neural correlates of automatic, spontaneous emotional response to brands, showing how deeply integrated are consumption symbols within the cognitive and affective processes of individuals. Functional magnetic resonance imaging (fMRI) was measured during a visual oddball paradigm consisting in the presentation of scrambled pictures as frequent stimuli, colored squares as targets, and brands and emotional pictures (selected from the International Affective Picture System [IAPS]) as emotionally-salient distractors. Affective rating of brands was assessed individually after scanning by a validated questionnaire. Results showed that, similarly to IAPS pictures, brands activated a well-defined emotional network, including amygdala and dorsolateral prefrontal cortex, highly specific of affective valence. In conclusion, this work identified the neural correlates of brands within cognitive and affective processes of consumers.

  17. Covert Diplomacy Between Israel and Egypt During Nasser Rule

    Directory of Open Access Journals (Sweden)

    Ido Yahel


    Full Text Available The history of Egypt and Israel consists of four wars and hundreds of border incidents that have taken the lives of tens of thousands of people. It seems that only the rise to power of a leader in the stature of Anwar Sadat could put an end to this bloody circle, because the previous president, Gamal Abdel Nasser, was not willing to hold any kind of political contact with Israel. But Nasser’s reign involved constant political contact between Egypt and Israel, most of whom remain confidential. This article attempts to examine whether any of these contacts were likely to succeed and yield a peace treaty between the two countries, an agreement that could have prevented three wars and saved the lives of so many people on both sides. It will do so by examining these contacts, their characteristics, and the reasons for their failure, while dividing them into three periods: the 1948 war to the 1956 war, the 1956 war to the 1967 war, and the 1967 war to the death of Nasser in 1970.

  18. Covert oculo-manual coupling induced by visually guided saccades.

    Directory of Open Access Journals (Sweden)

    Luca eFalciati


    Full Text Available Hand pointing to objects under visual guidance is one of the most common motor behaviors in everyday life. In natural conditions, gaze and arm movements are commonly aimed at the same target and the accuracy of both systems is considerably enhanced if eye and hand move together. Evidence supports the viewpoint that gaze and limb control systems are not independent but at least partially share a common neural controller. The aim of the present study was to verify whether a saccade execution induces excitability changes in the upper-limb corticospinal system (CSS, even in the absence of a manual response. This effect would provide evidence for the existence of a common drive for ocular and arm motor systems during fast aiming movements. Single-pulse TMS was applied to the left motor cortex of 19 subjects during a task involving visually guided saccades, and motor evoked potentials (MEPs induced in hand and wrist muscles of the contralateral relaxed arm were recorded. Subjects had to make visually guided saccades to one of 6 positions along the horizontal meridian (±5°, ±10° or ±15°. During each trial, TMS was randomly delivered at one of 3 different time delays: shortly after the end of the saccade or 300 ms or 540 ms after saccade onset. Fast eye movements towards a peripheral target were accompanied by changes in upper-limb CSS excitability. MEP amplitude was highest immediately after the end of the saccade and gradually decreased at longer TMS delays. In addition to the change in overall CSS excitability, MEPs were specifically modulated in different muscles, depending on the target position and the TMS delay. By applying a simple model of a manual pointing movement, we demonstrated that the observed changes in CSS excitability are compatible with the facilitation of an arm motor program for a movement aimed at the same target of the gaze. These results provide evidence in favor of the existence of a common drive for both eye and arm motor systems.

  19. A covert authentication and security solution for GMOs. (United States)

    Mueller, Siguna; Jafari, Farhad; Roth, Don


    Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.

  20. Covert Action Lead -- Central Intelligence Agency or Special Forces (United States)


    designed, people will blame the action on the wrong party (the enemy). Thus, public opinion will be won over to the side that actually did the killing ...mountain warfare. The FSSF training was conducted at Fort William Henry Harrison in Helena, Montana. The FSSF was activated for Project Plough , which

  1. Visual working memory is disrupted by covert verbal retrieval

    NARCIS (Netherlands)

    Ricker, Timothy J.; Cowan, Nelson; Morey, Candice C.

    If working memory (WM) depends on a central resource as is posited in some theories, but not in others it should be possible to observe interference between tasks that share few features with each other. We investigated whether interference with WM for visual arrays would occur, even if the

  2. HIL evaluation of control unit in grid-tied coverters

    Directory of Open Access Journals (Sweden)

    Porobić Vlado B.


    Full Text Available Hardware-in-the-Loop (HIL emulation is poised to become unsurpassed design tool for development, testing, and optimization of real-time control algorithms for grid connected power electronics converters for distributed generation, active filters and smart grid applications. It is strongly important to examine and test how grid connected converters perform under different operating conditions including grid disturbances and faults. In that sense, converter’s controller is a key component responsible for ensuring safe and high-performance operation. This paper demonstrates an example how ultra-low latency and high fidelity HIL emulator is used to easily, rapidly and exhaustively test and validate standard control strategy for grid connected power electronics converters, without need for expensive hardware prototyping and laboratory test equipment. [Projekat Ministarstva nauke Republike Srbije, br. III 042004 and by the Provincial Secretariat for Science and Technological Development of AP Vojvodina under contract No. 114-451-3508/2013-04

  3. Practical Algorithms for Subgroup Detection in Covert Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah; Wiil, Uffe Kock; Qureshi, Pir Abdul Rasool


    In this paper, we present algorithms for subgroup detection and demonstrated them with a real-time case study of USS Cole bombing terrorist network. The algorithms are demonstrated in an application by a prototype system. The system finds associations between terrorist and terrorist organisations...... and is capable of determining links between terrorism plots occurred in the past, their affiliation with terrorist camps, travel record, funds transfer, etc. The findings are represented by a network in the form of an Attributed Relational Graph (ARG). Paths from a node to any other node in the network indicate...

  4. Anti-infective medicine quality: analysis of basic product quality by approval status and country of manufacture

    Directory of Open Access Journals (Sweden)

    Bate R


    Full Text Available Roger Bate,1 Lorraine Mooney,2 Kimberly Hess,3 Julissa Milligan,1 Amir Attaran41American Enterprise Institute, Washington DC, USA; 2Africa Fighting Malaria, London, UK; 3Africa Fighting Malaria, Washington DC, USA; 4Faculty of Law and Medicine, University of Ottawa, Ottawa, CanadaBackground: Some medicines for sale in developing countries are approved by a stringent regulatory authority (SRA or the World Health Organization (WHO prequalification program; many of these are global brands. This study ascertains whether medicines approved by SRAs or the WHO perform better in simple quality tests than those that have not been approved by either.Methods: Over the past 4 years, 2652 essential drugs (products to treat malaria, tuberculosis, and bacterial infections were procured by covert shoppers from eleven African cities and eight cities in a variety of mid-income nations. All samples were assessed using the Global Pharma Health Fund eV Minilab® protocol to identify whether they were substandard, degraded, or counterfeit.Results: The failure rate among SRA-approved products was 1.01%, among WHO-approved products was 6.80%, and 13.01% among products that were not approved by either. African cities had a greater proportion of SRA- or WHO-approved products (31.50% than Indian cities (26.57%, but they also experienced a higher failure rate (14.21% than Indian cities (7.83%. The remainder of cities tested had both the highest proportion of approved products at 34.46% and the lowest failure rate at 2.70%. Products made in Africa had the highest failure rate at 25.77%, followed by Chinese products at 15.74%, Indian products at 3.70%, and European/US products, which failed least often, at 1.70%. Most worrying is that 17.65% of Chinese products approved by the WHO failed.Conclusion: The results strongly indicate that approval by either an SRA or the WHO is correlated with higher medicine quality at a statistically significant level. The comparatively high

  5. Biocidal Products and Borderline Products


    Yılmaz, Abdullah


    Biocidal product is defined as preparations sold in ready form to use that contains one or more active substances and has control effect, movement restriction or destruction against harmful organisms which has harmful effect on products that people use or produce or animals or environment. These substances which are composed mostly chemicals and ease our lifes are used in increasingly every areas of our life on the other hand they carry variety of risks and threaten our lives. In terms of env...

  6. Environmental products

    International Nuclear Information System (INIS)


    This volume in the series of directories of Quebec organizations doing research and development involving biomass-based products or processes focused on environmental products and services. The objective of this, and other directories in the series, was to stimulate interaction, and hence more aggressive development, of products and processes capable of being commercialized, to facilitate interaction between those who possess and those who could utilize biomass resources, and in general, to encourage the development of biomass-based industries. A total of 83 organizations were included in standardized format, describing areas of research interest, principal areas of technological expertise, major equipment, personnel and name and address of contact person. In this volume fields of research interest included environmental audits, waste treatment, biodegradation, composting, oxidation, photodegradation, disinfection and combustion. tabs

  7. Uranium production

    International Nuclear Information System (INIS)

    Spriggs, M.


    The balance between uranium supply and demand is examined. Should new resources become necessary, some unconventional sources which could be considered include low-grade extensions to conventional deposits, certain types of intrusive rock, tuffs, and lake and sea-bed sediments. In addition there are large but very low grade deposits in carbonaceous shales, granites, and seawater. The possibility of recovery is discussed. Programmes of research into the feasibility of extraction of uranium from seawater, as a by-product from phosphoric acid production, and from copper leach solutions, are briefly discussed. Other possible sources are coal, old mine dumps and tailings, the latter being successfully exploited commercially in South Africa. The greatest constraints on increased development of U from lower grade sources are economics and environmental impact. It is concluded that apart from U as a by-product from phosphate, other sources are unlikely to contribute much to world requirements in the foreseeable future. (U.K.)

  8. Bottom production

    International Nuclear Information System (INIS)

    Baines, J.; Baranov, S.P.; Bartalini, P.; Bay, A.; Bouhova, E.; Cacciari, M.; Caner, A.; Coadou, Y.; Corti, G.; Damet, J.; Dell-Orso, R.; De Mello Neto, J.R.T.; Domenech, J.L.; Drollinger, V.; Eerola, P.; Ellis, N.; Epp, B.; Frixione, S.; Gadomski, S.; Gavrilenko, I.; Gennai, S.; George, S.; Ghete, V.M.; Guy, L.; Hasegawa, Y.; Iengo, P.; Jacholkowska, A.; Jones, R.; Kharchilava, A.; Kneringer, E.; Koppenburg, P.; Korsmo, H.; Kramer, M.; Labanca, N.; Lehto, M.; Maltoni, F.; Mangano, M.L.; Mele, S.; Nairz, A.M.; Nakada, T.; Nikitin, N.; Nisati, A.; Norrbin, E.; Palla, F.; Rizatdinova, F.; Robins, S.; Rousseau, D.; Sanchis-Lozano, M.A.; Shapiro, M.; Sherwood, P.; Smirnova, L.; Smizanska, M.; Starodumov, A.; Stepanov, N.; Vogt, R.


    In the context of the LHC experiments, the physics of bottom flavoured hadrons enters in different contexts. It can be used for QCD tests, it affects the possibilities of B decays studies, and it is an important source of background for several processes of interest. The physics of b production at hadron colliders has a rather long story, dating back to its first observation in the UA1 experiment. Subsequently, b production has been studied at the Tevatron. Besides the transverse momentum spectrum of a single b, it has also become possible, in recent time, to study correlations in the production characteristics of the b and the b. At the LHC new opportunities will be offered by the high statistics and the high energy reach. One expects to be able to study the transverse momentum spectrum at higher transverse momenta, and also to exploit the large statistics to perform more accurate studies of correlations

  9. Bottom production

    Energy Technology Data Exchange (ETDEWEB)

    Baines, J.; Baranov, S.P.; Bartalini, P.; Bay, A.; Bouhova, E.; Cacciari, M.; Caner, A.; Coadou, Y.; Corti, G.; Damet, J.; Dell-Orso, R.; De Mello Neto, J.R.T.; Domenech, J.L.; Drollinger, V.; Eerola, P.; Ellis, N.; Epp, B.; Frixione, S.; Gadomski, S.; Gavrilenko, I.; Gennai, S.; George, S.; Ghete, V.M.; Guy, L.; Hasegawa, Y.; Iengo, P.; Jacholkowska, A.; Jones, R.; Kharchilava, A.; Kneringer, E.; Koppenburg, P.; Korsmo, H.; Kramer, M.; Labanca, N.; Lehto, M.; Maltoni, F.; Mangano, M.L.; Mele, S.; Nairz, A.M.; Nakada, T.; Nikitin, N.; Nisati, A.; Norrbin, E.; Palla, F.; Rizatdinova, F.; Robins, S.; Rousseau, D.; Sanchis-Lozano, M.A.; Shapiro, M.; Sherwood, P.; Smirnova, L.; Smizanska, M.; Starodumov, A.; Stepanov, N.; Vogt, R.


    In the context of the LHC experiments, the physics of bottom flavoured hadrons enters in different contexts. It can be used for QCD tests, it affects the possibilities of B decays studies, and it is an important source of background for several processes of interest. The physics of b production at hadron colliders has a rather long story, dating back to its first observation in the UA1 experiment. Subsequently, b production has been studied at the Tevatron. Besides the transverse momentum spectrum of a single b, it has also become possible, in recent time, to study correlations in the production characteristics of the b and the b. At the LHC new opportunities will be offered by the high statistics and the high energy reach. One expects to be able to study the transverse momentum spectrum at higher transverse momenta, and also to exploit the large statistics to perform more accurate studies of correlations.

  10. Phytosanitary products

    International Nuclear Information System (INIS)


    One of a series of directories of Quebec universities, industrial and governmental agencies in Quebec actively involved in research and development of phytosanitary products or services derived from or associated with biomass products. This directory contained standardized entries for 79 organizations from the agriculture, forestry and environmental sectors, active in fields ranging from genetic engineering, fertilizers, crop diseases and pest management, forestry management, harvesting methods and bioconversion. Each entry provided information about major fields of research interest, principal technologies utilized, major equipment, personnel, and name and address of person to be contacted for further information. tabs

  11. Aluminium production

    International Nuclear Information System (INIS)

    Winter, B.; Ayers, J.; Sammer, G.


    Aluminium is the most important non-ferrous metal by quantity. Aluminium is produced by electrolysis of aluminium oxide (also known as alumina). Alumina is produced by refining bauxite. The quantity of primary and secondary aluminium production in ECE-countries between 1992 and 1998 is shown. The European aluminium industry employs approximately 200 000 employees. The annual aluminium production in the European Union was 3.58 million tonnes in 1994, of which 44 % was secondary aluminium. In 1996 3.96 million tonnes of aluminium were produced in the EU, of which 44 % was secondary aluminium. (author)

  12. Uranium production

    International Nuclear Information System (INIS)

    Jones, J.Q.


    The domestic uranium industry is in a state of stagflation. Costs continue to rise while the market for the product remains stagnant. During the last 12 months, curtailments and closures of mines and mills have eliminated over 5000 jobs in the industry, plus many more in those industries that furnish supplies and services. By January 1982, operations at four mills and the mines that furnish them ore will have been terminated. Other closures may follow, depending on cost trends, duration of current contracts, the degree to which mills have been amortized, the feasibility of placing mines on standby, the grade of the ore, and many other factors. Open-pit mines can be placed on standby without much difficulty, other than the possible cost of restoration before all the ore has been removed. There are a few small, dry, underground mines that could be mothballed; however, the major underground producers are wet sandstone mines that in most cases could not be reopened after a prolonged shutdown; mills can be mothballed for several years. Figure 8 shows the location of all the production centers in operation, as well as those that have operated or are on standby. Table 1 lists the same production centers plus those that have been deferred, showing nominal capacity of conventional mills in tons of ore per calendar day, and the industry production rate for those mills as of October 1, 1981

  13. Novolak Production (United States)

    Aiba, Hiroshi

    Novolak resins are produced by reacting formaldehyde (30-55% concentration) with phenol under acidic conditions, with oxalic acid as the preferred catalyst and in special conditions, sulfuric acid. Depending on the batch size, all raw material components can be introduced into the reactor, or when there is an increase in the batch size as well as in the reactor volume, the reaction exotherm is controlled by a gradual addition of formaldehyde. Modern novolak production facilities are automated and programmed for reduced operational cost. A flow diagram of a general production line for the manufacture of novolak is shown. Recovery of the novolak is accomplished by the removal of water and devolatilization of crude novolak to molten, low-free phenol novolak resin which can be isolated as flake or pastille or dissolved in appropriate solvents. Novolak is stored either in a solid flake or pastille form or in solution. Most production is conducted under atmospheric conditions, but there are some recent, novel activities such as pressure in a hermetically-closed reactor reaching 0.1-10 MPa by using the heat of reaction without reflux to shorten reaction time, accelerating dehydration time by flash distillation, and providing economic benefit in the cost of novolak production.

  14. Product Configuration Systems and Productivity

    DEFF Research Database (Denmark)

    Pedersen, Jørgen Lindgaard; Edwards, Kasper


    Twelve companies have been interviewed with the purpose to get information about technical, economic and organisational matters in respect of Product Configuration Systems (PCS).Combinations of qualitative interviews and quantitative scoring have been used in ranking expected and realized results...

  15. Tequila production. (United States)

    Cedeño, M


    Tequila is obtained from the distillation of fermented juice of agave plant, Agave tequilana, to which up to 49% (w/v) of an adjunct sugar, mainly from cane or corn, could be added. Agave plants require from 8 to 12 years to mature and during all this time cleaning, pest control, and slacken of land are required to produce an initial raw material with the appropriate chemical composition for tequila production. Production process comprises four steps: cooking to hydrolyze inulin into fructose, milling to extract the sugars, fermentation with a strain of Saccharomyces cerevisiae to convert the sugars into ethanol and organoleptic compounds, and, finally, a two-step distillation process. Maturation, if needed, is carried out in white oak barrels to obtain rested or aged tequila in 2 or 12 months, respectively.

  16. Lepton production

    CERN Multimedia


    This experiment aims to settle open questions in the hadronic production of electrons, muons and neutrinos. Prominent among these are $e/\\mu$ universality, the contribution of charm decay to lepton pair production, and the "anomalous" low mass pairs.\\\\ The experimental design aims to optimize the combination of:\\\\- electron identification\\\\ - muon identification \\\\ - missing energy measurement for neutrinos \\\\ - vertex identification (for $\\tau \\simeq \\tau_{charm}$). \\\\ \\\\ The major components of the apparatus are shown in the figure. In the vertex region a proton beam of transverse size $\\simeq 50 \\mu$ impinges on a beryllium target of diameter $50 \\mu$, and high precision tracking in the vertex region is achieved by silicon strip detectors. Charged particle momenta are measured using a dipole magnet and high resolution drift chambers. Electrons are identified by the combination of the transition radiation detector and the finely segmented front section of the Uranium/Liquid Argon calorimeter. Essentially t...

  17. Product customization

    DEFF Research Database (Denmark)

    Lueg, Rainer


    This case study deals with the extension, customization, and profitability of two new product lines of a bicycle manufacturer. It can serve both as a discussion basis in class as well as an exam for advanced Master students in management, marketing, and ccounting. The case illustrates how variance...... application of financial analysis can lead to dysfunctional decisions that run counter to a company’s business model....

  18. Isotope production

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Dewi M.


