WorldWideScience

Sample records for grand theft auto

  1. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  2. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    Clara Victoria Meza-Maya

    2017-01-01

    Full Text Available Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V. Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes de un colegio de Bogotá. Resultados y conclusiones: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  3. Grand Theft Auto IV comes to Singapore: effects of repeated exposure to violent video games on aggression.

    Teng, Scott Kie Zin; Chong, Gabriel Yew Mun; Siew, Amy Sok Cheng; Skoric, Marko M

    2011-10-01

    Given the increasingly dominant role of video games in the mainstream entertainment industry, it is no surprise that the scholarly debate about their impact has been lively and well attended. Although >100 studies have been conducted to examine the impact of violent video games on aggression, no clear consensus has been reached, particularly in terms of their long-term impact on violent behavior and aggressive cognitions. This study employs a first-ever longitudinal laboratory-based experiment to examine longer-term effects of playing a violent video game. One hundred thirty-five participants were assigned either to the treatment condition where they played a violent video game in a controlled laboratory setting for a total of 12 hours or to the control group where they did not play a game. Participants in the treatment group played Grand Theft Auto IV over a period of 3 weeks and were compared with a control group on the posttest measures of trait aggression, attitudes toward violence, and empathy. The findings do not support the assertion that playing a violent video game for a period of 3 weeks increases aggression or reduces empathy, but they suggest a small increase in proviolence attitudes. The implications of the findings are discussed.

  4. Facing Fanon: Examining Neocolonial Aspects in Grand Theft Auto V through the Prism of the Machinima Film Finding Fanon II

    Steffen Krüger

    2018-02-01

    Full Text Available In this article, I examine the Machinima film 'Finding Fanon II', by London-based artists Larry Achiampong and David Blandy, for what it can tell us about the relationship between video gaming and the postcolonial. Evoking Frantz Fanon, one of the most piercing voices of the decolonisation movement of the 1950s and 1960s, in the context of 'Grand Theft Auto' (GTA, one of the most technologically advanced and, at the same time, scandalous video game series of the 21st century, 'Finding Fanon II' amounts to a scathing critique of both the game series’ depiction of race and academic scholarship that has been defending the series on the grounds of its use of humour and irony. Shot in the in-game video editor of 'GTA V', 'Finding Fanon II' lets this critique emerge from inside the game and as an effect of the artists’ engagement with it. By suspending the game’s mechanisms and programmed forms of interaction, the artwork brings their racialised logic to the fore, pointing towards the ways in which 'GTA V' commodifies black men for the consumption of white players. This commodification has the effect of normalising and naturalising the precarious position of black people in Western society. What the artwork adds to this argument through its facilitation of a Fanonian perspective is a reminder that it is not only the gaming experience of 'white' players that is framed in this way. Players with ethnic minority backgrounds might also accept the white gaze of the game as a given. Acts of self-commodification along the lines of a white Western rationality must thus be seen as a plausible new form of cultural imperialism promoted by the GTA series.

  5. Deterrence and Geographical Externalities in Auto Theft

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  6. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  7. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  8. Translating Missions in James Worral's Game "Grand Theft Auto's Missions"

    Rahmi, Zelika

    2018-01-01

    The objectives of the study was to know the difficult words encountered by the gamers and to know their strategies in translating this unknown word. The researcher used interview as the instrument to collect the material needed for this particular study. It is found that unknown word combined with certain feeling such as disappointment creates…

  9. Something for the Boys: "Iron Man," "Transformers," and "Grand Theft Auto IV"

    Beck, Bernard

    2009-01-01

    Three recent examples are discussed of popular culture products that cater specifically to the cultural world of boys, social types that are the created identities of young males in our society. The self-ascribed qualities of participants in the world of boys, rather than the inherent characteristics of young males, provide the content of the…

  10. AUTO

    Gammelgaard Nielsen, Anders; Aagaard, Tine; Diaz, pauline

    2011-01-01

    AUTO is the first assignment that the students of Architecture are introduced to at the Aarhus school of Architecture. The aim is to give students an understanding of design through a generic working method. This by disassembling a car engine and staging its components through a series of castings...

  11. [Identity theft

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  12. Auto-estima e fatores associados em gestantes da cidade de Pelotas, Rio Grande do Sul, Brasil Self-esteem and associated factors in pregnant women in the city of Pelotas, Rio Grande do Sul State, Brazil

    Michelle de Souza Dias

    2008-12-01

    Full Text Available O estudo tem como objetivo mensurar a auto-estima e fatores associados em gestantes atendidas pelo Sistema Único de Saúde (SUS na cidade de Pelotas, Rio Grande do Sul, Brasil. É do tipo transversal, tendo-se entrevistado 560 gestantes nos meses de maio a novembro de 2006, nos ambulatórios e enfermarias dos hospitais universitários e do centro de atendimento da Prefeitura Municipal. Dentre as gestantes atendidas, 62,9% receberam o diagnóstico de alto-risco. Para avaliação da auto-estima foi utilizada a escala de Rosenberg. Na amostra total a média de pontos na escala foi de 9,2 e o desvio-padrão de 4,6. As variáveis associadas positiva e significativamente com auto-estima foram idade, nível de escolaridade e nível econômico. Já as variáveis percepção de risco à saúde do bebê e número de gestações mostraram-se associadas negativamente à auto-estima. Além disso, as gestantes com condição gestacional de alto-risco têm uma auto-estima mais elevada quando comparadas com as de baixo-risco.This study analyzes self-esteem and associated factors in pregnant women treated by the Unified National Health System (SUS in the city of Pelotas, Rio Grande do Sul State, Brazil. Using a cross-sectional design, 560 pregnant women were interviewed from May to November 2006. The interviews were held in specific locations like University outpatient clinics and hospital wards and a center run by the city government. A full 62.9% were diagnosed as high-risk pregnancies. Mean self-esteem according to the Rosenberg scale was 9.2 (SD = 4.6. Variables showing a positive, significant association with self-esteem were age, schooling, and income. Perception of risk to the unborn infant's health and parity were both negatively associated with maternal self-esteem. These high-risk pregnant women also showed higher self-esteem than low-risk pregnant women.

  13. Grand Theft Auto is a "Sandbox" Game, but There are Weapons, Criminals, and Prostitutes in the Sandbox: Response to Ferguson and Donnellan (2017).

    Gabbiadini, Alessandro; Bushman, Brad J; Riva, Paolo; Andrighetto, Luca; Volpato, Chiara

    2017-12-01

    In this issue, (Ferguson, C. J., & Donnellan, B. D., Journal of Youth and and Adolescence, published online 21 June 2017) criticize one of our studies (Gabbiadini, A., Riva, P., Andrighetto, L., Volpato, C., & Bushman, B. J., PLoS ONE, 11: 1-14, 2016) that found violent sexist video games can reduce empathy for female violence victims in male players who identify with violent male game characters, and do so by increasing masculine beliefs. Their main criticism is a "straw person" argument built on a claim that we never made (i.e., a direct effect of sexist-violent video games on empathy). They also made several other criticisms of our article. We appreciate the opportunity to respond to their criticisms in this article. We also point out some flaws in their reanalysis. Despite their criticisms, the core contributions of our original article remain intact.

  14. Among pasta-loving Mafiosos, drug-selling Columbians and noodle-eating Triads – Race, humour and interactive ethics in Grand Theft Auto III

    Dymek, Mikolaj

    2005-01-01

    This paper explores the intersection of race, humour and interactivity in GTA3. Interactivity has been extensively researched, race issues in games have been scarcely studied (Leonard 2003), but hitherto no research has focused on humour aspects of games despite the popularity of this subject in non-academic discussions on the Internet (BBC News 2001; Perry 2001). Previously, content analysis of games has been focused on narrative aspects (Aarseth 1997; Murray 1998) or psychological links bet...

  15. Essays on electricity theft

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  16. LEVANTAMENTO DE AUTOS DE INFRAÇÃO PELO IBAMA/RN RELACIONADOS AOS EMPREENDIMENTOS DE CERÂMICA NO ESTADO DO RIO GRANDE DO NORTE

    Sângela Ramos de Souza

    2007-12-01

    Full Text Available A produção brasileira de cerâmica continua em seu processo de expansão. O tamanho do mercado nordestino e os custos de transportes associados ao baixo valor agregado dos revestimentos cerâmicos estimularam um movimento de desconcentração regional da produção, uma vez que a implantação de unidades produtivas no Nordeste passou a fazer parte da estratégia competitiva de algumas empresas. O presente trabalho busca mostrar os principais autos de infração relacionados aos empreendimentos de Cerâmica no Estado do Rio Grande do Norte pelo Instituto Brasileiro do Meio Ambiente e dos Recursos Renováveis do RN - IBAMA/RN, órgão ambiental fiscalizador no Estado, no período de 01/01/2002 a 04/10/2005. O levantamento de dados foi realizado através do acesso a Sistemas operados pelo IBAMA/RN, que informou o número de indústrias cadastradas no Rio Grande do Norte, o número de infrações, entre outras. Foram verificadas 140 indústrias cadastradas no Estado, distribuídas em 24 municípios. O alto número de indústrias do setor pode ser decorrente da centralização da atividade como alternativa econômica visto que a região apresenta condições ambientais que prejudicam seu potencial produtivo. O levantamento dos dados revelou que as principais infrações eram receber, armazenar ou transportar produto florestal sem cobertura de ATPF (Autorização de Transporte de Produtos Florestais e funcionar sem prévio registro no IBAMA. A atuação dos órgãos governamentais foi constatada como de fundamental importância para a diminuição do número de autos de infração das indústrias de cerâmica, referente ao período avaliado. A substituição da matriz energética, nas indústrias de cerâmica, de lenha para gás natural é a alternativa ideal no combate à poluição e de outras formas impactantes. Parece haver um direcionamento dos empreendedores, buscando um desenvolvimento sustentável, ainda que seja na intenção de obterem

  17. Gun Theft and Crime.

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  18. Exploring medical identity theft.

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  19. Motor Vehicle Theft. Special Report.

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  20. Identity theft and your practice.

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  1. Electricity theft: a comparative analysis

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  2. Controlling hospital library theft.

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  3. REPORTING THEFTS, ETC.

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  4. Auto Safety

    ... Safe Videos for Educators Search English Español Auto Safety KidsHealth / For Parents / Auto Safety What's in this ... by teaching some basic rules. Importance of Child Safety Seats Using a child safety seat (car seat) ...

  5. Identity Theft - The National Guard

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  6. Basic bookkeeping and avoiding theft.

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  7. Gas theft: Prevention and detection

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  8. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  9. Sensors prevent theft; Sensoren gegen Langfinger

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  10. 25 CFR 11.412 - Theft.

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  11. Program auto

    Rawool-Sullivan, M.W.; Plagnol, E.

    1990-01-01

    The program AUTO was developed to be used in the analysis of dE vs E type spectra. This program is written in FORTRAN and calculates dE vs E lines in MeV. The provision is also made in the program to convert these lines from MeV to ADC channel numbers to facilitate the comparison with the raw data from the experiments. Currently the output of this program can be plotted with the display program, called VISU, but it can also be used independent of the program VISU, with little or no modification in the actual fortran code. The program AUTO has many useful applications. In this article the program AUTO is described along with its applications

  12. Auto Market

    2001-01-01

    <正> Editor’s notes: the "online investigation of the updated condition of auto market in China", organized by BAGAE together with 7 websites, ended recently. The participants were from 32 provinces, cities and autonomous regions throughout China. Diplomas of the 4,657 participants were generally high, of which college or/over accounted for 80.7%; the participants were mainly middle-aged and young people in which 92.1% were below 40 years old.

  13. Deterring and remedying employee theft.

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  14. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  15. Comprehensive Auto CAD

    Jang, Taekju

    1993-06-01

    This book starts introduction of conception, application system, software for CAD, function of Auto CAD, kinds and function of Auto CAD files. It deals with starting of Auto CAD, dialogue box and Auto CAD interface, utility command, 2D drawing command, check command, control system, dimension, hatching command, layer command, block, 3D drawing, plotting and printing, auto CAD and application of data, supply program of auto CAD, AME and region modeler, EDLIN, script optimization of Auto CAD and composition on demand.

  16. Brake to the theft of fuels

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  17. Grand-scale theft: kleptoplasty in parasitic plants?

    Krause, Kirsten

    2015-04-01

    The angiosperm Rafflesia lives as an obligate holoparasite in intimate contact with its hosts, vines in the genus Tetrastigma. The hosts are forced to supply the parasite with all the necessary nutrients. Novel data tentatively suggest that the thievery may happen on a larger scale and include entire organellar genomes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  19. The Relationship between Cell Phone Use and Identity Theft

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  20. Current trends in copper theft prevention

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  1. Overt theft and the peculiarities of the qualification

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  2. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  3. Thefts, break-ins, etc.

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  4. Combating employee theft in the healthcare industry.

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  5. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  6. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  7. Thefts, break-ins, etc.

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  8. Is your practice at risk for medical identity theft?

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  9. 26 CFR 1.165-8 - Theft losses.

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  10. 14 CFR 1214.609 - Loss or theft.

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  11. 19 CFR 112.46 - Report of loss or theft.

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  12. 27 CFR 24.265 - Losses by theft.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  13. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  14. Electrical injuries due to theft of copper.

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  15. Learning Auto CAD 2004

    Shin, Gyeong Su; Song, Chun Dong; Park, Hyeong Jin; Kim, Yeong Min

    2004-02-15

    This book introduces basic knowledge of AutoCAD, practice method of command of AutoCAD like poly line, rotate, copy, break, trim, stretch, lengthen, chamfer, grips, extend, array polygon, spline, hatch, and image, writing letters, making library, application of design center and tool palette, drawing floor plan elevation, cross-sectional diagram, presentation materials, effective application of AutoCAD, and construction design using CAD POWER 2004.

  16. Easy Auto CAD

    Lee, Hyeon Jun

    1996-02-01

    This book explains Auto CAD easily, which introduces improved function in Auto CAD R 13, such as direct import and export of 3 DS pile, revised render order structure, and explanations of assist, view Draw, construct and modify. Next it gives descriptions of Auto CAD conception, application and system. The last part deals with line, arc, circle, ellipse, erase, undo, redo, redraw, line type, multi line, limits, zoom, move, copy, rotate, array, mirror, grid, snap, units, offset and poly line.

  17. Learning Auto CAD 2004

    Shin, Gyeong Su; Song, Chun Dong; Park, Hyeong Jin; Kim, Yeong Min

    2004-02-01

    This book introduces basic knowledge of AutoCAD, practice method of command of AutoCAD like poly line, rotate, copy, break, trim, stretch, lengthen, chamfer, grips, extend, array polygon, spline, hatch, and image, writing letters, making library, application of design center and tool palette, drawing floor plan elevation, cross-sectional diagram, presentation materials, effective application of AutoCAD, and construction design using CAD POWER 2004.

  18. The Transfer of Property Rights by Theft

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  19. An Optimum Solution for Electric Power Theft

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  20. Money and Credit With Limited Commitment and Theft

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  1. AutoCAD workbook

    Metherell, Phil

    1989-01-01

    AutoCAD Workbook helps new users learn the basics of AutoCad, providing guidance on most of the commonly used functions in which the program operates.This book discusses loading AutoCad and starting a drawing; drawing and erasing lines, circles, and arcs; and setting up the drawing environment. The topics on drawing and editing polylines; entering text and text styles; and layers, linetype, and color are also considered. This publication likewise covers creating and using blocks, hatching and extracting information, dimensioning drawings, 3D visualization, and plotting a drawing. Other

  2. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  3. Development of car theft crime index in peninsular Malaysia

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  4. Grandes remolques

    Editorial, Equipo

    1961-07-01

    Full Text Available El empleo creciente del material pesado auxiliar en la construcción de obras de ingeniería civil ha motivado la fabricación de grandes plataformas, capaces de transportar toda clase de maquinaria auxiliar. En general, este tipo de maquinaria requiere medios de transporte, pues su circulación por carreteras es lenta, obstructiva y cara, siempre que se trate de grandes distancias, caso presente en la mayoría de ocasiones en que se exige un traslado de esta maquinaria de una a otra obra.

  5. Tagaotsitav "Auto" / Kristiina Vaarik

    Vaarik, Kristiina

    2001-01-01

    Chris O'Connelli "Auto" Vanemuises, lavastaja Mark Babych. Etendusele tegid muusika ansamblist Bizarre tuntud muusikud Tristan Priimägi ja Lauri Liivak, kes artiklis sellest räägivad. Esietendus 2. detsembril 2000

  6. Application of Auto CAD

    Park, Yong Un; Kim, Geun Ho

    1989-05-01

    This book has introduction to use this book and explanation of application on Auto CAD, which includes, sub directories, batch files, robot wrist, design of standard paper, title block, robort weld room, robert wrist joint, PC board, plant sym, electro, PID, machines, robots, bubbles, plant, schema, Pid, plant assembly, robots, dim plant, PL-ASSM, plotting line weight control, symbol drawing joint, Auto CAD using script file, set up of workout · MNU, workout MNU, ACAD, LSP and workout · MNU.

  7. Application of Auto CAD 2000

    Kim, Hyeong Jun

    1999-11-01

    This book deals with basic of AutoCAD, beginning AutoCAD 2000, using design center of AutoCAD 2000, adding drawing element with design center, drawing lines, using 2D edit command, making layer, hatching, dimensioning, entering letters on the floor plan, making 3D object, practice of 3D command, edition of 3D object, making solid, rendering object, and using internet in AutoCAD 2000. This book is introduction of AutoCAD 2000 for beginner.

  8. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  9. Rural farmers' perspectives on stock theft: police crime statistics ...

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  10. Mutilation and Theft of Library Materials: The Perception and ...

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  11. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  12. 27 CFR 478.33a - Theft of firearms.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  13. 43 CFR 423.25 - Vandalism, tampering, and theft.

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  14. 47 CFR 76.1209 - Theft of service.

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  15. Fighting the scourge of metal theft.

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  16. Dog Theft: A Case for Tougher Sentencing Legislation.

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  17. Grandes cocinas

    García de Castro, Emilio

    1957-11-01

    Full Text Available Se describen en este artículo una serie de aparatos para grandes cocinas, vistos por los autores durante un rápido viaje por Alemania. Aprovechando los datos obtenidos se analizan brevemente las necesidades de una gran cocina moderna, comentando los planos de las instalaciones en varios hoteles o instituciones de todo el mundo. La mayoría de la información.

  18. AutoCAD

    Jensen, Henrik

    1998-01-01

    I 1998 var AutoCAD Arkitektskolens basale CAD-tilbud til de studerende. Kursets vægt ligger på konstruktion og strukturering af 3d-modeller og med udgangspunkt i dette, 2d-tegning. Kurset er opbygget over CAD Clasic skabelonen (se min forskning). Kompendiet kan bruges til selvstudium.......I 1998 var AutoCAD Arkitektskolens basale CAD-tilbud til de studerende. Kursets vægt ligger på konstruktion og strukturering af 3d-modeller og med udgangspunkt i dette, 2d-tegning. Kurset er opbygget over CAD Clasic skabelonen (se min forskning). Kompendiet kan bruges til selvstudium....

  19. PERI auto-tuning

    Bailey, D H; Williams, S [Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Chame, J; Chen, C; Hall, M [USC/ISI, Marina del Rey, CA 90292 (United States); Dongarra, J; Moore, S; Seymour, K; You, H [University of Tennessee, Knoxville, TN 37996 (United States); Hollingsworth, J K; Tiwari, A [University of Maryland, College Park, MD 20742 (United States); Hovland, P; Shin, J [Argonne National Laboratory, Argonne, IL 60439 (United States)], E-mail: mhall@isi.edu

    2008-07-15

    The enormous and growing complexity of today's high-end systems has increased the already significant challenges of obtaining high performance on equally complex scientific applications. Application scientists are faced with a daunting challenge in tuning their codes to exploit performance-enhancing architectural features. The Performance Engineering Research Institute (PERI) is working toward the goal of automating portions of the performance tuning process. This paper describes PERI's overall strategy for auto-tuning tools and recent progress in both building auto-tuning tools and demonstrating their success on kernels, some taken from large-scale applications.

  20. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  1. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  2. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  3. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  4. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  5. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  6. 7 CFR 331.19 - Notification of theft, loss, or release.

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  7. 27 CFR 555.165 - Failure to report theft or loss.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  8. The Durban Auto Cluster

    Lorentzen, Jochen; Robbins, Glen; Barnes, Justin

    2004-01-01

    The paper describes the formation of the Durban Auto Cluster in the context of trade liberalization. It argues that the improvement of operational competitiveness of firms in the cluster is prominently due to joint action. It tests this proposition by comparing the gains from cluster activities...

  9. AUTO-EXPANSIVE FLOW

    Physics suggests that the interplay of momentum, continuity, and geometry in outward radial flow must produce density and concomitant pressure reductions. In other words, this flow is intrinsically auto-expansive. It has been proposed that this process is the key to understanding...

  10. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  11. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  12. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  13. AutoCAD 2014 and AutoCAD LT 2014

    Gladfelter, Donnie

    2013-01-01

    A step-by-step tutorial introduction to AutoCAD As the only book to teach AutoCAD using a continuous tutorial which allows you to follow along sequentially or jump in at any exercise by downloading the drawing files, this Autodesk Official Press book is ideal for the AutoCAD novice. Industry expert and AutoCAD guru Donnie Gladfelter walks you through the powerful features of AutoCAD, provides you with a solid foundation of the basics, and shares the latest industry standards and techniques. The hands-on tutorial project inspired by real-world workflows that runs throughout the book

  14. Energy Theft in the Advanced Metering Infrastructure

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  15. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  16. Modeling the number of car theft using Poisson regression

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  17. MS AutoCad

    Andersen, Michael Rye; Heinicke, Hugo

    1996-01-01

    Formålet med dette notat er at give en introduktion til tegning af et generalarrangement ved anvendelse af CAD-programmet AutoCAD. Generalarrangementets formål er at skabe en overskuelig præsentation af et skibsprojekt. Det skal gøres indenfor de rammer, som ligger til grund for praktiskprojekter......Formålet med dette notat er at give en introduktion til tegning af et generalarrangement ved anvendelse af CAD-programmet AutoCAD. Generalarrangementets formål er at skabe en overskuelig præsentation af et skibsprojekt. Det skal gøres indenfor de rammer, som ligger til grund...

  18. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  19. Medical identity theft in the emergency department: awareness is crucial.

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  20. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  1. When accepting a gift can be professional misconduct and theft.

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  2. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  3. Identity Theft in the Academic World Leads to Junk Science.

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  4. Beating the Red Gold Rush: Copper Theft and Homeland Security

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  5. An Authentication Middleware for Prevention of Information Theft

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  6. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  7. Unlocking the condoms: The effect on sales and theft

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  8. Unlocking the condoms: The effect on sales and theft.

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  9. Myocarditis in auto-immune or auto-inflammatory diseases.

