WorldWideScience

Sample records for grand theft auto

  1. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  2. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    Directory of Open Access Journals (Sweden)

    Clara Victoria Meza-Maya

    2017-01-01

    Full Text Available Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V. Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes de un colegio de Bogotá. Resultados y conclusiones: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  3. Grand Theft Auto IV comes to Singapore: effects of repeated exposure to violent video games on aggression.

    Science.gov (United States)

    Teng, Scott Kie Zin; Chong, Gabriel Yew Mun; Siew, Amy Sok Cheng; Skoric, Marko M

    2011-10-01

    Given the increasingly dominant role of video games in the mainstream entertainment industry, it is no surprise that the scholarly debate about their impact has been lively and well attended. Although >100 studies have been conducted to examine the impact of violent video games on aggression, no clear consensus has been reached, particularly in terms of their long-term impact on violent behavior and aggressive cognitions. This study employs a first-ever longitudinal laboratory-based experiment to examine longer-term effects of playing a violent video game. One hundred thirty-five participants were assigned either to the treatment condition where they played a violent video game in a controlled laboratory setting for a total of 12 hours or to the control group where they did not play a game. Participants in the treatment group played Grand Theft Auto IV over a period of 3 weeks and were compared with a control group on the posttest measures of trait aggression, attitudes toward violence, and empathy. The findings do not support the assertion that playing a violent video game for a period of 3 weeks increases aggression or reduces empathy, but they suggest a small increase in proviolence attitudes. The implications of the findings are discussed.

  4. Facing Fanon: Examining Neocolonial Aspects in Grand Theft Auto V through the Prism of the Machinima Film Finding Fanon II

    Directory of Open Access Journals (Sweden)

    Steffen Krüger

    2018-02-01

    Full Text Available In this article, I examine the Machinima film 'Finding Fanon II', by London-based artists Larry Achiampong and David Blandy, for what it can tell us about the relationship between video gaming and the postcolonial. Evoking Frantz Fanon, one of the most piercing voices of the decolonisation movement of the 1950s and 1960s, in the context of 'Grand Theft Auto' (GTA, one of the most technologically advanced and, at the same time, scandalous video game series of the 21st century, 'Finding Fanon II' amounts to a scathing critique of both the game series’ depiction of race and academic scholarship that has been defending the series on the grounds of its use of humour and irony. Shot in the in-game video editor of 'GTA V', 'Finding Fanon II' lets this critique emerge from inside the game and as an effect of the artists’ engagement with it. By suspending the game’s mechanisms and programmed forms of interaction, the artwork brings their racialised logic to the fore, pointing towards the ways in which 'GTA V' commodifies black men for the consumption of white players. This commodification has the effect of normalising and naturalising the precarious position of black people in Western society. What the artwork adds to this argument through its facilitation of a Fanonian perspective is a reminder that it is not only the gaming experience of 'white' players that is framed in this way. Players with ethnic minority backgrounds might also accept the white gaze of the game as a given. Acts of self-commodification along the lines of a white Western rationality must thus be seen as a plausible new form of cultural imperialism promoted by the GTA series.

  5. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  6. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    OpenAIRE

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  7. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    OpenAIRE

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  8. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  9. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  10. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  11. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  12. Auto-estima e fatores associados em gestantes da cidade de Pelotas, Rio Grande do Sul, Brasil Self-esteem and associated factors in pregnant women in the city of Pelotas, Rio Grande do Sul State, Brazil

    Directory of Open Access Journals (Sweden)

    Michelle de Souza Dias

    2008-12-01

    Full Text Available O estudo tem como objetivo mensurar a auto-estima e fatores associados em gestantes atendidas pelo Sistema Único de Saúde (SUS na cidade de Pelotas, Rio Grande do Sul, Brasil. É do tipo transversal, tendo-se entrevistado 560 gestantes nos meses de maio a novembro de 2006, nos ambulatórios e enfermarias dos hospitais universitários e do centro de atendimento da Prefeitura Municipal. Dentre as gestantes atendidas, 62,9% receberam o diagnóstico de alto-risco. Para avaliação da auto-estima foi utilizada a escala de Rosenberg. Na amostra total a média de pontos na escala foi de 9,2 e o desvio-padrão de 4,6. As variáveis associadas positiva e significativamente com auto-estima foram idade, nível de escolaridade e nível econômico. Já as variáveis percepção de risco à saúde do bebê e número de gestações mostraram-se associadas negativamente à auto-estima. Além disso, as gestantes com condição gestacional de alto-risco têm uma auto-estima mais elevada quando comparadas com as de baixo-risco.This study analyzes self-esteem and associated factors in pregnant women treated by the Unified National Health System (SUS in the city of Pelotas, Rio Grande do Sul State, Brazil. Using a cross-sectional design, 560 pregnant women were interviewed from May to November 2006. The interviews were held in specific locations like University outpatient clinics and hospital wards and a center run by the city government. A full 62.9% were diagnosed as high-risk pregnancies. Mean self-esteem according to the Rosenberg scale was 9.2 (SD = 4.6. Variables showing a positive, significant association with self-esteem were age, schooling, and income. Perception of risk to the unborn infant's health and parity were both negatively associated with maternal self-esteem. These high-risk pregnant women also showed higher self-esteem than low-risk pregnant women.