    Some 2 0% of patients using radiopharmaceuticals receive injections of materials produced by cyclotrons. There are over 200 cyclotrons worldwide; around 35 are operated by commercial companies solely for the production of radio-pharmaceuticals with another 25 accelerators producing medically useful isotopes. These neutron-deficient isotopes are usually produced by proton bombardment. All commonly used medical isotopes can be generated by 'compact' cyclotrons with energies up to 40 MeV and beam intensities in the range 50 to 400 microamps. Specially designed target systems contain gram-quantities of highly enriched stable isotopes as starting materials. The targets can accommodate the high power densities of the proton beams and are designed for automated remote handling. The complete manufacturing cycle includes large-scale target production, isotope generation by cyclotron beam bombardment, radio-chemical extraction, pharmaceutical dispensing, raw material recovery, and labelling/packaging prior to the rapid delivery of these short-lived products. All these manufacturing steps adhere to the pharmaceutical industry standards of Good Manufacturing Practice (GMP). Unlike research accelerators, commercial cyclotrons are customized 'compact' machines usually supplied by specialist companies such as IBA (Belgium), EBCO (Canada) or Scanditronix (Sweden). The design criteria for these commercial cyclotrons are - small magnet dimensions, power-efficient operation of magnet and radiofrequency systems, high intensity extracted proton beams, well defined beam size and automated computer control. Performance requirements include rapid startup and shutdown, high reliability to support the daily production of short-lived isotopes and low maintenance to minimize the radiation dose to personnel. In 1987 a major step forward in meeting these exacting industrial requirements came when IBA, together with the University of Louvain-La-Neuve in Belgium, developed the Cyclone-30

  19. Diboson production

    Directory of Open Access Journals (Sweden)

    Evans D.L.


    Full Text Available Measurements of diboson production cross sections in pp collisions at the LHC at a centre of mass energy √s = 7 and 8 TeV, and in pp̅ collisions at the Tevatron at √s = 1.96 TeV are reviewed and compared with standard model predictions. Limits on charged and neutral anomalous triple gauge couplings extracted from the selected diboson event samples are also compared.

  20. Product design - Molecules, devices, functional products, and formulated products

    DEFF Research Database (Denmark)

    Gani, Rafiqul; Ng, Ka M.


    Chemical product design is a multidisciplinary and diverse subject. This article provides an overview of product design while focusing on product conceptualization. Four product types are considered - molecular products, formulated products, devices and functional products. For molecular products......, computer-aided design tools are used to predict the physicochemical properties of single molecules and blends. For formulated products, an integrated experiment-modeling approach is used to generate the formula with the specified product attributes. For devices and functional products, conceptual product...... design is carried out by modeling the product based on thermodynamics, kinetics and transport processes, by performing experiments, and by decision making based on rule-based methods The results are product specifications in terms of the type of ingredients, composition, and the structure, form, shape...

  1. New Product

    Institute of Scientific and Technical Information of China (English)



    Double Coin Holdings Launch New OTR Tire REM-15 With the increase of the demand for large-scale bulldozer in American market, Double Coin Group Co., Ltd. developed the Double Coin REM-15 OTR tire. This product is applicable for large-scale loader and bulldozer. The most remarkable characteristic is that it has good energy-saving performance and durability with low operating cost while the performances of tires aren't lowered. The new REM-15 is currently offered in the 17.5R25 size, which will be expanded to larger sizes in the future.

  2. production lines

    Directory of Open Access Journals (Sweden)

    Jingshan Li


    Full Text Available In this work, serial production lines with finished goods buffers operating in the pull regime are considered. The machines are assumed to obey Bernoulli reliability model. The problem of satisfying customers demand is addressed. The level of demand satisfaction is quantified by the due-time performance (DTP, which is defined as the probability to ship to the customer a required number of parts during a fixed time interval. Within this scenario, the definitions of DTP bottlenecks are introduced and a method for their identification is developed.

  3. Bottom Production

    CERN Document Server

    Nason, P.; Schneider, O.; Tartarelli, G.F.; Vikas, P.; Baines, J.; Baranov, S.P.; Bartalini, P.; Bay, A.; Bouhova, E.; Cacciari, M.; Caner, A.; Coadou, Y.; Corti, G.; Damet, J.; Dell'Orso, R.; De Mello Neto, J.R.T.; Domenech, J.L.; Drollinger, V.; Eerola, P.; Ellis, N.; Epp, B.; Frixione, S.; Gadomski, S.; Gavrilenko, I.; Gennai, S.; George, S.; Ghete, V.M.; Guy, L.; Hasegawa, Y.; Iengo, P.; Jacholkowska, A.; Jones, R.; Kharchilava, A.; Kneringer, E.; Koppenburg, P.; Korsmo, H.; Kramer, M.; Labanca, N.; Lehto, M.; Maltoni, F.; Mangano, Michelangelo L.; Mele, S.; Nairz, A.M.; Nakada, T.; Nikitin, N.; Nisati, A.; Norrbin, E.; Palla, F.; Rizatdinova, F.; Robins, S.; Rousseau, D.; Sanchis-Lozano, M.A.; Shapiro, M.; Sherwood, P.; Smirnova, L.; Smizanska, M.; Starodumov, A.; Stepanov, N.; Vogt, R.


    We review the prospects for bottom production physics at the LHC. Members of the working group who has contributed to this document are: J. Baines, S.P. Baranov, P. Bartalini, A. Bay, E. Bouhova, M. Cacciari, A. Caner, Y. Coadou, G. Corti, J. Damet, R. Dell'Orso, J.R.T. De Mello Neto, J.L. Domenech, V. Drollinger, P. Eerola, N. Ellis, B. Epp, S. Frixione, S. Gadomski, I. Gavrilenko, S. Gennai, S. George, V.M. Ghete, L. Guy, Y. Hasegawa, P. Iengo, A. Jacholkowska, R. Jones, A. Kharchilava, E. Kneringer, P. Koppenburg, H. Korsmo, M. Kraemer, N. Labanca, M. Lehto, F. Maltoni, M.L. Mangano, S. Mele, A.M. Nairz, T. Nakada, N. Nikitin, A. Nisati, E. Norrbin, F. Palla, F. Rizatdinova, S. Robins, D. Rousseau, M.A. Sanchis-Lozano, M. Shapiro, P. Sherwood, L. Smirnova, M. Smizanska, A. Starodumov, N. Stepanov, R. Vogt

  4. Production management (1976)

    International Nuclear Information System (INIS)

    Lee, Sun Ryong


    This book introduces production management theory, which gives descriptions of production and system, systems approach, development of production management, Taylor system, Ford system, types of production system, measuring ingredients model of production management, decision of production management, selection of production facilities, arrangement of facilities design of work method and task, work measure system, demanding fore casting, production quality system and credibility system.

  5. From Product Models to Product State Models

    DEFF Research Database (Denmark)

    Larsen, Michael Holm


    A well-known technology designed to handle product data is Product Models. Product Models are in their current form not able to handle all types of product state information. Hence, the concept of a Product State Model (PSM) is proposed. The PSM and in particular how to model a PSM is the Research...

  6. The K2/Spice Phenomenon: emergence, identification, legislation and metabolic characterization of synthetic cannabinoids in herbal incense products (United States)

    Brents, Lisa K.; Prather, Paul L.


    In 2008, the European Monitoring Center for Drugs and Drug Addiction (EMCDDA) detected unregulated, psychoactive synthetic cannabinoids (SCBs) in purportedly all-natural herbal incense products (often known as K2 or Spice) that were being covertly abused as marijuana substitutes. These drugs, which include JWH-018, JWH-073 and CP-47,497, bind and activate the cannabinoid receptors CB1R and CB2R with remarkable potency and efficacy. Serious adverse effects that often require medical attention, including severe cardiovascular, gastrointestinal and psychiatric sequelae, are highly prevalent with SCB abuse. Consequently, progressively restrictive legislation in the US and Europe has banned the distribution, sale and use of prevalent SCBs, initiating cycles in which herbal incense manufacturers replace banned SCBs with newer unregulated SCBs. The contents of the numerous, diverse herbal incense products was unknown when SCB abuse first emerged. Furthermore, the pharmacology of the active components was largely uncharacterized, and confirmation of SCB use was hindered by a lack of known biomarkers. These knowledge gaps prompted scientists across multiple disciplines to rapidly (1) monitor, identify and quantify with chromatography/mass spectrometry the ever-changing contents of herbal incense products, (2) determine the metabolic pathways and major urinary metabolites of several commonly abused SCBs and (3) identify active metabolites that possibly contribute to the severe adverse effect profile of SCBs. This review comprehensively describes the emergence of SCB abuse and provides a historical account of the major case reports, legal decisions and scientific discoveries of the ″K2/Spice Phenomenon″. Hypotheses concerning potential mechanisms SCB adverse effects are proposed in this review. PMID:24063277

  7. The association between hemispheric specialization for language production and for spatial attention depends on left-hand preference strength. (United States)

    Zago, Laure; Petit, Laurent; Mellet, Emmanuel; Jobard, Gaël; Crivello, Fabrice; Joliot, Marc; Mazoyer, Bernard; Tzourio-Mazoyer, Nathalie


    Cerebral lateralization for language production and spatial attention and their relationships with manual preference strength (MPS) were assessed in a sample of 293 healthy volunteers, including 151 left-handers, using fMRI during covert sentence production (PROD) and line bisection judgment (LBJ) tasks, as compared to high- and low-level reference tasks. At the group level, we found the expected complementary hemispheric specialization (HS) with leftward asymmetries for PROD within frontal and temporal regions and rightward asymmetries for LBJ within frontal and posterior occipito-parieto-temporal regions. Individual hemispheric (HLI) and regional (frontal and occipital) lateralization indices (LI) were then calculated on the activation maps for PROD and LBJ. We found a correlation between the degree of rightward cerebral asymmetry and the leftward behavioral attentional bias recorded during LBJ task. This correlation was found when LBJ-LI was computed over the hemispheres, in the frontal lobes, but not in the occipital lobes. We then investigated whether language production and spatial attention cerebral lateralization relate to each other, and whether manual preference was a variable that impacted the complementary HS of these functions. No correlation was found between spatial and language LIs in the majority of our sample of participants, including right-handers with a strong right-hand preference (sRH, n=97) and mixed-handers (MH, n=97), indicating that these functions lateralized independently. By contrast, in the group of left-handers with a strong left-hand preference (sLH, n= 99), a negative correlation was found between language and spatial lateralization. This negative correlation was found when LBJ-LI and PROD-LI were computed over the hemispheres, in the frontal lobes and between the occipital lobes for LBJ and the frontal lobes for PROD. These findings underline the importance to include sLH in the study sample to reveal the underlying mechanisms of

  8. Tobacco Products Production and Operations Reports (United States)

    Department of the Treasury — Monthly statistical reports on tobacco products production and operations. Data for Tobacco Statistical Release is derived directly from the Report – Manufacturer of...

  9. Innovation in Product Development

    DEFF Research Database (Denmark)

    McAloone, Tim C.; Restrepo-Giraldo, John Dairo


    The course on Innovation in Product Development attempts to identify and understand the nature of innovation and product development and their important factors. The course takes both a theoretical and a practical approach and employs a mix of lectures, project work and group discussion. Format...... insight. Course content The following aspects of innovation in product development are considered: - Humans and products - Needs and products - Product life - Teams creating products - Products creating business - Product development models - Organising product development - Product development tools...... - The future of product development....

  10. How do you select the right security features for your company's products (United States)

    Pickett, Gordon E.


    this paper will attempt to assist you and your associates define (1) what products are or may be under threat and how many different ways the product(s) might be compromised, (2) who might attempt to compromise your company's product(s), (3) what product security features may be effective in deterring the perceived threats, (4) how many deterrent features are needed, and should the features be overt, covert, or a combination of the two, (5) how will the candidate features hold up in the 'usage' environment, and (6) who will 'validate' the features and what skill levels, or auxiliary equipment, will be needed? Obviously, the cost effectiveness for adding possible security features to the product(s) needs to be considered, but more than just the cost of the feature, or the value of the product, needs to be factored into these considerations. For example, the effect of any compromise on the company's reputation and legal liabilities. This paper obviously can not provide all of the 'answers' but will attempt to provide you with 'food for thought.'

  11. SaferProducts API (United States)

    US Consumer Product Safety Commission — On March 11, 2011, the U.S. Consumer Product Safety Commission launched This site hosts the agency's new Publicly Available Consumer Product...

  12. Product and labour market regulations, production prices, wages and productivity

    NARCIS (Netherlands)

    Cette, G.; Lopez, J.; Mairesse, J.


    This study is an attempt to evaluate the effects of product and labour market regulations on industry productivity through their various impacts on changes in production prices and wages. In a first stage, the estimation of a regression equation on an industry*country panel, with controls for

  13. Production management (2000)

    International Nuclear Information System (INIS)

    Jung, Chung Yeong


    This book includes basic concept of production management, production system, strategy and mission of production, decision of production management, operation of decision making, life cycle of items and development, value of productions, design for reliability of productions, equipment layout and manufacturing process, quantitative forecast, schedule plan, inventory system, concept, input and output of MRP, Montekalo simulation, quality management, and automation system.

  14. Product Service Systems

    DEFF Research Database (Denmark)

    Departing from Product Development models based on physical artefacts. Moving towards integrated Product Development and System Operations models suited Product/Service-systems......Departing from Product Development models based on physical artefacts. Moving towards integrated Product Development and System Operations models suited Product/Service-systems...

  15. Production monitoring system for understanding product robustness

    DEFF Research Database (Denmark)

    Boorla, Srinivasa Murthy; Howard, Thomas J.


    study is used to demonstrate how the monitoring system can be used to efficiently guide corrective action to improve product performance. It is claimed that the monitoring system can be used to dramatically cut the time taken to identify, planand execute corrective action related to typical quality......In the current quality paradigm, the performance of a product is kept within specification by ensuring that its parts are within specification. Product performance is then validated after final assembly. However, this does not control how robust the product performance is, i.e. how much...... it will vary between the specification limits. In this paper, a model for predicting product performance is proposed, taking into account design, assembly and process parameters live from production. This empowers production to maintain final product performance, instead of part quality. The PRECI‐IN case...

  16. Productivity and Performance Measurement

    DEFF Research Database (Denmark)

    Hald, Kim Sundtoft; Spring, Martin

    This study explores conceptually how performance measurement as discussed in the literature, enables or constrains the ability to manage and improve productivity. It uses an inter-disciplinary literature review to identify five areas of concern relating productivity accounting to the ability...... to improve productivity: “Productivity representation”; “productivity incentives”, “productivity intervention”; “productivity trade-off or synergy” and “productivity strategy and context”. The paper discusses these areas of concern and expands our knowledge of how productivity and performance measurement...

  17. Understanding the Form, Function, and Logic of Clandestine Cellular Networks: The First Step in Effective Counternetwork Operations (United States)


    to Guerrilla Warfare and Underground Operations, ed. R. K. Brown, (Boulder, CO: Panther Publications, Inc., 1965); and Trinquier. Espionage related...Leaderless Resistance…has been used by white supremacists, anti-abortion and environmental activists, and animal rights groups. I argue that, despite...Stenson, Chad Oman, and Branko Lustig, “Scene 5,” Black Hawk Down, DVD, directed by Ridley Scott, (Culver City, CA: Columbia Pictures, 2002). 225 Ney

  18. P. W. Botha and the Space Research Corporation: Clandestine Operations and the Rise of a New Order in South Africa. (United States)


    in exile, leadership of the SON quickly passed to Joe Slovo, a uhite meber of the SACP. [241 Slovo uas married to Ruth First daughter of the founder of...region. [643 UNITA, liKe SLARPO, derived its support among the Ovambos in the region. By Spring 1975, the South African military had organized a ’ Zulu

  19. Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations (United States)


    are examples of this external non- professional genre . These groups function much like the U.S. Army Special Forces conducting unconventional force vehicle the IED was built to destroy, and conducts the operation. If he films the event, then he drops off the film at a drop-off point...and notifies the cell leader that the operation is complete. The cell leader directs the media cell to pick up the film from the drop-off site, and

  20. Product Structure, the Heart of Product Definition (United States)

    DeHoog, C., Jr.


    This paper describes the LMMSS Product Definition System (PDS) philosophy and approach were the use of each item parts document or software can be traced to a specific end item (EI) serial/tail number of the product. It explains why a part-oriented approach to data organization and configuration management is required. The definition of part-oriented is that all appropriate product definition data products will be collected. Referenced and managed by their linkage/relationship to parts/items, The paper will touch upon how LMMSS store/controls product definition information under each project's top product designator in a two tiered approach. One tier for each product end item and another tier which contain/controls listings of drawings, documents. Specifications and standards that are required for hardware item definition.

  1. Heavy Flavour Production

    CERN Document Server

    Nason, Paolo; Ridolfi, Giovanni


    We review the status of heavy flavour production in QCD. Comparison of experimental and theoretical results for top and bottom production are given. Selected topics in charm production are also discussed.

  2. Animal Product Safety Information (United States)

    ... Home Animal & Veterinary Safety & Health Product Safety Information Product Safety Information Share Tweet Linkedin Pin it More ... to report adverse experiences with veterinary drugs. Additional Product Information Questions and Answers: Evanger’s Dog and Cat ...

  3. Urinary incontinence products (United States)

    ... this page: // Urinary incontinence products To use the sharing features on this ... There are many products to help you manage urinary incontinence . You can decide which product to choose based ...


    Directory of Open Access Journals (Sweden)

    L. V. Golubeva


    Full Text Available Cottage cheese products holds a significant place among the dairy and milk-containing products. The range of products includes cheese: cheese, pastes, creams, cakes, etc. Such diversity can be attributed to their popularity among the population and benefit brought by the body from regular use. Curd protein is much better and easier to digest by the body than protein fish, meat or milk. Rich curd products lysine and methionine. Minerals contained in cheese products have a positive effect on bone formation and structure of tissues. The composition of curd products, in addition to cheese and dairy ingredients may include non-dairy ingredients origin. Today, for the production of cheese products use the most advanced technologies to further enrich its structure and significantly improve the nutritional value. Pine nut is widely used in the manufacture of many dairy products. But, in most cases, the production of dairy products as a filler used pine nut cake, which deprives the finished product valuable cedar oil. The authors proposed a technology for producing curd product with the addition of pine nuts and honey (pine nuts and fructose. Compatible with cream cheese filling insertion determined sensory organoleptic point scale. he optimum dosage of components: pine nuts – 5 %, honey – 10 % fructose – 7 %. Technological process of cottage cheese product is different from the traditional operations training components and their introduction into the finished cheese. Identify indicators of quality of the new product. Production of curd products thus expanding the range of dairy products functional orientation.

  5. Strong neutron sources - How to cope with weapon material production capabilities of fusion and spallation neutron sources?

    International Nuclear Information System (INIS)

    Englert, M.; Franceschini, G.; Liebert, W.


    In this article we investigate the potential and relevance for weapon material production in future fusion power plants and spallation neutron sources (SNS) and sketch what should be done to strengthen these technologies against a non-peaceful use. It is shown that future commercial fusion reactors may have military implications: first, they provide an easy source of tritium for weapons, an element that does not fall under safeguards and for which diversion from a plant could probably not be detected even if some tritium accountancy is implemented. Secondly, large fusion reactors - even if not designed for fissile material breeding - could easily produce several hundred kg Pu per year with high weapon quality and very low source material requirements. If fusion-only reactors will prevail over fission-fusion hybrids in the commercialization phase of fusion technology, the safeguard challenge will be more of a legal than of a technical nature. In pure fusion reactors (and in most SNS) there should be no nuclear material present at any time by design. The presence of undeclared nuclear material would indicate a military use of the plant. This fact offers a clear-cut detection criterion for a covert use of a declared facility. Another important point is that tritium does not fall under the definition of 'nuclear material', so a pure fusion reactor or a SNS that do not use nuclear materials are not directly falling under any international non-proliferation treaty requirements. Non-proliferation treaties have to be amended to take into account that fact. (A.C.)