    Comarmond, Cloé; Cacoub, Patrice

    2017-08-01

    Myocarditis is a major cause of heart disease in young patients and a common precursor of heart failure due to dilated cardiomyopathy. Some auto-immune and/or auto-inflammatory diseases may be accompanied by myocarditis, such as sarcoidosis, Behçet's disease, eosinophilic granulomatosis with polyangiitis, myositis, and systemic lupus erythematosus. However, data concerning myocarditis in such auto-immune and/or auto-inflammatory diseases are sparse. New therapeutic strategies should better target the modulation of the immune system, depending on the phase of the disease and the type of underlying auto-immune and/or auto-inflammatory disease. Copyright © 2017 Elsevier B.V. All rights reserved.

  10. AutoCAD / AutoCAD LT 2014 fundamentals metric

    ASCENT center for technical knowledge

    2014-01-01

    The objective of AutoCAD/AutoCAD LT 2014 Fundamentals is to enable students to create a basic 2D drawing in the AutoCAD software. Even at this fundamental level, the AutoCAD software is one of the most sophisticated computer applications that you are likely to encounter. Therefore learning to use it can be challenging. To make the process easier and provide flexibility for instructors and students, the training guide is divided into two parts that can be taken independently.

  11. Preventing thefts and damage to property

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  12. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  13. Easy Korean Auto CAD 14

    Lee, Jae Cheol

    1997-10-01

    This book introduces Auto CAD 14, which includes summary of basic things of Auto CAD 14, user interface for Auto CAD, basic drawing and advice, layer and set-up drawing, drawing with Auto CAD tools exactly, basic drawing of every thing, edit command, control of display, modeling and view ports of drawing space, various things drawing, writing letters, modification of floor plan, and check, block, X ref, lines and hatch, writing measurement, floor plan and OLE exchange of data, 3D floor plan, and rendering and presentation.

  14. On the Statistical Dependency of Identity Theft on Demographics

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  15. Developmental Trajectories of Male Physical Violence and Theft

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  16. On the electricity shortage, price and electricity theft nexus

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  17. Auto-fotografi som metode

    Mogensen, Mette

    2014-01-01

    Artiklen sætter fokus på auto-fotografi som metode i arbejdsmiljøforskningen. Den organisationsæstetiske tilgang, som metoden ofte forbindes med, udfordres med afsæt i en performativ og aktørnetværks-teoretisk position. Gennem en analyse af et enkelt auto-fotografi vises hvordan en artikulation af...

  18. 19 CFR 158.26 - Loss or theft in public stores.

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  19. Impact of identity theft on methods of identification.

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  20. Sim-based detection tools to minimize motorcycle theft

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  1. Dog Theft: A Case for Tougher Sentencing Legislation

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  2. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  3. Re-positioning the law of theft in view of recent developments in ...

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  4. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  5. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  6. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  7. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  8. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  9. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  10. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  11. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  12. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  13. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  14. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  15. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  16. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  17. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  18. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  19. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  20. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  1. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  2. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  3. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  4. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  5. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  6. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  7. 9 CFR 121.19 - Notification of theft, loss, or release.

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  8. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  9. 42 CFR 73.19 - Notification of theft, loss, or release.

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  10. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  11. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  12. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  13. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  14. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  15. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  16. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  17. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  18. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  19. "Grand Theft South Africa": Games, Literacy and Inequality in Consumer Childhoods

    Walton, Marion; Pallitt, Nicola

    2012-01-01

    Discussions of "game literacy" focus on the informal learning and literacies associated with games but seldom address the diversity in young people's gaming practices, and the highly differentiated technologies of digital gaming in use. We use available survey data to show how, in South Africa, income inequalities influence consumption…

  20. Translating Missions in James Worral’s game “Grand Theft Auto’s Missions”

    Zelika Rahmi

    2018-02-01

    Full Text Available The objectives of the study was to know the difficult words encountered by the gamers and to know their strategies in translating this unknown word. The researcher used interview as the instrument to collect the material needed for this particular study. It is found that unknown word combined with certain feeling such as dissappoinment creates retention. So, this particular study showed eventhough these students have low capacity in understanding words in English but in GTA game, they were still willing to play. From their willingness it could increase their motivation to translating the word in English. So, the game is a very effective way to building vocabullary skill.

  1. AutoCAD 2014 essentials

    Onstott, Scott

    2013-01-01

    Learn crucial AutoCAD tools and techniques with this Autodesk Official Press Book Quickly become productive using AutoCAD 2014 and AutoCAD LT 2014 with this full color Autodesk Official Press guide. This unique learning resource features concise, straightforward explanations and real-world, hands-on exercises and tutorials. Following a quick discussion of concepts and goals, each chapter moves on to an approachable hands-on exercise designed to reinforce real-world tactics and techniques. Compelling, full-color screenshots illustrate tutorial steps, and chapters conclude with relat

  2. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  3. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  4. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  5. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  6. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  7. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  8. New consumer load prototype for electricity theft monitoring

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  9. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  10. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  11. Reducing theft and embezzlement by encouraging ethical behavior.

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  12. New consumer load prototype for electricity theft monitoring

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  13. Towards creating believable decoy project folders for detecting data theft

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  14. Esma Auto ja Mazda on loodud kestma

    2003-01-01

    Ülevaade olulisematest sündmustest Esma Auto kümne tegevusaasta jooksul. Kommenteerivad Tarmo Järvoja, Mart Laar ja Enn Sau. Diagrammid ja skeemid: AS Esma Auto müügi statistika läbi aastate; AS Esma Auto kasum ja klientide arv aastate lõikes; Esma Auto esindused Eestis ja pakutavad teenused

  15. Using aerial infrared thermography to detect utility theft of service

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  16. Whose guns are stolen? The epidemiology of Gun theft victims.

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  17. AutoCAD 2015 and AutoCAD LT 2015

    Gladfelter, Donnie

    2014-01-01

    Learn AutoCAD by example with this tutorial-based guide from Autodesk Official Press Whether you are just starting out or an experienced user wanting to brush up on your skills, this Autodesk Official Press book provides you with concise explanations, focused examples, and step-by-step instructions through a hands-on tutorial project that runs throughout the book. As you progress through the project, the book introduces you to the Microsoft Windows-based AutoCAD interface and then guides you through basic commands and creating drawings. A downloadable file is available from the website so that

  18. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  19. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  20. Tempering of accounts and records to disguise SNM theft

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  1. Copper wire theft and high voltage electrical burns.

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  2. Copper wire theft and high voltage electrical burns

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  3. Measuring Identity Theft at Top Banks (Version 1.5)

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  4. AutoCAD 2010 For Dummies

    Byrnes, David

    2009-01-01

    AutoCAD is the hot computer-aided design software known for both its powerful tools and its complexity. AutoCAD 2010 for Dummies is the bestselling guide that walks you through this complicated program so you can build complex 3D technical drawings, edit like a pro, enter new dimensions, and plot with style. AutoCAD 2010 for Dummies helps you navigate the program, use the AutoCAD Design Center, create a basic layout and work with dimension, and put your drawings on the Internet. You'll soon be setting up the AutoCAD environment, using the AutoCAD Ribbon, creating annotation and dimension drawi

  5. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  6. An Optimum Solution for Electric-Power Theft

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  7. Kleptomania or common theft - diagnostic and judicial difficulties.

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  8. Anti Theft Mechanism Through Face recognition Using FPGA

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  9. Instant AutoIt scripting

    Laso, Emilio Aristides de Fez

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This is a Packt Instant How-to guide, which provides concise and clear recipes for getting started with AutoIt.Instant AutoIt Scripting Essentials How-to is for beginners who wish to know more about automation and programming, system administration developers who intent to automate/manage clusters and servers, and for computer programmers who want to control any PC to create seamless automation apps.

  10. Uma nova interpretação de um auto de Gil Vicente

    Silva, Isa Alexandra Marques da

    2009-01-01

    Neste trabalho, intitulado Uma nova interpretação de Um Auto de Gil Vicente, cedo lugar a uma reflexão sumária em torno da história do Teatro, como ponto de partida para a tragicomédia vicentina, denominada As Cortes de Júpiter, sobre a qual Garrett introduz o seu Auto de ―meditação‖ cultural. A partir do exemplo garrettiano, aproveitamos a oportunidade para ressaltar, especialmente, o grande deficit do nosso País na época do autor, do qual podemos verificar ainda alguns reflexos na actualida...

  11. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  12. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  13. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  14. AutoCAD platform customization VBA

    Ambrosius, Lee

    2015-01-01

    Boost productivity and streamline your workflow with expert AutoCAD: VBA programming instruction AutoCAD Platform Customization: VBA is the definitive guide to personalizing AutoCAD and the various programs that run on the AutoCAD platform, including AutoCAD Architecture, Civil 3D, Plant 3D, and more. Written by an Autodesk insider with years of customization and programming experience, this book features detailed discussions backed by real-world examples and easy-to-follow tutorials that illustrate each step in the personalization process. Readers gain expert guidance toward managing layout

  15. AutoCAD 2014 for dummies

    Fane, Bill

    2013-01-01

    Find your way around AutoCAD 2014 with this full-color, For Dummies guide!Put away that pencil and paper and start putting the power of AutoCAD 2014 to work in your CAD projects and designs. From setting up your drawing environment to using text, dimensions, hatching, and more, this guide walks you through AutoCAD basics and provides you with a solid understanding of the latest CAD tools and techniques. You'll also benefit from the full-color illustrations that mirror exactly what you'll see on your AutoCAD 2014 screen and highlight the importance of AutoCAD's Mode

  16. AutoCAD 2008 for dummies

    Byrnes, David

    2007-01-01

    A gentle, humorous introduction to this fearsomely complex software that helps new users start creating 2D and 3D technical drawings right awayCovers the new features and enhancements in the latest AutoCAD version and provides coverage of AutoCAD LT, AutoCAD''s lower-cost siblingTopics covered include creating a basic layout, using AutoCAD DesignCenter, drawing and editing, working with dimensions, plotting, using blocks, adding text to drawings, and drawing on the InternetAutoCAD is the leading CAD software for architects, engineers, and draftspeople who need to create detailed 2D and 3D tech

  17. AutoCAD platform customization autolisp

    Ambrosius, Lee

    2014-01-01

    Customize and personalize programs built on the AutoCAD platform AutoLISP is the key to unlocking the secrets of a more streamlined experience using industry leading software programs like AutoCAD, Civil 3D, Plant 3D, and more. AutoCAD Platform Customization: AutoLISP provides real-world examples that show you how to do everything from modifying graphical objects and reading and setting system variables to communicating with external programs. It also features a resources appendix and downloadable datasets and customization examples-tools that ensure swift and easy adoption. Find out how to r

  18. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  19. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  20. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  1. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  2. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  3. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  4. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  5. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  6. Copper wire theft and high voltage electrical burns

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  7. [Stress and auto-immunity].

    Delévaux, I; Chamoux, A; Aumaître, O

    2013-08-01

    The etiology of auto-immune disorders is multifactorial. Stress is probably a participating factor. Indeed, a high proportion of patients with auto-immune diseases report uncommon stress before disease onset or disease flare. The biological consequences of stress are increasingly well understood. Glucocorticoids and catecholamines released by hypothalamic-pituitary-adrenal axis during stress will alter the balance Th1/Th2 and the balance Th17/Treg. Stress impairs cellular immunity, decreases immune tolerance and stimulates humoral immunity exposing individuals to autoimmune disease among others. The treatment for autoimmune disease should include stress management. Copyright © 2012 Société nationale française de médecine interne (SNFMI). Published by Elsevier SAS. All rights reserved.

  8. Grand Hotel prijutil hudozhnikov

    2004-01-01

    Raadioajakirjanik Lea Veelmaa lindistas "Kunstikanali" 2004. a. esimese saate Grand Hotel Viljandis. Saatekülaliseks oli maalikunstnik Andres Tolts. Toltsi kaheksa akrüülmaali on eksponeeritud hotelli fuajees ja restoranis

  9. Grand Mal Seizure

    ... grand mal seizures include: A family history of seizure disorders Any injury to the brain from trauma, a ... the risk of birth defects. If you have epilepsy and plan to become pregnant, work with your ...

  10. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  11. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  12. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  13. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  14. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  15. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  16. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  17. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  18. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  19. Vehicle Theft Identification and Intimation Using GSM & IOT

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  20. Information on the thefts committed in the Pays de Gex

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  1. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  2. AutoCAD platform customization user interface, AutoLISP, VBA, and beyond

    Ambrosius, Lee

    2015-01-01

    Take control of AutoCAD to boost the speed, quality, and precision of your work Senior drafters and savvy users are increasingly taking AutoCAD customization out of the hands of system administrators, and taking control of their own workflow. In AutoCAD Platform Customization, Autodesk customization guru Lee Ambrosius walks you through a multitude of customization options using detailed tutorials and real-world examples applicable to AutoCAD, AutoCAD LT, Civil 3D, Plant 3D, and other programs built on the AutoCAD platform. By unleashing the full power of the software, you'll simplify and str

  3. The determinants of electricity theft: An empirical analysis of Indian states

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  4. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  5. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  6. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  7. Investigation of natural gas theft by magnetic remanence mapping.

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  8. Democracy and "Grand" Corruption.

    Rose-Ackerman, Susan

    1996-01-01

    Defines "grand" corruption as that occurring at the higher levels of a political system and involving large sums of money. Discusses the impact and incentives for this level of corruption as well as various government responses. Identifies multinational corporations as the major malefactors. (MJP)

  9. The GRANDE detector

    Adams, A.; Bond, R.; Coleman, L.; Rollefson, A.; Wold, D.; Bratton, C.B.; Gurr, H.; Kropp, W.; Nelson, M.; Price, L.R.; Reines, F.; Schultz, J.; Sobel, H.; Svoboda, R.; Yodh, G.; Burnett, T.; Chaloupka, V.; Wilkes, R.J.; Cherry, M.; Ellison, S.B.; Guzik, T.G.; Wefel, J.; Gaidos, J.; Loeffler, F.; Sembroski, G.; Wilson, C.; Goodman, J.; Haines, T.J.; Kielczewska, D.; Lane, C.; Steinberg, R.; Lieber, M.; Nagle, D.; Potter, M.; Tripp, R.

    1990-01-01

    In this paper we present a detector facility which meets the requirements outlined above for a next-generation instrument. GRANDE (Gamma Ray and Neutrino DEtector) is an imaging, water Cerenkov detector, which combines in one facility an extensive air shower array and a high-energy neutrino detector. (orig.)

  10. Triggering the GRANDE array

    Wilson, C.L.; Bratton, C.B.; Gurr, J.; Kropp, W.; Nelson, M.; Sobel, H.; Svoboda, R.; Yodh, G.; Burnett, T.; Chaloupka, V.; Wilkes, R.J.; Cherry, M.; Ellison, S.B.; Guzik, T.G.; Wefel, J.; Gaidos, J.; Loeffler, F.; Sembroski, G.; Goodman, J.; Haines, T.J.; Kielczewska, D.; Lane, C.; Steinberg, R.; Lieber, M.; Nagle, D.; Potter, M.; Tripp, R.

    1990-01-01

    A brief description of the Gamma Ray And Neutrino Detector Experiment (GRANDE) is presented. The detector elements and electronics are described. The trigger logic for the array is then examined. The triggers for the Gamma Ray and the Neutrino portions of the array are treated separately. (orig.)

  11. Grand-Bassam

    Geo

    l'estuaire du fleuve Comoé (Grand-Bassam, Côte d'Ivoire). Kouassi Laurent ADOPO1*, Apie Colette AKOBE1, Etche Mireille AMANI2,. Sylvain MONDE3 et Kouamé AKA3. (1)Laboratoire de Géologie Marine, Sédimentologie et Environnement, Centre de Recherche en Ecologie,. Université Felix Houphouet Boigny Abidjan, ...

  12. AutoCAD 2015 and AutoCAD LT 2015 bible

    Finkelstein, Ellen

    2014-01-01

    The perfect reference for all AutoCAD users AutoCAD 2015 and AutoCAD LT 2015 Bible is the book you want to have close at hand to answer those day-to-day questions about this industry-leading software. Author and Autodesk University instructor Ellen Finkelstein guides readers through AutoCAD 2015 and AutoCAD LT 2015 with clear, easy-to-understand instruction and hands-on tutorials that allow even total beginners to create a design on their very first day. Although simple and fundamental enough to be used by those new to CAD, the book is so comprehensive that even Autodesk power u

  13. Auto-immune Haemolytic Anaemia and Paroxys

    who presented with an acute auto-immune haemolytic anaemia. In addition to a persistently positive Coombs test, with specific red cell auto-antibodies, the acidified serum test and the sucrose haemolysis test were repeatedly positive. CASE REPORT. A 24-year-old Indian woman was admitted to hospital in. July 1969.

  14. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  15. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  16. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  17. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  18. Design of power cable grounding wire anti-theft monitoring system

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  19. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  20. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  1. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  2. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  3. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  4. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  5. Auto-immune hepatitis following delivery.

    Saini, Vandana; Gupta, Mamta; Mishra, S K

    2013-05-01

    Auto-immune hepatitis first presenting in the early postpartum period is rare. Immunosuppressive effects of pregnancy result in delayed manifestation of auto-immune hepatitis, and in established cases, the spontaneous improvements are there. Auto-immune hepatitis should be considered in the differential diagnosis of liver dysfunction first presenting in the early postpartum period. A case of postpartum hepatitis of auto-immune aetiology is being presented here. It is disease of unknown aetiology, characterised by inflammation of liver (as evidenced by raised serum transaminases, presence of interface hepatitis on histological examination), hypergammaglobulinaemia (> 1.5 times normal), presence of auto-antibodies [(antinuclear antibodies (ANA)], smooth muscle antibody (SMA) and antibody to liver-kidney microsome type 1 (LKM1) in the absence of viral markers ie, hepatitis B (HBsAg) and C (AntiHCV) and excellent response to corticosteroid therapy.

  6. AutoCAD 2008 and AutoCAD LT 2008 Bible

    Finkelstein, Ellen

    2011-01-01

    "Whether you're new to AutoCAD or a veteran, you will undoubtedly find this book to be an excellent resource."-- Abhi Singh, AutoCAD Product Manager, Autodesk, Inc.Here's the book that makes AutoCAD approachableEven the people at Autodesk look to Ellen Finkelstein for AutoCAD training, so who better to teach you about AutoCAD 2008? This comprehensive guide brings veterans up to speed on AutoCAD updates and takes novices from the basics to programming in AutoLISP(r) and VBA. Every feature is covered in a logical order, and with the Quick Start chapter, you'll be creating drawings on your very f

  7. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  8. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  9. Tricks of the trade: Mechanism of brood theft in an ant.

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  10. Grand unified theories

    Langacker, P.

    1981-01-01

    In this talk I discuss the present status of these theories and of their observational and experimental implications. In section II, I briefly review the standard SU 3 sup(c) x SU 2 x U 1 model of the strong and electroweak interactions. Although phenomenologically successful, the standard model leaves many questions unanswered. Some of these questions are addressed by grand unified theories, which are defined and discussed in Section III. The Georgi-Glashow SU 5 model is described, as are theories based on larger groups such as SO 10 , E 6 , or SO 16 . It is emphasized that there are many possible grand unified theories and that it is an experimental problem not only to test the basic ideas but to discriminate between models. (orig./HSI)

  11. Asymptotically safe grand unification

    Bajc, Borut [J. Stefan Institute,1000 Ljubljana (Slovenia); Sannino, Francesco [CP-Origins & the Danish IAS, University of Southern Denmark,Campusvej 55, DK-5230 Odense M (Denmark); Université de Lyon, France, Université Lyon 1, CNRS/IN2P3, UMR5822 IPNL,F-69622 Villeurbanne Cedex (France)

    2016-12-28

    Phenomenologically appealing supersymmetric grand unified theories have large gauge representations and thus are not asymptotically free. Their ultraviolet validity is limited by the appearance of a Landau pole well before the Planck scale. One could hope that these theories save themselves, before the inclusion of gravity, by generating an interacting ultraviolet fixed point, similar to the one recently discovered in non-supersymmetric gauge-Yukawa theories. Employing a-maximization, a-theorem, unitarity bounds, as well as positivity of other central charges we nonperturbatively rule out this possibility for a broad class of prime candidates of phenomenologically relevant supersymmetric grand unified theories. We also uncover candidates passing these tests, which have either exotic matter or contain one field decoupled from the superpotential. The latter class of theories contains a model with the minimal matter content required by phenomenology.

  12. LA GRANDE DESCENTE

    The first endcap disc of CMS being lowered slowly and carefully 100 m underground into the experimental cavern. The disc is one of 15 large pieces to make the grand descent.  The uniquely shaped slice, 16 m high, about 50 cm thick weighs 400 tonnes. The two HF that were lowered earlier in November can also be seen in the foreground and background.  

  13. Second auto-SCT for treatment of relapsed multiple myeloma.

    Gonsalves, W I; Gertz, M A; Lacy, M Q; Dispenzieri, A; Hayman, S R; Buadi, F K; Dingli, D; Hogan, W J; Kumar, S K

    2013-04-01

    High-dose therapy and auto-SCT remain integral in the initial treatment of multiple myeloma (MM), and are increasingly being applied for management of relapsed disease. We examined the outcomes in 98 patients undergoing salvage auto-SCT (auto-SCT2) for relapsed MM after receiving an initial transplant (auto-SCT1) between 1994 and 2009. The median age at auto-SCT2 was 60 years (range: 35-74). The median time between auto-SCT1 and auto-SCT2 was 46 months (range: 10-130). Treatment-related mortality was seen in 4%. The median PFS from auto-SCT2 was 10.3 (95% confidence interval (CI): 7-14) months and the median OS from auto-SCT2 was 33 months (95% CI: 28-51). In a multivariable analysis, shorter time to progression (TTP) after auto-SCT1, not achieving a CR after auto-SCT2, higher number of treatment regimens before auto-SCT2 and a higher plasma cell labeling index at auto-SCT2 predicted for shorter PFS. However, only a shorter TTP after auto-SCT1 predicted for a shorter OS post auto-SCT2. Hence, auto-SCT2 is an effective and feasible therapeutic option for MM patients relapsing after other treatments, especially in patients who had a TTP of at least 12 months after their auto-SCT1.

  14. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  15. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  16. MICRO AUTO GASIFICATION SYSTEM: EMISSIONS ...