  13. From Users to Designers: Building a Self-Organizing Game-Based Learning Environment

    Science.gov (United States)

    Squire, Kurt; Giovanetto, Levi; Devane, Ben; Durga, Shree

    2005-01-01

    The simultaneous publication of Steven Johnson's Everything Bad is Good for You and appearance of media reports of X-rated content in the popular game Grand Theft Auto has renewed controversies surrounding the social effects of computer and video games. On the one hand, videogames scholars argue that videogames are complex, cognitively challenging…

  14. 25 CFR 11.412 - Theft.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  15. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  16. Promoting Inclusive Education, Civic Scientific Literacy, and Global Citizenship with Videogames

    Science.gov (United States)

    Marino, Matthew T.; Hayes, Michael T.

    2012-01-01

    In this response to Yupanqui Munoz and Charbel El-Hani's paper, "The student with a thousand faces: From the ethics in videogames to becoming a citizen", we examine their critique of videogames in science education. Munoz and El-Hani present a critical analysis of videogames such as "Grand Theft Auto", "Street Fight", "Command and Conquer:…

  17. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  18. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  19. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  20. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  1. Gun Theft and Crime.

    Science.gov (United States)

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  2. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  3. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    OpenAIRE

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  4. Current trends in copper theft prevention

    Energy Technology Data Exchange (ETDEWEB)

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  5. Overt theft and the peculiarities of the qualification

    OpenAIRE

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  6. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  7. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  8. 14 CFR 1214.609 - Loss or theft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  9. 26 CFR 1.165-8 - Theft losses.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  10. 27 CFR 24.265 - Losses by theft.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  11. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  12. Brake to the theft of fuels

    International Nuclear Information System (INIS)

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  13. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  14. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  15. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  16. Something for the Boys: "Iron Man," "Transformers," and "Grand Theft Auto IV"

    Science.gov (United States)

    Beck, Bernard

    2009-01-01

    Three recent examples are discussed of popular culture products that cater specifically to the cultural world of boys, social types that are the created identities of young males in our society. The self-ascribed qualities of participants in the world of boys, rather than the inherent characteristics of young males, provide the content of the…

  17. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  18. Coming of Age at Bullworth Academy: Bully and Narratives of Youth Violence

    OpenAIRE

    Peter Rauch

    2009-01-01

    The 1999 rampage at Columbine High School, and the high-profile school shootings that preceded it, dramatically heightened pre-existing cultural anxieties about the consumption of violent media in childhood. In particular, videogames received unprecedented public scrutiny, and even now the spectre of Columbine continues to hang over any discussion of violent videogames. When Rockstar Games, developer of the ultraviolent Grand Theft Auto series, announced Bully, a similarly styled game that wo...

  19. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  20. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  1. Dog Theft: A Case for Tougher Sentencing Legislation.

    Science.gov (United States)

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  2. 7 CFR 331.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  3. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  4. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Science.gov (United States)

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  5. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  6. Money and Credit With Limited Commitment and Theft

    OpenAIRE

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  7. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  8. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  9. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  10. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  11. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  12. Video Games as Mass Art

    OpenAIRE

    Grant Tavinor

    2011-01-01

    Videogames are one of the most significant developments in the mass arts of recent times. In commercial terms, they are now among the most prominent of the mass arts worldwide. This commercial and cultural success does not exhaust the interest in videogames as a mass art phenomenon because games such as Grand Theft Auto IV and Fallout 3 are structurally radically different from previous forms of mass art. In particular, the ontology of videogames, the nature and identity of their works, and...

  13. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  14. LEVANTAMENTO DE AUTOS DE INFRAÇÃO PELO IBAMA/RN RELACIONADOS AOS EMPREENDIMENTOS DE CERÂMICA NO ESTADO DO RIO GRANDE DO NORTE

    Directory of Open Access Journals (Sweden)

    Sângela Ramos de Souza

    2007-12-01

    Full Text Available A produção brasileira de cerâmica continua em seu processo de expansão. O tamanho do mercado nordestino e os custos de transportes associados ao baixo valor agregado dos revestimentos cerâmicos estimularam um movimento de desconcentração regional da produção, uma vez que a implantação de unidades produtivas no Nordeste passou a fazer parte da estratégia competitiva de algumas empresas. O presente trabalho busca mostrar os principais autos de infração relacionados aos empreendimentos de Cerâmica no Estado do Rio Grande do Norte pelo Instituto Brasileiro do Meio Ambiente e dos Recursos Renováveis do RN - IBAMA/RN, órgão ambiental fiscalizador no Estado, no período de 01/01/2002 a 04/10/2005. O levantamento de dados foi realizado através do acesso a Sistemas operados pelo IBAMA/RN, que informou o número de indústrias cadastradas no Rio Grande do Norte, o número de infrações, entre outras. Foram verificadas 140 indústrias cadastradas no Estado, distribuídas em 24 municípios. O alto número de indústrias do setor pode ser decorrente da centralização da atividade como alternativa econômica visto que a região apresenta condições ambientais que prejudicam seu potencial produtivo. O levantamento dos dados revelou que as principais infrações eram receber, armazenar ou transportar produto florestal sem cobertura de ATPF (Autorização de Transporte de Produtos Florestais e funcionar sem prévio registro no IBAMA. A atuação dos órgãos governamentais foi constatada como de fundamental importância para a diminuição do número de autos de infração das indústrias de cerâmica, referente ao período avaliado. A substituição da matriz energética, nas indústrias de cerâmica, de lenha para gás natural é a alternativa ideal no combate à poluição e de outras formas impactantes. Parece haver um direcionamento dos empreendedores, buscando um desenvolvimento sustentável, ainda que seja na intenção de obterem