    Directory of Open Access Journals (Sweden)

    Diego Pacheco


    Full Text Available The main objective of this article is to point a set of practical strategies that can be adopted to increase the capacity of constraints resources on production systems, when the constraint is inside the factory and not is in the market. To serve this purpose will be presented strategies based on best practices of the Theory of Constraints, Lean Manufacturing and Total Productive Maintenance. This article also presents the mains tools for the deployment of these methodologies. The survey results have provided an objective set of practical strategy that can be used to increase the capacity and productivity of production systems according to the needs of each manufacturing system.

  7. PDT (Product Data Technology), Production and Society

    DEFF Research Database (Denmark)

    Vesterager, Johan


    Information and communication technology (ICT) constitute a genuine technical revolution by enabling a dynamic and flexible support or automation of knowledge and information work. Bearing in mind that products are frozen knowledge, ICT as known will change the way we produce products dramatically....... The use of ICT in engineering of products constitutes product data technology (PDT).This paper presents a a basic platform for an understanding the ongoing revolution with focus on the PDT-area taking outset in the fundamental elements of knowledge and information work: creation, transformation...

  8. Animal Production Research Advances

    African Journals Online (AJOL)

    Animal Production Research Advances is a peer-review journal established expressly to promote the production of all animal species utilized as food. The journal has an international scope and is intended for professionals in animal production and related sciences. We solicit contributions from animal production and ...

  9. Intelligent products : A survey

    NARCIS (Netherlands)

    Meyer, G.G.; Främling, K.; Holmström, J.

    This paper presents an overview of the field of Intelligent Products. As Intelligent Products have many facets, this paper is mainly focused on the concept behind Intelligent Products, the technical foundations, and the achievable practical goals of Intelligent Products. A novel classification of

  10. Making Product Customization Profitable

    DEFF Research Database (Denmark)

    Mortensen, Niels Henrik; Hvam, Lars; Haug, Anders


    The main result presented in this paper is the Framework for Product Family Master Plan. This framework supports the identification of a product architecture for companies that customize products and services. The framework has five coherent aspects, the market, product assortment, supply...

  11. Consumer Product Category Database (United States)

    The Chemical and Product Categories database (CPCat) catalogs the use of over 40,000 chemicals and their presence in different consumer products. The chemical use information is compiled from multiple sources while product information is gathered from publicly available Material Safety Data Sheets (MSDS). EPA researchers are evaluating the possibility of expanding the database with additional product and use information.

  12. Ergonomic Product Design 21

    International Nuclear Information System (INIS)

    Kwon, Yeong Guk


    This book explains basic of ergonomic product design with human engineering, image engineering and strategy of that design, ergonomic industrial design, which includes product design to access the human engineering in development of new product and customer satisfaction, application technology of image engineering, industrial design of human engineering item and strategy of human engineering, a good ergonomic design. It also tells of examples of convenient design for human such as hardware product and software product in automobile, telephones for ergonomic product in the future, new goods and new technology, ergonomic product in house and office, and computers and robots in the future.

  13. Product Family Assessment

    DEFF Research Database (Denmark)

    Kvist, Morten

    their focus from single products to entire product families and try to incorporate the development of product variety into a future product family. The key is to create fit between the product design and production setup. The challenge of understanding this fit and modelling dispositional relations between...... and on the ideas of lean production, plus experiences from the industrial collaboration. The idea of waste from the lean philosophy is brought into a product variety context, and discussed in relation to product development. Verification of the model has been carried out in an industrial setting at Danfoss......This thesis reports the results of a PhD project from the Technical University of Denmark. The research has been carried out in a collaborative project with the Danish company Danfoss Automatic Controls. In the global market companies are struggling to meet customers’ expectation of products...

  14. Designing Product Families

    DEFF Research Database (Denmark)

    Pedersen, Per Erik Elgård; Miller, Thomas Dedenroth


    Manufacturing companies that operate with products aimed at different market segments and applications are experiencing an increasing demand from customers who expect products to be tailored to their exact needs rather than accepting general products based on average customer needs. This trend ha......: Variety, Design Principles, and Product Maturity.......Manufacturing companies that operate with products aimed at different market segments and applications are experiencing an increasing demand from customers who expect products to be tailored to their exact needs rather than accepting general products based on average customer needs. This trend has...... led to a new business paradigm, "mass customization", where companies strive to provide highly customized products while still maintaining the efficiency of the classical mass production enterprise. One of the key factors in mass customization has been efficient use of product platforms...

  15. Production Function Geometry with "Knightian" Total Product (United States)

    Truett, Dale B.; Truett, Lila J.


    Authors of principles and price theory textbooks generally illustrate short-run production using a total product curve that displays first increasing and then diminishing marginal returns to employment of the variable input(s). Although it seems reasonable that a temporary range of increasing returns to variable inputs will likely occur as…

  16. Probiotic fermented dairy products


    Adnan Tamime; Rajka Božanić; Irena Rogelj


    Fermented dairy products are the most popular vehicle used in theindustry for the implantation of the probiotic microflora in humans. Therefore this paper provides an overview of new knowledge on probiotic fermented dairy products. It involves historical developments, commercial probiotic microorganisms and products, and their therapeutic properties, possibilities of quality improvement of different types of newly developed fermented dairy products together with fermented goat’s milk products.

  17. Software product quality measurement


    Godliauskas, Eimantas


    This paper analyses Ruby product quality measures, suggesting three new measures for Ruby product quality measurement tool Rubocop to measure Ruby product quality characteristics defined in ISO 2502n standard series. This paper consists of four main chapters. The first chapter gives a brief view of software product quality and software product quality measurement. The second chapter analyses object oriented quality measures. The third chapter gives a brief view of the most popular Ruby qualit...

  18. Fission products collecting devices

    International Nuclear Information System (INIS)

    Matsumoto, Hiroshi


    Purpose: To enable fission products trap with no contamination to coolants and cover gas by the provision of a fission products trap above the upper part of a nuclear power plant. Constitution: Upon fuel failures in a reactor core, nuclear fission products leak into coolants and move along the flow of the coolants to the coolants above the reactor core. The fission products are collected in a trap container and guided along a pipeline into fission products detector. The fission products detector monitors the concentration of the fission products and opens the downstream valve of the detector when a predetermined concentration of the fission products is detected to introduce the fission products into a waste gas processing device and release them through the exhaust pipe. (Seki, T.)


    Directory of Open Access Journals (Sweden)



    Full Text Available In this paper we conceptually discussed the brands’ role in the society, the dimensions of branding and the relationship between the brand and the products. We adhere to the main ideas expressed in the literature, that the brand is more than a product. However the product is needed to render the brand tangible. The product is the magic box that delivers the brand experience. Without the product, the brand meaning would have difficulties in attracting customers. More studies are needed to investigate the brand-product relationship.

  20. Emulsified Water Products

    Directory of Open Access Journals (Sweden)

    Elif Tuğçe AKSUN


    Full Text Available Seafood is very important depending on having high protein rate and easily digestibility by human, for supply to an important part of animal protein needed. Determining the quality of emulsion-type products, emulsion stability, viscosity and gel strength properties are very important. In the production of products specified in this property emulsion; the main protein ratio and properties of raw material used while you; emulsion pH, temperature, ionic violence, mixing speed, type of fat and additives that are used as well. Previous studies show that particularly of products resulting from water emulsified chicken and goat meat emulsified product obtained from a high capacity of emulsified and compared to cattle and sheep meat is close to specifications, preparation of emulsified type products may be appropriate for the use of fish meat. Another quality parameter in the emulsified meat products, viscosity depends on the amount of meat used in direct proportion with the texture. Fish meat animals in connective tissue connective tissue in meat other butchers to rate ratio is quite low. In this respect, the fish meat produced using emulsified products viscosity according to products prepared using other meat products is quite low. Fish meat produced using emulsified fish sausage products based on surimi, sausage and fish pate fish varieties classed emulsion type products. In this review the different types of seafood using emulsified meat product.

  1. Micro Products - Product Development and Design

    DEFF Research Database (Denmark)

    Hansen, Hans Nørgaard


    Innovation within the field of micro and nano technology is to a great extent characterized by cross-disciplinary skills. The traditional disciplines like e.g. physics, biology, medicine and engineering are united in a common development process that can only take place in the presence of multi......-disciplinary competences. One example is sensors for chemical analysis of fluids, where chemistry, biology and flow mechanics all influence the design of the product and thereby the industrial fabrication of the product [1]. On the technological side the development has moved very fast, primarily driven by the need...... of the electronics industry to create still smaller chips with still larger capacity. Therefore the manufacturing technologies connected with micro/nano products in silicon are relatively highly developed compared to the technologies used for manufacturing micro products in metals, polymers and ceramics. For all...

  2. Productivity and Competitiveness of Sorghum Production in ...

    African Journals Online (AJOL)

    showed that sorghum production in the study areas yielded profitable returns ... Keywords: Sorghum, Profitability, Competitiveness, Investment Potential, .... Guinness Ghana Brewery Limited to estimate cost and returns at the marketing sector ...

  3. Product line design

    Czech Academy of Sciences Publication Activity Database

    Anderson, S. P.; Celik, Levent


    Roč. 157, May (2015), s. 517-526 ISSN 0022-0531 Institutional support: RVO:67985998 Keywords : product line design * product differentiation * second-degree price discrimination Subject RIV: AH - Economics Impact factor: 1.097, year: 2015

  4. Advances in production technology

    CERN Document Server


    This edited volume contains the selected papers presented at the scientific board meeting of the German Cluster of Excellence on “Integrative Production Technology for High-Wage Countries”,  held in November 2014. The topical structure of the book is clustered in six sessions: Integrative Production Technology, Individualised Production, Virtual Production Systems, Integrated Technologies, Self-Optimising Production Systems and Human Factors in Production Technology. The Aachen perspective on a holistic theory of production is complemented by conference papers from external leading researchers in the fields of production, materials science and bordering disciplines. The target audience primarily comprises research experts and practitioners in the field but the book may also be beneficial for graduate students.

  5. Transformer Industry Productivity Slows. (United States)

    Otto, Phyllis Flohr


    Annual productivity increases averaged 2.4 percent during 1963-79, slowing since 1972 to 1.5 percent; computer-assisted design and product standardization aided growth in output per employee-hour. (Author)

  6. Phenomenology of lepton production

    International Nuclear Information System (INIS)

    Renard, F.M.


    The problem of lepton production in hadronic collisions is reviewed. The following subjects are developed: the Drell-Yan model for continuous l + l - production, vector mesons and clusters, and other sources of direct leptons [fr

  7. Pesticide Product Label System (United States)

    U.S. Environmental Protection Agency — The Pesticide Product Label System (PPLS) provides a collection of pesticide product labels (Adobe PDF format) that have been approved by EPA under Section 3 of the...

  8. Dictionaries for text production

    DEFF Research Database (Denmark)

    Fuertes-Olivera, Pedro; Bergenholtz, Henning


    Dictionaries for Text Production are information tools that are designed and constructed for helping users to produce (i.e. encode) texts, both oral and written texts. These can be broadly divided into two groups: (a) specialized text production dictionaries, i.e., dictionaries that only offer...... a small amount of lexicographic data, most or all of which are typically used in a production situation, e.g. synonym dictionaries, grammar and spelling dictionaries, collocation dictionaries, concept dictionaries such as the Longman Language Activator, which is advertised as the World’s First Production...... Dictionary; (b) general text production dictionaries, i.e., dictionaries that offer all or most of the lexicographic data that are typically used in a production situation. A review of existing production dictionaries reveals that there are many specialized text production dictionaries but only a few general...

  9. Household Products Database: Pesticides (United States)

    ... of Products Manufacturers Ingredients About the Database FAQ Product ... control bulbs carpenter ants caterpillars crabgrass control deer dogs dogs/cats fertilizer w/insecticide fertilizer w/weed ...

  10. Consumer Product Category Database (United States)

    U.S. Environmental Protection Agency — The Chemical and Product Categories database (CPCat) catalogs the use of over 40,000 chemicals and their presence in different consumer products. The chemical use...

  11. Globalization and Productivity

    DEFF Research Database (Denmark)

    Hayakawa, Kazunobu; Machikita, Tomohiro


    Recent empirical studies which utilize plant- or establishment-level data to examine globalization's impact on productivity have discovered many causal mechanisms involved in globalization's impact on firms’ productivity. Because these pathways have been broad, there have been few attempts...

  12. Production sharing agreements

    International Nuclear Information System (INIS)


    This paper, which was presented at the Production Sharing Agreement seminar, discusses economic rent, negotiations, trends in fiscal system development, and concessionary systems. Production sharing contracts, risk service contracts, joint ventures and the global market are examined. (UK)

  13. Alcohol production from whey

    Energy Technology Data Exchange (ETDEWEB)

    Reesen, L


    The continuous production of ethanol from whey permeate, by fermentation of its lactose with Kluyveromyces fragilis, is described. From whey containing 4.4% lactose, production costs were very competitive with those for alcohol from molasses.

  14. National pulpwood production, 2010 (United States)

    Ronald J. Piva; James W. Bentley; Steven W. Hayes


    U.S. pulpwood production amounted to 86.5 million cords in 2010, a decrease of 4 percent from 2008. Roundwood production totaled 65.7 million cords and accounted for 76 percent of the Nation's total pulpwood production. The Southern Region led the Nation in total production with 65.5 million cords, followed by the Northern Region with 12.8 million cords, and the...

  15. National pulpwood production, 2008 (United States)

    Tony G. Johnson; Ronald J. Piva; Brian F. Walters; al. et.


    United States’ pulpwood production amounted to 89.2 million cords in 2008. Roundwood production totaled 63.0 million cords and accounted for 71 percent of the Nation’s total pulpwood production. The use of wood residue totaled 26.2 million cords. Georgia led the Nation in total production, with 11.6 million cords. In 2008, 146 mills were operating and drawing wood from...

  16. Southern pulpwood production, 2007 (United States)

    Tony G. Johnson; Carolyn D. Steppleton; James w. Bentley


    The South’s production of pulpwood increased from 64.7 million cords in 2006 to 65.7 million cords in 2007. Roundwood production increased 1.2 million cords to 47.6 million cords and accounted for 72 percent of the total pulpwood production. The use of wood residue declined 1 percent to 18.2 million cords. Alabama led the South in total production at 10.6 million cords...

  17. Nordic Noir Production Values

    DEFF Research Database (Denmark)

    Waade, Anne Marit; Jensen, Pia Majbritt


    In this article the authors argue that Nordic noir constitutes a set of production values utilised and conceptualised to make Danish television series attractive in the international market. The idea of production values is embedded into a media industrial context where market principles of target...... by relating the specific Nordic noir production values present in the two series to changing conditions in Danish television drama production, in particular the internationalisation of DR’s Drama Division....

  18. Pomegranate production and marketing (United States)

    This book is relatively short, with 134 pages, 15 chapters, 52 figures, and 20 tables. It ranges from cultivar descriptions, production, biotic and abiotic challenges to production, to postharvest, aril and juice production, health benefits, and international trade. It contains great information and...

  19. Reconstituted products from oak (United States)

    W. C. Lewis; B. G. Heebink


    "Reconstituted" describes a family of panel products made from fractionated oak, bonded with either a synthetic resin or a natural lignin bond. Several current commercial fiber panel products from oak are described, and the status of research on experimental products and processes is presented. Recent technological developments are removing the stigma...

  20. Scenario based product design

    NARCIS (Netherlands)

    Tideman, M.


    Creating good products is not an easy thing to do. There are usually many different people who have an interest in the product. People such as the user, of course, but also marketing managers, production engineers, maintenance workers, recycling specialists, and government representatives, just to

  1. Age, Wage and Productivity

    NARCIS (Netherlands)

    van Ours, J.C.; Stoeldraijer, L.


    Previous empirical studies on the effect of age on productivity and wages find contradicting results. Some studies find that if workers grow older there is an increasing gap between productivity and wages, i.e. wages increase with age while productivity does not or does not increase at the same

  2. Polling, production & priorities

    NARCIS (Netherlands)

    Winands, E.M.M.


    Polling, Production & Priorities The present monograph focuses on the so-called stochastic economic lot scheduling problem (SELSP), which deals with the make-to-stock production of multiple standardized products on a single machine with limited capacity under random demands, possibly random setup

  3. Star Products and Applications


    Iida, Mari; Yoshioka, Akira


    Star products parametrized by complex matrices are defined. Especially commutative associative star products are treated, and star exponentials with respect to these star products are considered. Jacobi's theta functions are given as infinite sums of star exponentials. As application, several concrete identities are obtained by properties of the star exponentials.

  4. Framework of product experience

    NARCIS (Netherlands)

    Desmet, P.; Hekkert, P.


    In this paper, we introduce a general framework for product experience that applies to all affective responses that can be experienced in human-product interaction. Three distinct components or levels of product experiences are discussed: aesthetic experience, experience of meaning, and emotional

  5. Evolving production network structures

    DEFF Research Database (Denmark)

    Grunow, Martin; Gunther, H.O.; Burdenik, H.


    When deciding about future production network configurations, the current structures have to be taken into account. Further, core issues such as the maturity of the products and the capacity requirements for test runs and ramp-ups must be incorporated. Our approach is based on optimization...... modelling and assigns products and capacity expansions to production sites under the above constraints. It also considers the production complexity at the individual sites and the flexibility of the network. Our implementation results for a large manufacturing network reveal substantial possible cost...

  6. Product Structuring, an overview

    DEFF Research Database (Denmark)

    Tichem, Marcel; Storm, Ton; Andreasen, Mogens Myrup


    .In the paper, the field of product structuring is defined and broken down into topics. For each of the topics, results of research are presented. Issues for further research are identified. The references in the paper refer to papers in the proceedings of the workshops.......This paper presents the highlights of two WDK Workshops on Product Structuring. Product structuring plays an important role in creating products which have good functional and life-cycle related properties, in design process management, and in several other company functions like production control...

  7. Productivity analysis of sunflower production in Turkey

    International Nuclear Information System (INIS)

    Semerci, A.


    In Turkey, which ranks the tenth country worldwide in the sunflower (Helianthus annuus L.) production, 55% of the production is carried out in Thrace Region. Therefore, agricultural enterprises in Thrace Region, situated in the European part of Turkey have specialized in producing sunflower, and have become the centre of vegetable oil industry in the region in terms of produced raw material. This research was conducted in 182 agricultural enterprises in 3 provinces of Thrace Region in Turkey and its objective was to determine input/output relations in sunflower production. The study indicates that the determination coefficient (r/sup 2/) derived from Cobb-Douglas production function was significant at 0.01 level and the elasticity coefficients of the variables (except chemical fertilizer) were found beta i positive in derived equation. It was determined that the variable of herbicide cost had the highest value of the marginal effectiveness coefficients and none of the variables was used at economically optimal level in the study area. When the Marginal Technical Substitution and the Price Rates were taken into consideration, it was noted that only the seed cost/hoeing cost was closest to economically optimum level (1.10). According to stepwise analysis the Land Renting Value was determined as the most important variable in sunflower production. (author)

  8. Product Platform Modeling

    DEFF Research Database (Denmark)

    Pedersen, Rasmus

    for customisation of products. In many companies these changes in the business environment have created a controversy between the need for a wide variety of products offered to the marketplace and a desire to reduce variation within the company in order to increase efficiency. Many companies use the concept...... other. These groups can be varied and combined to form different product variants without increasing the internal variety in the company. Based on the Theory of Domains, the concept of encapsulation in the organ domain is introduced, and organs are formulated as platform elements. Included......This PhD thesis has the title Product Platform Modelling. The thesis is about product platforms and visual product platform modelling. Product platforms have gained an increasing attention in industry and academia in the past decade. The reasons are many, yet the increasing globalisation...