    A compact, CONEX-housed waste to energy unit, Micro Auto Gasification System (MAGS), was characterized for air emissions from burning of military waste types. The MAGS unit is a dual chamber gasifier with a secondary diesel-fired combustor. Eight tests were conducted with multiple waste types in a 7-day period at the Kilauea Military Camp in Hawai’i. The emissions characterized were chosen based on regulatory emissions limits as well as their ability to cause adverse health effects on humans: particulate matter (PM), mercury, heavy metals, volatile organic compounds (VOCs), polyaromatic hydrocarbons (PAHs), and polychlorinated dibenzo-p-dioxins (PCDDs) and polychlorinated dibenzofurans (PCDFs). Three military waste feedstock compositions reflecting the variety of wastes to be encountered in theatre were investigated: standard waste (SW), standard waste with increased plastic content (HP), standard waste without SW food components but added first strike ration (FSR) food and packaging material (termed FSR). A fourth waste was collected from the Kilauea dumpster that served the dining facility and room lodging (KMC). Limited scrubber water and solid ash residue samples were collected to obtain a preliminary characterization of these effluents/residues.Gasifying SW, HP, and KMC resulted in similar PCDD/PCDF stack concentrations, 0.26-0.27 ng TEQ/m3 at 7% O2, while FSR waste generated a notably higher stack concentration of 0.68 ng TEQ/m3 at 7% O2. The PM emission

  17. Auto Carrier Transporter Loading and Unloading Improvement

    Miller, Brian

    2003-01-01

    .... Any reduction in time and energy will result in a significant savings of money. The intent of this research is to develop an algorithm to solve the Auto Carrier Transport Pickup and Delivery Problem...

  18. Development of ATSR (Auto Thermal Steam Reformer)

    Ono, J.; Yoshino, Y.; Kuwabara, T.; Fujisima, S.; Kobayashi, S.; Maruko, S.

    2004-01-01

    'Full text:' Auto-thermal reformers are used popularly for fuel cell vehicle because they are compact and can start up quickly. On the other hand, steam reformers are used for stationary fuel cell power plant because they are good thermal efficiency. While, there are many cases using the auto- thermal reformer for stationary use with expectation of cost reduction in USA, as well. However, they are still insufficient for its durability, compactness and cost. We have been developing the new type of fuel processing system that is auto-thermal steam reformer (ATSR), which is hybrid of a conventional steam reformer (STR) and a conventional auto-thermal reformer (ATR). In this study, some proto-type of ATSR for field test were designed, tried manufacturing and tested performance and durability. And we have tried to operate with fuel cell stack to evaluate the system interface performance, that is, operability and controllability. (author)

  19. Line Generalization and AutoCAD Map

    Nada Vučetić

    2001-01-01

    Full Text Available The paper offers the results of original research made on the application of AutoCAD Map in line generalisation. The differences and similarities have been found out between the Douglas-Peucker method and the method of line simplification that is incorporated in AutoCAD Map. There have been also the inaccuracies found out in AutoCAD Map manual relating to the issues of buffer width and tolerance, and the line width before and after simplification. The paper gives recommendations about pseudo nodes dissolving. It has been noticed that AutoCAD Map simplification method is not independent of the order of points. The application of the method is illustrated by an example of coastal line of Istria.

  20. AutoCAD-To-NASTRAN Translator Program

    Jones, A.

    1989-01-01

    Program facilitates creation of finite-element mathematical models from geometric entities. AutoCAD to NASTRAN translator (ACTON) computer program developed to facilitate quick generation of small finite-element mathematical models for use with NASTRAN finite-element modeling program. Reads geometric data of drawing from Data Exchange File (DXF) used in AutoCAD and other PC-based drafting programs. Written in Microsoft Quick-Basic (Version 2.0).

  1. Computing Mass Properties From AutoCAD

    Jones, A.

    1990-01-01

    Mass properties of structures computed from data in drawings. AutoCAD to Mass Properties (ACTOMP) computer program developed to facilitate quick calculations of mass properties of structures containing many simple elements in such complex configurations as trusses or sheet-metal containers. Mathematically modeled in AutoCAD or compatible computer-aided design (CAD) system in minutes by use of three-dimensional elements. Written in Microsoft Quick-Basic (Version 2.0).

  2. Grande do Sul, Brasil

    Denis Alcides-Rezende

    2008-01-01

    Full Text Available The objective of this work is to analyse the integration of information systems and information technology resources in the municipal planning of 14 small cities of Rio Grande do Sul (Brazil. The research methodology consisted of a multiple case study together with a convenient non-probabilistic sample chosen through a research protocol. The results demonstrate the difficulties of these cities to organise the municipal data as well as their struggle for accessibility of information and planning for management and control.

  3. AutoCAD 2014 review for certification official certification preparation

    ASCENT center for technical knowledge

    2014-01-01

    The AutoCAD® 2014 Review for Certification book is intended for users of AutoCAD® preparing to complete the AutoCAD 2014 Certified Professional exam. This book contains a collection of relevant instructional topics, practice exercises, and review questions from the Autodesk Official Training Guides (AOTG) from ASCENT - Center for Technical Knowledge pertaining specifically to the Certified Professional exam topics and objectives. This book is intended for experienced users of AutoCAD in preparation for certification. New users of AutoCAD should refer to the AOTG training guides from ASCENT, such as AutoCAD/AutoCAD LT 2014 Fundamentals, for more comprehensive instruction.

  4. Genotoxic damage in auto body shop workers.

    Siebel, Anna Maria; Basso da Silva, Luciano

    2010-10-01

    Some studies have shown increased DNA damage among car painters, but other professionals working in auto body and paint shops have not been extensively assessed. The aim of this study was to assess DNA damage in different types of auto body shop workers by measuring micronucleus (MN) levels in exfoliated buccal cells. The mean number of cells with MN per 2000 exfoliated buccal cells was analyzed in three groups of male workers: auto body repair technicians, painters, and office workers (control group). All participants answered a questionnaire inquiring about age, smoking habits, alcohol consumption, work practices, occupational exposure time, job activities, and use of protective equipment. The mean number of cells with MN was 3.50 ± 1.50 in auto body painters, 3.91 ± 2.10 in auto body repair technicians, and 0.80 ± 0.78 in office workers, with a significant difference between the control group and the two other groups (p = 0.0001). Age, occupational exposure time, use of protective masks, alcohol consumption, and smoking habit did not affect MN results. The findings indicate that technicians and painters working in auto body shops are at risk for genotoxic damage, while office workers seem to be protected.

  5. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  6. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  7. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  8. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  9. New perspectives on auto propane

    Webb, R.F.

    1991-01-01

    In spite of the high level of propane use in vehicles in North America (relative to the use of compressed natural gas (CNG) or methanol), the alternate-fuel research and development activities of original equipment manufacturers (OEMs) are focusing on methanol, CNG, and electric vehicles. If OEM indifference to propane continues, propane vehicles will continue to be available only in after-market conversions, denying propane the benefits of OEM mass-production economics, quality control, retail distribution, and other factors. Recent developments in auto propane are reported which should be considered by OEMs and policymakers to allow propane to enter the mass-scale motor vehicle market. Propane and the liquefied petroleum gas (LPG) mix used as a motor vehicle fuel are often regarded as just a byproduct of natural gas production and oil refining, giving the impression that propane/LPG will not be available in sufficient quantities to support a mass market. It is shown that LPG supply is market-responsive and that over 20 billion gal of new supply could be made available from North American sources by the year 2000 and over 27 billion gal by 2005, sufficient to supply 12.5% of the projected North American vehicle fleet in 2005. The new supply would come from incremental expansion of existing production, displacement of LPG from lower-value uses, and LPG synthesis. The environmental performance of propane/LPG engines is also compared to that of engines running on gasoline, natural gas, and methanol. Advantages of LPG over gasoline include lower carbon content and lower CO emissions, and advantages over CNG arise from the high greenhouse gas activity and long life of methane. 12 figs

  10. Projecting pipeline construction by AutoDesk Map; Projektierung von Rohrleitungsbaumassnahmen mit AutoDesk Map

    Taschendorf, M.; Voigtlaender, M. [Hamburger Wasserwerke GmbH, Hamburg (Germany)

    2005-12-15

    Presented is AutoDesk Map, which enables the construction and planning of big grids for water- and gas supply. In this example industrial equipment is driven as objects in AutoDesk Map. Therefore the consistence of the data is guaranted and comprehensive CAD functions are available for industrial equipment and topologies. (GL)

  11. Cassini's Grand Finale Overview

    Spilker, L. J.

    2017-12-01

    After 13 years in orbit, the Cassini-Huygens Mission to Saturn ended in a science-rich blaze of glory. Cassini sent back its final bits of unique science data on September 15, 2017, as it plunged into Saturn's atmosphere, vaporizing and satisfying planetary protection requirements. Cassini's final phase covered roughly ten months and ended with the first time exploration of the region between the rings and planet. In late 2016 Cassini transitioned to a series of 20 Ring Grazing orbits with peripases just outside Saturn's F ring, providing close flybys of tiny ring moons, including Pan, Daphnis and Atlas, and high-resolution views of Saturn's A and F rings. A final Titan flyby in late April 2017 propelled Cassini across Saturn's main rings and into its Grand Finale orbits. Comprised of 22 orbits, Cassini repeatedly dove between Saturn's innermost rings and upper atmosphere to answer fundamental questions unattainable earlier in the mission. The last orbit turned the spacecraft into the first Saturn atmosphere probe. The Grand Finale orbits provided highest resolution observations of both the rings and Saturn, and in-situ sampling of the ring particle composition, Saturn's atmosphere, plasma, and innermost radiation belts. The gravitational field was measured to unprecedented accuracy, providing information on the interior structure of the planet, winds in the deeper atmosphere, and mass of the rings. The magnetic field provided insight into the physical nature of the magnetic dynamo and structure of the internal magnetic field. The ion and neutral mass spectrometer sampled the upper atmosphere for molecules that escape the atmosphere in addition to molecules originating from the rings. The cosmic dust analyzer directly sampled the composition from different parts of the main rings for the first time. Fields and particles instruments directly measured the plasma environment between the rings and planet. Science highlights and new mysteries collected in the Grand

  12. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  13. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  14. A Real Time Approach to Theft Prevention in the field of Transportation System

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  15. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  16. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  17. AutoCAD 2012 and AutoCAD LT 2012 Bible

    Finkelstein, Ellen

    2011-01-01

    The latest version of this perennial favorite, in-depth, reference-tutorial This top-selling book has been updated by AutoCAD guru and author Ellen Finkelstein to provide you with the very latest coverage of both AutoCAD 2012 and AutoCAD LT 2012. It begins with a Quick Start tutorial, so you start creating right away. From there, the book covers so much in-depth material on AutoCAD that it is said that even Autodesk employees keep this comprehensive book at their desks. A DVD is included that features before-and-after drawings of all the tutorials and plenty of great examples from AutoCAD prof

  18. Decision-based model development for nuclear material theft, smuggling, and illicit use

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  19. Grand unification and supergravity

    Nanopoulos, D.V.

    Grand Unified Theories (GUTs) are very successful, but they suffer from fine-tuning or hierarchy problems. It seems that more symmetry beyond the gauge symmetry is needed and indeed supersymmetric GUTs may provide the correct framework in solving the hierarchy problems. These are reviewed. From the results discussed, it is seen that for the first time in particle physics, gravity seems to play a dominant role. It may be responsible for GUT breaking, SU(2) x U(1) breaking, fermion masses, proton decay and a consistent cosmological picture. Supergravity seems to offer a consistent, effective theory for energies below the Planck scale to N=1 local SUSY but also, in the context of N=8 extended supergravity with a dynamically realized SU(8), there may be a consistent fundamental unified theory of all interactions. (U.K.)

  20. Grand unification: status report

    Georgi, H.

    1983-01-01

    Grand unification is reviewed with regard to the flavor puzzle and the hierarchy puzzle. Progress in CP and the PQWWKDFS axion is reviewed. The neutrino mass and B-L research, the understanding and assimilation of the language of effective theories (which divide the momentum scale up into regions), with focus on the models, are surveyed. Various unified models are organized according to whether they address the hierarchy puzzle or the flavor puzzle. SU(5), SO(10), E6, and Higgs are considered simple and explicit models. Global symmetry addresses hierarchy puzzle, but the rules are unclear. In SO (18), with regard to hierarchy, perturbation theory breaks down. SO (14) fails for hierarchy because of GIM, b and t problems. Supersymmetry and technicolor with regard to flavor puzzle are questioned. The CP solution of ETC and Composite C models (addressing both flavor and hierarchy) is a minus. Composite A model has no evident virtues, and the basic idea of ETC model needs checking

  1. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  2. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  3. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  4. Grand unified theories. Pt. 2

    Ellis, J.

    1982-01-01

    The author gives an introduction to the construction of grand unified theories on the base of the SU(3)xSU(2)xU(1) model of the strong, weak, and electromagnetic interactions. Especially he discusses the proton decay, neutrino masses and oscillations, and cosmological implications in connection with grand unified theories. (orig./HSI)

  5. La importancia de ser grande

    Baisre, J. A.

    2007-01-01

    Se responde a las preguntas ¿por qué los mamíferos marinos son los animales más grandes del planeta?, ¿Por qué los peces no pueden ser más grandes?. Éstas y otras interrogantes son respondidas de forma sencilla y clara.

  6. [Clinical overview of auto-inflammatory diseases].

    Georgin-Lavialle, S; Rodrigues, F; Hentgen, V; Fayand, A; Quartier, P; Bader-Meunier, B; Bachmeyer, C; Savey, L; Louvrier, C; Sarrabay, G; Melki, I; Belot, A; Koné-Paut, I; Grateau, G

    2018-04-01

    Monogenic auto-inflammatory diseases are characterized by genetic abnormalities coding for proteins involved in innate immunity. They were initially described in mirror with auto-immune diseases because of the absence of circulating autoantibodies. Their main feature is the presence of peripheral blood inflammation in crisis without infection. The best-known auto-inflammatory diseases are mediated by interleukines that consisted in the 4 following diseases familial Mediterranean fever, cryopyrinopathies, TNFRSF1A-related intermittent fever, and mevalonate kinase deficiency. Since 10 years, many other diseases have been discovered, especially thanks to the progress in genetics. In this review, we propose the actual panorama of the main known auto-inflammatory diseases. Some of them are recurrent fevers with crisis and remission; some others evaluate more chronically; some are associated with immunodeficiency. From a physiopathological point of view, we can separate diseases mediated by interleukine-1 and diseases mediated by interferon. Then some polygenic inflammatory diseases will be shortly described: Still disease, Schnitzler syndrome, aseptic abscesses syndrome. The diagnosis of auto-inflammatory disease is largely based on anamnesis, the presence of peripheral inflammation during attacks and genetic analysis, which are more and more performant. Copyright © 2018 Société Nationale Française de Médecine Interne (SNFMI). Published by Elsevier SAS. All rights reserved.

  7. The tariff for fire and theft car insurance: analysis with a Cox model

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  8. The tariff for fire and theft car insurance: analysis with a Cox model

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  9. AutoCAD platform customization user interface and beyond

    Ambrosius, Lee

    2014-01-01

    Make AutoCAD your own with powerful personalization options Options for AutoCAD customization are typically the domain of administrators, but savvy users can perform their own customizations to personalize AutoCAD. Until recently, most users never thought to customize the AutoCAD platform to meet their specific needs, instead leaving it to administrators. If you are an AutoCAD user who wants to ramp up personalization options in your favorite software, AutoCAD Platform Customization: User Interface and Beyond is the perfect resource for you. Author Lee Ambrosius is recognized as a leader in Au

  10. Human neutrophils in auto-immunity.

    Thieblemont, Nathalie; Wright, Helen L; Edwards, Steven W; Witko-Sarsat, Véronique

    2016-04-01

    Human neutrophils have great capacity to cause tissue damage in inflammatory diseases via their inappropriate activation to release reactive oxygen species (ROS), proteases and other tissue-damaging molecules. Furthermore, activated neutrophils can release a wide variety of cytokines and chemokines that can regulate almost every element of the immune system. In addition to these important immuno-regulatory processes, activated neutrophils can also release, expose or generate neoepitopes that have the potential to break immune tolerance and result in the generation of autoantibodies, that characterise a number of human auto-immune diseases. For example, in vasculitis, anti-neutrophil cytoplasmic antibodies (ANCA) that are directed against proteinase 3 or myeloperoxidase are neutrophil-derived autoantigens and activated neutrophils are the main effector cells of vascular damage. In other auto-immune diseases, these neutrophil-derived neoepitopes may arise from a number of processes that include release of granule enzymes and ROS, changes in the properties of components of their plasma membrane as a result of activation or apoptosis, and via the release of Neutrophil Extracellular Traps (NETs). NETs are extracellular structures that contain chromatin that is decorated with granule enzymes (including citrullinated proteins) that can act as neo-epitopes to generate auto-immunity. This review therefore describes the processes that can result in neutrophil-mediated auto-immunity, and the role of neutrophils in the molecular pathologies of auto-immune diseases such as vasculitis, rheumatoid arthritis (RA) and systemic lupus erythematosus (SLE). We discuss the potential role of NETs in these processes and some of the debate in the literature regarding the role of this phenomenon in microbial killing, cell death and auto-immunity. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. Parallel auto-correlative statistics with VTK.

    Pebay, Philippe Pierre; Bennett, Janine Camille

    2013-08-01

    This report summarizes existing statistical engines in VTK and presents both the serial and parallel auto-correlative statistics engines. It is a sequel to [PT08, BPRT09b, PT09, BPT09, PT10] which studied the parallel descriptive, correlative, multi-correlative, principal component analysis, contingency, k-means, and order statistics engines. The ease of use of the new parallel auto-correlative statistics engine is illustrated by the means of C++ code snippets and algorithm verification is provided. This report justifies the design of the statistics engines with parallel scalability in mind, and provides scalability and speed-up analysis results for the autocorrelative statistics engine.

  12. AutoCAD 2015 and AutoCAD LT 2015 essentials

    Onstott, Scott

    2014-01-01

    Step-by-step instructions for the AutoCAD fundamentals AutoCAD 2015 Essentials contains 400 pages of full-color, comprehensive instruction on the world's top drafting and architecture software. This 2015 edition features architectural, manufacturing, and landscape architecture examples. And like previous editions, the detailed guide introduces core concepts using interactive tutorials and open-ended projects, which can be completed in any order, thanks to downloadable data sets (an especially useful feature for students and professionals studying for Autodesk AutoCAD certification). Unlike man

  13. AutoCAD 2012 and AutoCAD LT 2012 No Experience Required

    Gladfelter, Donnie

    2011-01-01

    The perfect step-by-step introduction to Autodesk's powerful architectural design software With this essential guide, you'll learn how to plan, develop, document, and present a complete AutoCAD project by building a summer cabin from start to finish. You can follow each step sequentially or jump in at any point by downloading the drawing files from the book's companion web site. You'll also master all essential AutoCAD features, get a thorough grounding in the basics, learn the very latest industry standards and techniques, and quickly become productive with AutoCAD 2012.Features concise expla

  14. Grand slam on cancer.

    Gartrell, Nanette

    2014-01-01

    A winner of 59 Grand Slam championships including a record 9 Wimbledon singles titles, Martina Navratilova is the most successful woman tennis player of the modern era. Martina was inducted into the International Tennis Hall of Fame, named "Tour Player of the Year" seven times by the Women's Tennis Association, declared "Female Athlete of the Year" by the Associated Press, and ranked one of the "Top Forty Athletes of All-Time" by Sports Illustrated. Equally accomplished off the court, Martina is an author, philanthropist, TV commentator, and activist who has dedicated her life to educating people about prejudice and stereotypes. After coming out as a lesbian in 1981, Martina became a tireless advocate of equal rights for lesbian, gay, bisexual, and transgender (LGBT) people, and she has contributed generously to the LGBT community. Martina is the author of seven books, including most recently Shape Your Self: My 6-Step Diet and Fitness Plan to Achieve the Best Shape of your Life, an inspiring guide to healthy living and personal fitness. Martina was diagnosed with breast cancer in 2010.

  15. Magnetic spectrometer Grand Raiden

    Fujiwara, M.; Akimune, H.; Daito, I.; Fujimura, H.; Fujita, Y.; Hatanaka, K.; Ikegami, H.; Katayama, I.; Nagayama, K.; Matsuoka, N.; Morinobu, S.; Noro, T.; Yoshimura, M.; Sakaguchi, H.; Sakemi, Y.; Tamii, A.; Yosoi, M.

    1999-01-01

    A high-resolution magnetic spectrometer called 'Grand Raiden' is operated at the RCNP ring cyclotron facility in Osaka for nuclear physics studies at intermediate energies. This magnetic spectrometer has excellent ion-optical properties. In the design of the spectrometer, the second-order dispersion matching condition has been taken into account, and almost all the aberration terms such as (x vertical bar θ 3 ), (x vertical bar θφ 2 ), (x vertical bar θ 2 δ) and (x vertical bar θδ 2 ) in a third-order matrix calculation are optimized. A large magnetic rigidity of the spectrometer (K = 1400 MeV) gives a great advantage to measure the charge-exchange ( 3 He, t) reactions at 450 MeV. The ability of the high-resolution measurement has been demonstrated. Various coincidence measurements are performed to study the nuclear structures of highly excited states through decay properties of nuclear levels following nuclear reactions at intermediate energies

  16. Clinical physiology grand rounds.

    Richards, Jeremy; Schwartzstein, Richard; Irish, Julie; Almeida, Jacqueline; Roberts, David

    2013-04-01

    Clinical Physiology Grand Rounds (CPGR) is an interactive, case-based conference for medical students designed to: (1) integrate preclinical and clinical learning; (2) promote inductive clinical reasoning; and (3) emphasise students as peer teachers. CPGR specifically encourages mixed learning level student interactions and emphasises the use of concept mapping. We describe the theoretical basis and logistical considerations for an interactive, integrative, mixed-learner environment such as CPGR. In addition, we report qualitative data regarding students' attitudes towards and perceptions of CPGR. Medical students from first to fourth year participate in a monthly, interactive conference. The CPGR was designed to bridge gaps and reinforce linkages between basic science and clinical concepts, and to incorporate interactive vertical integration between preclinical and clinical students. Medical education and content experts use Socratic, interactive teaching methods to develop real-time concept maps to emphasise the presence and importance of linkages across curricula. Student focus groups were held to assess attitudes towards and perceptions of the mixed-learner environment and concept maps in CPGR. Qualitative analyses of focus group transcripts were performed to develop themes and codes describing the students' impressions of CPGR. CPGR is a case-based, interactive conference designed to help students gain an increased appreciation of linkages between basic science and clinical medicine concepts, and an increased awareness of clinical reasoning thought processes. Success is dependent upon explicit attention being given to goals for students' integrated learning. © Blackwell Publishing Ltd 2013.

  17. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  18. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  19. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  20. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  1. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  2. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  3. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  4. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  5. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  6. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  7. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  8. Theft detection and smart metering practices and expectations in the Netherlands

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  9. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  10. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  11. Growing trend of identity theft poses safety and billing loss threats.

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  12. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  13. Auto Body Repair 103, 203, 303.

    Manitoba Dept. of Education, Winnipeg.

    As part of the high school vocational industrial program in Manitoba, this course has been designed to provide students with the foundation for a career in auto-body repair. The program introduces and provides opportunities for student skill development in the theories and techniques of tool and equipment operation, metallurgy and welding, damage…

  14. Mathematical model of three winding auto transformer

    Volcko, V.; Eleschova, Z.; Belan, A.; Janiga, P.