  15. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  16. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  17. 42 CFR 73.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  18. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  19. Dog Theft: A Case for Tougher Sentencing Legislation

    Science.gov (United States)

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  20. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  1. Developmental Trajectories of Male Physical Violence and Theft

    Science.gov (United States)

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  2. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  3. Teaching introductory game development with unreal engine: Challenges, strategies, and experiences

    OpenAIRE

    Head, Nicholas A

    2015-01-01

    From the days of Pong to 100 million dollar projects such as the Grand Theft Auto franchise, video games have evolved significantly over the years. This evolution has also changed the way game development is viewed as a career. Today, video games are one of the most profitable forms of entertainment, and game development courses are appearing at universities around the world. Even with this growth, a degree from a university has yet to be an important factor in finding a job in game developme...

  4. Uma nova interpretação de um auto de Gil Vicente

    OpenAIRE

    Silva, Isa Alexandra Marques da

    2009-01-01

    Neste trabalho, intitulado Uma nova interpretação de Um Auto de Gil Vicente, cedo lugar a uma reflexão sumária em torno da história do Teatro, como ponto de partida para a tragicomédia vicentina, denominada As Cortes de Júpiter, sobre a qual Garrett introduz o seu Auto de ―meditação‖ cultural. A partir do exemplo garrettiano, aproveitamos a oportunidade para ressaltar, especialmente, o grande deficit do nosso País na época do autor, do qual podemos verificar ainda alguns reflexos na actualida...

  5. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  6. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  7. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  8. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  9. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  10. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  11. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  12. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  13. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  14. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  15. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  16. Combating employee theft in the healthcare industry.

    Science.gov (United States)

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  17. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  18. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  19. On the electricity shortage, price and electricity theft nexus

    International Nuclear Information System (INIS)

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  20. Tricks of the trade: Mechanism of brood theft in an ant.

    Science.gov (United States)

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  1. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  2. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    OpenAIRE

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  3. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  4. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  5. Electrical injuries due to theft of copper.

    Science.gov (United States)

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  6. Deterring and remedying employee theft.

    Science.gov (United States)

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  7. Advising caution in studying seasonal oscillations in crime rates.

    Directory of Open Access Journals (Sweden)

    Kun Dong

    Full Text Available Most types of crime are known to exhibit seasonal oscillations, yet the annual variations in the amplitude of this seasonality and their causes are still uncertain. Using a large collection of data from the Houston and Los Angeles Metropolitan areas, we extract and study the seasonal variations in aggravated assault, break in and theft from vehicles, burglary, grand theft auto, rape, robbery, theft, and vandalism for many years from the raw daily data. Our approach allows us to see various long term and seasonal trends and aberrations in crime rates that have not been reported before. We then apply an ecologically motivated stochastic differential equation to reproduce the data. Our model relies only on social interaction terms, and not on any exigent factors, to reproduce both the seasonality, and the seasonal aberrations observed in our data set. Furthermore, the stochasticity in the system is sufficient to reproduce the variations seen in the seasonal oscillations from year to year. Researchers should be very careful about trying to correlate these oscillations with external factors.

  8. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Science.gov (United States)

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  9. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  10. Translating Missions in James Worral's Game "Grand Theft Auto's Missions"

    Science.gov (United States)

    Rahmi, Zelika

    2018-01-01

    The objectives of the study was to know the difficult words encountered by the gamers and to know their strategies in translating this unknown word. The researcher used interview as the instrument to collect the material needed for this particular study. It is found that unknown word combined with certain feeling such as disappointment creates…

  11. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  12. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Science.gov (United States)

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  13. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  14. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  15. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    Science.gov (United States)

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  16. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  17. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  18. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  19. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  20. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  1. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Science.gov (United States)

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  2. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  3. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  4. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  5. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  6. Myocarditis in auto-immune or auto-inflammatory diseases.

    Science.gov (United States)

    Comarmond, Cloé; Cacoub, Patrice

    2017-08-01

    Myocarditis is a major cause of heart disease in young patients and a common precursor of heart failure due to dilated cardiomyopathy. Some auto-immune and/or auto-inflammatory diseases may be accompanied by myocarditis, such as sarcoidosis, Behçet's disease, eosinophilic granulomatosis with polyangiitis, myositis, and systemic lupus erythematosus. However, data concerning myocarditis in such auto-immune and/or auto-inflammatory diseases are sparse. New therapeutic strategies should better target the modulation of the immune system, depending on the phase of the disease and the type of underlying auto-immune and/or auto-inflammatory disease. Copyright © 2017 Elsevier B.V. All rights reserved.