  9. Low income product innovation

    Directory of Open Access Journals (Sweden)

    Maria Cecília Sobral


    Full Text Available At affluent markets, the literature on product development management tells us to aggregate value and technology, to differentiate products and to launch fast. And at the low-income markets? This exploratory research defines a popular product, characterizes and measures their markets in Brazil, and identifies innovation strategies for them. The results suggest that the effective strategic orientation differs from affluent markets. It includes: to enhance the auto service component; to identify and service the key functionalities to the targeted public; to standardize products and increase the production scale; to extend the product life cycle; to use convenient distribution and marketing channels; to build product images that have appeal in the popular market; to offer longer financing horizons with befittingly lower installments. Data came from market researches and general demographic census. General media published stories were used to identify companies and their strategies. And a few case studies allowed the authors a deeper exploration of the relevant themes.

  10. Chlorhexidine in cosmetic products

    DEFF Research Database (Denmark)

    Opstrup, Morten Schjørring; Johansen, Jeanne Duus; Bossi, Rossana


    or an antimicrobial agent in cosmetic products at a concentration up to 0.3%, as set by the European Cosmetics Directive (now Regulations). OBJECTIVES: To identify cosmetic product types containing chlorhexidine, and to measure the concentration of chlorhexidine in selected products. METHODS: Between February 2013...... and April 2013, we checked for chlorhexidine in cosmetic products in 14 supermarkets, one hairdressing salon and one beauty and retail store in Copenhagen, Denmark by reading the ingredient labels. The chlorhexidine concentration was measured in 10 selected products by high-performance liquid chromatography...... concentrations were 0.01-0.15%. CONCLUSIONS: We found chlorhexidine in various cosmetic product types, predominantly aimed at females, and in hair products. The measured chlorhexidine concentrations were all within the permitted limit. The relevance for allergic sensitization should be further explored....

  11. Play as productionproduction as game?

    DEFF Research Database (Denmark)

    Eichberg, Henning


    Play-related products and their export have through recent decades contributed to a certain Danish image on the world level – with Lego bricks at the commercial end and adventure playgrounds at the pedagogical end. The phenomena of toy production and play exports challenge our understanding of what...... “play” and “game” are, and of their social as well as political significance. At the municipal level, the city of Odense – “city of Hans Christian Andersen” – is branding itself as “city of play”. On the international level, Danish play-related products have expanded on the world market. In the field...... of sport, Danish sport is not just elite sport, but also organized in local associations. People meet in mass summer festivals of popular sport. Folk Academies develop sport as personal development, often in an experimental way. Street sports, parkour, play and games are promoted. Civil society is a basis...

  12. 17 CFR 229.1204 - (Item 1204) Oil and gas production, production prices and production costs. (United States)


    ... production, production prices and production costs. 229.1204 Section 229.1204 Commodity and Securities... production, production prices and production costs. (a) For each of the last three fiscal years disclose... production cost, not including ad valorem and severance taxes, per unit of production. Instruction 1 to Item...

  13. Nephrotoxicity of Natural Products. (United States)

    Nauffal, Mary; Gabardi, Steven


    The manufacture and sale of natural products constitute a multi-billion dollar industry. Nearly a third of the American population admit to using some form of complementary or alternative medicine, with many using them in addition to prescription medications. Most patients fail to inform their healthcare providers of their natural product use and physicians rarely inquire. Annually, thousands of natural product-induced adverse events are reported to Poison Control Centers nationwide. Natural product manufacturers are not responsible for proving safety and efficacy, as the FDA does not regulate them. However, concerns exist surrounding the safety of natural products. This review provides details on natural products that have been associated with renal dysfunction. We have focused on products that have been associated with direct renal injury, immune-mediated nephrotoxicity, nephrolithiasis, rhabdomyolysis with acute renal injury, hepatorenal syndrome, and common adulterants or contaminants that are associated with renal dysfunction. The potential for natural products to cause renal dysfunction is justifiable. It is imperative that natural product use be monitored closely in all patients. Healthcare practitioners must play an active role in identifying patients using natural products and provide appropriate patient education. © 2016 S. Karger AG, Basel.

  14. Fermentative production of isobutene. (United States)

    van Leeuwen, Bianca N M; van der Wulp, Albertus M; Duijnstee, Isabelle; van Maris, Antonius J A; Straathof, Adrie J J


    Isobutene (2-methylpropene) is one of those chemicals for which bio-based production might replace the petrochemical production in the future. Currently, more than 10 million metric tons of isobutene are produced on a yearly basis. Even though bio-based production might also be achieved through chemocatalytic or thermochemical methods, this review focuses on fermentative routes from sugars. Although biological isobutene formation is known since the 1970s, extensive metabolic engineering is required to achieve economically viable yields and productivities. Two recent metabolic engineering developments may enable anaerobic production close to the theoretical stoichiometry of 1isobutene + 2CO(2) + 2H(2)O per mol of glucose. One relies on the conversion of 3-hydroxyisovalerate to isobutene as a side activity of mevalonate diphosphate decarboxylase and the other on isobutanol dehydration as a side activity of engineered oleate hydratase. The latter resembles the fermentative production of isobutanol followed by isobutanol recovery and chemocatalytic dehydration. The advantage of a completely biological route is that not isobutanol, but instead gaseous isobutene is recovered from the fermenter together with CO(2). The low aqueous solubility of isobutene might also minimize product toxicity to the microorganisms. Although developments are at their infancy, the potential of a large scale fermentative isobutene production process is assessed. The production costs estimate is 0.9 Euro kg(-1), which is reasonably competitive. About 70% of the production costs will be due to the costs of lignocellulose hydrolysate, which seems to be a preferred feedstock.

  15. Recombinant organisms for production of industrial products


    Adrio, Jose-Luis; Demain, Arnold L


    A revolution in industrial microbiology was sparked by the discoveries of ther double-stranded structure of DNA and the development of recombinant DNA technology. Traditional industrial microbiology was merged with molecular biology to yield improved recombinant processes for the industrial production of primary and secondary metabolites, protein biopharmaceuticals and industrial enzymes. Novel genetic techniques such as metabolic engineering, combinatorial biosynthesis and molecular breeding...

  16. Leading co-production

    DEFF Research Database (Denmark)

    Tortzen, Anne

    leadership styles executed by public managers affect the quality and public value of co-production processes? The paper argues that publicly initiated co-production initiatives are influenced by conflicting governance logics placing public managers in an institutional cross pressure (Lowndes & Roberts, 2013...... of building networks and relations, developing trust and focusing on empowerment and on the participants' resources to develop innovative solutions Drawing on three qualitative case studies of ‘most likely' co-production cases in Danish municipalities, the study identifies three different leadership styles...... and increase public value (Bovaird & Löffler, 2012; Osborne, 2010). The paper argues that a deeper understanding of the dynamics of co-production can be gained from analyzing the leadership dimension of co-production processes, which has hitherto not been given much attention by co-production researchers...

  17. Product Platform Performance

    DEFF Research Database (Denmark)

    Munk, Lone

    The aim of this research is to improve understanding of platform-based product development by studying platform performance in relation to internal effects in companies. Platform-based product development makes it possible to deliver product variety and at the same time reduce the needed resources...... engaging in platform-based product development. Similarly platform assessment criteria lack empirical verification regarding relevance and sufficiency. The thesis focuses on • the process of identifying and estimating internal effects, • verification of performance of product platforms, (i...... experienced representatives from the different life systems phase systems of the platform products. The effects are estimated and modeled within different scenarios, taking into account financial and real option aspects. The model illustrates and supports estimation and quantification of internal platform...

  18. Global product development

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Ahmed-Kristensen, Saeema


    Globalisation has enabled companies to globalise their product development process. Today, everything from manufacturing to R&D can be globally distributed. This has led to a more complex and disintegrated product development process. This paper investigates the impacts companies have experienced...... operational solutions to counteract the negative impacts with varying degrees of success. This paper presents a unique look into global product development through an investigation of its impact on the organisation, the product development process, and the product. Furthermore, it shows the solutions...... as a result of this, and how they have been addressed. Data was collected through case studies of five Danish multinational corporations. The findings showed that the companies experienced several challenges when they globalised their product development process. They consequently implemented various...



    Ľubomíra Juhaniaková; Miroslava Kačániová


    The aim of this work was to determine microbiological quality of confectionery products. In confectionery products microbiological parameters: coliforms bacteria, microscopic filamentous fungi and yeasts, Salmonella sp. and staphylococci were observed. The confectionery products were evaluated: Kremes - honey cube, roll Arabica, roll Rona, roll stuffed with apricot cream, honey cube, pinwheel caramel, Sachovnica cut, Zora cut and curd cake. For microbiological tests 18 samples of confectioner...

  20. Southern pulpwood production, 2008 (United States)

    Tony G. Johnson; Carolyn D. Steppleton; James W. Bentley


    The South’s production of pulpwood increased from 65.7 million cords in 2007 to 67.0 million cords in 2008. Roundwood production increased by 1.2 million cords to 48.8 million cords and accounted for 73 percent of the South’s total pulpwood production. The use of wood residue remained stable at 18.2 million cords. Georgia led the South...

  1. Southern pulpwood production, 2012 (United States)

    James W. Bentley; Jason A. Cooper


    The South’s production of pulpwood increased from 62.7 million cords in 2011 to 63.7 million cords in 2012. Roundwood production decreased by 770,000 cords to 49.3 million cords and accounted for 78 percent of the South’s total pulpwood production. The use of wood residue dropped 15 percent to 14.4 million cords in 2012. Georgia and Alabama led the South in total...

  2. Southern pulpwood production, 2011 (United States)

    James W. Bentley; Carolyn D. Steppleton


    The South’s production of pulpwood declined from 65.5 million cords in 2010 to 62.7 million cords in 2011. Roundwood production decreased by 878,000 cords to 50.1 million cords and accounted for 80 percent of the South’s total pulpwood production. The use of wood residue dropped 14 percent to 12.6 million cords in 2011. Georgia and Alabama led the South in total...

  3. Electricity production of Slovakia

    International Nuclear Information System (INIS)

    Czodor, T.


    Here is examined the spatial structure of electric energy production divided in hydropower plants (through-flow and re-pumping), thermal power plants as the most expensive way of electric energy production and nuclear power plants where high difficulty and long-term realisation of construction projects and spent financial resources are pointed out. Work describes present structure of electric energy production and consumption and refers to alternative electric energy sources

  4. Working Hours and Productivity


    Collewet, Marion; Sauermann, Jan


    This paper studies the link between working hours and productivity using daily information on working hours and performance of a sample of call centre agents. We exploit variation in the number of hours worked by the same employee across days and weeks due to central scheduling, enabling us to estimate the effect of working hours on productivity. We find that as the number of hours worked increases, the average handling time for a call increases, meaning that agents become less productive. Th...

  5. Productivity in Public Services


    Helen Simpson


    This paper discusses issues arising in the measurement of productivity in public services. Compared to measuring productivity in the private sector difficulties arise because the output of public services is often un-priced and because some public services are consumed collectively. A key problem is measuring the full range of outputs and quality improvements delivered by public sector organisations that are valued by society. Without comprehensive measures of output productivity statistics m...

  6. Ionization of food products

    International Nuclear Information System (INIS)

    Vasseur, J.P.


    After general remarks on foods preservation, on international works and on ionization future prospects, main irradiation sources are described. Recalls on radioactivity, on radiation-matter interaction, on toxicology of ionized foods and on ionized foods detection are given. Ionization applications to various products are reviewed, especially in: - Poultry meat - Fishing products - Fresh fruits and vegetables - Dry fruits and vegetables - spices, tea, infusion - prepacked products... An evaluation of economics and sociocultural impacts is presented in connection with recent experiments [fr

  7. Accounting for productivity

    DEFF Research Database (Denmark)

    Aiyar, Shekhar; Dalgaard, Carl-Johan Lars


    The development accounting literature almost always assumes a Cobb-Douglas (CD) production function. However, if in reality the elasticity of substitution between capital and labor deviates substantially from 1, the assumption is invalid, potentially casting doubt on the commonly held view...... that factors of production are relatively unimportant in accounting for differences in labor productivity. We use international data on relative factor shares and capital-output ratios to formulate a number of tests for the validity of the CD assumption. We find that the CD specification performs reasonably...... well for the purposes of cross-country productivity accounting....

  8. Measuring Clinical Productivity. (United States)

    Hudson, Mark E; Lebovitz, Evan E


    Productivity measurements have been used to evaluate and compare physicians and physician practices. Anesthesiology is unique in that factors outside anesthesiologist control impact opportunity for revenue generation and make comparisons between providers and facilities challenging. This article uses data from the multicenter University of Pittsburgh Physicians Department of Anesthesiology to demonstrate factors influencing productivity opportunity by surgical facility, between department divisions and subspecialties within multispecialty divisions, and by individuals within divisions. The complexities of benchmarking anesthesiology productivity are demonstrated, and the potential value of creating a productivity profile for facilities and groups is illustrated. Copyright © 2018 Elsevier Inc. All rights reserved.

  9. Sustainable hydrogen production

    Energy Technology Data Exchange (ETDEWEB)

    Block, D.L.; Linkous, C.; Muradov, N.


    This report describes the Sustainable Hydrogen Production research conducted at the Florida Solar Energy Center (FSEC) for the past year. The report presents the work done on the following four tasks: Task 1--production of hydrogen by photovoltaic-powered electrolysis; Task 2--solar photocatalytic hydrogen production from water using a dual-bed photosystem; Task 3--development of solid electrolytes for water electrolysis at intermediate temperatures; and Task 4--production of hydrogen by thermocatalytic cracking of natural gas. For each task, this report presents a summary, introduction/description of project, and results.


    Directory of Open Access Journals (Sweden)

    Edu Grieco Mazzini Junior


    Full Text Available Design or product development? The questioning in relation to the employment of such terminology dates back to possible misconceptions regarding interpretation and approach them. Therefore, it can be stated that there are differences between these two terms? In this context, we highlight two views concerning the origin of the design. The first character creative and based on pre-industrial revolution, based on projective and methodologies directed towards the practice of designing products. And second, where design is understood as an industrial process: the development of new products includes, besides a creative procedure are developed, and symbolic formal solutions for products, but also a technical procedure based on the definition of the requirements concerning the product engineering. Is this the most widely accepted interpretation? theoretical studies were conducted from interpretations of the concept of the design proposed by the International Council of Societies of Industrial Design – ICSDI (2012, and for the characterization of the process of product development, we sought to develop an analogy between these two terminologies and can be proved that the use of one of terminology will not cause deviations of interpretation, since both deal with the life cycle of the product. The main results obtained until now the definition of design proposed by the ICSID where it is characterized as a creative activity focused on the complete life cycle of products is the more approaches of the concept of product development.

  11. The Internationalisation of Production

    DEFF Research Database (Denmark)

    Yang, Cheng; Madsen, Erik Skov


    practice is further analysed in terms of (1) general information of each case company; (2) motivation of production internationalisation of each case company; (3) limitations as SMEs to internationalise production; (4) operational activities during the internationalization; (5) benefits of joint effort......This paper mainly aims to explore how SMEs internationalise their production. Directed by this objective, a new practice adopted by five Danish SMEs to internationalise their production to China is identified, which to our knowledge has never been reported by any of the existing literature. The new...

  12. Optimizing production under uncertainty

    DEFF Research Database (Denmark)

    Rasmussen, Svend

    This Working Paper derives criteria for optimal production under uncertainty based on the state-contingent approach (Chambers and Quiggin, 2000), and discusses po-tential problems involved in applying the state-contingent approach in a normative context. The analytical approach uses the concept...... of state-contingent production functions and a definition of inputs including both sort of input, activity and alloca-tion technology. It also analyses production decisions where production is combined with trading in state-contingent claims such as insurance contracts. The final part discusses...

  13. SMART Product Innovation

    DEFF Research Database (Denmark)

    Cramer-Petersen, Claus L.; Ahmed-Kristensen, Saeema; Li, Xuemeng


    . The ambition of The Danish Industry Foundation and The Kata Foundation was to develop a method; a robust and specific approach to ensure that product innovation in Danish enterprises in practice would result in products of the highest quality, producible at lower costs and profitable at competitive prices...... products to our neighboring countries continues to suffer. The customers’ financial capacity has been reduced and cheaper products from Asia and other regions have found their way into our local markets. Competition is fierce – especially pricewise. This was the starting point for the SMART project...


    Directory of Open Access Journals (Sweden)

    V.M. Sineglazov


    Full Text Available  Research results of representation of product structure made by means of CADDS5 computer-aided design (CAD system, Product Data Management Optegra (PDM system and Product Life Cycle Management Wind-chill system (PLM, are examined in this work. Analysis of structure component development and its storage in various systems is carried out. Algorithms of structure transformation required for correct representation of the structure are considered. Management analysis of electronic mockup presentation of the product structure is carried out for Windchill system.

  15. Production control system specified quality sausage products

    Directory of Open Access Journals (Sweden)

    A. V. Tokarev


    Full Text Available The problem of management of production target in technological system of production of sausages of the set quality is considered in article. Decomposition of technological system is considered. Functions of management are allocated: formation of an optimum compounding of forcemeat, expert analysis of a compounding, laboratory analysis of a compounding and its statement. Information technology of interaction of these functions is offered. The mathematical problem definition of finding of an optimum compounding meat product with use of possible substitutes of ingredients is presented. This mathematical problem is a classical linear programming problem whose solution has the standard program. Since the manufacture of the finished product are various nonlinear effects are taken into account at the present time it is practically impossible, the methodology provided in this operation "Expert analysis of the formulation" and "Laboratory analysis of the finished product." An example of calculating the optimum alternative base recipe "Sausages “Viennese with cheese”" TS 9213-010-40155161-2002. For an alternative formulation demands were made at a cost of meat, the ingredient composition, as well as the final product organoleptic and physic-chemical indicators should comply with regulatory requirements "Sausages “Viennese with cheese”" TS 9213-010-40155161-2002. Indicator acid activity (pH calculated stuffing formulation should be in the range 6.0-6.3. As a partial replacement for the main raw material have been proposed acceptable substitutes. It was necessary to calculate on the basis of the formulation "Sausages “Viennese with cheese”" TS 9213-010-40155161-2002 optimal price and quality alternative formulation. As a result of depreciation of the value of alternative stuffing recipe was 14,5 % when all of the restrictions on the consumer properties. The proposed information technology implemented in the software package "Multi

  16. Industrial production of products like petroleum

    Energy Technology Data Exchange (ETDEWEB)

    Baurier, P J.H.


    This invention has as its object a process for separating tars, oils, or gases coming from the distillation of carbonaceous materials, such as lignities or shales, to separate all other substances of the same kind and to prepare products like petroleum. The process for present consideration consists essentially in achieving simultaneously hydrogenation of the material (treated for conversion to stable products) and desulfurization of the materials showing the following characteristics: The substances to be treated are fed in the gaseous state, as vapors or pulverized and made to react at a temperature of 300 to 450/sup 0/C in the presence of excess water vapor, on divided metals capable of decomposing the water with release of hydrogen, at a temperature below 450/sup 0/C.