    2012-01-01

    This article deals with the design of mathematical model of three-winding auto transformer for steady state analyses. The article is focused on model simplicity for the purposes of the use in complex transmission systems and authenticity of the model taking into account different types of step-voltage regulator. (Authors)

  15. Auto Euroopa Liidus kallim / Sulev Oll

    Oll, Sulev, 1964-

    2001-01-01

    Euroopa Liiduga liitumisel tuleb uue auto eest välja käia vähemalt 10 000 krooni rohkem, kuna plaanide kohaselt ei tohi liikmesriikides autode hinnaerinevused ületada 12%. Ilmunud ka: Delovõje Vedomosti, 28. märts 2001, lk. 7

  16. A Primary Talkk about Chinese Auto Parts

    2001-01-01

    <正> Along with the completion of the second phase of the socialist modernization construction in 2000, China is starting to initiate the Tenth Five-Year Plan. 2001-2005 will be a key period during which China is supposed to build the third strategic objective It is also an extraordinary period for Chinese auto industry to bring in line with international practice.

  17. The Marketing Channels of China Auto Industry

    our reporter

    2001-01-01

    <正> After the 1990’s, the multi-channel structure of sales has still existed although the market mechanism is playing a main role in Chinese auto marketing circulation. Now, the channels of automobile marketing in China are as follows: 1. Manufacturer-established marketing channels

  18. MICRO AUTO GASIFICATION SYSTEM: EMISSIONS CHARACTERIZATION

    A compact, CONEX-housed waste to energy unit, Micro Auto Gasification System (MAGS), was characterized for air emissions from burning of military waste types. The MAGS unit is a dual chamber gasifier with a secondary diesel-fired combustor. Eight tests were conducted with multipl...

  19. Auto-correlograms and auto-regressive models of trace metal distributions in Cochin backwaters

    Jayalakshmy, K.V.; Sankaranarayanan, V.N.

    Auto-correlation technique has been applied to study fluctuations in concentration profiles of chemical species in Cochin Backwaters (Kerala, India). No stability in time can be detected for particulate Mn at all stations, for Fe at stations 1...

  20. Variabilidade da aderência e das propriedades mecânicas do concreto auto-adensável

    F. M. Almeida Filho

    Full Text Available Esta pesquisa tem como objetivo estudar a variabilidade das propriedades mecânicas (resistência à compressão, módulo de elasticidade longitudinal e resistência à tração e da resistência de aderência do concreto auto-adensável (CAA, com resistência à compressão do concreto de 50 MPa aos 28 dias, variando o tamanho máximo do agregado graúdo e sua fluidez. Os ensaios foram realizados em corposde- prova de 15 x 30 cm e em vigas padronizadas de acordo com o Rilem-Ceb-Fib (1973. De acordo com os resultados obtidos, pode-se concluir que a variabilidade do concreto auto-adensável é pequena para o módulo de elasticidade e para a resistência à compressão e grande para a resistência à tração por causa do modo de ruptura do modelo. Com relação à resistência de aderência, a variabilidade foi pequena mostrando que o concreto auto-adensável é material confiável com grande potencial de utilização no mercado da construção civil.

  1. Rational Thoughts on the Development of Chinese Auto Industry

    Shao Qihui

    2004-01-01

    @@ In order to keep the steady, fast and sustainable development of auto industry, we should have an overall knowledge of the history and current situation of the world auto industry, and have a correct strategic planning and scientific measures towards the Chinese auto industry.

  2. 46 CFR 78.19-1 - Use of auto pilot.

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Use of auto pilot. 78.19-1 Section 78.19-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Auto Pilot § 78.19-1 Use of auto pilot. Except as provided in 33 CFR 164.15, when the automatic pilot is used in— (a...

  3. 46 CFR 97.16-1 - Use of auto pilot.

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto pilot. 97.16-1 Section 97.16-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Auto Pilot § 97.16-1 Use of auto pilot. Except as provided in 33 CFR 164.15, when the automatic pilot is used...

  4. Efficiency calibration of solid track spark auto counter

    Wang Mei; Wen Zhongwei; Lin Jufang; Liu Rong; Jiang Li; Lu Xinxin; Zhu Tonghua

    2008-01-01

    The factors influencing detection efficiency of solid track spark auto counter were analyzed, and the best etch condition and parameters of charge were also reconfirmed. With small plate fission ionization chamber, the efficiency of solid track spark auto counter at various experiment assemblies was re-calibrated. The efficiency of solid track spark auto counter at various experimental conditions was obtained. (authors)

  5. Se o velho é o outro, quem sou eu? A construção da auto-imagem na velhice

    Ana Helena de Ávila

    2007-01-01

    Full Text Available Este estudio investigó como el viejo construye su auto-imagen a partir de la representación social de la vejez. Se realizaron siete entrevistas semi-estructuradas, con viejos de 72 a 91 años, de ambos sexos, diferentes clases sociales y diferentes grados de escolaridad, residentes en Porto Alegre y Grande Porto Alegre. Las entrevistas abordaron las siguientes áreas de interés: auto-imagen en la vejez, representaciones sociales de la vejez y vivencias personales. Los resultados indicaron que existen dos posibilidades para la construcción de esta auto-imagen y ambas están relacionadas por la representación social que el otro tiene de la vejez.

  6. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  7. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  8. AutoCAD-To-GIFTS Translator Program

    Jones, Andrew

    1989-01-01

    AutoCAD-to-GIFTS translator program, ACTOG, developed to facilitate quick generation of small finite-element models using CASA/GIFTS finite-element modeling program. Reads geometric data of drawing from Data Exchange File (DXF) used in AutoCAD and other PC-based drafting programs. Geometric entities recognized by ACTOG include points, lines, arcs, solids, three-dimensional lines, and three-dimensional faces. From this information, ACTOG creates GIFTS SRC file, which then reads into GIFTS preprocessor BULKM or modified and reads into EDITM to create finite-element model. SRC file used as is or edited for any number of uses. Written in Microsoft Quick-Basic (Version 2.0).

  9. Gamma ray auto absorption correction evaluation methodology

    Gugiu, Daniela; Roth, Csaba; Ghinescu, Alecse

    2010-01-01

    Neutron activation analysis (NAA) is a well established nuclear technique, suited to investigate the microstructural or elemental composition and can be applied to studies of a large variety of samples. The work with large samples involves, beside the development of large irradiation devices with well know neutron field characteristics, the knowledge of perturbing phenomena and adequate evaluation of correction factors like: neutron self shielding, extended source correction, gamma ray auto absorption. The objective of the works presented in this paper is to validate an appropriate methodology for gamma ray auto absorption correction evaluation for large inhomogeneous samples. For this purpose a benchmark experiment has been defined - a simple gamma ray transmission experiment, easy to be reproduced. The gamma ray attenuation in pottery samples has been measured and computed using MCNP5 code. The results show a good agreement between the computed and measured values, proving that the proposed methodology is able to evaluate the correction factors. (authors)

  10. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  11. Flipped-Adversarial AutoEncoders

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  12. El auto de fe de 1606

    María Isabel Pérez de Colosía Rodríguez

    1994-01-01

    Full Text Available La relación del auto de fe de 1606, está dividida en los siguientes siete apartados: Relajados en persona, Relajados en estatua, Reconciliados por la secta de Mahoma, Reconciliados por la ley de Moisés, Reconciliados por la secta Luterana, Penintenciados con abjuración de behementi y Penitenciados con abjuración de levi.

  13. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  14. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  15. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  16. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  17. A study for prevent theft of the bike design and analysis

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  18. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  19. High-voltage electrical burns due to copper theft - Case series.

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  20. High-voltage electrical burns due to copper theft – Case series

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  1. Auto-recognition of surfaces and auto-generation of material removal volume for finishing process

    Kataraki, Pramod S.; Salman Abu Mansor, Mohd

    2018-03-01

    Auto-recognition of a surface and auto-generation of material removal volumes for the so recognised surfaces has become a need to achieve successful downstream manufacturing activities like automated process planning and scheduling. Few researchers have contributed to generation of material removal volume for a product but resulted in material removal volume discontinuity between two adjacent material removal volumes generated from two adjacent faces that form convex geometry. The need for limitation free material removal volume generation was attempted and an algorithm that automatically recognises computer aided design (CAD) model’s surface and also auto-generate material removal volume for finishing process of the recognised surfaces was developed. The surfaces of CAD model are successfully recognised by the developed algorithm and required material removal volume is obtained. The material removal volume discontinuity limitation that occurred in fewer studies is eliminated.

  2. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  3. Selected topics in grand unification

    Seckel, D.

    1983-01-01

    This dissertation is a collection of four pieces of research dealing with grand unification. The topics are neutron oscillation, CP violation, magnetic monopole abundance and distribution in neutron stars, and a proposal for an inflationary cosmology driven by stress-energy in domain walls

  4. Introduction to grand unification theories

    Kang, Kyungsik

    1980-01-01

    We introduce the Georgi-Glashow model based on the minimal gauge group SU(5) as a prototype grand unification theory of the electroweak and strong interactions. Simple estimation of sin 2 thetasub(W) in the symmetry limit and the renormalization corrections at the energy scale of Msub(W) are given along wich other successes of the SU(5) model

  5. Coordinated Exploration for Grand Challenges

    Ørding Olsen, Anders; Sofka, Wolfgang; Grimpe, Christoph

    2016-01-01

    Grand challenges are among the most complex problems for modern societies. Many governments and foundations provide substantial resources to encourage the search for solutions. Due to the significance of these problems, organizations often form partnerships in what we call search consortia to eng...

  6. Theory and practice of Auto CAD, computer graphics

    Hwang, Si Won; Choe, Hong Yeong; Shin, Jae Yeon; Lee, Ryong Cheol

    1990-08-01

    This book describes theory and practice of Auto CAD, computer graphics, which deals with peripheral of computer, occurrence of digital line by DDA, BRM, theory of conversion, data base and display and shape modeling. This book gives descriptions of outline of CAD system, Auto CAD, basic function practice, simple figure practice, the third angle projection drawing a little complex single object, machine drawing I, function practice of improved Auto CAD, edit, set up layer, and 3D, and 3D display function.

  7. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  8. AutoRoute Rapid Flood Inundation Model

    2013-03-01

    cross-section data does not exist. As such, the AutoRoute model is not meant to be as accurate as models such as HEC - RAS (U.S. Army Engineer...such as HEC - RAS assume that the defined low point of cross sections must be connected. However, in this approach the channel is assumed to be defined...Res. 33(2): 309-319. U.S. Army Engineer Hydrologic Engineering Center. 2010. “ HEC - RAS : River Analysis System, User’s Manual, Version 4.1.” Davis

  9. Eco-Material Selection for Auto Bodies

    Mayyas, Ahmad T [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Omar, Mohammed [Masdar Institute of Science & Technology; Hayajneh, Mohammed T. [Jordan University of Science and Technology

    2017-09-25

    In the last decades, majority of automakers started to include lightweight materials in their vehicles to meet hard environmental regulations and to improve fuel efficiency of their vehicles. As a result, eco-material selection for vehicles emerged as a new discipline under design for environment. This chapter will summarize methods of eco-material selections for automotive applications with more emphasis into auto-bodies. A set of metrics for eco-material selection that takes into account all economic, environmental and social factors will be developed using numerical and qualitative methods. These metrics cover products' environmental impact, functionality and manufacturability, in addition to the economic and societal factors.

  10. Shape Analysis Using the Auto Diffusion Function

    Gebal, Katarzyna; Bærentzen, Jakob Andreas; Aanæs, Henrik

    2009-01-01

    Scalar functions defined on manifold triangle meshes is a starting point for many geometry processing algorithms such as mesh parametrization, skeletonization, and segmentation. In this paper, we propose the Auto Diffusion Function (ADF) which is a linear combination of the eigenfunctions......, it is controlled by a single parameter which can be interpreted as feature scale, and, finally, the ADF is invariant to rigid and isometric deformations. We describe the ADF and its properties in detail and compare it to other choices of scalar functions on manifolds. As an example of an application, we present...

  11. On the road again: traffic fatalities and auto insurance minimums

    Pavel A. Yakovlev

    2018-03-01

    Full Text Available Prior research on policy-induced moral hazard effects in the auto insurance market has focused on the impact of compulsory insurance, no-fault liability, and tort liability laws on traffic fatalities. In contrast, this paper examines the moral hazard effect of a previously overlooked policy variable: minimum auto insurance coverage. We hypothesize that state-mandated auto insurance minimums may “over-insure” some drivers, lowering their incentives to drive carefully. Using a longitudinal panel of American states from 1982 to 2006, we find that policy-induced increases in auto insurance minimums are associated with higher traffic fatality rates, ceteris paribus.

  12. Investigating the Simulink Auto-Coding Process

    Gualdoni, Matthew J.

    2016-01-01

    Model based program design is the most clear and direct way to develop algorithms and programs for interfacing with hardware. While coding "by hand" results in a more tailored product, the ever-growing size and complexity of modern-day applications can cause the project work load to quickly become unreasonable for one programmer. This has generally been addressed by splitting the product into separate modules to allow multiple developers to work in parallel on the same project, however this introduces new potentials for errors in the process. The fluidity, reliability and robustness of the code relies on the abilities of the programmers to communicate their methods to one another; furthermore, multiple programmers invites multiple potentially differing coding styles into the same product, which can cause a loss of readability or even module incompatibility. Fortunately, Mathworks has implemented an auto-coding feature that allows programmers to design their algorithms through the use of models and diagrams in the graphical programming environment Simulink, allowing the designer to visually determine what the hardware is to do. From here, the auto-coding feature handles converting the project into another programming language. This type of approach allows the designer to clearly see how the software will be directing the hardware without the need to try and interpret large amounts of code. In addition, it speeds up the programming process, minimizing the amount of man-hours spent on a single project, thus reducing the chance of human error as well as project turnover time. One such project that has benefited from the auto-coding procedure is Ramses, a portion of the GNC flight software on-board Orion that has been implemented primarily in Simulink. Currently, however, auto-coding Ramses into C++ requires 5 hours of code generation time. This causes issues if the tool ever needs to be debugged, as this code generation will need to occur with each edit to any part of

  13. Auto-Generated Semantic Processing Services

    Davis, Rodney; Hupf, Greg

    2009-01-01

    Auto-Generated Semantic Processing (AGSP) Services is a suite of software tools for automated generation of other computer programs, denoted cross-platform semantic adapters, that support interoperability of computer-based communication systems that utilize a variety of both new and legacy communication software running in a variety of operating- system/computer-hardware combinations. AGSP has numerous potential uses in military, space-exploration, and other government applications as well as in commercial telecommunications. The cross-platform semantic adapters take advantage of common features of computer- based communication systems to enforce semantics, messaging protocols, and standards of processing of streams of binary data to ensure integrity of data and consistency of meaning among interoperating systems. The auto-generation aspect of AGSP Services reduces development time and effort by emphasizing specification and minimizing implementation: In effect, the design, building, and debugging of software for effecting conversions among complex communication protocols, custom device mappings, and unique data-manipulation algorithms is replaced with metadata specifications that map to an abstract platform-independent communications model. AGSP Services is modular and has been shown to be easily integrable into new and legacy NASA flight and ground communication systems.

  14. Web proxy auto discovery for the WLCG

    Dykstra, D; Blumenfeld, B; De Salvo, A; Dewhurst, A; Verguilov, V

    2017-01-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids regis...

  15. Economic evaluation of epinephrine auto-injectors for peanut allergy.

    Shaker, Marcus; Bean, Katherine; Verdi, Marylee

    2017-08-01

    Three commercial epinephrine auto-injectors were available in the United States in the summer of 2016: EpiPen, Adrenaclick, and epinephrine injection, USP auto-injector. To describe the variation in pharmacy costs among epinephrine auto-injector devices in New England and evaluate the additional expense associated with incremental auto-injector costs. Decision analysis software was used to evaluate costs of the most and least expensive epinephrine auto-injector devices for children with peanut allergy. To evaluate regional variation in epinephrine auto-injector costs, a random sample of New England national and corporate pharmacies was compared with a convenience sample of pharmacies from 10 Canadian provinces. Assuming prescriptions written for 2 double epinephrine packs each year (home and school), the mean costs of food allergy over the 20-year model horizon totaled $58,667 (95% confidence interval [CI] $57,745-$59,588) when EpiPen was prescribed and $45,588 (95% CI $44,873-$46,304) when epinephrine injection, USP auto-injector was prescribed. No effectiveness differences were evident between groups, with 17.19 (95% CI 17.11-17.27) quality-adjusted life years accruing for each subject. The incremental cost per episode of anaphylaxis treated with epinephrine over the model horizon was $12,576 for EpiPen vs epinephrine injection, USP auto-injector. EpiPen costs were lowest at Canadian pharmacies ($96, 95% CI $85-$107). There was price consistency between corporate and independent pharmacies throughout New England by device brand, with the epinephrine injection, USP auto-injector being the most affordable device. Cost differences among epinephrine auto-injectors were significant. More expensive auto-injector brands did not appear to provide incremental benefit. Copyright © 2017 American College of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  16. Results from KASCADE–Grande

    Bertaina, M.; Apel, W.D.; Arteaga-Velázquez, J.C.; Bekk, K.; Blümer, J.; Bozdog, H.; Brancus, I.M.; Buchholz, P.; Cantoni, E.; Chiavassa, A.; Cossavella, F.

    2012-01-01

    The KASCADE–Grande experiment, located at Karlsruhe Institute of Technology (Germany) is a multi-component extensive air-shower experiment devoted to the study of cosmic rays and their interactions at primary energies 10 14 –10 18 eV. Main goals of the experiment are the measurement of the all-particle energy spectrum and mass composition in the 10 16 –10 18 eV range by sampling charged (N ch ) and muon (N μ ) components of the air shower. The method to derive the energy spectrum and its uncertainties, as well as the implications of the obtained result, is discussed. An overview of the analyses performed by KASCADE–Grande to derive the mass composition of the measured high-energy comic rays is presented as well.

  17. Results from KASCADE-Grande

    Bertaina, M., E-mail: bertaina@to.infn.it [Dipartimento di Fisica Generale dell' Universita, Torino (Italy); Apel, W.D. [Institut fuer Kernphysik, KIT - Karlsruher Institut fuer Technologie (Germany); Arteaga-Velazquez, J.C. [Universidad Michoacana, Instituto de Fisica y Matematicas, Morelia (Mexico); Bekk, K. [Institut fuer Kernphysik, KIT - Karlsruher Institut fuer Technologie (Germany); Bluemer, J. [Institut fuer Kernphysik, KIT - Karlsruher Institut fuer Technologie (Germany); Institut fuer Experimentelle Kernphysik, KIT - Karlsruher Institut fuer Technologie (Germany); Bozdog, H. [Institut fuer Kernphysik, KIT - Karlsruher Institut fuer Technologie (Germany); Brancus, I.M. [National Institute of Physics and Nuclear Engineering, Bucharest (Romania); Buchholz, P. [Fachbereich Physik, Universitaet Siegen (Germany); Cantoni, E. [Dipartimento di Fisica Generale dell' Universita, Torino (Italy); Istituto di Fisica dello Spazio Interplanetario, INAF Torino (Italy); Chiavassa, A. [Dipartimento di Fisica Generale dell' Universita, Torino (Italy); Cossavella, F. [Institut fuer Experimentelle Kernphysik, KIT - Karlsruher Institut fuer Technologie (Germany); and others

    2012-11-11

    The KASCADE-Grande experiment, located at Karlsruhe Institute of Technology (Germany) is a multi-component extensive air-shower experiment devoted to the study of cosmic rays and their interactions at primary energies 10{sup 14}-10{sup 18} eV. Main goals of the experiment are the measurement of the all-particle energy spectrum and mass composition in the 10{sup 16}-10{sup 18} eV range by sampling charged (N{sub ch}) and muon (N{sub {mu}}) components of the air shower. The method to derive the energy spectrum and its uncertainties, as well as the implications of the obtained result, is discussed. An overview of the analyses performed by KASCADE-Grande to derive the mass composition of the measured high-energy comic rays is presented as well.

  18. Cassini's Grand Finale Science Highlights

    Spilker, Linda

    2017-10-01

    After 13 years in orbit, the Cassini-Huygens Mission to Saturn ended in a science-rich blaze of glory. Cassini returned its final bits of unique science data on September 15, 2017, as it plunged into Saturn's atmosphere satisfying planetary protection requirements. Cassini's Grand Finale covered a period of roughly five months and ended with the first time exploration of the region between the rings and planet.The final close flyby of Titan in late April 2017 propelled Cassini across Saturn’s main rings and into its Grand Finale orbits; 22 orbits that repeatedly dove between Saturn’s innermost rings and upper atmosphere making Cassini the first spacecraft to explore this region. The last orbit turned the spacecraft into the first Saturn upper atmospheric probe.The Grand Finale orbits provided highest resolution observations of both the rings and Saturn, and in-situ sampling of the ring particle composition, Saturn's atmosphere, plasma, and innermost radiation belts. The gravitational field was measured to unprecedented accuracy, providing information on the interior structure of the planet, winds in the deeper atmosphere, and mass of the rings. The magnetic field provided insight into the physical nature of the magnetic dynamo and structure of the internal magnetic field. The ion and neutral mass spectrometer sampled the upper atmosphere for molecules that escape the atmosphere in addition to molecules originating from the rings. The cosmic dust analyzer directly sampled the composition from different parts of the main rings for the first time. Fields and particles instruments directly measured the plasma environment between the rings and planet.Science highlights and new mysteries gleaned to date from the Grand Finale orbits will be discussed.The research described in this paper was carried out in part at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics and Space Administration. Copyright 2017

  19. Grandes números primos

    Bang, Thöger

    2012-01-01

    En las escuelas danesas la teoría de los números se ha ido restringiendo gradualmente hasta no incluir sino la demostración de la descomposición univoca de los números enteros en números primos y la demostración del teorema clásico de EUCLIDES sobre la existencia de un número primo arbitrariamente grande.

  20. Grand unification theory and technicolor

    Rubakov, V.A.; Shaposhnikov, M.E.

    1983-01-01

    The lecture course can be considered as introduction to the problems concerning grand unification models. The course is incomplete. Such problems as CP-violations in strong interactions and the problem of gravitational interaction inclusion in the scheme of grand unification theory are not touched upon. Models of early unification, in which strong, weak and electromagnetic interactions are compared according to the ''strength'' at energies of about 10 5 -10 6 GeV, are not discussed. Models with horizontal symmetry, considering different generations of quarks and leptons from one viewpoint, are not analyzed. Cosmological applications of supersymmetric unified theories are not considered. Certain problems of standard elementary particle theory, philosophy of the great unification, general properties of the grand unification models and the main principles of the construction of models: the SU(5) model, models on the SO(10) groups, have been considered. The problem of supersymmetric unification hierarchies, supersymmetric generalization of the minimum SU(5) model, supersymmetry violation and the problem of hierarchies, phenomenology of the o.rand unification models, cosmological application and technicolour, are discussed

  1. Sarri võttis Talleksiga taanlastelt Saksa Auto / Villy Paimets

    Paimets, Villy, 1972-

    2005-01-01

    Andres Sarri poolt kontrollitav AS Talleks ostis Taani partnerilt Semler Holding välja 50-protsendilise osaluse AS-is Saksa Auto. Lisa: Viimastel aastatel eestlaste poolt välja ostetud ettevõtted. Diagramm: Saksa Auto tulemused paranesid mullu märgatavalt. Vt. samas: Sarri: me ei tee halbu tehinguid; Peeter Raidla. Tuleristsed 90ndate alguse võimuvõitlusest

  2. 46 CFR 167.65-35 - Use of auto pilot.