  7. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  8. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  9. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  10. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  11. AutoCAD 2008 and AutoCAD LT 2008 Bible

    CERN Document Server

    Finkelstein, Ellen

    2011-01-01

    "Whether you're new to AutoCAD or a veteran, you will undoubtedly find this book to be an excellent resource."-- Abhi Singh, AutoCAD Product Manager, Autodesk, Inc.Here's the book that makes AutoCAD approachableEven the people at Autodesk look to Ellen Finkelstein for AutoCAD training, so who better to teach you about AutoCAD 2008? This comprehensive guide brings veterans up to speed on AutoCAD updates and takes novices from the basics to programming in AutoLISP(r) and VBA. Every feature is covered in a logical order, and with the Quick Start chapter, you'll be creating drawings on your very f

  12. Variabilidade da aderência e das propriedades mecânicas do concreto auto-adensável

    Directory of Open Access Journals (Sweden)

    F. M. Almeida Filho

    Full Text Available Esta pesquisa tem como objetivo estudar a variabilidade das propriedades mecânicas (resistência à compressão, módulo de elasticidade longitudinal e resistência à tração e da resistência de aderência do concreto auto-adensável (CAA, com resistência à compressão do concreto de 50 MPa aos 28 dias, variando o tamanho máximo do agregado graúdo e sua fluidez. Os ensaios foram realizados em corposde- prova de 15 x 30 cm e em vigas padronizadas de acordo com o Rilem-Ceb-Fib (1973. De acordo com os resultados obtidos, pode-se concluir que a variabilidade do concreto auto-adensável é pequena para o módulo de elasticidade e para a resistência à compressão e grande para a resistência à tração por causa do modo de ruptura do modelo. Com relação à resistência de aderência, a variabilidade foi pequena mostrando que o concreto auto-adensável é material confiável com grande potencial de utilização no mercado da construção civil.

  13. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  14. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  15. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  16. Sim-based detection tools to minimize motorcycle theft

    Science.gov (United States)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  17. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  18. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  19. AutoCAD 2014 and AutoCAD LT 2014

    CERN Document Server

    Gladfelter, Donnie

    2013-01-01

    A step-by-step tutorial introduction to AutoCAD As the only book to teach AutoCAD using a continuous tutorial which allows you to follow along sequentially or jump in at any exercise by downloading the drawing files, this Autodesk Official Press book is ideal for the AutoCAD novice. Industry expert and AutoCAD guru Donnie Gladfelter walks you through the powerful features of AutoCAD, provides you with a solid foundation of the basics, and shares the latest industry standards and techniques. The hands-on tutorial project inspired by real-world workflows that runs throughout the book

  20. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  1. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  2. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  3. Comprehensive Auto CAD

    International Nuclear Information System (INIS)

    Jang, Taekju

    1993-06-01

    This book starts introduction of conception, application system, software for CAD, function of Auto CAD, kinds and function of Auto CAD files. It deals with starting of Auto CAD, dialogue box and Auto CAD interface, utility command, 2D drawing command, check command, control system, dimension, hatching command, layer command, block, 3D drawing, plotting and printing, auto CAD and application of data, supply program of auto CAD, AME and region modeler, EDLIN, script optimization of Auto CAD and composition on demand.

  4. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  5. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  6. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  7. Se o velho é o outro, quem sou eu? A construção da auto-imagem na velhice

    Directory of Open Access Journals (Sweden)

    Ana Helena de Ávila

    2007-01-01

    Full Text Available Este estudio investigó como el viejo construye su auto-imagen a partir de la representación social de la vejez. Se realizaron siete entrevistas semi-estructuradas, con viejos de 72 a 91 años, de ambos sexos, diferentes clases sociales y diferentes grados de escolaridad, residentes en Porto Alegre y Grande Porto Alegre. Las entrevistas abordaron las siguientes áreas de interés: auto-imagen en la vejez, representaciones sociales de la vejez y vivencias personales. Los resultados indicaron que existen dos posibilidades para la construcción de esta auto-imagen y ambas están relacionadas por la representación social que el otro tiene de la vejez.

  8. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  9. New consumer load prototype for electricity theft monitoring

    International Nuclear Information System (INIS)

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  10. New consumer load prototype for electricity theft monitoring

    Science.gov (United States)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  11. AutoCAD / AutoCAD LT 2014 fundamentals metric

    CERN Document Server

    ASCENT center for technical knowledge

    2014-01-01

    The objective of AutoCAD/AutoCAD LT 2014 Fundamentals is to enable students to create a basic 2D drawing in the AutoCAD software. Even at this fundamental level, the AutoCAD software is one of the most sophisticated computer applications that you are likely to encounter. Therefore learning to use it can be challenging. To make the process easier and provide flexibility for instructors and students, the training guide is divided into two parts that can be taken independently.

  12. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  13. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  14. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  15. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  16. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  17. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    OpenAIRE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  18. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    International Nuclear Information System (INIS)

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  19. Kleptomania or common theft - diagnostic and judicial difficulties.