  17. Recombinant organisms for production of industrial products (United States)

    Adrio, Jose-Luis


    A revolution in industrial microbiology was sparked by the discoveries of ther double-stranded structure of DNA and the development of recombinant DNA technology. Traditional industrial microbiology was merged with molecular biology to yield improved recombinant processes for the industrial production of primary and secondary metabolites, protein biopharmaceuticals and industrial enzymes. Novel genetic techniques such as metabolic engineering, combinatorial biosynthesis and molecular breeding techniques and their modifications are contributing greatly to the development of improved industrial processes. In addition, functional genomics, proteomics and metabolomics are being exploited for the discovery of novel valuable small molecules for medicine as well as enzymes for catalysis. The sequencing of industrial microbal genomes is being carried out which bodes well for future process improvement and discovery of new industrial products. PMID:21326937

  18. Recombinant organisms for production of industrial products. (United States)

    Adrio, Jose-Luis; Demain, Arnold L


    A revolution in industrial microbiology was sparked by the discoveries of ther double-stranded structure of DNA and the development of recombinant DNA technology. Traditional industrial microbiology was merged with molecular biology to yield improved recombinant processes for the industrial production of primary and secondary metabolites, protein biopharmaceuticals and industrial enzymes. Novel genetic techniques such as metabolic engineering, combinatorial biosynthesis and molecular breeding techniques and their modifications are contributing greatly to the development of improved industrial processes. In addition, functional genomics, proteomics and metabolomics are being exploited for the discovery of novel valuable small molecules for medicine as well as enzymes for catalysis. The sequencing of industrial microbal genomes is being carried out which bodes well for future process improvement and discovery of new industrial products. © 2010 Landes Bioscience

  19. Volatile products controlling Titan's tholins production

    KAUST Repository

    Carrasco, Nathalie


    A quantitative agreement between nitrile relative abundances and Titan\\'s atmospheric composition was recently shown with a reactor simulating the global chemistry occurring in Titan\\'s atmosphere (Gautier et al. [2011]. Icarus, 213, 625-635). Here we present a complementary study on the same reactor using an in situ diagnostic of the gas phase composition. Various initial N 2/CH 4 gas mixtures (methane varying from 1% to 10%) are studied, with a monitoring of the methane consumption and of the stable gas neutrals by in situ mass spectrometry. Atomic hydrogen is also measured by optical emission spectroscopy. A positive correlation is found between atomic hydrogen abundance and the inhibition function for aerosol production. This confirms the suspected role of hydrogen as an inhibitor of heterogeneous organic growth processes, as found in Sciamma-O\\'Brien et al. (Sciamma-O\\'Brien et al. [2010]. Icarus, 209, 704-714). The study of the gas phase organic products is focussed on its evolution with the initial methane amount [CH 4] 0 and its comparison with the aerosol production efficiency. We identify a change in the stationary gas phase composition for intermediate methane amounts: below [CH 4] 0=5%, the gas phase composition is mainly dominated by nitrogen-containing species, whereas hydrocarbons are massively produced for [CH 4] 0>5%. This predominance of N-containing species at lower initial methane amount, compared with the maximum gas-to solid conversion observed in Sciamma-O\\'Brien et al. (2010) for identical methane amounts confirms the central role played by N-containing gas-phase compounds to produce tholins. Moreover, two protonated imines (methanimine CH 2NH and ethanamine CH 3CHNH) are detected in the ion composition in agreement with Titan\\'s INMS measurements, and reinforcing the suspected role of these chemical species on aerosol production. © 2012 Elsevier Inc.

  20. Questionnaire typography and production. (United States)

    Gray, M


    This article describes the typographic principles and practice which provide the basis of good design and print, the relevant printing processes which can be used, and the graphic designer's function in questionnaire production. As they impose constraints on design decisions to be discussed later in the text, the various methods of printing and production are discussed first.

  1. Product line design

    Czech Academy of Sciences Publication Activity Database

    Anderson, S. P.; Celik, Levent


    Roč. 157, May (2015), s. 517-526 ISSN 0022-0531 R&D Projects: GA ČR(CZ) GA15-22540S Institutional support: PRVOUK-P23 Keywords : product line design * product differentiation * second-degree price discrimination Subject RIV: AH - Economics Impact factor: 1.097, year: 2015

  2. Training for Productivity. (United States)

    Maglen, Leo; Hopkins, Sonnie; Burke, Gerald

    An exploratory study was conducted to evaluate the utility of a method to demonstrate that Australian enterprises that invest in the training of their employees gain a return from that investment through an increase in employee productivity. The method, which compares enterprise expenditure on training of personnel with labor productivity across a…

  3. Marketing Novel Fruit Products

    NARCIS (Netherlands)

    ’T Riet, Van Jonathan; Onwezen, M.C.; Bartels, Jos; Lans, Van Der I.A.; Kraszewska, Magdalena


    The purpose of this study was to compare the influence of four different marketing claims and price information on consumers’ product choices for novel fruits and novel fruit products, using a choice experiment. In total, 1,652 people in Greece (n = 400), the Netherlands (n = 419), Poland (n =

  4. Heavy-Quark Production

    CERN Document Server

    Frixione, Stefano; Nason, Paolo; Ridolfi, Giovanni


    We review the present theoretical and experimental status of heavy quark production in high-energy collisions. In particular, we cover hadro- and photoproduction at fixed target experiments, at HERA and at the hadron colliders, as well as aspects of heavy quark production in e+e- collisions at the Z0 peak.

  5. Products from cottonseed

    Energy Technology Data Exchange (ETDEWEB)



    A review with 41 references is made on the manufacture of oil, protein, and other products from cottonseed, the effects of gossypol on protein yield and quality and technology of gossypol removal. A process eliminating thermal treatment of the kernels and permitting the production of oil, proteins, phytin, gossypol, sugar, sterols, phosphatides, tocopherols, and residual shells and bagasse is described.

  6. Productivity and energy efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Lovins, H. [Rocky Mountain Inst., Snowmass, CO (United States)


    Energy efficient building and office design offers the possibility of significantly increased worker productivity. By improving lighting, heating and cooling, workers can be made more comfortable and productive. An increase of 1 percent in productivity can provide savings to a company that exceed its entire energy bill. Efficient design practices are cost effective just from their energy savings. The resulting productivity gains make them indispensable. This paper documents eight cases in which efficient lighting, heating, and cooling have measurably increased worker productivity, decreased absenteeism, and/or improved the quality of work performed. They also show that efficient lighting can measurably increase work quality by removing errors and manufacturing defects. The case studies presented include retrofit of existing buildings and the design of new facilities, and cover a variety of commercial and industrial settings. Each case study identifies the design changes that were most responsible for increased productivity. As the eight case studies illustrate, energy efficient design may be one of the least expensive ways for a business to improve the productivity of its workers and the quality of its product. (author). 15 refs.

  7. Product Placement in Cartoons

    Directory of Open Access Journals (Sweden)

    Irena Oroz Štancl


    Full Text Available Product placement is a marketing approach for integrating products or services into selected media content. Studies have shown that the impact of advertising on children and youth are large, and that it can affect their preferences and attitudes. The aim of this article is to determine the existing level of product placement in cartoons that are broadcast on Croatian television stations. Content analysis of cartoons in a period of one month gave the following results: in 30% of cartoons product placement was found; most product placement were visual ads, in 89%, however, auditory product placement and plot connection was also found. Most ads were related to toys and it is significant that even 65% of cartoons are accompanied by a large amount of products available on the Croatian market. This is the result of two sales strategies: brand licensing (selling popular cartoon characters to toys, food or clothing companies and cartoon production based on existing line of toys with the sole aim of making their sales more effective.

  8. Upgrading uncompetitive products economically

    DEFF Research Database (Denmark)

    Lu, Hua; Jensen, Christian Søndergaard


    for upgrading an uncompetitive product, and combine the solutions into a single solution. We also propose a spatial join-based solution that assumes P and T are indexed by an R-tree. Given a set of products in the same R-tree node, we derive three lower bounds on their upgrading costs. These bounds are employed...

  9. Green product innovation strategy

    NARCIS (Netherlands)

    Driessen, P.H.


    Over the last decades, companies have started to incorporate green issues in product innovation strategies. This dissertation studies green product innovation strategy, its antecedents and its outcomes. A three-stage approach is followed. In the first stage, the topic is explored and a preliminary

  10. Interleaved Product LDPC Codes


    Baldi, Marco; Cancellieri, Giovanni; Chiaraluce, Franco


    Product LDPC codes take advantage of LDPC decoding algorithms and the high minimum distance of product codes. We propose to add suitable interleavers to improve the waterfall performance of LDPC decoding. Interleaving also reduces the number of low weight codewords, that gives a further advantage in the error floor region.

  11. Production (information sheets)

    NARCIS (Netherlands)


    Documentation sheets: Geo energy 2 Integrated System Approach Petroleum Production (ISAPP) The value of smartness 4 Reservoir permeability estimation from production data 6 Coupled modeling for reservoir application 8 Toward an integrated near-wellbore model 10 TNO conceptual framework for "E&P

  12. Spectra and strangeness production

    International Nuclear Information System (INIS)

    Miake, Yasuo.


    Particle production (π ± , K ± and p ± ) has been measured in p + A and Si + A reactions using the E802 spectrometer. The comparison of the particle production (rapidity distributions, momentum distributions, and the integrated yields ratios) between p + Be, p + Au and central Si + Au collisions and the effects of rescattering is discussed. 14 refs., 6 figs

  13. Marketing technologically advanced products

    NARCIS (Netherlands)

    Bender, Horst


    This paper calls for a merger of technology and marketing under a customer value perspective; for an enhancement of the traditional technological innovation orientation of the technology-based firm with a market thrust. It establishes technology-based products as product-service offerings that are

  14. Accelerated product development

    NARCIS (Netherlands)

    Langerak, F.; Seth, J.N.; Malhotra, N.K.


    Accelerated product development is a competitive strategy that seeks to reduce the development cycle time of new products. However, there has been little theoretical advancement and empirical model testing in the identification of the conditions under which cycle time reduction is appropriate, the

  15. Global product development

    DEFF Research Database (Denmark)

    Taylor, Thomas Paul; Ahmed-Kristensen, Saeema


    Selecting key performance indicators in conventional product development is a challenging task for project management and is compound by global product development. Informed from the findings of two in depth case studies conducted with large Danish manufacturing companies, in this paper we develo...

  16. Production process of VE

    International Nuclear Information System (INIS)


    This book tells of synopsis of production process of VE(value engineering), object selection method and establishment of target, collection of object information, design of function, write improvement suggestion, evaluation of improvement suggestion, all sorts of worksheets of production process of VE, explanation of IE, explanation of PERT.

  17. Improved wound care product

    DEFF Research Database (Denmark)


    The present invention pertains to use of sodium diacetate (NaHAc 2) as an antimicrobial agent against bacteria growing in biofilms. The aspects of the invention include a wound care product comprising sodium diacetate, a kit comprising a wound care product,and a methodof treating an infected wound....

  18. Productivity of Stream Definitions

    NARCIS (Netherlands)

    Endrullis, Jörg; Grabmayer, Clemens; Hendriks, Dimitri; Isihara, Ariya; Klop, Jan


    We give an algorithm for deciding productivity of a large and natural class of recursive stream definitions. A stream definition is called ‘productive’ if it can be evaluated continuously in such a way that a uniquely determined stream is obtained as the limit. Whereas productivity is undecidable

  19. The Productive Programmer

    CERN Document Server

    Ford, Neal


    Anyone who develops software for a living needs a proven way to produce it better, faster, and cheaper. The Productive Programmer offers critical timesaving and productivity tools that you can adopt right away, no matter what platform you use. Master developer Neal Ford details ten valuable practices that will help you elude common traps, improve your code, and become more valuable to your team.


    Directory of Open Access Journals (Sweden)

    Adrian MICU


    Full Text Available Cost advantages may be either internal or external. Internal economics of scope, scale, or experience, and external economies of focus or logistical integration, enable a company to produce some products at a lower cost than the competition. The coordination of pricing with suppliers, although not actually economizing resources, can improve the efficiency of pricing by avoiding the incrementalization of a supplier's nonincremental fixed costs and profit. Any of these strategies can generate cost advantages that are, at least in the short run, sustainable. Even cost advantages that are not sustainable, however, can generate temporary savings that are often the key to building more sustainable cost or product advantages later.. Even when a product's physical attributes are not readily differentiable, opportunities to develop product advantages remain. The augmented product that customers buy is more than the particular product or service exchanged. It includes all sorts of ancillary services and intangible relationships that make buying thesame product from one company less difficult, less risky, or more pleasant than buying from a competitor. Superior augmentation of the same basic product can add substantial value in the eyes of consumers, leading them to pay willingly what are often considerable price premiums.

  1. Tanzania : Productive Jobs Wanted


    World Bank Group


    Over the past 18 months, the World Bank has been working on a comprehensive plan to address the challenge of productive jobs in Tanzania. This study represents a step towards a better understanding of how to promote job creation in Tanzania. Indeed, the growth of productive jobs is vital for alleviating poverty and promoting shared prosperity - two important goals of Tanzania's economic st...

  2. Risks of Leveraged Products

    NARCIS (Netherlands)

    A. Di Cesare (Antonio)


    textabstractLeveraged investments have become a fundamental feature of modern economies. The new financial products allow people to take greater-than-usual exposures to risk factors. This thesis analyzes several different aspects of the risks involved by some frequently used leveraged products:

  3. Quarkonia production at CDF

    International Nuclear Information System (INIS)

    Demina, R.


    We present the results of J/ψ, ψ', χ c and Υ(1S), Υ(2S), Υ(3S) production in the proton-antiproton collisions at √s = 1800 GeV measured with the CDF Detector. Contributions of different production mechanisms are discussed. 10 refs., 7 figs

  4. Optimal Product Placement. (United States)

    Hsu, Chia-Ling; Matta, Rafael; Popov, Sergey V; Sogo, Takeharu


    We model a market, such as an online software market, in which an intermediary connects sellers and buyers by displaying sellers' products. With two vertically-differentiated products, an intermediary can place either: (1) one product, not necessarily the better one, on the first page, and the other hidden on the second page; or (2) both products on the first page. We show that it can be optimal for the intermediary to obfuscate a product-possibly the better one-since this weakens price competition and allows the sellers to extract a greater surplus from buyers; however, it is not socially optimal. The choice of which one to obfuscate depends on the distribution of search costs.

  5. Product Architecture Modularity Strategies

    DEFF Research Database (Denmark)

    Mikkola, Juliana Hsuan


    The focus of this paper is to integrate various perspectives on product architecture modularity into a general framework, and also to propose a way to measure the degree of modularization embedded in product architectures. Various trade-offs between modular and integral product architectures...... and how components and interfaces influence the degree of modularization are considered. In order to gain a better understanding of product architecture modularity as a strategy, a theoretical framework and propositions are drawn from various academic literature sources. Based on the literature review......, the following key elements of product architecture are identified: components (standard and new-to-the-firm), interfaces (standardization and specification), degree of coupling, and substitutability. A mathematical function, termed modularization function, is introduced to measure the degree of modularization...

  6. Thermophilic Biohydrogen Production

    DEFF Research Database (Denmark)

    Karakashev, Dimitar Borisov; Angelidaki, Irini


    Dark fermentative hydrogen production at thermophilic conditions is attractive process for biofuel production. From thermodynamic point of view, higher temperatures favor biohydrogen production. Highest hydrogen yields are always associated with acetate, or with mixed acetate- butyrate type...... fermentation. On the contrary the hydrogen yield decreases, with increasing concentrations of lactate, ethanol or propionate. Major factors affecting dark fermentative biohydrogen production are organic loading rate (OLR), pH, hydraulic retention time (HRT), dissolved hydrogen and dissolved carbon dioxide...... concentrations, and soluble metabolic profile (SMP). A number of thermophilic and extreme thermophilic cultures (pure and mixed) have been studied for biohydrogen production from different feedstocks - pure substrates and waste/wastewaters. Variety of process technologies (operational conditions...

  7. Production measurements at LHCb

    CERN Document Server



    The $\\text{LHC}b$ detector, with its excellent momentum resolution and flexible trigger strategy, is ideally suited for measuring heavy quark and quarkonia production properties. In addition, the new system of forward shower counters installed upstream and downstream has begun to be used, therefore the experiment is being suited to measure central exclusive production. The $\\text{LHC}b$ measurements of inclusive and differential cross-sections of the production of $J/\\psi$ resonance and $J/\\psi$ pairs, as well bottom quarks and $Z^0$ boson, based on Run 2 datasets are summarized. Finally, results on the prompt production of open charm hadrons and the exclusive production of charmonium are discussed.

  8. Hydrogen production by Cyanobacteria

    Directory of Open Access Journals (Sweden)

    Chaudhuri Surabhi


    Full Text Available Abstract The limited fossil fuel prompts the prospecting of various unconventional energy sources to take over the traditional fossil fuel energy source. In this respect the use of hydrogen gas is an attractive alternate source. Attributed by its numerous advantages including those of environmentally clean, efficiency and renew ability, hydrogen gas is considered to be one of the most desired alternate. Cyanobacteria are highly promising microorganism for hydrogen production. In comparison to the traditional ways of hydrogen production (chemical, photoelectrical, Cyanobacterial hydrogen production is commercially viable. This review highlights the basic biology of cynobacterial hydrogen production, strains involved, large-scale hydrogen production and its future prospects. While integrating the existing knowledge and technology, much future improvement and progress is to be done before hydrogen is accepted as a commercial primary energy source.

  9. Health products inspection

    International Nuclear Information System (INIS)

    Stoltz, M.


    To protect public health, the Health Products Inspection is a public service mission where the application of regulations concerning activities on human health products and cosmetic products is verified. This mission permits a global approach to assess the health products risk-based benefit and, in monitoring by laboratory testing and by on site inspections, to verify their compliance with appropriate regulations. The seventy five inspectors perform about eight hundred inspections per year, in France and abroad. These inspections are related to data provided in the health products assessment and also to manufacturing and delivery practices. The French inspection body is also involved in the training of foreign inspectors and in the harmonization of national, European and international practices either for operators than for the competent authorities. (author)

  10. Dry alcohol production plant

    Directory of Open Access Journals (Sweden)

    Stanković Mirjana S.


    Full Text Available The IGPC Engineering Department designed basic projects for dry alcohol production plant, using technology developed in the IGPC laboratories. Several projects were completed: technological, machine, electrical, automation. On the basis of these projects a production plant with a capacity of 40 m3/y was manufactured, at "Zorka Pharma", Šabac in 1995-1996. The product meets all quality demands, as well as environmental regulations. The dry alcohol production process is fully automatized. There is no waste in the process, neither gaseous, nor liquid. The chosen process provides safe operation according to temperature regime and resistance in the pipes, air purification columns and filters. Working at increased pressure is suitable for evaporation and condensation at increased temperatures. The production process can be controlled manually, which is necessary during start-up, and repairs.

  11. Exposure from consumer products

    International Nuclear Information System (INIS)

    Sadagopan, Geetha


    Consumer products containing radioactive material, are available in the market place to any member of public as off the shelf item and are intended for unrestricted use by them at home or for their personal use. Radioactivity may be involved in the product for several reasons: 1. ionising radiation from the radioactive material forms the basis of the particular functioning of the product like radioisotopes in smoke detectors, radio-luminous dials, etc.; 2. chemical/spectroscopic characteristics of the radioactive material and not its radioactivity is the basis for the functional property of the product like thoriated gas mantles, uranium in glass enamels, etc. and 3. radioactive materials could be naturally occurring in consumer products, but could increase in concentration after processing like increased uranium or thorium concentrations after the processing of rare earth oxides

  12. Chemical Product Design

    DEFF Research Database (Denmark)

    Gani, Rafiqul


    This paper highlights for a class of chemical products, the design process, their design with respect to the important issues, the need for appropriate tools and finally, lists some of the challenges and opportunities for the process systems engineering (PSE)/computer-aided process engineering...... (CAPE) community. The chemical products considered belong to the following types: chemical/biochemical/agrochemical products, coatings and solvents, food (nutraceuticals), HIM (household, industrial and institutional), personal care, pharmaceuticals and drugs. The challenges and opportunities...... are highlighted in terms of the needs for multi-level modeling with emphasis on property models that are suitable for computer-aided applications, flexible solution strategies that are able to solve a large range of chemical product design problems and finally, a systems chemical product design framework...