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Use of auto pilot. 167.65-35 Section 167.65-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Special Operating Requirements § 167.65-35 Use of auto pilot. Except as provided in 33 CFR 164.15, when...

  3. 46 CFR 109.585 - Use of auto pilot.

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto pilot. 109.585 Section 109.585 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Miscellaneous § 109.585 Use of auto pilot. Except as provided in 33 CFR 164.15, when the automatic pilot is used...

  4. 46 CFR 122.360 - Use of auto pilot.

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto pilot. 122.360 Section 122.360 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... Requirements § 122.360 Use of auto pilot. Whenever an automatic pilot is used the master shall ensure that: (a...

  5. 46 CFR 131.960 - Use of auto-pilot.

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto-pilot. 131.960 Section 131.960 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS OPERATIONS Miscellaneous § 131.960 Use of auto-pilot. When the automatic pilot is used in areas of high traffic density...

  6. 46 CFR 185.360 - Use of auto pilot.

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Use of auto pilot. 185.360 Section 185.360 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) OPERATIONS Miscellaneous Operating Requirements § 185.360 Use of auto pilot. Whenever an automatic pilot is...

  7. An Instructional Method for the AutoCAD Modeling Environment.

    Mohler, James L.

    1997-01-01

    Presents a command organizer for AutoCAD to aid new uses in operating within the 3-D modeling environment. Addresses analyzing the problem, visualization skills, nonlinear tools, a static view of a dynamic model, the AutoCAD organizer, environment attributes, and control of the environment. Contains 11 references. (JRH)

  8. Auto concept y rasgos de personalidad: Un estudio correlacional

    Débora Cecílio Fernandes

    Full Text Available Este estudio ha investigado las relaciones entre los rasgos de personalidad y auto concepto. Fueron aplicadas la Escala de Traços de Personalidade para Crianças y la Escala de Autoconceito Infanto-Juvenil en 389 niños, con edad de 8 a 10 años de escuelas públicas y particulares. Se han hallado diferencias de sexo para casi todas las medidas hechas. Para los varones, ha sido observado correlaciones positivas entre extroversión y auto conceptos escolar y familiar, neuroticismo y psicoticismo con auto conceptos personal y social, y sociabilidad con auto concepto familiar; y correlaciones negativas entre extroversión y auto concepto social, psicoticismo y auto concepto familiar, y sociabilidad y auto concepto personal. Para las niñas, fueron observadas correlaciones positivas entre el auto concepto social y psicoticismo y sociabilidad con el familiar; y correlaciones negativas entre extroversión y el social, psicoticismo y neuroticismo con el familiar. Los análisis de los grupos extremos confirmaron los datos encontrados.

  9. Measurement of anti- acetylcholine receptor auto-antibodies in ...

    auto-antibodies in myasthenia gravis. K. J. Steenkamp, W. Duim, M. s. Myer,. S. C. K. Malfeld, R. Anderson. Two different acetylcholine receptor (AChR) preparations derived from ... the detection of AChR auto-antibodies in serum specimens from 20 ... 4°C. Thereafter, 1 ml of washing solution (phosphate- buffered saline ...

  10. Rüütmann taandub Kommest Auto juhtimisest / Kaisa Tahlfeld

    Tahlfeld, Kaisa

    2007-01-01

    AS-i Kommest Auto asutaja ja omanik Toomas Rüütmann loobub ettevõtte juhtimisest, kuid jätkab juhatuse liikmena ning keskendub eksportturgudele ja koostööle edasimüüjatega. Kommest Auto uueks juhiks saab Raido Toonekurg. Lisa: Mis on mis; Taust

  11. Kommest Auto ostmisest huvitub ka Hillar Teder / Andres Eilart

    Eilart, Andres

    2008-01-01

    Kommest Auto ostmise vastu tunnevad huvi suurärimees Andres Sarri, Rootsis Peugeot' sõidukeid müüv Taani päritolu K. W. Bruun Import ja multimiljonär Hillar Teder, kellele kuulub Audisid müüv Reval Auto

  12. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  13. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  14. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  15. Low auto-fluorescence fabrication methods for plastic nanoslits.

    Yin, Zhifu; Qi, Liping; Zou, Helin; Sun, Lei; Xu, Shenbo

    2016-04-01

    Plastic nanofluidic devices are becoming increasingly important for biological and chemical applications. However, they suffer from high auto-fluorescence when used for on-chip optical detection. In this study, the auto-fluorescence problem of plastic nanofluidic devices was remedied by newly developed fabrication methods that minimise their auto-fluorescence: one by depositing a gold (Au) layer on them, the other by making them ultra-thin. In the first method, the Au layer [minimum thickness is 40 nm on 150 μm SU-8, 50 nm on 1 mm polyethylene terephthalate (PET), and 40 on 2 nm polymethyl methacrylate (PMMA)] blocks the auto-fluorescence of the polymer; in the second method, auto-fluorescence is minimised by making the chips ultra-thin, selected operating thickness of SU-8 is 20 μm, for PET it is 150 μm, and for PMMA it is 0.8 mm.

  16. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  17. Auto-incompatibilidade em plantas Self-incompatibility in plants

    Maria Teresa Schifino-Wittmann

    2002-12-01

    Full Text Available A auto-incompatibilidade (AI é a incapacidade de uma planta fértil formar sementes quando fertilizada por seu próprio pólen. É um mecanismo fisiólogico, com base genética, que promove a alogamia, e tem despertado a atenção de geneticistas e melhoristas de plantas. Atualmente, a ênfase nas pesquisas está na identificação e entendimento dos processos moleculares e celulares que levam ao reconhecimento e à rejeição do pólen auto-incompatível, incluindo a identificação, localização e seqüenciamento das proteínas, enzimas e genes envolvidos. Existem dois tipos principais de AI, a gametofítica (AIG, em que a especificidade do pólén é gerada pelo alelo S do genoma haplóide do grão do pólen (gametófito, e a esporofítica (AIE, em que a especificidade é gerada pelo genótipo diplóide da planta adulta (esporófito que deu origem ao grão de pólen. A AIE pode ser homomórfica, quando não existem modificações florais que acompanham o processo, ou heteromórfica, quando, com o processo de AI, ocorrem modificações florais. A reação da AI engloba desde o impedimento da germinação do pólen até o rompimento do tubo polínico. A ocorrência de AI em espécies de interesse econômico pode ter uma importância muito grande, sendo muito positiva em alguns casos e um empecilho em outros, dependendo da parte da planta (vegetativa ou reprodutiva que é colhida e do tipo de reprodução, sexual ou vegetativa. A utilização da AI no melhoramento de plantas é feita há bastante tempo, mas existe uma lacuna entre o grau de detalhamento do conhecimento teórico, como as bases genética e molecular, e a aplicação deste conhecimento no melhoramento.Self-incompatibility (SI is the failure of a fertile plant to set seeds when fertilized with its own pollen. It is a physiological mechanism, with a genetic basis, which promotes allogamy and has drawn geneticists and plant breeders’ attention. Nowadays, the research has put

  18. Auto-choreography: Animating Sentient Archives

    Kim Satchell

    2010-03-01

    Full Text Available The stories lives tell, the narratives they follow and the spaces they embody are critical to articulating the conditions of everyday life. This resonates in the fraught relations within and between surf cultures, affluent societies and economic development. In the context of Rural Cultural Studies the analysis of coastal place allows for a combination of self-reflexive, critical and transformative modes of inquiry. This pedagogy of the coast offers innovative approaches to contemporary anthropogenic and existential challenges. For the Ecological Humanities, adjusting to living synergistically requires dialogue, ethical frameworks and care. This includes attention to the more-than human world and the non-human inhabitants with whose lives people become entangled in the mutuality of wandering paths and shared haunts. The imaginary-material architectures and geographies of these samples of coastal life, are topographies woven of spatiality and contemporary coastal writing. These contemplations attempt to sketch performative interactions from the auto-choreography animating sentient archives.

  19. Gasification characteristics of auto shredder residue

    Navee, S.; Ramzan, N.

    2011-01-01

    Given the large volume of used tyre waste generated each year it is imperative that suitable re-use and disposal techniques are developed for dealing with this problem; presently these include rethreading, reprocessing for use as safe playground and sports surfaces, use as noise reduction barriers and utilisation as a fuel source. This paper reports on pilot scale studies designed to investigate the suitability of automotive waste for energy recovery via gasification. The study was carried out into auto shredder residue, which is a mixture of three distinct waste streams: tyres, rubber/plastic and general automotive waste. The tests included proximate, ultimate and elemental analysis, TGA, as well as calorific value determinations. In addition, the waste was tested in a desktop gasifier, and analysis was carried out to determine the presence and type of combustible gases. It was concluded that tyre waste and rubber/plastic waste are quite suitable fuels for gasification. (author)

  20. Auto-Gerontology: A Personal Odyssey.

    Palmore, Erdman B

    2017-11-01

    The four leading theories of optimal aging are activity, continuity, successful aging, and selective optimization with adaptation. All tend to support the slogan, "Use it or lose it." I have tried to continue using my abilities in four key areas: professional, volunteer, personal relationships, and physical fitness. Ageism also has become personal for me because I have made it a personal priority to do what I can to reduce ageism. This includes research and writing, developing a list of 45 advantages to aging, avoiding ageist jokes and language, developing positive slogans about aging, maintaining personal fitness, going on birthday adventures, and being proud of my age (85). I close with answers to some questions about auto-gerontology.

  1. Development of Auto-Stacking Warehouse Truck

    Kuo-Hsien Hsia

    2018-03-01

    Full Text Available Warehouse automation is a very important issue for the promotion of traditional industries. For the production of larger and stackable products, it is usually necessary to operate a fork-lifter for the stacking and storage of the products by a skilled person. The general autonomous warehouse-truck does not have the ability of stacking objects. In this paper, we develop a prototype of auto-stacking warehouse-truck that can work without direct operation by a skill person. With command made by an RFID card, the stacker truck can take the packaged product to the warehouse on the prior-planned route and store it in a stacking way in the designated storage area, or deliver the product to the shipping area or into the container from the storage area. It can significantly reduce the manpower requirements of the skilled-person of forklift technician and improve the safety of the warehousing area.

  2. Female Infertility and Serum Auto-antibodies: a Systematic Review.

    Deroux, Alban; Dumestre-Perard, Chantal; Dunand-Faure, Camille; Bouillet, Laurence; Hoffmann, Pascale

    2017-08-01

    On average, 10 % of infertile couples have unexplained infertility. Auto-immune disease (systemic lupus erythematosus, anti-phospholipid syndrome) accounts for a part of these cases. In the last 20 years, aspecific auto-immunity, defined as positivity of auto-antibodies in blood sample without clinical or biological criteria for defined diseases, has been evoked in a subpopulation of infertile women. A systematic review was performed (PUBMED) using the MESH search terms "infertility" and "auto-immunity" or "reproductive technique" or "assisted reproduction" or "in vitro fertilization" and "auto-immunity." We retained clinical and physiopathological studies that were applicable to the clinician in assuming joint management of both infertility associated with serum auto-antibodies in women. Thyroid auto-immunity which affects thyroid function could be a cause of infertility; even in euthyroidia, the presence of anti-thyroperoxydase antibodies and/or thyroglobulin are related to infertility. The presence of anti-phospholipid (APL) and/or anti-nuclear (ANA) antibodies seems to be more frequent in the population of infertile women; serum auto-antibodies are associated with early ovarian failure, itself responsible for fertility disorders. However, there exist few publications on this topic. The methods of dosage, as well as the clinical criteria of unexplained infertility deserve to be standardized to allow a precise response to the question of the role of serum auto-antibodies in these women. The direct pathogenesis of this auto-immunity is unknown, but therapeutic immunomodulators, prescribed on a case-by-case basis, could favor pregnancy even in cases of unexplained primary or secondary infertility.

  3. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  4. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  5. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  6. Grand unification: quo vadis domine

    Senjanovic, G.

    1985-01-01

    The present theoretical and experimental situation with grand unification is summarized. The issues of proton decay and the Weinberg angle are addressed, going through the predictions of both the standard SU(5) theory and its supersymmetric extension. The SO(10) theory, which provides a minimal one family model, is then studied. The gravitational characteristics of domain walls and strings are then discussed. It is argued that there is a need to go beyond SO(10) in order to incorporate a unified picture of families. This leads to the prediction of mirror fermions, whose physics is analyzed. 31 refs

  7. Graafikatriennaali grand prix Korea kunstnikule

    1998-01-01

    Tallinna XI graafikatriennaali rahvusvaheline žürii andis grand prix korea kunstnikule Chung¡Sang-Gonile, kolm võrdset preemiat - soome kunstnikele Anita Jensenile ja Tapani Mikkonenile ning jaapani kunstnikule Estuko Obatale. Eesti Kunstimuuseumi preemia - Wendy Swallow. Tallinna linna preemia ja Ivar Luki sponsoripreemia - Walter Jule. Sponsoripreemiad : Paletti Eesti AS preemia - Inga Heamägi; Rannila Profiili preemia - Mojca Zlokarnik; UNDP preemia - Andrea Juan. Rotermanni soolalao arhitektuuri- ja kunstikeskuse diplom - Lis Ingram, Heli Päivikki Kurunsaari, Randi Strand, Wendy Swallow

  8. Grand Challenges of Enterprise Integration

    Brosey, W.D; Neal, R.E.; Marks, D.

    2001-04-01

    Enterprise Integration connects and combines people, processes, systems, and technologies to ensure that the right people and the right processes have the right information and the right resources at the right time. A consensus roadmap for Technologies for Enterprise Integration was created as part of an industry/government/academia partnership in the Integrated Manufacturing Technology Initiative (IMTI). Two of the grand challenges identified by the roadmapping effort will be addressed here--Customer Responsive Enterprises and Totally Connected Enterprises. Each of these challenges is briefly discussed as to the current state of industry and the future vision as developed in the roadmap.

  9. Grand Challenges for Environmental Magnetism

    Verosub, K. L.

    2009-05-01

    The development of new, inexpensive, and rapid geochemical methods for determining the ages of geologic materials, their elemental composition, and their isotopic ratios over a broad array of elements puts into sharp focus the question: What information can environmental magnetic methods provide that can't be obtained using these other methods? Because iron is ubiquitous in the Earth's crust and because it exists in so many different forms, a discipline that looks in detail at iron-bearing minerals does have the potential to make significant contributions to the study of surficial processes. However, to reach that potential requires the development of new environmental magnetic methods. I would like to put forward three Grand Challenges for environmental magnetism that have the potential to move the field forward to a new level of scientific sophistication and that will allow environmental magnetists to compete successfully in a world increasingly dominated by geochemists. The first Grand Challenge is the development of new techniques that lead to the direct and unambiguous identification of the full suite of magnetic minerals. For many environmental magnetic applications, the key magnetic minerals are not just magnetite and hematite but also iron oxy-hydroxides (goethite, lepidocrocite, akaganeite, ferrihydrite), carbonates (siderite) and sulfides (pyrrhotite and greigite) as well as compounds involving iron and other transition metals (cobalt and nickel). The second Grand Challenge is the development of new analytical methods that provide specific quantitative values for the amount of each magnetic mineral present in a sample. One promising approach to this problem is the application of two- or three-component multivariate analysis to arrays of downcore environmental magnetic parameters. The third Grand Challenge is the development of new ways of determining, not just the average values, but the actual distributions of grain sizes and coercivities of each mineral

  10. The Grand Challenges of Nanotechnology

    Lane, Neal

    2001-01-01

    Amazing breakthroughs and advances continue to be made in nanoscale science and engineering and the rapidly emerging field of nanotechnology, including near-commercial applications in biomedicine, computing and environmental protection. The National Nanotechnology Initiative, begun by the Clinton Administration has placed nanoscale research on a new funding trajectory. But, many 'grand challenges' must be overcome, technical ones as well as those related to funding, science and technology workforce, and the need for stronger collaboration across discipline, organizations, government agencies and with other countries

  11. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  12. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  13. RxPATROL: a Web-based tool for combating pharmacy theft.

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  14. Automatic detection of AutoPEEP during controlled mechanical ventilation

    Nguyen Quang-Thang

    2012-06-01

    Full Text Available Abstract Background Dynamic hyperinflation, hereafter called AutoPEEP (auto-positive end expiratory pressure with some slight language abuse, is a frequent deleterious phenomenon in patients undergoing mechanical ventilation. Although not readily quantifiable, AutoPEEP can be recognized on the expiratory portion of the flow waveform. If expiratory flow does not return to zero before the next inspiration, AutoPEEP is present. This simple detection however requires the eye of an expert clinician at the patient’s bedside. An automatic detection of AutoPEEP should be helpful to optimize care. Methods In this paper, a platform for automatic detection of AutoPEEP based on the flow signal available on most of recent mechanical ventilators is introduced. The detection algorithms are developed on the basis of robust non-parametric hypothesis testings that require no prior information on the signal distribution. In particular, two detectors are proposed: one is based on SNT (Signal Norm Testing and the other is an extension of SNT in the sequential framework. The performance assessment was carried out on a respiratory system analog and ex-vivo on various retrospectively acquired patient curves. Results The experiment results have shown that the proposed algorithm provides relevant AutoPEEP detection on both simulated and real data. The analysis of clinical data has shown that the proposed detectors can be used to automatically detect AutoPEEP with an accuracy of 93% and a recall (sensitivity of 90%. Conclusions The proposed platform provides an automatic early detection of AutoPEEP. Such functionality can be integrated in the currently used mechanical ventilator for continuous monitoring of the patient-ventilator interface and, therefore, alleviate the clinician task.

  15. The Status and Trend of Chinese Auto EC

    2002-01-01

    <正> As a new information industry, E-commerce is becoming a new growth point of economy, and changing the development of traditional industries such as the auto industry. E-commerce would ultimately bring it profound changes. Therefore, many countries are employing E-commerce to impel the development of the auto industry rapidly. As the final large market, China has to keep up with the trend of global auto development. If we did not explore and establish E-commerce actively, with WTO coming, we

  16. Some advice for Skoda Auto on the Chinese Market

    Guo, Yun

    2017-01-01

    Auto industry is an eternal topic. The development of auto industry can be considered as a vital part of GDP in a country. Meanwhile it is a standard to measure technology in a country. Therefore Czech made Skoda Auto Company. Then Volkswagen Group purchased it. It is means Skoda is also a mem-ber of Volkswagen. The quality of the car is really great. The cars of Skoda are entering into Chinese market. Chinese accepts them, however, compare with some old brands, which are Mercedes-Benz, BMW, ...

  17. Web Proxy Auto Discovery for the WLCG

    Dykstra, D.; Blomer, J.; Blumenfeld, B.; De Salvo, A.; Dewhurst, A.; Verguilov, V.

    2017-10-01

    All four of the LHC experiments depend on web proxies (that is, squids) at each grid site to support software distribution by the CernVM FileSystem (CVMFS). CMS and ATLAS also use web proxies for conditions data distributed through the Frontier Distributed Database caching system. ATLAS & CMS each have their own methods for their grid jobs to find out which web proxies to use for Frontier at each site, and CVMFS has a third method. Those diverse methods limit usability and flexibility, particularly for opportunistic use cases, where an experiment’s jobs are run at sites that do not primarily support that experiment. This paper describes a new Worldwide LHC Computing Grid (WLCG) system for discovering the addresses of web proxies. The system is based on an internet standard called Web Proxy Auto Discovery (WPAD). WPAD is in turn based on another standard called Proxy Auto Configuration (PAC). Both the Frontier and CVMFS clients support this standard. The input into the WLCG system comes from squids registered in the ATLAS Grid Information System (AGIS) and CMS SITECONF files, cross-checked with squids registered by sites in the Grid Configuration Database (GOCDB) and the OSG Information Management (OIM) system, and combined with some exceptions manually configured by people from ATLAS and CMS who operate WLCG Squid monitoring. WPAD servers at CERN respond to http requests from grid nodes all over the world with a PAC file that lists available web proxies, based on IP addresses matched from a database that contains the IP address ranges registered to organizations. Large grid sites are encouraged to supply their own WPAD web servers for more flexibility, to avoid being affected by short term long distance network outages, and to offload the WLCG WPAD servers at CERN. The CERN WPAD servers additionally support requests from jobs running at non-grid sites (particularly for LHC@Home) which they direct to the nearest publicly accessible web proxy servers. The responses

  18. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  19. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  20. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  1. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  2. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  3. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  4. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  5. Information Processing in Auto-regulated Systems

    Karl Javorszky

    2003-06-01

    Full Text Available Abstract: We present a model of information processing which is based on two concurrent ways of describing the world, where a description in one of the languages limits the possibilities for realisations in the other language. The two describing dimensions appear in our common sense as dichotomies of perspectives: subjective - objective; diversity - similarity; individual - collective. We abstract from the subjective connotations and treat the test theoretical case of an interval on which several concurrent categories can be introduced. We investigate multidimensional partitions as potential carriers of information and compare their efficiency to that of sequenced carriers. We regard the same assembly once as a contemporary collection, once as a longitudinal sequence and find promising inroads towards understanding information processing by auto-regulated systems. Information is understood to point out that what is the case from among alternatives, which could be the case. We have translated these ideas into logical operations on the set of natural numbers and have found two equivalence points on N where matches between sequential and commutative ways of presenting a state of the world can agree in a stable fashion: a flip-flop mechanism is envisioned. By following this new approach, a mathematical treatment of some poignant biomathematical problems is allowed. Also, the concepts presented in this treatise may well have relevance and applications within the information processing and the theory of language fields.