    Science.gov (United States)

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  20. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  1. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  2. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  3. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  4. AutoCAD 2015 and AutoCAD LT 2015 bible

    CERN Document Server

    Finkelstein, Ellen

    2014-01-01

    The perfect reference for all AutoCAD users AutoCAD 2015 and AutoCAD LT 2015 Bible is the book you want to have close at hand to answer those day-to-day questions about this industry-leading software. Author and Autodesk University instructor Ellen Finkelstein guides readers through AutoCAD 2015 and AutoCAD LT 2015 with clear, easy-to-understand instruction and hands-on tutorials that allow even total beginners to create a design on their very first day. Although simple and fundamental enough to be used by those new to CAD, the book is so comprehensive that even Autodesk power u

  5. AutoCAD 2012 and AutoCAD LT 2012 Bible

    CERN Document Server

    Finkelstein, Ellen

    2011-01-01

    The latest version of this perennial favorite, in-depth, reference-tutorial This top-selling book has been updated by AutoCAD guru and author Ellen Finkelstein to provide you with the very latest coverage of both AutoCAD 2012 and AutoCAD LT 2012. It begins with a Quick Start tutorial, so you start creating right away. From there, the book covers so much in-depth material on AutoCAD that it is said that even Autodesk employees keep this comprehensive book at their desks. A DVD is included that features before-and-after drawings of all the tutorials and plenty of great examples from AutoCAD prof

  6. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  7. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  8. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  9. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  10. AutoCAD platform customization user interface, AutoLISP, VBA, and beyond

    CERN Document Server

    Ambrosius, Lee

    2015-01-01

    Take control of AutoCAD to boost the speed, quality, and precision of your work Senior drafters and savvy users are increasingly taking AutoCAD customization out of the hands of system administrators, and taking control of their own workflow. In AutoCAD Platform Customization, Autodesk customization guru Lee Ambrosius walks you through a multitude of customization options using detailed tutorials and real-world examples applicable to AutoCAD, AutoCAD LT, Civil 3D, Plant 3D, and other programs built on the AutoCAD platform. By unleashing the full power of the software, you'll simplify and str

  11. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  12. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  13. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  14. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  15. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  16. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  17. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  18. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  19. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  20. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  1. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  2. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  3. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  4. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  5. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Science.gov (United States)

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  6. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  7. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  8. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  9. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  10. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Science.gov (United States)

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  11. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  12. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  13. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  14. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  15. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  16. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  17. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  18. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  19. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  20. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Directory of Open Access Journals (Sweden)

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  1. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  2. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  3. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  4. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  5. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  6. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  7. Auto Safety

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Auto Safety KidsHealth / For Parents / Auto Safety What's in this ... by teaching some basic rules. Importance of Child Safety Seats Using a child safety seat (car seat) ...

  8. AutoCAD 2015 and AutoCAD LT 2015 essentials

    CERN Document Server

    Onstott, Scott

    2014-01-01

    Step-by-step instructions for the AutoCAD fundamentals AutoCAD 2015 Essentials contains 400 pages of full-color, comprehensive instruction on the world's top drafting and architecture software. This 2015 edition features architectural, manufacturing, and landscape architecture examples. And like previous editions, the detailed guide introduces core concepts using interactive tutorials and open-ended projects, which can be completed in any order, thanks to downloadable data sets (an especially useful feature for students and professionals studying for Autodesk AutoCAD certification). Unlike man

  9. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  10. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  11. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  12. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  13. Program auto

    International Nuclear Information System (INIS)

    Rawool-Sullivan, M.W.; Plagnol, E.

    1990-01-01

    The program AUTO was developed to be used in the analysis of dE vs E type spectra. This program is written in FORTRAN and calculates dE vs E lines in MeV. The provision is also made in the program to convert these lines from MeV to ADC channel numbers to facilitate the comparison with the raw data from the experiments. Currently the output of this program can be plotted with the display program, called VISU, but it can also be used independent of the program VISU, with little or no modification in the actual fortran code. The program AUTO has many useful applications. In this article the program AUTO is described along with its applications

  14. Application of Auto CAD 2000

    International Nuclear Information System (INIS)

    Kim, Hyeong Jun

    1999-11-01

    This book deals with basic of AutoCAD, beginning AutoCAD 2000, using design center of AutoCAD 2000, adding drawing element with design center, drawing lines, using 2D edit command, making layer, hatching, dimensioning, entering letters on the floor plan, making 3D object, practice of 3D command, edition of 3D object, making solid, rendering object, and using internet in AutoCAD 2000. This book is introduction of AutoCAD 2000 for beginner.

  15. AutoCAD 2010 For Dummies

    CERN Document Server

    Byrnes, David

    2009-01-01

    AutoCAD is the hot computer-aided design software known for both its powerful tools and its complexity. AutoCAD 2010 for Dummies is the bestselling guide that walks you through this complicated program so you can build complex 3D technical drawings, edit like a pro, enter new dimensions, and plot with style. AutoCAD 2010 for Dummies helps you navigate the program, use the AutoCAD Design Center, create a basic layout and work with dimension, and put your drawings on the Internet. You'll soon be setting up the AutoCAD environment, using the AutoCAD Ribbon, creating annotation and dimension drawi

  16. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  17. Easy Auto CAD

    International Nuclear Information System (INIS)

    Lee, Hyeon Jun

    1996-02-01

    This book explains Auto CAD easily, which introduces improved function in Auto CAD R 13, such as direct import and export of 3 DS pile, revised render order structure, and explanations of assist, view Draw, construct and modify. Next it gives descriptions of Auto CAD conception, application and system. The last part deals with line, arc, circle, ellipse, erase, undo, redo, redraw, line type, multi line, limits, zoom, move, copy, rotate, array, mirror, grid, snap, units, offset and poly line.