  13. Petroleum product market outlook

    International Nuclear Information System (INIS)


    The influence of petroleum market disturbances on price increases was discussed with particular reference to Hurricane Katrina and the loss of refinery production and damage to oil infrastructure in the United States. The supply of petroleum products in Canada will be very tight heading into the winter of 2006, despite the fact that Canadian refineries are operating at full capacity to ensure an adequate supply of gasoline and diesel fuel for consumers. In addition to refinery production, petroleum supplies are also determined by the adequacy of inventories and the efficiency of the infrastructure in place to deliver products to where they are needed. The lack of spare capacity has reduced the flexibility of the North American refining system to respond to further disruptions. Refiners were asked to provide information on 4 areas of their operations in order for Natural Resources Canada to analyze the short-term outlook for petroleum products markets. The 4 areas included refinery utilization rates and capability to increase production; any planned refinery turnaround that would affect petroleum product supplies; inventory levels compared to levels in previous years; and, any logistical problems that could affect product distribution. A graph depicting the relationship between Canadian production of gasoline and domestic sales clearly illustrated the seasonal nature of gasoline consumption and that production in Canada is much higher than consumption. Canada exports large volumes of gasoline, primarily to the United States eastern seabord from refineries in Atlantic Canada. The trend is similar for diesel fuel. Demand for both gasoline and diesel is expected to continue to grow in 2005 as high prices have had a limited impact on demand growth. In general, the Ontario/Quebec region is short of gasoline and must import gasoline during the summer months to cover the shortfall. It was noted that motorists and homeowners who heat with oil will bear the burden of higher

  14. Greenhouse production systems for people

    NARCIS (Netherlands)

    Giacomelli, G.A.; Sase, S.; Cramer, R.; Hoogeboom, J.; McKenzie, A.; Parbst, K.; Sacrascia-Mugnozza, G.; Selina, P.; Sharp, D.A.; Voogt, J.O.; Weel, van P.A.; Mears, D.


    Environmentally sound greenhouse production requires that: demand for market products is understood; greenhouse design addresses the climate circum-stances; input resources are available and consumed efficiently, and; there must be a reasonable balance of production products to the environmental

  15. A Framework For Product Development

    DEFF Research Database (Denmark)

    McAloone, Timothy Charles; Robotham, Antony John


    -aspect approach to product development; understanding the strategic conditions that affect product development; developing a coherent approach to product quality based on product-life thinking; addressing environmental needs in a proactive manner through innovation techniques; and understanding both...

  16. Product sounds : Fundamentals and application

    NARCIS (Netherlands)

    Ozcan-Vieira, E.


    Products are ubiquitous, so are the sounds emitted by products. Product sounds influence our reasoning, emotional state, purchase decisions, preference, and expectations regarding the product and the product's performance. Thus, auditory experience elicited by product sounds may not be just about

  17. Uranium production from phosphates

    International Nuclear Information System (INIS)

    Ketzinel, Z.; Folkman, Y.


    According to estimates of the world's uranium consumption, exploitation of most rich sources is expected by the 1980's. Forecasts show that the rate of uranium consumption will increase towards the end of the century. It is therefore desirable to exploit poor sources not yet in use. In the near future, the most reasonable source for developing uranium is phosphate rock. Uranium reserves in phosphates are estimated at a few million tons. Production of uranium from phosphates is as a by-product of phosphate rock processing and phosphoric acid production; it will then be possible to save the costs incurred in crushing and dissolving the rock when calculating uranium production costs. Estimates show that the U.S. wastes about 3,000 tons of uranium per annum in phosphoric acid based fertilisers. Studies have also been carried out in France, Yugoslavia and India. In Israel, during the 1950's, a small plant was operated in Haifa by 'Chemical and Phosphates'. Uranium processes have also been developed by linking with the extraction processes at Arad. Currently there is almost no activity on this subject because there are no large phosphoric acid plants which would enable production to take place on a reasonable scale. Discussions are taking place about the installation of a plant for phosphoric acid production utilising the 'wet process', producing 200 to 250,000 tons P 2 O 5 per annum. It is necessary to combine these facilities with uranium production plant. (author)

  18. Manual of radioisotope production

    International Nuclear Information System (INIS)


    The Manual of Radioisotope Production has been compiled primarily to help small reactor establishments which need a modest programme of radioisotope production for local requirements. It is not comprehensive, but gives guidance on essential preliminary considerations and problems that may be met in the early stages of production. References are included as an aid to the reader who wishes to seek further in the extensive literature on the subject. In preparing the Manual, which is in two parts, the Agency consulted several Member States which already have long experience in radioisotope production. An attempt has been made to condense this experience, firstly, by setting out the technical and economic considerations which govern the planning and execution of an isotope programme and, secondly, by providing experimental details of isotope production processes. Part I covers topics common to all radioisotope processing, namely, laboratory design, handling and dispensing of radioactive solutions, quality control, measurement and radiological safety. Part II contains information on the fifteen radioisotopes in most common use. These are bromine-82, cobalt-58, chromium-51, copper-64, fluorine-18, gold-198, iodine-131, iron-59, magnesium-28, potassium-42, sodium-24, phosphorus-32, sulphur-35, yttrium-90 and zinc-65. Their nuclear properties are described, references to typical applications are given and published methods of production are reviewed; also included are descriptions in detail of the production processes used at several national atomic energy organizations. No attempt has been made to distinguish the best values for nuclear data or to comment on the relative merits of production processes. Each process is presented essentially as it was described by the contributor on the understanding that critical comparisons are not necessary for processes which have been well tried in practical production for many years. The information is presented as a guide to enable

  19. Sicilian potential biogas production

    Directory of Open Access Journals (Sweden)

    Antonio Comparetti


    Full Text Available This study is aimed at predicting the Sicilian potential biogas production, using the Organic Fraction of Municipal Solid Waste (OFMSW, animal manure and food industry by-products, in a region where only one biogas plant using MSW and one co-digestion plant are nowadays available. The statistical data about OFMSW, the number of animals bred in medium and large farms and the amounts of by-products of food processing industries were evaluated, in order to compute the Sicilian potential biogas and energy production. The OFMSW produced in Sicily, that is 0.8 million tons ca. per year (37% of MSW, could be used in a bio-reactor, together with other raw materials, for Anaerobic Digestion (AD process, producing biogas and “digestate”. Moreover, 3.03 million tons ca. of manure, collected in medium and large animal husbandry farms (where cows, pigs and poultry are bred, and 350 thousand tons ca. of by-products, collected in food processing industries (pomace from olive oil mills and grape marc from wineries, might be used for AD process. The Sicilian potential biogas production from the AD of the above raw materials is 170.2 millions of m3, that is equal to 1023.4 GWh of energy per year, of which 484 GWh from animal manure, 303 GWh from OFMSW and 236.4 GWh from food industry by-products. The highest biogas production is in the province of Palermo (35.6 millions of m3, Ragusa (30.8 millions of m3 and Catania (22.8 millions of m3, having a potential energy production of 213.8, 185 and 137 GWh, respectively.

  20. Concurrency in product realization (United States)

    Kelly, Michael J.


    Technology per se does not provide a competitive advantage. Timely exploitation of technology is what gives the competitive edge, and this demands a major shift in the product development process and management of the industrial enterprise. `Teaming to win' is more than a management theme; it is the disciplined engineering practice that is essential to success in today's global marketplace. Teaming supports the concurrent engineering practices required to integrate the activities of people responsible for product realization through achievement of shorter development cycles, lower costs, and defect-free products.

  1. Radiation processed polysaccharide products

    International Nuclear Information System (INIS)

    Nguyen, Quoc Hien


    Radiation crosslinking, degradation and grafting techniques for modification of polymeric materials including natural polysaccharides have been providing many unique products. In this communication, typical products from radiation processed polysaccharides particularly plant growth promoter from alginate, plant protector and elicitor from chitosan, super water absorbent containing starch, hydrogel sheet containing carrageenan/CM-chitosan as burn wound dressing, metal ion adsorbent from partially deacetylated chitin were described. The procedures for producing those above products were also outlined. Future development works on radiation processing of polysaccharides were briefly presented. (author)

  2. Versioning of printed products (United States)

    Tuijn, Chris


    During the definition of a printed product in an MIS system, a lot of attention is paid to the production process. The MIS systems typically gather all process-related parameters at such a level of detail that they can determine what the exact cost will be to make a specific product. This information can then be used to make a quote for the customer. Considerably less attention is paid to the content of the products since this does not have an immediate impact on the production costs (assuming that the number of inks or plates is known in advance). The content management is typically carried out either by the prepress systems themselves or by dedicated workflow servers uniting all people that contribute to the manufacturing of a printed product. Special care must be taken when considering versioned products. With versioned products we here mean distinct products that have a number of pages or page layers in common. Typical examples are comic books that have to be printed in different languages. In this case, the color plates can be shared over the different versions and the black plate will be different. Other examples are nation-wide magazines or newspapers that have an area with regional pages or advertising leaflets in different languages or currencies. When considering versioned products, the content will become an important cost factor. First of all, the content management (and associated proofing and approval cycles) becomes much more complex and, therefore, the risk that mistakes will be made increases considerably. Secondly, the real production costs are very much content-dependent because the content will determine whether plates can be shared across different versions or not and how many press runs will be needed. In this paper, we will present a way to manage different versions of a printed product. First, we will introduce a data model for version management. Next, we will show how the content of the different versions can be supplied by the customer

  3. OPEC's production policies

    International Nuclear Information System (INIS)

    Mabro, R.


    An enlightening study on the workings of OPEC its policies and practices, agreements and disagreements, and how each affects the world petroleum market. The book explores OPEC's production patterns and quota agreements and the relationship between production and pricing policies. Political compromises that have hindered OPEC production agreements and their successful implementation are covered - compromises such as concessions made to the U.A.E. and those resulting from the Gulf war. Notable historical events are cited, and a look into the future at what we can expect of OPEC in coming years concludes the study

  4. Production of Metabolites

    DEFF Research Database (Denmark)


    A recombinant micro-organism such as Saccharomyces cerevisiae which produces and excretes into culture medium a stilbenoid metabolite product when grown under stilbenoid production conditions, which expresses in above native levels a ABC transporter which transports said stilbenoid out of said...... micro-organism cells to the culture medium. The genome of the Saccharomyces cerevisiae produces an auxotrophic phenotype which is compensated by a plasmid which also expresses one or more of said enzymes constituting said metabolic pathway producing said stilbenoid, an expression product of the plasmid...

  5. Entropy Production of Stars

    Directory of Open Access Journals (Sweden)

    Leonid M. Martyushev


    Full Text Available The entropy production (inside the volume bounded by a photosphere of main-sequence stars, subgiants, giants, and supergiants is calculated based on B–V photometry data. A non-linear inverse relationship of thermodynamic fluxes and forces as well as an almost constant specific (per volume entropy production of main-sequence stars (for 95% of stars, this quantity lies within 0.5 to 2.2 of the corresponding solar magnitude is found. The obtained results are discussed from the perspective of known extreme principles related to entropy production.

  6. Property Rights and Productivity

    DEFF Research Database (Denmark)

    Newman, Carol; Tarp, Finn; Van Den Broeck, Katleen


    This paper explores the effect of land titling on agricultural productivity in Vietnam and the productivity effects of single versus joint titling for husband and wife. Using a plot-fixed-effects approach our results show that obtaining a land title is associated with higher yields, for both...... individually and jointly held titles. We conclude that there is no tradeoff between joint titling and productivity, and so joint titles are potentially an effective way to improve women’s bargaining power within the household with no associated efficiency losses....

  7. SMART product innovation

    DEFF Research Database (Denmark)

    Cramer-Petersen, Claus L.; Ahmed-Kristensen, Saeema; Li, Xuemeng


    Among the inspirations for the SMART process is “design to customer value,” where products are modified based on a thorough understanding of customers that allows product developers to eliminate features that do not affect customer satisfaction while including only the elements and functionality...... that customers really appreciate. The SMART process includes methods to understand product value for the customer and the user; analyse the cost of components and processes; combine customer value and cost reduction potentials into feasible, high-value concepts; and generate prototypes that can be tested...... with users and customers....

  8. Will marine productivity wane? (United States)

    Laufkötter, Charlotte; Gruber, Nicolas


    If marine algae are impaired severely by global climate change, the resulting reduction in marine primary production would strongly affect marine life and the ocean's biological pump that sequesters substantial amounts of atmospheric carbon dioxide in the ocean's interior. Most studies, including the latest generation of Earth system models, project only moderate global decreases in biological production until 2100 (1, 2), suggesting that these concerns are unwarranted. But on page 1139 of this issue, Moore et al. (3) show that this conclusion might be shortsighted and that there may be much larger long-term changes in ocean productivity than previously appreciated.

  9. Glocalized Production: The Evolution of Global Production

    DEFF Research Database (Denmark)

    Chavez, Marianna; Bilberg, Arne

    In light of the challenges of the current globalized production model, four global Danish companies were interviewed with the purpose of exploring “glocalized production” as the new step and solution to the challenges of the “global village.” The research sought to gauge the interest on “glocalized...... production” by key managers of these companies, and test three hypotheses: that a definition could be established from “glocalization” aspects, that it will reduce supply chain complexity, and that it can affect organizational trust levels. The results are presented along with suggestions to pave the way...

  10. Product numerical range in a space with tensor product structure


    Puchała, Zbigniew; Gawron, Piotr; Miszczak, Jarosław Adam; Skowronek, Łukasz; Choi, Man-Duen; Życzkowski, Karol


    We study operators acting on a tensor product Hilbert space and investigate their product numerical range, product numerical radius and separable numerical range. Concrete bounds for the product numerical range for Hermitian operators are derived. Product numerical range of a non-Hermitian operator forms a subset of the standard numerical range containing the barycenter of the spectrum. While the latter set is convex, the product range needs not to be convex nor simply connected. The product ...

  11. Soy production and certification

    DEFF Research Database (Denmark)

    Tomei, Julia; Semino, Stella Maris; Paul, Helena


    With the rising emphasis on biofuels as a potential solution to climate change, this paper asks whether certification schemes, developed to promote sustainable feedstock production, are able to deliver genuine sustainability benefits. The Round Table on Responsible Soy (RTRS) is a certification...... the social and environmental impacts of soybean production can be mitigated by the RTRS. It concludes that at present certification schemes are unlikely to be able to address either the institutional challenges associated with their implementation or the detrimental impacts of the additional demand generated...... scheme that aims to promote responsible soy production through the development of principles and criteria. However, can and does this initiative address the negative impacts associated with the intensive production of soy? Taking the example of soy biodiesel produced in Argentina, this paper asks whether...

  12. Productive and Unproductive Competition

    DEFF Research Database (Denmark)

    Guerra, Alice; Luppi, Barbara; Parisi, Francesco

    Conventional theories of competition classify contests as being either “productive,” when the competitive efforts generate a surplus for society, or “unproductive,” when competition generates no social surplus and merely distributes already existing resources. These two discrete categories of com...... and socially optimal levels of competition in the full range of intermediate cases, as well as in the extremum cases of destructive and super-productive competition.......Conventional theories of competition classify contests as being either “productive,” when the competitive efforts generate a surplus for society, or “unproductive,” when competition generates no social surplus and merely distributes already existing resources. These two discrete categories...... of competition create a division of real-world situations into analytical categories that fails to recognize the entire spectrum of competitive activities. Taking the existing models of productive and unproductive competition as benchmark idealizations, this paper explores the relationship between the privately...

  13. Segregation in cast products

    Indian Academy of Sciences (India)


    The agreement with experimental data is mostly qualitative. The paper also ... For example, a high degree of positive segregation in the central region .... solute in a cast product, important ones being: size of casting, rate of solidification, mode.

  14. Household Products Database (United States)

    ... your bathroom, and on the shelves in your laundry room? Learn more about what's in these products, ... MD 20894 National Institutes of Health , Health & Human Services Customer Service: Last ...


    African Journals Online (AJOL)



    Feb 23, 2016 ... The pulp and kernels of the fruit are the only by-products marketed by women and mainly girls who .... characteristics of trees and fruit involved, 30 adult hermaphrodite ..... Ethnobotanical research and traditional health care in.

  16. Smallholder pig production

    DEFF Research Database (Denmark)

    Braae, Uffe Christian; Ngowi, Helena; Johansen, Maria Vang


    A cross-sectional study was carried out in the Mbeya Region, Tanzania, with the aim of describing the distribution and diversity of ectoparasites on pigs, within confinement and free-range production systems of smallholder farms. A total of 128 farms were surveyed, with 96 practising confinement...... and 32 practising free-range production systems. The prevalence of ectoparasites on pigs within confinement and free-range production systems was 24% and 84%, respectively. Logistic regression analyses revealed that keeping pigs in a free-range system and the presence of neighbouring pigs were risk...... although highly prevalent within both production systems. Keeping pigs in a free-range system and contact with neighbouring pigs were main risk factors for the presence of ectoparasites. Confinement was highly effective as a preventive tool against hard ticks....

  17. Peanut Product Recalls (United States)

    U.S. Department of Health & Human Services — This list includes human and pet food subject to recall in the United States since January 2009 related to peanut products distributed by Peanut Corporation of...

  18. Products by Glycation Process

    Directory of Open Access Journals (Sweden)

    Liliana Ortega


    Full Text Available The antioxidant properties of sweet and acid whey products were incremented by polymerization of their proteins by glycation of whey protein concentrates (WPC and their hydrolyzates (WPCH with ribose and glucose in individual experiments under similar concentration. Heating at 50°C during 20 h maximum and pH 7 and pH 9 were used in all tests. The higher activity was found in WPC glycosylates products with ribose at pH 7 and heating during 10–15 h. In comparable form, antioxidant activity in WPCH was incremented by prior hydrolysis to glycation with 25–45% of hydrolysis degree. Further functional properties of whey proteins (solubility, emulsion, and foam were also improved by the polymerization with ribose. The color of polymerized products due to Maillard reactions was associated with antioxidant activity of each compound; however comparative color in glycosylates products with glucose and ribose did not show this effect.

  19. Vegetable Production System (Veggie) (United States)

    National Aeronautics and Space Administration — The Vegetable Production System (Veggie) was developed to be a simple, easily stowed, high growth volume, low resource facility capable of producing fresh vegetables...

  20. NSP Production Reports (United States)

    Department of Housing and Urban Development — NSP Production Reports contain cumulative data on units assisted with NSP funds. An NSP grantee reports on the accomplishment of an activity when it meets an End...

  1. OSU Chlorophyll Bloom Product (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This product was developed for the Oregon coast based on the observed change between running 8-day composite chlorophyll-a (CHL) data obtained by the MODerate...

  2. Radioactivity in consumer products

    Energy Technology Data Exchange (ETDEWEB)

    Moghissi, A.A.; Paras, P.; Carter, M.W.; Barker, R.F. (eds.)


    Papers presented at the conference dealt with regulations and standards; general and biological risks; radioluminous materials; mining, agricultural, and construction materials containing radioactivity; and various products containing radioactive sources.

  3. Kronecker Products on Preconditioning

    KAUST Repository

    Gao, Longfei


    techniques have become increasingly popular due to their great potential on large scale computation. In this work, we present preconditioning techniques for linear systems built with tensor product basis functions. Efficient algorithms are designed

  4. Challenges in biogas production

    DEFF Research Database (Denmark)

    Rennuit, Charlotte


    Anaerobic digestion (AnD) is a sustainable process combining waste treatment, nutrient recycling and energy production which can contribute to limit climate change and environmental problems. However, in order for this technique to be more widely used, production of biogas from available wastes...... from a mixture of pig manure and other waste materials by separating the solid fraction of digestate and recycling it back to the digester. It is shown that separation and recycling of the dry matter rich solid fraction could successfully increase biogas production and a preliminary economic evaluation...... showed a potential increase of 1.9 to 6.8€ per ton of biomass treated. In the second part of this study, a biological treatment to improve energy production from wastewater sludge was investigated. Wastewater sludge was subjected to thermophilic aerobic digestion (TAD) from 2h to 5d. Increase in biogas...