  6. Auto-identification fiberoptical seal verifier

    Yamamoto, Yoichi; Mukaiyama, Takehiro

    1998-08-01

    An auto COBRA seal verifier was developed by Japan Atomic Energy Research Institute (JAERI) to provide more efficient and simpler inspection measures for IAEA safeguards. The verifier is designed to provide means of a simple, quantitative and objective judgment on in-situ verification for the COBRA seal. The equipment is a portable unit with hand-held weight and size. It can be operated by battery or AC power. The verifier reads a COBRA seal signature by using a built-in CCD camera and carries out the signature comparison procedure automatically on digital basis. The result of signature comparison is given as a YES/NO answer. The production model of the verifier was completed in July 1996. The development was carried out in collaboration with Mitsubishi Heavy Industries, Ltd. This report describes the design and functions of the COBRA seal verifier and the results of environmental and functional tests. The development of the COBRA seal verifier was carried out in the framework of Japan Support Programme for Agency Safeguards (JASPAS) as a project, JD-4 since 1981. (author)

  7. Kepler AutoRegressive Planet Search (KARPS)

    Caceres, Gabriel

    2018-01-01

    One of the main obstacles in detecting faint planetary transits is the intrinsic stellar variability of the host star. The Kepler AutoRegressive Planet Search (KARPS) project implements statistical methodology associated with autoregressive processes (in particular, ARIMA and ARFIMA) to model stellar lightcurves in order to improve exoplanet transit detection. We also develop a novel Transit Comb Filter (TCF) applied to the AR residuals which provides a periodogram analogous to the standard Box-fitting Least Squares (BLS) periodogram. We train a random forest classifier on known Kepler Objects of Interest (KOIs) using select features from different stages of this analysis, and then use ROC curves to define and calibrate the criteria to recover the KOI planet candidates with high fidelity. These statistical methods are detailed in a contributed poster (Feigelson et al., this meeting).These procedures are applied to the full DR25 dataset of NASA’s Kepler mission. Using the classification criteria, a vast majority of known KOIs are recovered and dozens of new KARPS Candidate Planets (KCPs) discovered, including ultra-short period exoplanets. The KCPs will be briefly presented and discussed.

  8. The Auto-Gopher Deep Drill

    Badescu, Mircea

    2014-01-01

    Subsurface penetration by coring, drilling or abrading is of great importance for a large number of space and earth applications. An Ultrasonic/Sonic Drill/Corer (USDC) has been in development at JPL's Nondestructive Evaluation and Advanced Actuators (NDEAA) lab as an adaptable tool for many of these applications. The USDC uses a novel drive mechanism to transform the high frequency ultrasonic or sonic vibrations of the tip of a horn into a lower frequency sonic hammering of a drill bit through an intermediate free-flying mass. The USDC device idea has been implemented at various scales from handheld drills to large diameter coring devices. A series of computer programs that model the function and performance of the USDC device were developed and were later integrated into an automated modeling package. The USDC has also evolved from a purely hammering drill to a rotary hammer drill as the design requirements increased form small diameter shallow drilling to large diameter deep coring. A synthesis of the Auto-Gopher development is presented in this paper.

  9. Polarization Imaging Apparatus with Auto-Calibration

    Zou, Yingyin Kevin (Inventor); Zhao, Hongzhi (Inventor); Chen, Qiushui (Inventor)

    2013-01-01

    A polarization imaging apparatus measures the Stokes image of a sample. The apparatus consists of an optical lens set, a first variable phase retarder (VPR) with its optical axis aligned 22.5 deg, a second variable phase retarder with its optical axis aligned 45 deg, a linear polarizer, a imaging sensor for sensing the intensity images of the sample, a controller and a computer. Two variable phase retarders were controlled independently by a computer through a controller unit which generates a sequential of voltages to control the phase retardations of the first and second variable phase retarders. A auto-calibration procedure was incorporated into the polarization imaging apparatus to correct the misalignment of first and second VPRs, as well as the half-wave voltage of the VPRs. A set of four intensity images, I(sub 0), I(sub 1), I(sub 2) and I(sub 3) of the sample were captured by imaging sensor when the phase retardations of VPRs were set at (0,0), (pi,0), (pi,pi) and (pi/2,pi), respectively. Then four Stokes components of a Stokes image, S(sub 0), S(sub 1), S(sub 2) and S(sub 3) were calculated using the four intensity images.

  10. AutoCategorization for Customized Knowledge Portals, Phase I

    National Aeronautics and Space Administration — An AutoCategorizing Knowledge Management Engine ("AKM") will automate key capabilities for both human-human and human-agent collaboration tools in aerospace...

  11. Auto industry : a framework for considering federal financial assistance.

    2008-12-05

    The current economic downturn has brought significant financial stress to the auto manufacturing industry. Recent deteriorating financial, real estate, and labor markets have reduced consumer confidence and available credit, and automobile purchases ...

  12. Auto-regenerative thermoluminescence dating using zircon inclusions

    Templer, R.H.

    1993-01-01

    Fired ceramics containing zircon inclusions have been dated by allowing the zircons to regenerate their own thermoluminescence (TL) signal, hence auto-regenerative TL dating. The technique is conceptually straightforward. One first measures the TL accrued since the last heating of the material. The zircon grains are then stored for six months and the TL signal regenerated through self-irradiation is measured. Since the internal dose-rate for zircon is dominated by the internal component the age of the sample is simply given by the ratio of the natural to auto-regenerated signal times the laboratory storage period. The technique, however, requires the measurement of a very small auto-regenerated signal, which introduces a number of experimental and physical complications. The methods for overcoming these problems and successfully dating zircons by auto-regeneration are described. (Author)

  13. Linking mileage to auto accident risk and urban form.

    2013-08-01

    Pricing auto insurance on a per-mile basis provides a beneficial, cost-based incentive to : reduce vehicle miles traveled compared with traditional rating plans that charge annual : premiums with little or no consideration of miles driven. : The rese...

  14. Auto-immune haematological complications occurring during the ...

    Auto-immune haematological complications occurring during treatment for malignant Iymphoproliferative diseases are described in 5 patients. There appeared to be a temporal relationship between the development of these complications and the administration of chemotherapeutic drugs or extensive radiotherapy.

  15. A Moment in the Auto/biographical Enterprise | Jansen | Current ...

    Abstract. Judith Lütge Coullie, Stephan Meyer, Thengani H Ngwenya and Thomas Olver (eds). (2006) Selves in Question: Interviews on Southern African Auto/biography. Honolulu: University of Hawai'i Press.

  16. Assessment of Factors Related to Auto-PEEP.

    Natalini, Giuseppe; Tuzzo, Daniele; Rosano, Antonio; Testa, Marco; Grazioli, Michele; Pennestrì, Vincenzo; Amodeo, Guido; Marsilia, Paolo F; Tinnirello, Andrea; Berruto, Francesco; Fiorillo, Marialinda; Filippini, Matteo; Peratoner, Alberto; Minelli, Cosetta; Bernardini, Achille

    2016-02-01

    Previous physiological studies have identified factors that are involved in auto-PEEP generation. In our study, we examined how much auto-PEEP is generated from factors that are involved in its development. One hundred eighty-six subjects undergoing controlled mechanical ventilation with persistent expiratory flow at the beginning of each inspiration were enrolled in the study. Volume-controlled continuous mandatory ventilation with PEEP of 0 cm H2O was applied while maintaining the ventilator setting as chosen by the attending physician. End-expiratory and end-inspiratory airway occlusion maneuvers were performed to calculate respiratory mechanics, and tidal flow limitation was assessed by a maneuver of manual compression of the abdomen. The variable with the strongest effect on auto-PEEP was flow limitation, which was associated with an increase of 2.4 cm H2O in auto-PEEP values. Moreover, auto-PEEP values were directly related to resistance of the respiratory system and body mass index and inversely related to expiratory time/time constant. Variables that were associated with the breathing pattern (tidal volume, frequency minute ventilation, and expiratory time) did not show any relationship with auto-PEEP values. The risk of auto-PEEP ≥5 cm H2O was increased by flow limitation (adjusted odds ratio 17; 95% CI: 6-56.2), expiratory time/time constant ratio 15 cm H2O/L s (3; 1.3-6.9), age >65 y (2.8; 1.2-6.5), and body mass index >26 kg/m(2) (2.6; 1.1-6.1). Flow limitation, expiratory time/time constant, resistance of the respiratory system, and obesity are the most important variables that affect auto-PEEP values. Frequency expiratory time, tidal volume, and minute ventilation were not independently associated with auto-PEEP. Therapeutic strategies aimed at reducing auto-PEEP and its adverse effects should be primarily oriented to the variables that mainly affect auto-PEEP values. Copyright © 2016 by Daedalus Enterprises.

  17. 新型盗窃行为探析%An Analysis of the New types of Act of Theft

    韩梅

    2013-01-01

    The 8th Amendment of the Criminal Law has added three new types act of theft, which makes the objective essentials of constituting crimes tend to be specific relatively. To study and discuss the new types of act of theft will be helpful for grasping the essence of theft and preventing such crimes more precisely. Indoor theft refers to an act entering relatively isolated residences of others’ living illegally to steal their properties. Theft with weapons refers to an act that the actor carrying the portable weapons banned in the country or other weapons to steal. Pick-pocketing refers to an act that the actor steals others’ properties in public places.%  《刑法修正案(八)》增加了三种新的盗窃行为类型,使盗窃罪的客观构成要件相对趋向于具体化。入户盗窃,是指非法进入他人生活的与外界相对隔离的住所窃取他人财物;携带凶器盗窃,是指行为人随身携带国家禁止个人携带的器械或其他器械进行盗窃的行为;扒窃是指行为人在公共场所盗窃别人随身的财物。对三种新类型盗窃行为方式的研究和探讨,有助于更准确地把握盗窃罪的实质和预防此类犯罪。

  18. [Design of blood-pressure parameter auto-acquisition circuit].

    Chen, Y P; Zhang, D L; Bai, H W; Zhang, D A

    2000-02-01

    This paper presents the realization and design of a kind of blood-pressure parameter auto-acquisition circuit. The auto-acquisition of blood-pressure parameter controlled by 89C2051 single chip microcomputer is accomplished by collecting and processing the driving signal of LCD. The circuit that is successfully applied in the home unit of telemedicine system has the simple and reliable properties.

  19. Skill Formation in Malaysia: The Case of Auto Parts Industry

    Sadoi, Yuri

    1998-01-01

    This study takes the auto parts industry in Malaysia to demonstrate the difficulties a developing country faces in promoting skill development. Auto parts production needs a wide range of production techniques, which in turn require many types and levels of skilled workers. Realizing the importance of skilled workers, the Malaysian government has been emphasizing skill formation by increasing the number of technical schools, introducing a skill certification system, and giving a tax incentive...

  20. Parliament tears up 'feeble' auto-oil proposals

    Anon.

    1997-01-01

    Recent discussions in the European Parliament concerning the ''auto-oil'' proposals, i.e. the effects of automotive fuel specifications on the environment, are described in this paper. Legislative changes or amendments proposed by various national, or other interest groups are also noted. In particular, the sulphur content of diesel fuels is a matter of widespread concern because of its use for city taxis and buses. Further fuel proposals in the ''auto-oil'' style are expected in the near future. (UK)

  1. 70 MeV injector auto tuning system handbook

    Ellis, J.E.; Munn, R.W.; Sandels, E.G.

    1976-06-01

    The handbook is in three sections: (1) description and location; (2) operating instructions; and (3) design notes on the tank and debuncher auto tuning systems for the 70 MeV injector. The purpose of the auto tuning system is to maintain the 'tune' of the four tanks and debuncher to within a few Hz, stabilizing against changes of temperature and other physical factors affecting the resonant frequency of the tanks. (U.K.)

  2. Google Earth Grand Tour Themes

    De Paor, D. G.; Whitmeyer, S. J.; Bentley, C.; Dordevic, M. M.

    2014-12-01

    As part of an NSF TUES Type 3 project entitled "Google Earth for Onsite and Distance Education (GEODE)," we are assembling a "Grand Tour" of locations on Earth and other terrestrial bodies that every geoscience student should know about and visit at least in virtual reality. Based on feedback from colleagues at previous meetings, we have identified nine Grand Tour themes: "Plates and Plumes," "Rocks and Regions," "Geology Through Time," "The Mapping Challenge*," "U.S. National Parks*," "The Magical Mystery Tour*," "Resources and Hazards," "Planets and Moons," and "Top of the Pops." Themes marked with an asterisk are most developed at this stage and will be demonstrated in real time. The Mapping Challenge invites students to trace geological contacts, measure bedding strike and dip and the plunge, trend, and facing of a fold. There is an advanced tool for modeling periclinal folds. The challenge is presented in a game-like format with an emphasis on puzzle-solving that will appeal to students regardless of gender. For the tour of U.S. national parks, we divided the most geologically important parks into four groups—Western Pacific, West Coast, Rockies, and East Coast. We are combining our own team's GigaPan imagery with imagery already available on the Internet. There is a great deal of imagery just waiting to be annotated for geological education purposes. The Magical Mystery Tour takes students to Google Streetview locations selected by instructors. Students are presented with questions or tasks and are given automatic feedback. Other themes are under development. Within each theme, we are crowd-sourcing contributions from colleagues and inviting colleagues to vote for or against proposed locations and student interactions. The GEODE team includes the authors and: Heather Almquist, Stephen Burgin, Cinzia Cervato, Gene Cooper, Paul Karabinos, Terry Pavlis, Jen Piatek, Bill Richards, Jeff Ryan, Ron Schott, Kristen St. John, and Barb Tewksbury.

  3. Next Generation Innovation Policy and Grand Challenges

    Kuhlmann, Stefan; Rip, Arie

    2018-01-01

    The paper explores transformative ways to address Grand Challenges, while locating them in a broader diagnosis of ongoing changes. Coping with Grand Challenges is a challenge in its own right, for policy as well as for science, technology, and innovation actors. The paper presents building blocks

  4. Proton hexality in local grand unification

    Foerste, Stefan; Nilles, Hans Peter [Bonn Univ. (Germany). Bethe Center for Theoretical Physics and Physikalisches Institut; Ramos-Sanchez, Saul [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Vaudrevange, Patrick K.S. [Muenchen Univ. (Germany). Arnold Sommerfeld Center for Theoretical Physics

    2010-07-15

    Proton hexality is a discrete symmetry that avoids the problem of too fast proton decay in the supersymmetric extension of the standard model. Unfortunately it is inconsistent with conventional grand unification. We show that proton hexality can be incorporated in the scheme of ''Local Grand Unification'' discussed in the framework of model building in (heterotic) string theory. (orig.)

  5. AutoFACT: An Automatic Functional Annotation and Classification Tool

    Lang B Franz

    2005-06-01

    Full Text Available Abstract Background Assignment of function to new molecular sequence data is an essential step in genomics projects. The usual process involves similarity searches of a given sequence against one or more databases, an arduous process for large datasets. Results We present AutoFACT, a fully automated and customizable annotation tool that assigns biologically informative functions to a sequence. Key features of this tool are that it (1 analyzes nucleotide and protein sequence data; (2 determines the most informative functional description by combining multiple BLAST reports from several user-selected databases; (3 assigns putative metabolic pathways, functional classes, enzyme classes, GeneOntology terms and locus names; and (4 generates output in HTML, text and GFF formats for the user's convenience. We have compared AutoFACT to four well-established annotation pipelines. The error rate of functional annotation is estimated to be only between 1–2%. Comparison of AutoFACT to the traditional top-BLAST-hit annotation method shows that our procedure increases the number of functionally informative annotations by approximately 50%. Conclusion AutoFACT will serve as a useful annotation tool for smaller sequencing groups lacking dedicated bioinformatics staff. It is implemented in PERL and runs on LINUX/UNIX platforms. AutoFACT is available at http://megasun.bch.umontreal.ca/Software/AutoFACT.htm.

  6. [Oral diseases in auto-immune polyendocrine syndrome type 1].

    Proust-Lemoine, Emmanuelle; Guyot, Sylvie

    2017-09-01

    Auto-immune polyendocrine syndrome type 1 (APS1) also called Auto-immune Polyendocrinopathy Candidiasis Ectodermal Dystrophy (APECED) is a rare monogenic childhood-onset auto-immune disease. This autosomal recessive disorder is caused by mutations in the auto-immune regulator (AIRE) gene, and leads to autoimmunity targeting peripheral tissues. There is a wide variability in clinical phenotypes in patients with APSI, with auto-immune endocrine and non-endocrine disorders, and chronic mucocutaneous candidiasis. These patients suffer from oral diseases such as dental enamel hypoplasia and candidiasis. Both are frequently described, and in recent series, enamel hypoplasia and candidiasis are even the most frequent components of APS1 together with hypoparathyroidism. Both often occur during childhood (before 5 years old for canrdidiasis, and before 15 years old for enamel hypoplasia). Oral candidiasis is recurrent all life long, could become resistant to azole antifungal after years of treatment, and be carcinogenic, leading to severe oral squamous cell carcinoma. Oral components of APS1 should be diagnosed and rigorously treated. Dental enamel hypoplasia and/or recurrent oral candidiasis in association with auto-immune diseases in a young child should prompt APS1 diagnosis. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  7. From Users to Designers: Building a Self-Organizing Game-Based Learning Environment

    Squire, Kurt; Giovanetto, Levi; Devane, Ben; Durga, Shree

    2005-01-01

    The simultaneous publication of Steven Johnson's Everything Bad is Good for You and appearance of media reports of X-rated content in the popular game Grand Theft Auto has renewed controversies surrounding the social effects of computer and video games. On the one hand, videogames scholars argue that videogames are complex, cognitively challenging…

  8. Promoting Inclusive Education, Civic Scientific Literacy, and Global Citizenship with Videogames

    Marino, Matthew T.; Hayes, Michael T.

    2012-01-01

    In this response to Yupanqui Munoz and Charbel El-Hani's paper, "The student with a thousand faces: From the ethics in videogames to becoming a citizen", we examine their critique of videogames in science education. Munoz and El-Hani present a critical analysis of videogames such as "Grand Theft Auto", "Street Fight", "Command and Conquer:…

  9. Details of criminological investigations of large-valued thefts related to nuclear materials (diversion safeguards program)

    Leachman, R.B.; Cornella, A.P.

    1972-06-01

    Studies were made of five areas of criminology which have great similarity to the case of nuclear materials. Actual cases of crimes were analyzed by experts in law enforcement and criminal justice. To identify fields of analogous criminology, possible characteristics of nuclear material thefts were considered: total value, high unit cost, limited marketability, special technology for handling, and licensing. The items considered to be analogous to nuclear materials in these aspects were: narcotics, data (as exists in computer memories, tapes, or discs), precious metal and gems, objects of art, and weapons. A criminology survey was conducted in which 509 individuals received one or more questionnaires soliciting opinion responses. Sixty-five questionnaires were returned. Eighty-four individuals replied by letter indicating inadequate knowledge of the crimes being surveyed. The questionnaire was supplemented by 18 interviews with criminal justice and industry personnel for more definitive information on diversion problems. Results of this survey are reported

  10. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  11. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  12. Development of simulation technology on full auto air conditioning system; Auto eakon no simulation gijutsu no kaihatsu

    Fujita, N; Otsubo, Y; Matsumura, K; Sako, H [Mazda Motor Corp., Hiroshima (Japan)

    1997-10-01

    Mazda has developed simulation technology on control of full auto air conditioning system. We have developed the development tool based on the technology, aiming at higher controllability of full auto air conditioning system and shorter development period. The tool performs simulation on control, on-vehicle evaluation of actual load operation, collecting data and analyzing them by personal computer. This paper reports our verification results on effectiveness of the technology/ and the tool. 4 refs., 9 figs.

  13. Research on data auto-analysis algorithms in the explosive detection system

    Wang Haidong; Li Yuanjing; Yang Yigang; Li Tiezhu; Chen Boxian; Cheng Jianping

    2006-01-01

    This paper mainly describe some auto-analysis algorithms in explosive detection system with TNA method. These include the auto-calibration algorithm when disturbed by other factors, MCA auto-calibration algorithm with calibrated spectrum, the auto-fitting and integral of hydrogen and nitrogen elements data. With these numerical algorithms, the authors can automatically and precisely analysis the gamma-spectra and ultimately achieve the explosive auto-detection. (authors)

  14. Salvage Islet Auto Transplantation After Relaparatomy.

    Balzano, Gianpaolo; Nano, Rita; Maffi, Paola; Mercalli, Alessia; Melzi, Raffaelli; Aleotti, Francesca; Gavazzi, Francesca; Berra, Cesare; De Cobelli, Francesco; Venturini, Massimo; Magistretti, Paola; Scavini, Marina; Capretti, Giovanni; Del Maschio, Alessandro; Secchi, Antonio; Zerbi, Alessandro; Falconi, Massimo; Piemonti, Lorenzo

    2017-10-01

    To assess feasibility, safety, and metabolic outcome of islet auto transplantation (IAT) in patients undergoing completion pancreatectomy because of sepsis or bleeding after pancreatic surgery. From November 2008 to October 2016, approximately 22 patients were candidates to salvage IAT during emergency relaparotomy because of postpancreatectomy sepsis (n = 11) or bleeding (n = 11). Feasibility, efficacy, and safety of salvage IAT were compared with those documented in a cohort of 36 patients who were candidate to simultaneous IAT during nonemergency preemptive completion pancreatectomy through the pancreaticoduodenectomy. The percentage of candidates that received the infusion of islets was significantly lower in salvage IAT than simultaneous IAT (59.1% vs 88.9%, P = 0.008), mainly because of a higher rate of inadequate islet preparations. Even if microbial contamination of islet preparation was significantly higher in candidates to salvage IAT than in those to simultaneous IAT (78.9% vs 20%, P < 0.001), there was no evidence of a higher rate of complications related to the procedure. Median follow-up was 5.45 ± 0.52 years. Four (36%) of 11 patients reached insulin independence, 6 patients (56%) had partial graft function, and 1 patient (9%) had primary graft nonfunction. At the last follow-up visit, median fasting C-peptide was 0.43 (0.19-0.93) ng/mL; median insulin requirement was 0.38 (0.04-0.5) U/kg per day, and median HbA1c was 6.6% (5.9%-8.1%). Overall mortality, in-hospital mortality, metabolic outcome, graft survival, and insulin-free survival after salvage IAT were not different from those documented after simultaneous IAT. Our data demonstrate the feasibility, efficacy, and safety of salvage IAT after relaparotomy.

  15. Fuel consumption impacts of auto roof racks

    Chen, Yuche; Meier, Alan

    2016-01-01

    The after-market roof rack is one of the most common components attached to a vehicle for carrying over-sized items, such as bicycles and skis. It is important to understand these racks’ fuel consumption impacts on both individual vehicles and the national fleet because they are widely used. We estimate the national fuel consumption impacts of roof racks using a bottom-up approach. Our model incorporates real-world data and vehicle stock information to enable assessing fuel consumption impacts for several categories of vehicles, rack configurations, and usage conditions. In addition, the model draws on two new data-gathering techniques, on-line forums and crowd-sourcing. The results show that nationwide, roof racks are responsible for 0.8‰ of light duty vehicle fuel consumption in 2015, corresponding to 100 million gallons of gasoline per year. Sensitivity analyses show that results are most sensitive to the fraction of vehicles with installed roof racks but carrying no equipment. The aerodynamic efficiency of typical roof racks can be greatly improved and reduce individual vehicle fuel consumption; however, government policies to minimize extensive driving with empty racks—if successful—could save more fuel nationally. - Highlights: •First estimate of national energy impacts of auto roof racks—about 1‰. •A bottom-up approach reveals details of the fuel consumption penalty caused by racks. •Two novel data collection techniques, on-line forums and crowd-sourcing, improve estimate. •Technical and behavioral policies could significantly cut fuel penalties from roof racks.