  18. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  19. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  20. AutoCAD platform customization VBA

    CERN Document Server

    Ambrosius, Lee

    2015-01-01

    Boost productivity and streamline your workflow with expert AutoCAD: VBA programming instruction AutoCAD Platform Customization: VBA is the definitive guide to personalizing AutoCAD and the various programs that run on the AutoCAD platform, including AutoCAD Architecture, Civil 3D, Plant 3D, and more. Written by an Autodesk insider with years of customization and programming experience, this book features detailed discussions backed by real-world examples and easy-to-follow tutorials that illustrate each step in the personalization process. Readers gain expert guidance toward managing layout

  1. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  2. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    Science.gov (United States)

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  3. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Science.gov (United States)

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  4. AutoCAD workbook

    CERN Document Server

    Metherell, Phil

    1989-01-01

    AutoCAD Workbook helps new users learn the basics of AutoCad, providing guidance on most of the commonly used functions in which the program operates.This book discusses loading AutoCad and starting a drawing; drawing and erasing lines, circles, and arcs; and setting up the drawing environment. The topics on drawing and editing polylines; entering text and text styles; and layers, linetype, and color are also considered. This publication likewise covers creating and using blocks, hatching and extracting information, dimensioning drawings, 3D visualization, and plotting a drawing. Other

  5. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  6. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  7. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  8. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Science.gov (United States)

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  9. AutoCAD 2008 for dummies

    CERN Document Server

    Byrnes, David

    2007-01-01

    A gentle, humorous introduction to this fearsomely complex software that helps new users start creating 2D and 3D technical drawings right awayCovers the new features and enhancements in the latest AutoCAD version and provides coverage of AutoCAD LT, AutoCAD''s lower-cost siblingTopics covered include creating a basic layout, using AutoCAD DesignCenter, drawing and editing, working with dimensions, plotting, using blocks, adding text to drawings, and drawing on the InternetAutoCAD is the leading CAD software for architects, engineers, and draftspeople who need to create detailed 2D and 3D tech

  10. AutoCAD 2014 for dummies

    CERN Document Server

    Fane, Bill

    2013-01-01

    Find your way around AutoCAD 2014 with this full-color, For Dummies guide!Put away that pencil and paper and start putting the power of AutoCAD 2014 to work in your CAD projects and designs. From setting up your drawing environment to using text, dimensions, hatching, and more, this guide walks you through AutoCAD basics and provides you with a solid understanding of the latest CAD tools and techniques. You'll also benefit from the full-color illustrations that mirror exactly what you'll see on your AutoCAD 2014 screen and highlight the importance of AutoCAD's Mode

  11. AutoCAD platform customization autolisp

    CERN Document Server

    Ambrosius, Lee

    2014-01-01

    Customize and personalize programs built on the AutoCAD platform AutoLISP is the key to unlocking the secrets of a more streamlined experience using industry leading software programs like AutoCAD, Civil 3D, Plant 3D, and more. AutoCAD Platform Customization: AutoLISP provides real-world examples that show you how to do everything from modifying graphical objects and reading and setting system variables to communicating with external programs. It also features a resources appendix and downloadable datasets and customization examples-tools that ensure swift and easy adoption. Find out how to r

  12. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  13. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Directory of Open Access Journals (Sweden)

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  14. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  15. Learning Auto CAD 2004

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Gyeong Su; Song, Chun Dong; Park, Hyeong Jin; Kim, Yeong Min

    2004-02-15

    This book introduces basic knowledge of AutoCAD, practice method of command of AutoCAD like poly line, rotate, copy, break, trim, stretch, lengthen, chamfer, grips, extend, array polygon, spline, hatch, and image, writing letters, making library, application of design center and tool palette, drawing floor plan elevation, cross-sectional diagram, presentation materials, effective application of AutoCAD, and construction design using CAD POWER 2004.

  16. Learning Auto CAD 2004

    International Nuclear Information System (INIS)

    Shin, Gyeong Su; Song, Chun Dong; Park, Hyeong Jin; Kim, Yeong Min

    2004-02-01

    This book introduces basic knowledge of AutoCAD, practice method of command of AutoCAD like poly line, rotate, copy, break, trim, stretch, lengthen, chamfer, grips, extend, array polygon, spline, hatch, and image, writing letters, making library, application of design center and tool palette, drawing floor plan elevation, cross-sectional diagram, presentation materials, effective application of AutoCAD, and construction design using CAD POWER 2004.

  17. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  18. Reducing theft and embezzlement by encouraging ethical behavior.