  5. Proprietary policy and production

    Czech Academy of Sciences Publication Activity Database

    Jeong, Byeongju

    -, č. 287 (2006), s. 1-14 ISSN 1211-3298 Institutional research plan: CEZ:MSM0021620846 Keywords : proprietary regime * direct production * model Subject RIV: AH - Economics

  6. Measuring multifactor productivity growth

    Czech Academy of Sciences Publication Activity Database

    Wölfl, A.; Hájková, Dana

    -, 2007/5 (2007), s. 1-45 Institutional research plan: CEZ:AV0Z70850503 Keywords : multifactor productivity growth * GDP growth * measuring Subject RIV: AH - Economics

  7. Products in fusion systems

    DEFF Research Database (Denmark)

    Henke, Ellen


    We revisit the notion of a product of a normal subsystem with a p-subgroup as defined by Aschbacher (2011) [Asc11, Chapter 8]. In particular, we give a previously unknown, more transparent construction....

  8. From Environment to Production

    KAUST Repository

    Kodzius, Rimantas; Behzad, H.; Archer, John A.C.; Bajic, Vladimir B.; Gojobori, Takashi


    Using Metagenomic analysis, computational modeling, single cell and genome editing technologies, we are expressing desired microbial genes and their networks in suitable hosts for mass production of energy, food, and fine chemicals

  9. Top Production at LHCb

    CERN Multimedia

    Santana Rangel, Murilo


    Single and pair top production in the forward direction at the LHC allows for precision tests of the Standard Model. The observation of top quarks in 7 and 8 TeV data and prospects for precision measurements are shown.

  10. Processed Products Database System (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Collection of annual data on processed seafood products. The Division provides authoritative advice, coordination and guidance on matters related to the collection,...

  11. Product lifecycle management

    CERN Document Server

    Stark, John


    This third edition updates and adds to the successful second edition and gives the reader a thorough description of PLM, providing them with a full understanding of the theory and the practical skills to implement PLM within their own business environment. This new and expanded edition is fully updated to reflect the many technological and management advances made in PLM since the release of the second edition. Describing the environment in which products are developed, manufactured and supported, before addressing the Five Pillars of PLM: business processes, product data, PLM applications, Organisational Change Management (OCM) and Project Management, this book explains what Product Lifecycle Management is, and why it’s needed. The final part of the book addresses the PLM timeline, showing the typical steps and activities of a PLM project or initiative. “Product Lifecycle Management” will broaden the reader’s understanding of PLM, nurturing the skills needed to implement PLM successfully and to achi...

  12. From Environment to Production

    KAUST Repository

    Kodzius, Rimantas


    Using Metagenomic analysis, computational modeling, single cell and genome editing technologies, we are expressing desired microbial genes and their networks in suitable hosts for mass production of energy, food, and fine chemicals

  13. Food Product Dating (United States)

    ... Standard Forms FSIS United States Department of Agriculture Food Safety and Inspection Service About FSIS District Offices ... Web Content Viewer (JSR 286) Actions ${title} Loading... Food Product Dating "Best if Used By" is a ...

  14. Minimum entropy production principle

    Czech Academy of Sciences Publication Activity Database

    Maes, C.; Netočný, Karel


    Roč. 8, č. 7 (2013), s. 9664-9677 ISSN 1941-6016 Institutional support: RVO:68378271 Keywords : MINEP Subject RIV: BE - Theoretical Physics

  15. Forecast Icing Product (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Forecast Icing Product (FIP) is an automatically-generated index suitable for depicting areas of potentially hazardous airframe icing. The FIP algorithm uses...

  16. Bottonium production at LEP

    International Nuclear Information System (INIS)

    Abraham, K.J.


    The production of γ ('3S 1 ) and η b ( 1 S 0 ) with two gluons from Z decay is investigated. It is found that at LEP luminosities experimental detection will hardly be feasible. (author). 9 refs.; 1 fig

  17. Current Icing Product (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Current Icing Product (CIP) is an automatically-generated index suitable for depicting areas of potentially hazardous airframe icing. The CIP algorithm combines...

  18. Acetone production by methylobacteria. (United States)

    Thomson, A W; O'Neill, J G; Wilkinson, J F


    An accumulation of acetone was observed during the metabolism of ethane and products of ethane oxidation by washed suspensions of Methylosinus trichosporium OB3B. This strain possessed an acetoacetate decarboxylase and 3-hydroxybutyrate dehydrogenase, and a decline in poly-beta-hydroxybutyric acid occurred under the same conditions as acetone formation. A pathway of acetone production from poly-beta-hydroxybutyric acid via 3-hydroxybutyrate and acetoacetate was suggested.

  19. Pretreated densified biomass products (United States)

    Dale, Bruce E; Ritchie, Bryan; Marshall, Derek


    A product comprising at least one densified biomass particulate of a given mass having no added binder and comprised of a plurality of lignin-coated plant biomass fibers is provided, wherein the at least one densified biomass particulate has an intrinsic density substantially equivalent to a binder-containing densified biomass particulate of the same given mass and h a substantially smooth, non-flakey outer surface. Methods for using and making the product are also described.

  20. Productivity Improvement for Engineers. (United States)


    organization and the likely positions or types of work that will be required of the engineer in the future. There should therefore, be a balance of...Mall, P., Improving Total Productivity, John Wiley & Sons, New York, 1978. Miller, R.B., Participative Management-Quality of Worklife and Job Enrichment...Noyes Data Corp., Park Ridge, N.J., 1977. Hughes Aircraft Co., R & D Productivity-Study Report, Hughes Aircraft Co., Culver City , California, 1974

  1. Conditions for industrial production

    DEFF Research Database (Denmark)

    Jensen, Karsten Ingerslev; Schultz, Jørgen Munthe; Brauer, H.


    The possibility of an industrial aerogel glazing production is discussed with respect to sample size, sales volume and prices. Different ways of an industrial assembling line is outlined and the total costs of a 1 square meter aerogel glazing is calculated.......The possibility of an industrial aerogel glazing production is discussed with respect to sample size, sales volume and prices. Different ways of an industrial assembling line is outlined and the total costs of a 1 square meter aerogel glazing is calculated....

  2. Mycotoxins in poultry production


    Resanović Radmila M.; Nešić Ksenija D.; Nesić Vladimir D.; Palić Todor D.; Jaćević Vesna M.


    All poultry is sensitive to mycotoxins. This partly depends on the type, age and production categories of poultry, their living conditions and nutritive status and partly on the type, quantity and duration of mycotoxin ingestion. The presence of mycotoxins results in significant health disorders and a decrease in production performances. This leads to considerable economic loss for the poultry industry - either direct losses, i.e. death of the poultry or the indirect ones, i.e. the decrease i...

  3. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen


    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  4. New product pricing

    International Nuclear Information System (INIS)

    Wilkinson, V.K.


    One of the most uncertain elements in budget planning is estimating production costs of items that have heretofore only been produced in prototype configurations and quantities. This paper examines the design and development of a mathematical model which computes appropriate prices for new and unique products. The resulting model offers a producer a fair return on his investment and the consumer a fair purchase price

  5. Selling new products


    Borgh, van der, W.


    As we proceed into the 21st century, companies are facing increasingly complex and dynamic business environments. Many organizations have to deal with intense competition as more products are introduced faster, with shorter life cycles, and less competitive differentiation. Consequently, companies are pushed to not only be more adept in product development but also in capitalizing on these innovative activities. However, while companies have become more successful in inventing and developing ...

  6. Managing Joint Production Motivation

    DEFF Research Database (Denmark)

    Lindenberg, Siegwart; Foss, Nicolai Juul


    We contribute to the microfoundations of organizational performance by proffering the construct of joint production motivation. Under such motivational conditions individuals see themselves as part of a joint endeavor, each with his or her own roles and responsibilities; generate shared...... representations of actions and tasks; cognitively coordinate cooperation; and choose their own behaviors in terms of joint goals. Using goal-framing theory, we explain how motivation for joint production can be managed by cognitive/symbolic management and organizational design....

  7. Radioactive consumer products

    International Nuclear Information System (INIS)

    Sato, Otomaru


    Present situation of utilizing the radioactive consumer products and exposure dose were reviewed with published data. Practically, consumer products are divided into three categories, (1) radioactive nuclides intentionally incorporated into radioluminous dye, ionization chambers for smoke detector, eliminator of static electricity, and glow lamp (2) natural radioactive nuclides contained in false teeth, porcelain, glass, and gas mantle (3) natural radioactive nuclides accumulated as industrial waste at the consumption of coal, petroleum, and natural gas or in fertilizer and materials for construction. (Nakanishi, T.)

  8. PRODUCTION OF TRITIUM (United States)

    Jenks, G.H.; Shapiro, E.M.; Elliott, N.; Cannon, C.V.


    This invention relates to a process for the production of tritium by subjecting comminuted solid lithium fluoride containing the lithium isotope of atomic mass number 6 to neutron radiation in a self-sustaining neutronic reactor. The lithium fiuoride is heated to above 450 deg C. in an evacuated vacuum-tight container during radiation. Gaseous radiation products are withdrawn and passed through a palladium barrier to recover tritium. (AEC)

  9. Heavy quark production

    International Nuclear Information System (INIS)

    Rossi, L.; Genoa Univ.


    The hadro- and photo-production of charm and beauty particles are reviewed. The most recent experimental results on charm are compared with the next-to-leading order perturbative QCD calculations as a check of the theory. Results on beauty production at hadronic colliders are presented and indicate that these machines may also be regarded as beauty factories. (author) 21 refs.; 18 figs.; 2 tabs


    Directory of Open Access Journals (Sweden)

    Ľubomíra Juhaniaková


    Full Text Available The aim of this work was to determine microbiological quality of confectionery products. In confectionery products microbiological parameters: coliforms bacteria, microscopic filamentous fungi and yeasts, Salmonella sp. and staphylococci were observed. The confectionery products were evaluated: Kremes - honey cube, roll Arabica, roll Rona, roll stuffed with apricot cream, honey cube, pinwheel caramel, Sachovnica cut, Zora cut and curd cake. For microbiological tests 18 samples of confectionery products were used. Numbers of coliforms bacteria in confectionery products ranged from <1x101 to 4x102 cfu.g-1, the number of microscopic fungi ranged from 0 to <1x101 cfu.g-1, the number of yeasts from <1x101 to 5.5x102 cfu.g-1, cells of Salmonella sp. were not detected and the number of staphylococci was from 0 to <1x101 cfu.g-1. All investigated samples of confectionary products were in accordance with the Codex Alimentarius of the Slovak Republic.

  11. Material and energy productivity. (United States)

    Steinberger, Julia K; Krausmann, Fridolin


    Resource productivity, measured as GDP output per resource input, is a widespread sustainability indicator combining economic and environmental information. Resource productivity is ubiquitous, from the IPAT identity to the analysis of dematerialization trends and policy goals. High resource productivity is interpreted as the sign of a resource-efficient, and hence more sustainable, economy. Its inverse, resource intensity (resource per GDP) has the reverse behavior, with higher values indicating environmentally inefficient economies. In this study, we investigate the global systematic relationship between material, energy and carbon productivities, and economic activity. We demonstrate that different types of materials and energy exhibit fundamentally different behaviors, depending on their international income elasticities of consumption. Biomass is completely inelastic, whereas fossil fuels tend to scale proportionally with income. Total materials or energy, as aggregates, have intermediate behavior, depending on the share of fossil fuels and other elastic resources. We show that a small inelastic share is sufficient for the total resource productivity to be significantly correlated with income. Our analysis calls into question the interpretation of resource productivity as a sustainability indicator. We conclude with suggestions for potential alternatives.

  12. Particle production by neutrinos

    International Nuclear Information System (INIS)

    Schreiner, P.


    A review is given of particle production by neutrinos in charged-current inclusive and exclusive channels. The production rates for various particles in neutrino-nucleon interactions at a beam energy of 25 GeV are compared. The mesons are, of course, dominated by pion production. The p 0 (760) rate is an order of magnitude smaller. Strange and charm pseudoscalar mesons are a further factor of two down in rate. The strange vector mesons are suppressed by more than an order of magnitude relative to K 0 production; however, the charmed D* + (2010) is only a factor of two smaller in rate than the D 0 (1860). With regards to the baryons, most of them are, of course, nucleons. The Λ 0 and Y*(1385) rates are down by one and two orders of magnitudes, respectively. The lower limit on the charmed Σ/sub c/ ++ baryon rate is similar to the Y*(1385) rate. Finally, the quasielastic and one-pion production exclusive channels have about the same cross section as that of the D* + ; associated production of strange particles in the νn → μ - K + Λ channel and the ΔS = +ΔΩ process νp → μ - pK + are down by factors of five and twenty, respectively, compared to the quasielastic cross section

  13. Whither tobacco product regulation? (United States)

    McNeill, Ann; Hammond, David; Gartner, Coral


    Despite decades of industry innovation and regulatory efforts, the harmfulness of conventional cigarettes has not changed. There are several pitfalls in this area, including the long time lag before health impacts of product regulatory changes become apparent, the danger of consumers deriving false reassurance of lesser harm in the interim period, the lack of relevant expertise and the lack of an internationally agreed and evidence-based strategic approach. Articles 9 and 10 of the Framework Convention on Tobacco Control provide the potential for such a global strategy, and knowledge and research has increased significantly over recent years. However, there are huge opportunity costs in implementing product disclosure and regulatory strategies: most national regulators have very limited human and financial resources, which should be focused on other evidence-based tobacco control interventions. We believe therefore that it is now time to abandon the notion of safe or safer cigarettes while moving consumers towards cleaner nicotine products as soon as possible. In parallel to this, we recommend a number of other strategies be implemented including: reducing the appeal of all tobacco products, forbidding new tobacco products or brand variants being marketed without evidence of reduced harm, appeal or addictiveness, and developing a tobacco industry resourced, but industry independent, Framework Convention on Tobacco Control global repository to assist national regulators in understanding and regulating the products on their markets.

  14. Production of uranium dioxide

    International Nuclear Information System (INIS)

    Hart, J.E.; Shuck, D.L.; Lyon, W.L.


    A continuous, four stage fluidized bed process for converting uranium hexafluoride (UF 6 ) to ceramic-grade uranium dioxide (UO 2 ) powder suitable for use in the manufacture of fuel pellets for nuclear reactors is disclosed. The process comprises the steps of first reacting UF 6 with steam in a first fluidized bed, preferably at about 550 0 C, to form solid intermediate reaction products UO 2 F 2 , U 3 O 8 and an off-gas including hydrogen fluoride (HF). The solid intermediate reaction products are conveyed to a second fluidized bed reactor at which the mol fraction of HF is controlled at low levels in order to prevent the formation of uranium tetrafluoride (UF 4 ). The first intermediate reaction products are reacted in the second fluidized bed with steam and hydrogen at a temperature of about 630 0 C. The second intermediate reaction product including uranium dioxide (UO 2 ) is conveyed to a third fluidized bed reactor and reacted with additional steam and hydrogen at a temperature of about 650 0 C producing a reaction product consisting essentially of uranium dioxide having an oxygen-uranium ratio of about 2 and a low residual fluoride content. This product is then conveyed to a fourth fluidized bed wherein a mixture of air and preheated nitrogen is introduced in order to further reduce the fluoride content of the UO 2 and increase the oxygen-uranium ratio to about 2.25

  15. Tobacco industry use of judicial seminars to influence rulings in products liability litigation (United States)

    Friedman, L C


    Objectives This paper examines the tobacco industry's efforts to influence litigation by sponsoring judicial seminars. Methods Thousands of internal tobacco documents were examined, including memos, reports, presentations, and newsletters. Connections to outside organisations were corroborated by examining tobacco industry financial records, budgets, and letters pledging funds. Facts about outside organisations were triangulated through examining their websites and publicly‐filed financial records, and verifying facts through their representatives' statements in newspaper and law review articles. Results There are direct financial ties between the tobacco industry and groups that organise judicial seminars in an effort to influence jurisprudence, and judges who attend these seminars may be breaching judicial ethics either by not inquiring about the source of funding or by ignoring funding by potential litigants. Conclusions The tobacco industry's attempts to clandestinely influence judges' decisions in cases to which they are a party endangers the integrity of the judiciary. PMID:16565460

  16. Product Quality and Worker Quality


    Abowd, John M; Kramarz, Francis


    We study the relation between product quality and worker quality using an economic model that, under certain conditions, provides a direct link between product price, product quality and work-force quality. Our measures of product quality are the evolution in the detailed product price relative to its product group, and the level of the product price relative to this group. Our worker quality measures are the firm's average person effect and personal characteristics effect from individual wag...

  17. Product Quality and Worker Quality


    John M. ABOWD; Françis KRAMARZ; Antoine MOREAU


    We study the relation between product quality and worker quality using an economic model that, under certain conditions, provides a direct link between product price, product quality and work force quality. Our measures of product quality are the evolution in the detailed product price relative to its product group and the level of the product price relative to this group. Our worker quality measures are the firm's average person effect and personal characteristics effect from individual wage...

  18. Perspectives in production of functional meat products (United States)

    Vasilev, D.; Glišić, M.; Janković, V.; Dimitrijević, M.; Karabasil, N.; Suvajdžić, B.; Teodorović, V.


    The meat industry has met new challenges since the World Health Organization classified processed meat in carcinogenic Group 1. In relation to this, the functional food concept in meat processing has gained importance, especially in reducing carcinogenic N-nitroso compounds and polycyclic aromatic hydrocarbons (PAHs) as an additional imperative, apart from the usual fat and salt reduction and product enrichment with functional ingredients. PAH reduction relies on control of the smoking process, but there is also a possibility they could be degraded by means of probiotic microorganisms or spices. The reduction of N-nitroso compounds could be provided by lowering the amount of added nitrite/nitrate, using substitutes for these chemicals, and/or by preventing conditions for the creation of N-nitroso compounds. Nevertheless, fat and salt reductions still remain topical, and rely mostly on the use of functional ingredients as their substitutes.

  19. Biodiesel production technologies: review

    Directory of Open Access Journals (Sweden)

    Shemelis Nigatu Gebremariam


    Full Text Available Biodiesel is a fuel with various benefits over the conventional diesel fuel. It is derived from renewable resources, it has less emission to environment, it is biodegradable so has very limited toxicity and above all its production can be decentralized so that it could have a potential in helping rural economies. However, there are also some worth mentioning challenges associated with production of biodiesel. Among them repeatedly mentioned are the cost of feedstock and the choice of convenient technology for efficient production of the fuel from diverse feedstock types. There are four main routes by which raw vegetable oil and/or animal fat can be made suitable for use as substituent fuel in diesel engines without modification. These are direct use or blending of oils, micro-emulsion, thermal cracking or pyrolysis and transesterification reaction. Due to the quality of the fuel produced, the transesterification method is the most preferred way to produce biodiesel from diverse feedstock types. Through this method, oils and fats (triglycerides are converted to their alkyl esters with reduced viscosity to near diesel fuel levels. There are different techniques to carry out transesterification reaction for biodiesel production. Each technique has its own advantages and disadvantages as well as its own specifically convenient feedstock character. There are also some very important reaction conditions to be given due attention in each of this techniques for efficient production of biodiesel, such as molar ratio of alcohol to oil, type and amount of catalyst, reaction temperature, reaction time, reaction medium, type and relative amount of solvents, among others. This review is meant to investigate the main transesterification techniques for biodiesel production in terms of their choice of feedstock character as well as their determinately required reaction conditions for efficient biodiesel production, so that to give an overview on their advantages

  20. Product Knowledge Modelling and Management

    DEFF Research Database (Denmark)

    Zhang, Y.; MacCallum, K. J.; Duffy, Alex


    function-oriented design. Both Specific Product Knowledge and Product Domain Knowledge are modelled at two levels, a meta-model and an information-level.Following that, a computer-based scheme to manage the proposed product lknowledge models within a dynamically changing environment is presented.......The term, Product Knowledge is used to refer to two related but distinct concepts; the knowledge of a specific product (Specific Product Knowledge) and the knowledge of a product domain (Product Domain Knowledge). Modelling and managing Product Knowlege is an essential part of carrying out design.......A scheme is presented in this paper to model, i.e. classify, structure and formalise the product knowledge for the purpose of supporting function-oriented design. The product design specification and four types of required attributes of a specific product have been identified to form the Specific Product...