  16. Risk and resilience in the Nigerian oil sector: The economic effects of pipeline sabotage and theft

    Yeeles, Adam; Akporiaye, Alero

    2016-01-01

    Political unrest in the Niger Delta has long been viewed as a hurdle for extracting maximum value from Nigeria's oil resources. Recently, investors and policymakers have laid blame for sector under-performance on pipeline sabotage and theft, and sounded the alarm for an impending ‘oil crisis’. However, our understanding of the economic effects of social action against oil companies is incomplete. Rigorous analysis has not heretofore been offered as evidence for such dire futures. Despite the obvious risk of pipeline interdiction, price dynamics and aggregate production respond minimally to pipeline interdiction. Based on quantitative analysis of the relationship among price, production and pipeline interdiction from multiple data sources covering different time intervals (monthly data from 2005 to 2014 and annual data from 1999 to 2013), we find no evidence of significant effects of pipeline interdiction on production and a weak relationship between pipeline interdiction and Bonny light crude prices. Reported losses in product are substantial, but there is no evidence of statistically significant impacts on price or production in the aggregate. Explanations for this counterintuitive result are cast in terms of sector resilience. The implications of this finding for producer risk and the likelihood of an impending ‘oil crisis’ are discussed. - Highlights: • We examine the impact of pipeline sabotage and theft on the Nigerian oil economy. • Econometric analysis of production, price and pipeline interdiction over different time intervals. • Aggregate price and production are impacted minimally by pipeline interdiction. • Oil sector business risk is high, but production is resilient to interruptions from social and political unrest.

  17. Approximation auto-coherente a deux particules, pseudogap et supraconductivite dans le modele de Hubbard attractif

    Allen, Steve

    2000-10-01

    Dans cette these nous presentons une nouvelle methode non perturbative pour le calcul des proprietes d'un systeme de fermions. Notre methode generalise l'approximation auto-coherente a deux particules proposee par Vilk et Tremblay pour le modele de Hubbard repulsif. Notre methode peut s'appliquer a l'etude du comportement pre-critique lorsque la symetrie du parametre d'ordre est suffisamment elevee. Nous appliquons la methode au probleme du pseudogap dans le modele de Hubbard attractif. Nos resultats montrent un excellent accord avec les donnees Monte Carlo pour de petits systemes. Nous observons que le regime ou apparait le pseudogap dans le poids spectral a une particule est un regime classique renormalise caracterise par une frequence caracteristique des fluctuations supraconductrices inferieure a la temperature. Une autre caracteristique est la faible densite de superfluide de cette phase demontrant que nous ne sommes pas en presence de paires preformees. Les resultats obtenus semblent montrer que la haute symetrie du parametre d'ordre et la bidimensionalite du systeme etudie elargissent le domaine de temperature pour lequel le regime pseudogap est observe. Nous argumentons que ce resultat est transposable aux supraconducteurs a haute temperature critique ou le pseudogap apparait a des' temperatures beaucoup plus grandes que la temperature critique. La forte symetrie dans ces systemes pourraient etre reliee a la theorie SO(5) de Zhang. En annexe, nous demontrons un resultat tout recent qui permettrait d'assurer l'auto-coherence entre les proprietes a une et a deux particules par l'ajout d'une dynamique au vertex irreductible. Cet ajout laisse entrevoir la possibilite d'etendre la methode au cas d'une forte interaction.

  18. La Grande: volver a empezar

    Julio Premat

    2011-07-01

    Full Text Available Este texto, borrador de un trabajo más amplio, pretende despejar algunas pistas de lectura de La grande, en tanto que paradójico final de la producción de Saer. Digo “paradójico” porque puede tomársela como una novela de comienzo o de origen : de un volver a empezar, en todos los sentidos del término. En esa perspectiva podrían estudiarse algunos núcleos temáticos (como el retorno o el recuerdo de cara a la construcción del texto, a la relación planteada con la tradición y a la singular historia de su escritura (y al material genético que rodea y completa esta novela a la vez inacabada y póstuma. En esta intervención, la idea es la de comentar tres textos, escenas o frases del texto, y a partir de allí esbozar pistas para un estudio que está en ciernes.Première ébauche d’un travail de plus d’ampleur, ce texte vise à éclairer quelques pistes de lecture de La grande, en tant que fin paradoxale de la production de Saer. Je dis « paradoxale » parce que l’on peut considérer cette œuvre comme un roman des commencements ou des origines : comme un retour aux débuts, dans tous les sens du terme. Dans cette perspective, plusieurs nœuds thématiques (comme le retour ou le souvenir pourraient être étudiés en relation à la construction du texte, à la relation qui s’établit avec la tradition et à la singulière histoire de son écriture (et au matériau génétique qui entoure et complète ce roman, à la fois inachevé et posthume. Il sera question ici de commenter trois textes, scènes ou phrases du texte, et d’ébaucher à partir de là quelques pistes pour une étude à l’état naissant.The objective of this text, a draft for a broader work, is to outline some reading clues for La grande, inasmuch as it constitutes a paradoxical ending of Saer’s production. I say “paradoxical” because we can consider this work a novel of beginnings or of origins: a return to the beginning, in every meaning of the

  19. Caracterisation pratique des systemes quantiques et memoires quantiques auto-correctrices 2D

    Landon-Cardinal, Olivier

    approche, dite de tomographie variationnelle, propose de reconstruire l'etat en restreignant l'espace de recherche a une classe variationnelle plutot qu'a l'immense espace des etats possibles. Un etat variationnel etant decrit par un petit nombre de parametres, un petit nombre d'experiences peut suffire a identifier les parametres variationnels de l'etat experimental. Nous montrons que c'est le cas pour deux classes variationnelles tres utilisees, les etats a produits matriciels (MPS) et l'ansatz pour intrication multi-echelle (MERA). Memoires quantiques auto-correctrices 2D. Une memoire quantique auto-correctrice est un systeme physique preservant de l'information quantique durant une duree de temps macroscopique. Il serait done l'equivalent quantique d'un disque dur ou d'une memoire flash equipant les ordinateurs actuels. Disposer d'un tel dispositif serait d'un grand interet pour l'informatique quantique. Une memoire quantique auto-correctrice est initialisee en preparant un etat fondamental, c'est-a-dire un etat stationnaire de plus basse energie. Afin de stocker de l'information quantique, il faut plusieurs etats fondamentaux distincts, chacun correspondant a une valeur differente de la memoire. Plus precisement, l'espace fondamental doit etre degenere. Dans cette these, on s'interesse a des systemes de particules disposees sur un reseau bidimensionnel (2D), telles les pieces sur un echiquier, qui sont plus faciles a realiser que les systemes 3D. Nous identifions deux criteres pour l'auto-correction: - La memoire quantique doit etre stable face aux perturbations provenant de l'environnement, par exemple l'application d'un champ magnetique externe. Ceci nous amene a considerer les systemes topologiques 2D dont les degres de liberte sont intrinsequement robustes aux perturbations locales de l'environnement. - La memoire quantique doit etre robuste face a un environnement thermique. Il faut s'assurer que les excitations thermiques n'amenent pas deux etats fondamentaux

  20. Auto fluorescence of intervertebral disc tissue: a new diagnostic tool.

    Hoell, T; Huschak, G; Beier, A; Hüttmann, G; Minkus, Y; Holzhausen, H J; Meisel, H J

    2006-08-01

    The paper reports on auto fluorescence phenomena of inter-vertebral human discs. It systematically investigates the auto fluorescence effects of ex vivo disc specimen and reports on surgical cases to demonstrate the potential value of the new method. The paper offers biologic explanations of the phenomenon and discusses the potential value of the UV auto fluorescence technique as a diagnostic tool. Intra- and postoperative observations are made by a surgical microscope with an integrated UV light source. Quantitative measurements were carried out using a photon counter and a spectrometer ex vivo. The auto fluorescence phenomenon allows the differentiation of traumatized and degenerated disc tissue intraoperatively in some cases, it allows the differentiation of bony and collagen endplate in cervical disc surgery. The source of the auto fluorescent light emission are amino acids of the collagen molecules. The proteoglycan components and the liquid components of the disc do not show relevant auto fluorescence. Emission wavelength of disc material is equivalent to color perception. It differs due to different collagen composition of the intervertebral disc components from yellow-green to blue-green and can be visualized in situ by naked eye.UV-auto fluorescence of inter-vertebral discs is a new clinical tool that has the potential to differentiate disc material from the anatomical surrounding, to distinguish between different fractions of the disc and to give information on the quality and status of the disc material. Since the technology has just emerged, it needs further investigations to quantify the clinical observations reported in this paper.

  1. Auto-Context Convolutional Neural Network (Auto-Net) for Brain Extraction in Magnetic Resonance Imaging.

    Mohseni Salehi, Seyed Sadegh; Erdogmus, Deniz; Gholipour, Ali

    2017-11-01

    Brain extraction or whole brain segmentation is an important first step in many of the neuroimage analysis pipelines. The accuracy and the robustness of brain extraction, therefore, are crucial for the accuracy of the entire brain analysis process. The state-of-the-art brain extraction techniques rely heavily on the accuracy of alignment or registration between brain atlases and query brain anatomy, and/or make assumptions about the image geometry, and therefore have limited success when these assumptions do not hold or image registration fails. With the aim of designing an accurate, learning-based, geometry-independent, and registration-free brain extraction tool, in this paper, we present a technique based on an auto-context convolutional neural network (CNN), in which intrinsic local and global image features are learned through 2-D patches of different window sizes. We consider two different architectures: 1) a voxelwise approach based on three parallel 2-D convolutional pathways for three different directions (axial, coronal, and sagittal) that implicitly learn 3-D image information without the need for computationally expensive 3-D convolutions and 2) a fully convolutional network based on the U-net architecture. Posterior probability maps generated by the networks are used iteratively as context information along with the original image patches to learn the local shape and connectedness of the brain to extract it from non-brain tissue. The brain extraction results we have obtained from our CNNs are superior to the recently reported results in the literature on two publicly available benchmark data sets, namely, LPBA40 and OASIS, in which we obtained the Dice overlap coefficients of 97.73% and 97.62%, respectively. Significant improvement was achieved via our auto-context algorithm. Furthermore, we evaluated the performance of our algorithm in the challenging problem of extracting arbitrarily oriented fetal brains in reconstructed fetal brain magnetic

  2. A Grande Reportagem no contexto informativo SIC

    Colaço, Vanessa Alexandra Francisco

    2014-01-01

    Os telespectadores querem ver grandes reportagens? Como evoluíram as audiências da Grande Reportagem SIC? É este o produto premium da estação? Terá este formato um investimento e continuidade garantidas? Estas são algumas das questões formuladas e às quais se procurou dar resposta neste Relatório de Estágio. Neste trabalho traça-se o perfil do programa Grande Reportagem SIC, clarificando a linha editorial que lhe serviu de base, procurando perceber as suas dinâmicas e passando em revista mome...

  3. Supersymmetry and supergravity: Phenomenology and grand unification

    Arnowitt, R.; Nath, P.

    1993-01-01

    A survey is given of supersymmetry and supergravity and their phenomenology. Some of the topics discussed are the basic ideas of global supersymmetry, the minimal supersymmetric Standard Model (MSSM) and its phenomenology, the basic ideas of local supersymmetry (supergravity), grand unification, supersymmetry breaking in supergravity grand unified models, radiative breaking of SU(2) x U(1), proton decay, cosmological constraints, and predictions of supergravity grand unified models. While the number of detailed derivations are necessarily limited, a sufficient number of results are given so that a reader can get a working knowledge of this field

  4. Kepler AutoRegressive Planet Search

    Caceres, Gabriel Antonio; Feigelson, Eric

    2016-01-01

    The Kepler AutoRegressive Planet Search (KARPS) project uses statistical methodology associated with autoregressive (AR) processes to model Kepler lightcurves in order to improve exoplanet transit detection in systems with high stellar variability. We also introduce a planet-search algorithm to detect transits in time-series residuals after application of the AR models. One of the main obstacles in detecting faint planetary transits is the intrinsic stellar variability of the host star. The variability displayed by many stars may have autoregressive properties, wherein later flux values are correlated with previous ones in some manner. Our analysis procedure consisting of three steps: pre-processing of the data to remove discontinuities, gaps and outliers; AR-type model selection and fitting; and transit signal search of the residuals using a new Transit Comb Filter (TCF) that replaces traditional box-finding algorithms. The analysis procedures of the project are applied to a portion of the publicly available Kepler light curve data for the full 4-year mission duration. Tests of the methods have been made on a subset of Kepler Objects of Interest (KOI) systems, classified both as planetary `candidates' and `false positives' by the Kepler Team, as well as a random sample of unclassified systems. We find that the ARMA-type modeling successfully reduces the stellar variability, by a factor of 10 or more in active stars and by smaller factors in more quiescent stars. A typical quiescent Kepler star has an interquartile range (IQR) of ~10 e-/sec, which may improve slightly after modeling, while those with IQR ranging from 20 to 50 e-/sec, have improvements from 20% up to 70%. High activity stars (IQR exceeding 100) markedly improve. A periodogram based on the TCF is constructed to concentrate the signal of these periodic spikes. When a periodic transit is found, the model is displayed on a standard period-folded averaged light curve. Our findings to date on real

  5. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Samuel Andrew Hardy

    2015-01-01

    Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hire...

  6. PROBLEMA DE ALOCAÇÃO DE CONFIABILIDADE-REDUNDÂNCIA USANDO EVOLUÇÃO DIFERENCIAL AUTO-ADAPTATIVA

    Spengler, Hellen Cristina; Loch, Gustavo Valentim

    2017-01-01

    Resumo. Esse trabalho considera a otimização não-linear inteira-mista do problema de alocação de confiabilidade-redundância, determinando simultaneamente a confiabilidade e redundância dos componentes de um sistema em série. Grande número de métodos (exatos e metaheurísticos) já abordaram esse problema, apresentando soluções satisfatórias. Nesse trabalho é utilizado um algoritmo de evolução diferencial auto-adaptativa (SaMDE) junto a um algoritmo de busca local. O exemplo numérico resolvido i...

  7. Cirios, trompetas y altares : el auto de fe como fiesta

    Doris Moreno Martínez

    1997-01-01

    Full Text Available El análisis del auto de fe en su vertiente festiva nos permite superar la vieja polémica de la historiografía liberal y la historiografia conservadora, en torno a la popularidad/repulsión social de la Inquisición. Trascendiendo las visiones unidireccionales, se intenta aprender el auto de fe general desde una perspectiva global; se integran las vertientes jurídica, religiosa y social a través de algunos de los múltiples ingredientes del auto: sensitivos (luz, colores, sonidos..., sociales (participación activa de artesanos, familiares y asistentes... y simbólicos (orden preeminencial en las procesiones y en los tablados, juramentos..., para configurar el auto de fe como una fiesta compleja. poliédrica. En el auto de fe la Iglesia y el Estado tantas veces enfrentados, mostraban sus respectivos poderes concertados, con toda la capacidad intimidatoría de una simbología muy funcional y efectiva, y los componentes mórbidos de identificación personal del mal y la escenificación dramática.The analysis of the auto de fe on its festive side allows us to overecome the old discussion between the liberal histórical view and the conservative view that surrounds the social popularity/repulsion of the Inquisition. Overcoming the narrow visión we try to understand a global perspective; we intégrate the juridical, religious and social aspects through some of the many ingredients of the auto de fe: sensory (light, colours, sounds..., social (active participation of artisans, families and people present... and symbolical (order of rank in processions on stages and oath taking.... All those aspects combine to make the auto de fe a very complex and many sided festivity. In the auto de fe, the Church and the State, many times oppossed to one another, showed that their respective powers were united, with all the intimidating power of a very effective and functional symbolism and the morbid components of a personal identification of evil and the

  8. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  9. Presença de auto-anticorpos não-tireóide-específicos no soro de pacientes com hipotireoidismo auto-imune

    Soares Débora Vieira; Vanderborght Bart O. M.; Vaisman Mário

    2003-01-01

    Auto-anticorpos contra componentes não-específicos da tireóide foram encontrados no soro de pacientes com doença auto-imune da tireóide. Neste estudo avaliamos a presença de auto-anticorpos antinucleares (ANA), antimúsculo liso (anti-ML) e antimitocôndria (anti-Mc) no soro de pacientes com hipotireoidismo auto-imune (HA), comparando-os a controles saudáveis. Estudamos 70 pacientes com hipotireoidismo auto-imune (tireoidite de Hashimoto ou tireoidite atrófica ) e 70 controles saudáveis (sem di...

  10. Las cinco grandes dimensiones de la personalidad

    Jan ter Laak

    1996-12-01

    Full Text Available Este artículo revisa las distintas posiciones teóricas sobre las cinco grandes dimensiones de la personalidad, mostrando las semejanzas y diferencias entre las posturas teóricas. Esta contribución presenta lo siguiente: (a la génesis del contenido y la estructura de las cinco dimensiones; (b la fortaleza de las cinco dimensiones; (e la relación de las cinco grandes dimensiones con otros constructos de personalidad; (d discute el valor predictivo de las puntuaciones del perfil de las cinco dimensiones para criterios pertinentes; (e analiza el estatus teórico de las cinco dimensiones; (f discute críticas históricas sobre las cinco grandes dimensiones y se formulan respuestas a estas críticas; (g hace conjeturas para el futuro de las cinco grandes dimensiones; y (h concluye con algunas conclusiones y comentarios.

  11. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  12. Grand unification and gravity - selected topics

    Zee, A.

    1981-09-01

    The material given here was presented in lectures delivered at the 4th Kyoto Summer Institute on Grand Unification and Related Topics. It consists of six sections. The sections are: the family problem, fermion mass hierarchy, maximal local symmetry, operator analysis of new physics, dynamically generated gravity, and Kaluza theory and grand unification. The last section contains a (hopefully) pedagogical introduction to Kaluza theory. For pedagogical completeness, several appendices reviewing some elementary notions of differential geometry have been added

  13. Auto/Ethnography and the Question of Ethics

    Wolff-Michael Roth

    2008-10-01

    Full Text Available Auto/ethnography has emerged as an important method in the social sciences for contributing to the project of understanding human actions and concerns. Although the name of the method includes "ethnography," auto/ethnography often is concerned exclusively with an abstract (i.e., undeveloped and abstracting understanding, and therefore the writing, of the Self rather than the writing of the "ethno." Auto/ethnography, such conceived, is a form of therapy, in the best case, and a form of narcissism and autoerotic relation, in the worst case. But because the Self exists in relation to the world, becomes in and through participation in everyday events, and because the human relation is inherently ethical, there are inherent ethical questions where the Other may come to be harmed as much as the Self. URN: urn:nbn:de:0114-fqs0901381

  14. AutoCAD electrical 2013 for electrical control designers

    Tickoo, Sham; CADCIM Technologies

    2013-01-01

    The AutoCAD Electrical 2013 for Electrical Control Designers textbook has been written to assist the engineering students and the practicing designers learn the application of various AutoCAD Electrical tools and options for creating electrical control designs. After reading this textbook, the users will be able to create professional electrical-control drawings easily and effectively. Moreover, the users will be able to automate various control engineering tasks such as building circuits, numbering wires, creating bills of materials, and many more. The textbook takes the users across a wide spectrum of electrical control drawings through progressive examples and numerous illustrations and exercises, thereby making it an ideal guide for both the novice and the advanced users. Salient Features of the Textbook Consists of 14 chapters that are organized in a pedagogical sequence covering various tools and features of AutoCAD Electrical such as schematic drawings, parametric and non-parametric PLC modules, Circu...

  15. COSMIC SHEAR MEASUREMENT USING AUTO-CONVOLVED IMAGES

    Li, Xiangchong; Zhang, Jun

    2016-01-01

    We study the possibility of using quadrupole moments of auto-convolved galaxy images to measure cosmic shear. The autoconvolution of an image corresponds to the inverse Fourier transformation of its power spectrum. The new method has the following advantages: the smearing effect due to the point-spread function (PSF) can be corrected by subtracting the quadrupole moments of the auto-convolved PSF; the centroid of the auto-convolved image is trivially identified; the systematic error due to noise can be directly removed in Fourier space; the PSF image can also contain noise, the effect of which can be similarly removed. With a large ensemble of simulated galaxy images, we show that the new method can reach a sub-percent level accuracy under general conditions, albeit with increasingly large stamp size for galaxies of less compact profiles.

  16. Fast radio burst search: cross spectrum vs. auto spectrum method

    Liu, Lei; Zheng, Weimin; Yan, Zhen; Zhang, Juan

    2018-06-01

    The search for fast radio bursts (FRBs) is a hot topic in current radio astronomy studies. In this work, we carry out a single pulse search with a very long baseline interferometry (VLBI) pulsar observation data set using both auto spectrum and cross spectrum search methods. The cross spectrum method, first proposed in Liu et al., maximizes the signal power by fully utilizing the fringe phase information of the baseline cross spectrum. The auto spectrum search method is based on the popular pulsar software package PRESTO, which extracts single pulses from the auto spectrum of each station. According to our comparison, the cross spectrum method is able to enhance the signal power and therefore extract single pulses from data contaminated by high levels of radio frequency interference (RFI), which makes it possible to carry out a search for FRBs in regular VLBI observations when RFI is present.

  17. Auto-focusing accelerating hyper-geometric laser beams

    Kovalev, A A; Kotlyar, V V; Porfirev, A P

    2016-01-01

    We derive a new solution to the paraxial wave equation that defines a two-parameter family of three-dimensional structurally stable vortex annular auto-focusing hyper-geometric (AH) beams, with their complex amplitude expressed via a degenerate hyper-geometric function. The AH beams are found to carry an orbital angular momentum and be auto-focusing, propagating on an accelerating path toward a focus, where the annular intensity pattern is ‘sharply’ reduced in diameter. An explicit expression for the complex amplitude of vortex annular auto-focusing hyper-geometric-Gaussian beams is derived. The experiment has been shown to be in good agreement with theory. (paper)

  18. [Dermatological features of auto-inflammatory recurrent fevers].