    Science.gov (United States)

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  19. AutoCAD 2012 and AutoCAD LT 2012 No Experience Required

    CERN Document Server

    Gladfelter, Donnie

    2011-01-01

    The perfect step-by-step introduction to Autodesk's powerful architectural design software With this essential guide, you'll learn how to plan, develop, document, and present a complete AutoCAD project by building a summer cabin from start to finish. You can follow each step sequentially or jump in at any point by downloading the drawing files from the book's companion web site. You'll also master all essential AutoCAD features, get a thorough grounding in the basics, learn the very latest industry standards and techniques, and quickly become productive with AutoCAD 2012.Features concise expla

  20. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  1. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  2. The tariff for fire and theft car insurance: analysis with a Cox model

    OpenAIRE

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  3. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  4. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  5. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Science.gov (United States)

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  6. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  7. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  8. Easy Korean Auto CAD 14

    International Nuclear Information System (INIS)

    Lee, Jae Cheol

    1997-10-01

    This book introduces Auto CAD 14, which includes summary of basic things of Auto CAD 14, user interface for Auto CAD, basic drawing and advice, layer and set-up drawing, drawing with Auto CAD tools exactly, basic drawing of every thing, edit command, control of display, modeling and view ports of drawing space, various things drawing, writing letters, modification of floor plan, and check, block, X ref, lines and hatch, writing measurement, floor plan and OLE exchange of data, 3D floor plan, and rendering and presentation.

  9. Fighting the scourge of metal theft.

    Science.gov (United States)

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  10. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  11. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  12. AutoCAD 2014 essentials

    CERN Document Server

    Onstott, Scott

    2013-01-01

    Learn crucial AutoCAD tools and techniques with this Autodesk Official Press Book Quickly become productive using AutoCAD 2014 and AutoCAD LT 2014 with this full color Autodesk Official Press guide. This unique learning resource features concise, straightforward explanations and real-world, hands-on exercises and tutorials. Following a quick discussion of concepts and goals, each chapter moves on to an approachable hands-on exercise designed to reinforce real-world tactics and techniques. Compelling, full-color screenshots illustrate tutorial steps, and chapters conclude with relat

  13. AutoCAD 2015 and AutoCAD LT 2015

    CERN Document Server

    Gladfelter, Donnie

    2014-01-01

    Learn AutoCAD by example with this tutorial-based guide from Autodesk Official Press Whether you are just starting out or an experienced user wanting to brush up on your skills, this Autodesk Official Press book provides you with concise explanations, focused examples, and step-by-step instructions through a hands-on tutorial project that runs throughout the book. As you progress through the project, the book introduces you to the Microsoft Windows-based AutoCAD interface and then guides you through basic commands and creating drawings. A downloadable file is available from the website so that

  14. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  15. Auto-immune hepatitis following delivery.

    Science.gov (United States)

    Saini, Vandana; Gupta, Mamta; Mishra, S K

    2013-05-01

    Auto-immune hepatitis first presenting in the early postpartum period is rare. Immunosuppressive effects of pregnancy result in delayed manifestation of auto-immune hepatitis, and in established cases, the spontaneous improvements are there. Auto-immune hepatitis should be considered in the differential diagnosis of liver dysfunction first presenting in the early postpartum period. A case of postpartum hepatitis of auto-immune aetiology is being presented here. It is disease of unknown aetiology, characterised by inflammation of liver (as evidenced by raised serum transaminases, presence of interface hepatitis on histological examination), hypergammaglobulinaemia (> 1.5 times normal), presence of auto-antibodies [(antinuclear antibodies (ANA)], smooth muscle antibody (SMA) and antibody to liver-kidney microsome type 1 (LKM1) in the absence of viral markers ie, hepatitis B (HBsAg) and C (AntiHCV) and excellent response to corticosteroid therapy.

  16. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  17. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  18. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  19. AutoCAD

    DEFF Research Database (Denmark)

    Jensen, Henrik

    1998-01-01

    I 1998 var AutoCAD Arkitektskolens basale CAD-tilbud til de studerende. Kursets vægt ligger på konstruktion og strukturering af 3d-modeller og med udgangspunkt i dette, 2d-tegning. Kurset er opbygget over CAD Clasic skabelonen (se min forskning). Kompendiet kan bruges til selvstudium.......I 1998 var AutoCAD Arkitektskolens basale CAD-tilbud til de studerende. Kursets vægt ligger på konstruktion og strukturering af 3d-modeller og med udgangspunkt i dette, 2d-tegning. Kurset er opbygget over CAD Clasic skabelonen (se min forskning). Kompendiet kan bruges til selvstudium....

  20. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  1. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  2. Séminaire de l'enseignement technique : Forum AutoCAD 2006 et AutoCAD Mechanical 2006 - French version only

    CERN Multimedia

    Davide Vitè

    2005-01-01

    Jeudi 17 novembre 2005 de 14:30 à 16:30 - Training Centre Auditorium Forum AutoCAD 2006 et AutoCAD Mechanical 2006 CADSCHOOL, CH-1207 GENEVE, Suisse Ce nouveau séminaire de l'Enseignement technique, organisé en forme de forum et en collabora- tion avec TS-MME et notre entreprise partenaire en formation, sera consacré à la présentation de la nouvelle version d'AutoCAD, AutoCAD 2006 et AutoCAD Mechanical 2006, disponible au CERN. Au programme : Présentation d'AutoCAD Mechanical 2006 Améliorations par rapport à AutoCAD Mechanical 6 Power Pack Questions - Réponses Langue: Français. Séminaire libre, sans inscription. Organisateurs: Manfred Mayer / TS-MME / 74499 ; Davide Vitè / HR-PMD / 75141 Pour plus d'information, veuillez SVP visiter les pages des Séminaires de l'Enseignement Technique à l'adresse http://www.cern.ch/TechnicalTraining/special/TTseminars.asp . ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING technical.training@cern.ch