  1. Smoke production in fires

    Energy Technology Data Exchange (ETDEWEB)

    Sarvaranta, L.; Kokkala, M. [VTT Building Technology, Espoo (Finland). Building Physics, Building Services and Fire Technology


    Characterization of smoke, factors influencing smoke production and experimental methods for measuring smoke production are discussed in this literature review. Recent test-based correlation models are also discussed. Despite the large number of laboratories using different fire testing methods, published smoke data have been scarce. Most technical literature on smoke production from building materials is about experimental results in small scale tests. Compilations from cone calorimeter tests have been published for a few materials, e.g. upholstered furniture materials and some building products. Mass optical density data and compilations of gravimetric soot data are available for various materials as well as a number of smoke obscuration values. For a given material often a wide range of values of smoke output can be found in the literature and care should be exercised in applying the appropriate value in each case. In laboratory experiments, the production of smoke and its optical properties are often measured simultaneously with other fire properties as heat release and flame spread. The measurements are usually dynamic in full scale, i.e. they are performed in a flow-through system. In small scale they may be either dynamic, as in the cone calorimeter, or static, i.e. the smoke is accumulated in a closed box. Small-scale tests are necessary as practical tools. Full-scale tests are generally considered to be more reliable and are needed to validitate the small-scale tests

  2. New Product Launching Ideas (United States)

    Kiruthika, E.


    Launching a new product can be a tense time for a small or large business. There are those moments when you wonder if all of the work done to develop the product will pay off in revenue, but there are many things are can do to help increase the likelihood of a successful product launch. An open-minded consumer-oriented approach is imperative in todayís diverse global marketplace so a firm can identify and serve its target market, minimize dissatisfaction, and stay ahead of competitors. Final consumers purchase for personal, family, or household use. Finally, the kind of information that the marketing team needs to provide customers in different buying situations. In high-involvement decisions, the marketer needs to provide a good deal of information about the positive consequences of buying. The sales force may need to stress the important attributes of the product, the advantages compared with the competition; and maybe even encourage ìtrialî or ìsamplingî of the product in the hope of securing the sale. The final stage is the post-purchase evaluation of the decision. It is common for customers to experience concerns after making a purchase decision. This arises from a concept that is known as ìcognitive dissonance

  3. Hydrogen production by radiation

    International Nuclear Information System (INIS)

    Jung, Jin Ho; Lee, M. J.; Jin, J. H.; Park, K. B.; Cho, Y. H.; Jeong, H. S.; Chung, H. H.; Jeong, Y. S.; Ahn, S. S.


    In this work, various kinds of catalysts including a nanosize TiO2 (nTiO 2 ) were examined in respect to the efficiency of H2 production by gamma rays.The different activity of catalysts was characterized by X-ray powder diffraction (XRD) and electron paramagnetic resonance (EPR). A combination of EPR and spin-trapping method was also used to detect unstable radicals such as hydroxyl radicals and hydrogen atoms to investigate the effect of catalysts and additives on the efficiency of H2 production. A nanosize TiO 2 (nTiO 2 ) catalyst that showed an excellent activity in the production of H2 from water by gamma rays were examined in respect to the efficiency of H2 production with concomitant treatment of metal-EDTA complexes that are main wastes of chemical cleaning wastewater. As a result, among the catalysts examined in this work, a nanosize TiO2 (nTiO 2 ) showed the most efficient H2 production and the efficiency increased upon reapplication. This catalyst was also successfully used to produce H2 with concomitant treatment of metal-EDTA complexes

  4. Uranium production in Sweden

    International Nuclear Information System (INIS)

    Bergh, S.


    The history of uranium production in Sweden is reviewed in the article. The World War II led to an exploitation of the Swedish alum shale on a large scale. In the last phase of the war it also became obvious that the shale might be used for energy production of quite another kind than oil. In 1947 AB Atom energy was founded, an enterprise with one of its purposes to extract uranium for peaceful use. A plant with a yearly capacity of 120 tons of uranium was erected at Ranstad and ready for production by 1965. From the start in Ranstad and for many years to come there was hardly any interest in an immediate large uranium production. It was decided to use the plant for studies on its more effective exploitation in case of an expansion in the future, bearing in mind the reactor programme. In the course of time economical reasons began to speak against the project. The shale seemed to have a future neither as oil nor as uranium resource. The complete termination of the work on uranium production from shale occurred in 1989

  5. Gestion de production

    CERN Document Server

    Courtois, Alain; Pillet, Maurice


    n ouvrage de référence pour tous les gestionnaires de production industrielle. Un cas concret d'entreprise fictive, fil rouge de l'ouvrage, pour expliquer et illustrer les différents outils et méthodes utilisés. Toutes les méthodes et tous les outils de gestion de production, des plus traditionnels aux novateurs, explicités, comparés et illustrés. L'ouvrage, entièrement mis à jour, reflète toutes les évolutions liées à la gestion de production. II se divise désormais en deux grandes partes ; la première regroupe les méthodes de base de la gestion de la production ainsi que l'informatisation de celles-ci (chapitres 2 à 10) ; la seconde concerne les méthodes d'amélioration de la production (chapitres 11 à 15), en mettant un accent fort sur la philosophie du Lean Manufacturing : L'entreprise en mouvement avec le Lean ; Les principaux outils du Lean ; Le pilotage d'atelier en flux tirés par la méthode Kanban ; L'implantation d'ateliers ; Les indicateurs de performance. Pour faciliter la le...

  6. Optimizing kaon production

    International Nuclear Information System (INIS)

    Berley, D.


    Kaon production data is examined with the view toward producing high quality beams in the future. Emphasis is placed upon the low momentum region, below 1 GeV/c, where the behavior of the kaon momentum spectrum is shown to be dominated by strongly momentum dependent kinematic factors. No complete experimental survey of production cross sections at different incident proton energies exists from a single apparatus. Information on relative production yields for different proton energies is important in the choice of parameters for an accelerator constructed primarily as a source of kaons. Data from different accelerators do exist and have been compiled. The key element in understanding how to present the data from different laboratories in a consistent way is an analysis of the effects of target material, target size, and production angle. This analysis not only enables a unification of the data but also indicates simple, useful and powerful principles about optimizing target efficiency. A summary is presented of existing kaon production facilities in the United States. These are all at proton accelerators. The possibility of using electron accelerators as kaon sources is examined. It is found that secondary beam fluxes can be obtained at electron linacs which are comparable to those obtained at proton synchrotrons

  7. Smoke production in fires

    Energy Technology Data Exchange (ETDEWEB)

    Sarvaranta, L; Kokkala, M [VTT Building Technology, Espoo (Finland). Building Physics, Building Services and Fire Technology


    Characterization of smoke, factors influencing smoke production and experimental methods for measuring smoke production are discussed in this literature review. Recent test-based correlation models are also discussed. Despite the large number of laboratories using different fire testing methods, published smoke data have been scarce. Most technical literature on smoke production from building materials is about experimental results in small scale tests. Compilations from cone calorimeter tests have been published for a few materials, e.g. upholstered furniture materials and some building products. Mass optical density data and compilations of gravimetric soot data are available for various materials as well as a number of smoke obscuration values. For a given material often a wide range of values of smoke output can be found in the literature and care should be exercised in applying the appropriate value in each case. In laboratory experiments, the production of smoke and its optical properties are often measured simultaneously with other fire properties as heat release and flame spread. The measurements are usually dynamic in full scale, i.e. they are performed in a flow-through system. In small scale they may be either dynamic, as in the cone calorimeter, or static, i.e. the smoke is accumulated in a closed box. Small-scale tests are necessary as practical tools. Full-scale tests are generally considered to be more reliable and are needed to validitate the small-scale tests

  8. Product mix retail strategies

    Directory of Open Access Journals (Sweden)

    Ristić Miloš


    Full Text Available The sales of appropriate merchandise is essential for performance of every retail enterprise. The way that products are displayed within retail sales object will be in so much important as the merchandise is considered a pad of the perceived image of that outlet. Thus, assorted products speak to their consumers as far as to what they [the consumers] can expect, and they signal off a number of marketing messages as well. Merchandising is the key element in attracting the consumers and in encouraging of repeated purchases. The question then could be: products or services?, yet the retailer's future will depend on his ability to develop the best sale offers. The selection of appropriate merchandise, and that would be the one [merchandise] that is in accordance with outlet's image, requires careful planning which, again, needs to be related with the direction the seller is following. Managing of the product assortments' dimensions emerges from the retailer's strategic planning, therefore, the decisions made on the inclusion of novel products as well as about deleting of the old stock are deemed (to be strategic.

  9. Oil production system

    Energy Technology Data Exchange (ETDEWEB)

    Ballantyne, J F


    A new oil producing system is proposed which consists of a group of underwater wells, an underwater riser and a floating storage facility for the production of the wells. The group of wells and the riser are interconnected through a manifold system in such a way that the production from any well or from the entire group of wells go to the base (foundation) of the riser. From above the riser is connected with the floating storage facility which is equipped, besides tanks for storing the well products, with a separation device for separating the oil and the accompanying gas. The gas is used as a fuel for producing electric power required by the dynamic positioning systems. The products from each well are tested by means of a regulable coupling controlled by means of a cable, which is passed from the surface through the riser. The wellhead equipment for the unslanted wells is mounted on a template previously installed on the sea floor. From the template the well products enter the riser through the manifold unit system.

  10. Beauty production at CDF

    International Nuclear Information System (INIS)

    Shears, Tara


    A review of recent measurements of beauty production, based on proton antiproton collision data at √s = 1.96 TeV and using the CDF detector, is given. Previous measurements of beauty (b) quark production at the Tevatron, carried out at centre-of-mass energies √s = 1.8 TeV, have shown discrepancies when compared to Next to Leading Order (NLO) predictions [1]. Improved predictions and experimental procedures have reduced this discrepancy [2]. Improved parton density functions, better fragmentation functions and more complete theoretical calculations have improved theoretical accuracy. Experimentally, measurements of beauty production at √s = 1.96 TeV are now presented in terms of b hadrons or B mesons, to avoid problems unfolding back to the quark level. In this review [3] measurements of inclusive beauty (where one beauty jet or hadron is reconstructed in the event), and beauty + X (where X can be a boson or another beauty jet or hadron), production will be presented: inclusive beauty jet cross-section; semi and fully reconstructed B meson cross-section; beauty dijet cross-section; semi-reconstructed B B meson cross-section; Z boson + beauty jet cross-section. More information concerning other measurements of heavy quark production can be found elsewhere [4

  11. Application of manufactured products (United States)

    Sastri, Sankar; Duke, Michael B.


    A wide range of products can be manufactured from the following materials: (1) lunar regolith or basalt; (2) regolith or rock beneficiated to concentrate plagioclase or other minerals; (3) iron, extracted from lunar soil or rocks by various means; (4) naturally occurring or easily obtained materials that have cementitious properties; and (5) byproducts of the above materials. Among the products that can be produced from these materials are the following: beams; plates and sheets; transparent plates (windows); bricks and blocks; pipes and tubes; low-density materials (foams); fiber, wire, and cables; foils and reflective coatings; hermetic seals (coatings); and formed objects. In addition to oxygen, which can be obtained by several processes, either from unbeneficiated regolith or by reduction of concentrated ilmenite, these materials make the simplest requirements of the lunar resource extraction system. A thorough analysis of the impact of these simplest products on the economics of space operations is not possible at this point. Research is necessary both to define optimum techniques and adapt them to space and to determine the probable market for the products so that the priority of various processes can be assessed. Discussions of the following products are presented: aerobraking heat shields; pressurized habitats; lunar photovoltaic farms; and agricultural systems.

  12. ATLAS production system

    CERN Document Server

    Borodin, Mikhail; The ATLAS collaboration; De, Kaushik; Klimentov, Alexei; Golubkov, Dmitry; Maeno, Tadashi; Mashinistov, Ruslan; Wenaus, Torre; Padolski, Siarhei


    The second generation of the ATLAS production system called ProdSys2 is a distributed workload manager which used by thousands of physicists to analyze the data remotely, with the volume of processed data is beyond the exabyte scale, across a more than hundred heterogeneous sites. It achieves high utilization by combining dynamic job definition based on many criterias, such as input and output size, memory requirements and CPU consumption with manageable scheduling policies and by supporting different kind of computational resources, such as GRID, clouds, supercomputers and volunteering computers. Besides jobs definition Production System also includes flexible web user interface, which implements user-friendly environment for main ATLAS workflows, e.g. simple way of combining different data flows, and real-time monitoring, optimised for using with huge amount of information to present. We present an overview of the ATLAS Production System major components: job and task definition, workflow manager web user i...

  13. Renewable Acrylonitrile Production

    Energy Technology Data Exchange (ETDEWEB)

    Beckham, Gregg T [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Karp, Eric M [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Eaton, Todd R [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Sanchez i Nogue, Violeta [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Vorotnikov, Vassili [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Biddy, Mary J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Tan, Eric C [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Brandner, David [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Manker, Lorenz [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Michener, William E [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Vardon, Derek R [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Bratis, Adam D [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Liu, Rongming [University of Colorado; Gill, Ryan T. [University of Colorado; Gilhespy, Michelle [Johnson Matthey Technology Centre; Skoufa, Zinovia [Johnson Matthey Technology Centre; Watson, Michael J. [Johnson Matthey Technology Centre; Fruchey, O. Stanley [MATRIC; Cywar, Robin M. [Formerly NREL


    Acrylonitrile (ACN) is a petroleum-derived compound used in resins, polymers, acrylics, and carbon fiber. We present a process for renewable ACN production using 3-hydroxypropionic acid (3-HP), which can be produced microbially from sugars. The process achieves ACN molar yields exceeding 90% from ethyl 3-hydroxypropanoate (ethyl 3-HP) via dehydration and nitrilation with ammonia over an inexpensive titanium dioxide solid acid catalyst. We further describe an integrated process modeled at scale that is based on this chemistry and achieves near-quantitative ACN yields (98 +/- 2%) from ethyl acrylate. This endothermic approach eliminates runaway reaction hazards and achieves higher yields than the standard propylene ammoxidation process. Avoidance of hydrogen cyanide as a by-product also improves process safety and mitigates product handling requirements.


    Directory of Open Access Journals (Sweden)

    Jolana Karovičová


    Full Text Available The aim of this work was to write down a review article about various aspects connected with staling of bakery products. Shelf life is directly associated with the staling process, which depends on the composition of bakery products and important are storage conditions as well. In the article are described particular components (starch, nonstarch polysacharides, water and how they affect the staling process. Generally during staling of bakery products occur  processes related with starch retrogradation, moisture redistribution from the crumb to the crust and other interactions between components. Staling process could be delayed by using various bakery improvers like enzymes, hydrocolloids, emulgators and other compounds. Also useful is the application of suitable packaging techniques.doi:10.5219/124

  15. Product and Process Modelling

    DEFF Research Database (Denmark)

    Cameron, Ian T.; Gani, Rafiqul

    . These approaches are put into the context of life cycle modelling, where multiscale and multiform modelling is increasingly prevalent in the 21st century. The book commences with a discussion of modern product and process modelling theory and practice followed by a series of case studies drawn from a variety......This book covers the area of product and process modelling via a case study approach. It addresses a wide range of modelling applications with emphasis on modelling methodology and the subsequent in-depth analysis of mathematical models to gain insight via structural aspects of the models...... to biotechnology applications, food, polymer and human health application areas. The book highlights to important nature of modern product and process modelling in the decision making processes across the life cycle. As such it provides an important resource for students, researchers and industrial practitioners....

  16. Connecting the Production Multiple

    DEFF Research Database (Denmark)

    Lichen, Alex Yu; Mouritsen, Jan

    &OP process itself is a fluid object, but there is still possibility to organise the messy Production. There are connections between the Production multiple and the managerial technology fluid. The fluid enacted the multiplicity of Production thus making it more difficult to be organised because there were...... in opposite directions. They are all part of the fluid object. There is no single chain of circulating references that makes the object a matter of fact. Accounting fluidity means that references drift back and forth and enact new realities also connected to the chain. In this setting future research may......This paper is about objects. It follows post ANT trajectories and finds that objects are multiple and fluid. Extant classic ANT inspired accounting research largely sees accounting inscriptions as immutable mobiles. Although multiplicity of objects upon which accounting acts has been explored...

  17. Cyanobacterial chemical production. (United States)

    Case, Anna E; Atsumi, Shota


    The increase in global temperatures caused by rising CO2 levels necessitates the development of alternative sources of fuel and chemicals. One appealing alternative that has been receiving increased attention in recent years is the photosynthetic conversion of atmospheric CO2 to biofuels and chemical products using genetically engineered cyanobacteria. This can help to not only provide an alternate "greener" source for some of the most popular petroleum based products but it can also help to reduce atmospheric CO2. Utilizing cyanobacteria rather than plants allows for reduced land requirements and reduces competition with food crops. This review discusses advancements in the field since 2012 with a particular emphasis on production of hydrocarbons. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. Productivity and Institutions

    Directory of Open Access Journals (Sweden)

    Gylfi Zoega


    Full Text Available Differences in productivity account for differences in output per capita between countries as well as changes in output and the standard of living for each country over long periods of time. During the first industrial revolution, one could already see the emergence of two groups of countries: the high- and the low-GDP per capita countries. The list of countries belonging to the highproductivity group has not changed much over the past century. Differences in institutions separate the two clubs. The high-productivity group is, amongst many other differences, characterized by less corruption, a better legal system, superior enforcement of contracts, a lower cost of starting a business and lower tariffs. Historical output series for Britain going back to the mid-19th century show that productivity has increased greatly and improved the standard of living.

  19. Remelt Ingot Production Technology (United States)

    Grandfield, J. F.

    The technology related to the production of remelt ingots (small ingots, sows and T-Bar) is reviewed. Open mold conveyors, sow casting, wheel and belt casting and VDC and HDC casting are described and compared. Process economics, capacity, product quality and process problems are listed. Trends in casting machine technology such as longer open mold conveyor lines are highlighted. Safety issues related to the operation of these processes are discussed. The advantages and disadvantages of the various machine configurations and options e.g. such as dry filling with the mold out of water and wet filling with the mold in water for open mould conveyors are discussed. The effect of mold design on machine productivity, mold cracking and mold life is also examined.

  20. Energy production systems engineering

    CERN Document Server

    Blair, Thomas Howard


    Energy Production Systems Engineering presents IEEE, Electrical Apparatus Service Association (EASA), and International Electrotechnical Commission (IEC) standards of engineering systems and equipment in utility electric generation stations. Electrical engineers that practice in the energy industry must understand the specific characteristics of electrical and mechanical equipment commonly applied to energy production and conversion processes, including the mechanical and chemical processes involved, in order to design, operate and maintain electrical systems that support and enable these processes. To aid this understanding, Energy Production Systems Engineeringdescribes the equipment and systems found in various types of utility electric generation stations. This information is accompanied by examples and practice problems. It also addresses common issues of electrical safety that arise in electric generation stations.