    Escudier, A; Mauvais, F-X; Bastard, P; Boussard, C; Jaoui, A; Koskas, V; Lecoq, E; Michel, A; Orcel, M-C; Truelle, P-E; Wohrer, D; Piram, M

    2018-02-01

    Auto-inflammatory diseases are characterized by unexplained and recurrent attacks of systemic inflammation often involving the skin, joints, or serosal membranes. They are due to a dysfunction or dysregulation of the innate immunity, which is the first line of defense against pathogens. Early recognition of these diseases by the clinician, especially by pediatricians encountering such pathologies in pediatric patients, is primordial to avoid complications. Skin manifestations, common in most auto-inflammatory diseases, are helpful for prompt diagnosis. After a brief physiopathological review, we will describe auto-inflammatory recurrent fevers by their main dermatological presentations: urticarial lesions, neutrophilic dermatoses, panniculitis, other maculopapular eruptions, dyskeratosis, skin vasculitis, and oral aphthous. We finally suggest a decision tree to help clinicians better target genetic exams in patients with recurrent fevers and dermatological manifestations. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  19. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  20. Software planning and analysis for automated design system AutoCAD

    Koskutė, Lina

    2007-01-01

    AutoCAD sistemos papildymas sukurtas tam, kad būtų lengviau ir paprasčiau dirbti su AutoCAD grafine sistema. Funkcijos sukurtos naudojant AutoLisp ir VisualLISP programavimo kalbas. Sistemos papildymą galima įdiegti į bet kurią AutoCAD versiją. Sukurtas papildymas lankstus naujų funkcijų prijungimui, lengvai eksploatuojamas. Funkcijos suskirstytos į keletą grupių pagal jų formatą. AutoCAD system complement is created to make more easy working with AutoCAD graphic system. Functions are crea...

  1. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  2. Beyond NextGen: AutoMax Overview and Update

    Kopardekar, Parimal; Alexandrov, Natalia

    2013-01-01

    Main Message: National and Global Needs - Develop scalable airspace operations management system to accommodate increased mobility needs, emerging airspace uses, mix, future demand. Be affordable and economically viable. Sense of Urgency. Saturation (delays), emerging airspace uses, proactive development. Autonomy is Needed for Airspace Operations to Meet Future Needs. Costs, time critical decisions, mobility, scalability, limits of cognitive workload. AutoMax to Accommodate National and Global Needs. Auto: Automation, autonomy, autonomicity for airspace operations. Max: Maximizing performance of the National Airspace System. Interesting Challenges and Path Forward.

  3. Innovaatioiden esteet ja profiloitumisen keinot AutoPalinin markkinoinnissa

    Vallin, Veera

    2011-01-01

    Tämän opinnäytetyön aiheena olivat innovaatioiden esteet ja profiloitumisen keinot AutoPalinin markkinoinnissa. Työssä tutkittiin ja analysoitiin Satakunnan suurimman autotalon AutoPalinin uusien autojen sanomalehtimainontaa ja selvitettiin ilmoi-tusten sisältöön rajoittavasti vaikuttavia tekijöitä. Tavoitteena oli selittää automainonnan samankaltaisuuden aiheuttajia ja etsiä keinoja jälleenmyyjän parempaan profiloitumiseen painetussa mediassa. Opinnäytetyössä esiteltiin erilaisia sanomal...

  4. Instant Autodesk AutoCAD 2014 customization with .NET

    Nelson, Tom

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. An instruction-based guide with examples written in the C# programming language. VB.NET programmers can also take advantage of these examples by using one of the free conversion websites to convert the examples to VB.NET.Clear, step-by-step instructions and complete code examples illustrate the processes, making it easy to develop your own custom AutoCAD tools.This book is perfect if you are interested in customizing AutoCAD 2014 using the .NET API. You should have a basic familiari

  5. Auto-calibration of Systematic Odometry Errors in Mobile Robots

    Bak, Martin; Larsen, Thomas Dall; Andersen, Nils Axel

    1999-01-01

    This paper describes the phenomenon of systematic errors in odometry models in mobile robots and looks at various ways of avoiding it by means of auto-calibration. The systematic errors considered are incorrect knowledge of the wheel base and the gains from encoder readings to wheel displacement....... By auto-calibration we mean a standardized procedure which estimates the uncertainties using only on-board equipment such as encoders, an absolute measurement system and filters; no intervention by operator or off-line data processing is necessary. Results are illustrated by a number of simulations...... and experiments on a mobile robot....

  6. Líneas de Ensamble Auto-balanceables

    Palomino Sánchez, José Manuel

    2011-01-01

    Este documento presenta una monografía de las líneas de ensamble auto-balanceables. Este tipo de líneas se han popularizado con la implementación de la manufactura esbelta en muchas empresas de diferentes ramos. Sin embargo, su estudio es aún incipiente, por lo que el objetivo de este proyecto es hacer una revisión de la literatura existente con el propósito de identificar posibles trabajos en esta área. Las líneas de ensamble auto-balanceables, también descritas en la literatura como Buck...

  7. Auto-imunidade e colágeno V Autoimmunity and collagen V

    Cristiane Carla de Oliveira

    2006-06-01

    Full Text Available As proteínas da matriz extracelular (MEC e seus componentes estão sendo amplamente estudados na literatura médica, assim como sua relação com o remodelamento tecidual presente nas doenças reumáticas. Neste artigo, mostramos a importância do estudo do colágeno do tipo V no entendimento da etiologia da esclerodermia, no que se refere ao desencadeamento da auto-imunidade nesta enfermidade. Estudos em nosso laboratório demonstram que a sensibilização com colágeno do tipo V em coelhos pode resultar em um modelo animal de esclerodermia. Diante destes fatos, sugerimos que pesquisas neste campo podem ser de grande valia no desenvolvimento de novas condutas terapêuticas.The extracellular matrix (ECM proteins and their components have been widely studied in medical literature, as well its relationship with the tecidual remodeling present in the rheumatic disease. In this paper we show the importance of understanding the role of type V collagen as an important trigger of rheumatic autoimmune diseases. Studies in our laboratory demonstrate that type V collagen sensibilization in rabbits, could result in an animal scleroderma model. In this way we suggested that researches in this field can be worthy in development of new therapeutic procedures.

  8. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  9. Spot auto-focusing and spot auto-stigmation methods with high-definition auto-correlation function in high-resolution TEM.

    Isakozawa, Shigeto; Fuse, Taishi; Amano, Junpei; Baba, Norio

    2018-04-01

    As alternatives to the diffractogram-based method in high-resolution transmission electron microscopy, a spot auto-focusing (AF) method and a spot auto-stigmation (AS) method are presented with a unique high-definition auto-correlation function (HD-ACF). The HD-ACF clearly resolves the ACF central peak region in small amorphous-thin-film images, reflecting the phase contrast transfer function. At a 300-k magnification for a 120-kV transmission electron microscope, the smallest areas used are 64 × 64 pixels (~3 nm2) for the AF and 256 × 256 pixels for the AS. A useful advantage of these methods is that the AF function has an allowable accuracy even for a low s/n (~1.0) image. A reference database on the defocus dependency of the HD-ACF by the pre-acquisition of through-focus amorphous-thin-film images must be prepared to use these methods. This can be very beneficial because the specimens are not limited to approximations of weak phase objects but can be extended to objects outside such approximations.

  10. Lead theft--a study of the "uniqueness" of lead from church roofs.

    Bond, John W; Hainsworth, Sarah V; Lau, Tien L

    2013-07-01

    In the United Kingdom, theft of lead is common, particularly from churches and other public buildings with lead roofs. To assess the potential to distinguish lead from different sources, 41 samples of lead from 24 church roofs in Northamptonshire, U.K, have been analyzed for relative abundance of trace elements and isotopes of lead using X-ray fluorescence (XRF) and inductively coupled plasma mass spectrometry, respectively. XRF revealed the overall presence of 12 trace elements with the four most abundant, calcium, phosphorus, silicon, and sulfur, showing a large weight percentage standard error of the mean of all samples suggesting variation in the weight percentage of these elements between different church roofs. Multiple samples from the same roofs, but different lead sheets, showed much lower weight percentage standard errors of the mean suggesting similar trace element concentrations. Lead isotope ratios were similar for all samples. Factors likely to affect the occurrence of these trace elements are discussed. © 2013 American Academy of Forensic Sciences.

  11. Design of remote car anti-theft system based on ZigBee

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  12. The Attractiveness of Materials in Advanced Nuclear Fuel Cycles for Various Proliferation and Theft Scenarios

    Bathke, C.G.; Wallace, R.K.; Ireland, J.R.; Johnson, M.W.; Hase, Kevin R.; Jarvinen, G.D.; Ebbinghaus, B.B.; Sleaford, Brad W.; Bradley, Keith S.; Collins, Brian A.; Smith, Brian W.; Prichard, Andrew W.

    2010-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  13. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  14. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Manabi Paul

    Full Text Available Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  15. Relationship between Delusion of Theft and Cognitive Functions in Patients with Mild Alzheimer’s Disease

    Na, Hae-Ran; Kang, Dong Woo; Woo, Young-Sup; Bahk, Won-Myong; Lee, Chang-Uk; Lim, Hyun Kook

    2018-01-01

    Although delusion of theft (DT) is the most frequent type of delusion in Alzheimer’s disease (AD), its relationship to cognitive functions remains unclear. The aim of this study was to demonstrate the relationship between DT and cognitive functions in mild AD. Two hundred eighty-nine mild AD patients were enrolled in this study. These subjects were classified into three groups: patients with no delusions (ND, n=82), patients with paranoid delusions (PD, n=114) and patients with DT (n=93). Cognitive functions and their associations with the degree of delusion were compared among the three groups. The results showed that verbal Fluency scores were significantly lower in the PD group than in the DT and ND groups. Word List Recall scores were significantly lower in the DT group than in the PD and ND groups. Interestingly, delusion severity measured with the Neuropsychiatric Inventory delusion subscale correlated negatively with the Word List Recall scores in the DT group. In this study, we demonstrated that episodic memory functions in mild AD patients were associated with DT, but not with PD. Further studies might be needed to clarify the pathophysiology of delusions associated with AD. PMID:29669410

  16. Relationship between Delusion of Theft and Cognitive Functions in Patients with Mild Alzheimer's Disease.

    Na, Hae-Ran; Kang, Dong Woo; Woo, Young-Sup; Bahk, Won-Myong; Lee, Chang-Uk; Lim, Hyun Kook

    2018-04-01

    Although delusion of theft (DT) is the most frequent type of delusion in Alzheimer's disease (AD), its relationship to cognitive functions remains unclear. The aim of this study was to demonstrate the relationship between DT and cognitive functions in mild AD. Two hundred eighty-nine mild AD patients were enrolled in this study. These subjects were classified into three groups: patients with no delusions (ND, n=82), patients with paranoid delusions (PD, n=114) and patients with DT (n=93). Cognitive functions and their associations with the degree of delusion were compared among the three groups. The results showed that verbal Fluency scores were significantly lower in the PD group than in the DT and ND groups. Word List Recall scores were significantly lower in the DT group than in the PD and ND groups. Interestingly, delusion severity measured with the Neuropsychiatric Inventory delusion subscale correlated negatively with the Word List Recall scores in the DT group. In this study, we demonstrated that episodic memory functions in mild AD patients were associated with DT, but not with PD. Further studies might be needed to clarify the pathophysiology of delusions associated with AD.

  17. The attractiveness of materials in advanced nuclear fuel cycles for various proliferation and theft scenarios

    Bathke, Charles G.; Wallace, Richard K.; Ireland, John R.; Johnson, M.W.; Hase, Kevin R.; Jarvinen, Gordon D.; Ebbinghaus, Bartley B.; Sleaford, Brad A.; Bradley, Keith S.; Collins, Brian W.; Smith, Brian W.; Prichard, Andrew W.

    2009-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  18. Anti-theft device staining on banknotes detected by mass spectrometry imaging.

    Correa, Deleon Nascimento; Zacca, Jorge Jardim; Rocha, Werickson Fortunato de Carvalho; Borges, Rodrigo; de Souza, Wanderley; Augusti, Rodinei; Eberlin, Marcos Nogueira; Vendramini, Pedro Henrique

    2016-03-01

    We describe the identification and limits of detection of ink staining by mass spectrometry imaging (MSI), as used in anti-theft devices (ATDs). Such ink staining is applied to banknotes during automated teller machine (ATM) explosions. Desorption electrospray ionization (DESI) coupled with high-resolution and high-accuracy orbitrap mass spectrometry (MS) and a moving stage device were applied to obtain 2D molecular images of the major dyes used for staining, that is, 1-methylaminoanthraquinone (MAAQ), rhodamine B (RB) and rhodamine 6G (R6G). MAAQ could not be detected because of its inefficient desorption by DESI from the banknote cellulose surface. By contrast, ATD staining on banknotes is perceptible by the human naked eye only at concentrations higher than 0.2 μg cm(-2), whereas both RB and R6G at concentrations 200 times lower (as low as 0.001 μg cm(-2)) could be easily detected and imaged by DESI-MSI, with selective and specific identification of each analyte and their spatial distribution on samples from suspects. This technique is non-destructive, and no sample preparation is required, which ensures sample preservation for further forensic investigations. Copyright © 2016. Published by Elsevier Ireland Ltd.

  19. Assessment of heavy metal exposure around auto body refinishing ...

    Significant number of occupations are present in our society which involves metal pollution. These small operational occupations which are always neglected by governments and other occupational health services are another major factor of metal flow in urban soil. The local auto body refinishing shops are one of these ...

  20. Heavy Metals in Soils of auto- mechanic shops and refuse ...

    Dumpsites soil samples in Apir and North Bank Auto- mechanic workshop locations in Makurdi, the Benue State capital located on latitude 70 44'N and longitude 80 32'E of the Equator situated in a valley in north central Nigeria, 100m above sea level, were collected and analyzed for content of selected heavy metals.

  1. AutoClickChem: click chemistry in silico.

    Jacob D Durrant

    Full Text Available Academic researchers and many in industry often lack the financial resources available to scientists working in "big pharma." High costs include those associated with high-throughput screening and chemical synthesis. In order to address these challenges, many researchers have in part turned to alternate methodologies. Virtual screening, for example, often substitutes for high-throughput screening, and click chemistry ensures that chemical synthesis is fast, cheap, and comparatively easy. Though both in silico screening and click chemistry seek to make drug discovery more feasible, it is not yet routine to couple these two methodologies. We here present a novel computer algorithm, called AutoClickChem, capable of performing many click-chemistry reactions in silico. AutoClickChem can be used to produce large combinatorial libraries of compound models for use in virtual screens. As the compounds of these libraries are constructed according to the reactions of click chemistry, they can be easily synthesized for subsequent testing in biochemical assays. Additionally, in silico modeling of click-chemistry products may prove useful in rational drug design and drug optimization. AutoClickChem is based on the pymolecule toolbox, a framework that may facilitate the development of future python-based programs that require the manipulation of molecular models. Both the pymolecule toolbox and AutoClickChem are released under the GNU General Public License version 3 and are available for download from http://autoclickchem.ucsd.edu.

  2. AutoClickChem: click chemistry in silico.

    Durrant, Jacob D; McCammon, J Andrew

    2012-01-01

    Academic researchers and many in industry often lack the financial resources available to scientists working in "big pharma." High costs include those associated with high-throughput screening and chemical synthesis. In order to address these challenges, many researchers have in part turned to alternate methodologies. Virtual screening, for example, often substitutes for high-throughput screening, and click chemistry ensures that chemical synthesis is fast, cheap, and comparatively easy. Though both in silico screening and click chemistry seek to make drug discovery more feasible, it is not yet routine to couple these two methodologies. We here present a novel computer algorithm, called AutoClickChem, capable of performing many click-chemistry reactions in silico. AutoClickChem can be used to produce large combinatorial libraries of compound models for use in virtual screens. As the compounds of these libraries are constructed according to the reactions of click chemistry, they can be easily synthesized for subsequent testing in biochemical assays. Additionally, in silico modeling of click-chemistry products may prove useful in rational drug design and drug optimization. AutoClickChem is based on the pymolecule toolbox, a framework that may facilitate the development of future python-based programs that require the manipulation of molecular models. Both the pymolecule toolbox and AutoClickChem are released under the GNU General Public License version 3 and are available for download from http://autoclickchem.ucsd.edu.

  3. Auto-Tutorial Instruction in Entomology: Principles of Entomology (Orders).

    Minnick, D. R.; Steele, K. L.

    Auto-tutorial instruction was compared to traditional lecture instruction in a university entomology course. In seven consecutive terms, undergraduate students enrolled in an introductory entomology course were divided into two groups: Group I received only lecture instruction on insect orders, while Group II was dismissed for three consecutive…

  4. Propane Canada's first ever auto propane conversion directory

    Anon.

    1999-01-01

    A directory of auto propane dealers in Alberta, British Columbia and Manitoba was presented. Dealers in Calgary, Edmonton, Burnaby, Dawson Creek and Winnipeg were listed along with their addresses, phone numbers, fax, and E-mail addresses. Some of the other information provided included accreditation, equipment used and manufacturer brands used by the dealers

  5. High speed auto-charging system for condenser bank

    Mizuno, Yasunori; Bito, Fumio; Fujita, Kazuhiko; Sometani, Taro

    1987-01-01

    A current-control type high-speed charging system, which is intended for auto-charging of the condenser bank, is developed. Moreover, the system can also serve to compensate the current leakage from the condenser bank so that the charged voltage can be kept constant. The system consists of a sequence circuit, a charging current control circuit (or auto-charging circuit) and a charging circuit. The auto-charging circuit is characterized by the use of a triac to control the current. The current, controlled by the circuit, is supplied to the condenser bank through a step-up transformer and voltage doubler rectifier circuit. It is demonstrated that the use of the high-speed auto-charging circuit can largely decrease the required charging time, compared to constant voltage charging. In addition, the compensation function is shown to serve effectively for maintaining a constant voltage after the completion of charging. The required charging time is decreases as the charging current increases. The maximum charging current is decided by the rating of the traic and the current rating of the rectifier diode in the secondary circuit. Major components of these circuits have decreased impedances to minimize the effect of noise, so that the possibility of an accident can be eliminated. Other various improvements are made in the grounding circuit and the charging protection circuit in order to ensure safety. (Nogami, K.)

  6. Pick-N-Pull Auto Dismantlers, Kansas City, LLC Inc.

    The EPA is providing notice of a proposed Administrative Penalty Assessment against Pick-N-Pull Auto Dismantlers, Kansas City, LLC, a subsidiary of Schnitzer Steel Industries, Inc., for alleged violations at its facilities at 8012 East Truman Rd., Kansas C

  7. An Integration of Math with Auto Technician Courses

    Valenzuela, Hector

    2012-01-01

    This article describes the development of the contextualized math, the course design, student teaching and daily interaction with the students, and the implementation aspects of the research project designed to develop contextualized mathematics and integrate it into the Auto Technician courses. The applied math curriculum was integrated into…

  8. La allegoria en los autos y farsas anteriores a calderon

    Fothergill Payne-Guépin, Louise Wilhelmina

    1976-01-01

    In Spanje is men pas in de twintiger jaren begonnen de allegorie weer als waardige component van de figuratieve expressie te beschouwen. In 1924 rehabiliteert Valbuena Prat de autos Sacramentales van Calderón en in hetzelfde jaar analyseert Jean Baruzi, gevolgd door de grote filoloog Dámaso Alonso,

  9. Careers in Auto Racing: Work in the Fast Lane

    Lawhorn, William

    2009-01-01

    Long before most people had seen an automobile, thrill-seekers across the globe were driving cars competitively. The speed of racecars has accelerated steadily, as has the popularity of the sport. In public opinion polls of sports popularity, in fact, auto racing consistently finishes near the top. Racecar drivers may be the star of their event,…

  10. Evaluation of Service Station Attendant-Auto Care Project.

    Cress, Ronald J.

    The project described offers an approach to providing occupational skills to socially and educationally handicapped youth, specifically the skills necessary for a service station attendant in driveway salesmanship and auto care. The 10-page evaluation report presents project goals and objectives with evaluation data (represented graphically) and…

  11. Fra form-Z til AutoCad

    Jensen, Henrik

    2003-01-01

    Dette kursus er lavet for at forberede de studerende til deres tegnestuepraktik, og dets indhold er planlagt i samarbejde med tegnestuerne. I 2003 var form-Z Arkitektskolens grundlæggende CAD-program; men på tegnestuerne arbejde man med AutoCad. Kurset er opbygget over CAD Clasic skabelonen (se min...

  12. Comparison of two (geometric) algorithms for auto OMA

    Juul, Martin; Olsen, Peter; Balling, Ole

    2018-01-01

    parameters. The two algorithms are compared and illustrated on simulated data. Different choices of distance measures are discussed and evaluated. It is illustrated how a simple distance measure outperforms traditional distance measures from other Auto OMA algorithms. Traditional measures are unable...

  13. Brakes. Auto Mechanics Curriculum Guide. Module 6. Instructor's Guide.

    Allain, Robert

    This module is the sixth of nine modules in the competency-based Missouri Auto Mechanics Curriculum Guide. Eight units cover: introduction to automotive brake systems; disc and drum brake system components and how they operate; properties of brake fluid and procedures for bleeding the brake system; diagnosing and determining needed repairs on…

  14. Globalisation, Crisis and Industrial Relations in the Indian Auto Industry

    D'Costa, Anthony

    2011-01-01

    in the broader capital-labour relation in the wider global economy due to globalisation is argued to be tempered by India's particular national and local institutions governing industrial relations, unionisation, the specific trajectory of the Indian auto industry, and economic development strategies. When much...... for employment security and lessons for other countries in these turbulent times....

  15. Measurement of antiacetylcholine receptor auto-antibodies in ...

    Two different acetylcholine receptor (AChR) preparations derived from amputated human muscle (AChRAMP) and from the human rhabdomyosarcoma cell line TE671 (AChRTE67,) were compared in radio-immunoprecipitation assays for the detection of AChR auto-antibodies in serum specimens from 20 patients with ...

  16. The Use of Vincristine in Refractory Auto-immune Thrombocytopenic ...

    Two patients with auto-immune thrombocytopenic purpura are reported who continued to bleed despite high doses of corticosteroids, immunosuppressive therapy and splenec- tomy. The addition of vincristine to their therapeutic regimen produced a response in each case and both patients are now off all therapy without ...

  17. Dispersion effect and auto-reconditioning performance of nanometer ...

    This paper reported on dispersion effect and dispersing techniques of nanometer WS2 particles in the green lubricant concocted by us. And it also researched on auto-reconditioning performance of nanometer WS2 particles to the abrasive surfaces of steel ball from four-ball tribology test and piston ring from engine ...

  18. Auto-immune Haematological Complications Occurring during the ...

    1974-10-19

    Oct 19, 1974 ... Immunohaematological disorders may complicate the clini- cal course of patients with chronic lymphocytic leukaemia, lymphocytic lymphoma and Hodgkin's disease.'" Auto- immune haemolytic anaemia is the most common of these complications, occurring in approximately 10 - 25'% of patients with ...

  19. Sex identification of Nigerian indigenous chicks using Auto-sexing ...

    Sexing has been a challenging task in Nigerian indigenous chickens due to the monomorphism of chicks which makes it impossible to distinguish the male from the female until eight weeks. . Therefore, this study was carried out to determine the sex of Nigerian indigenous chicks using the common auto-sexing methods.

  20. An example of auto-anti-A1 agglutinins.

    Wright, J; Lim, F C; Freedman, J

    1980-10-01

    The serum of an elderly man, group A, Le(a+b-), contained an IgM antibody that agglutinated his own cells and the cells of random group A1 donors. Over a period of 5 months, the titre of these auto-anti-A1 agglutinins was 4 at 22 degrees C.