  3. PROBLEMA DE ALOCAÇÃO DE CONFIABILIDADE-REDUNDÂNCIA USANDO EVOLUÇÃO DIFERENCIAL AUTO-ADAPTATIVA

    OpenAIRE

    Spengler, Hellen Cristina; Loch, Gustavo Valentim

    2017-01-01

    Resumo. Esse trabalho considera a otimização não-linear inteira-mista do problema de alocação de confiabilidade-redundância, determinando simultaneamente a confiabilidade e redundância dos componentes de um sistema em série. Grande número de métodos (exatos e metaheurísticos) já abordaram esse problema, apresentando soluções satisfatórias. Nesse trabalho é utilizado um algoritmo de evolução diferencial auto-adaptativa (SaMDE) junto a um algoritmo de busca local. O exemplo numérico resolvido i...

  4. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  5. Second auto-SCT for treatment of relapsed multiple myeloma.

    Science.gov (United States)

    Gonsalves, W I; Gertz, M A; Lacy, M Q; Dispenzieri, A; Hayman, S R; Buadi, F K; Dingli, D; Hogan, W J; Kumar, S K

    2013-04-01

    High-dose therapy and auto-SCT remain integral in the initial treatment of multiple myeloma (MM), and are increasingly being applied for management of relapsed disease. We examined the outcomes in 98 patients undergoing salvage auto-SCT (auto-SCT2) for relapsed MM after receiving an initial transplant (auto-SCT1) between 1994 and 2009. The median age at auto-SCT2 was 60 years (range: 35-74). The median time between auto-SCT1 and auto-SCT2 was 46 months (range: 10-130). Treatment-related mortality was seen in 4%. The median PFS from auto-SCT2 was 10.3 (95% confidence interval (CI): 7-14) months and the median OS from auto-SCT2 was 33 months (95% CI: 28-51). In a multivariable analysis, shorter time to progression (TTP) after auto-SCT1, not achieving a CR after auto-SCT2, higher number of treatment regimens before auto-SCT2 and a higher plasma cell labeling index at auto-SCT2 predicted for shorter PFS. However, only a shorter TTP after auto-SCT1 predicted for a shorter OS post auto-SCT2. Hence, auto-SCT2 is an effective and feasible therapeutic option for MM patients relapsing after other treatments, especially in patients who had a TTP of at least 12 months after their auto-SCT1.

  6. Esma Auto ja Mazda on loodud kestma

    Index Scriptorium Estoniae

    2003-01-01

    Ülevaade olulisematest sündmustest Esma Auto kümne tegevusaasta jooksul. Kommenteerivad Tarmo Järvoja, Mart Laar ja Enn Sau. Diagrammid ja skeemid: AS Esma Auto müügi statistika läbi aastate; AS Esma Auto kasum ja klientide arv aastate lõikes; Esma Auto esindused Eestis ja pakutavad teenused

  7. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  8. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  9. Caracterisation pratique des systemes quantiques et memoires quantiques auto-correctrices 2D

    Science.gov (United States)

    Landon-Cardinal, Olivier

    approche, dite de tomographie variationnelle, propose de reconstruire l'etat en restreignant l'espace de recherche a une classe variationnelle plutot qu'a l'immense espace des etats possibles. Un etat variationnel etant decrit par un petit nombre de parametres, un petit nombre d'experiences peut suffire a identifier les parametres variationnels de l'etat experimental. Nous montrons que c'est le cas pour deux classes variationnelles tres utilisees, les etats a produits matriciels (MPS) et l'ansatz pour intrication multi-echelle (MERA). Memoires quantiques auto-correctrices 2D. Une memoire quantique auto-correctrice est un systeme physique preservant de l'information quantique durant une duree de temps macroscopique. Il serait done l'equivalent quantique d'un disque dur ou d'une memoire flash equipant les ordinateurs actuels. Disposer d'un tel dispositif serait d'un grand interet pour l'informatique quantique. Une memoire quantique auto-correctrice est initialisee en preparant un etat fondamental, c'est-a-dire un etat stationnaire de plus basse energie. Afin de stocker de l'information quantique, il faut plusieurs etats fondamentaux distincts, chacun correspondant a une valeur differente de la memoire. Plus precisement, l'espace fondamental doit etre degenere. Dans cette these, on s'interesse a des systemes de particules disposees sur un reseau bidimensionnel (2D), telles les pieces sur un echiquier, qui sont plus faciles a realiser que les systemes 3D. Nous identifions deux criteres pour l'auto-correction: - La memoire quantique doit etre stable face aux perturbations provenant de l'environnement, par exemple l'application d'un champ magnetique externe. Ceci nous amene a considerer les systemes topologiques 2D dont les degres de liberte sont intrinsequement robustes aux perturbations locales de l'environnement. - La memoire quantique doit etre robuste face a un environnement thermique. Il faut s'assurer que les excitations thermiques n'amenent pas deux etats fondamentaux

  10. Towards creating believable decoy project folders for detecting data theft

    NARCIS (Netherlands)

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  11. Transtornos mentais comuns e auto-estima na gestação: prevalência e fatores associados Common mental disorders and self-esteem in pregnancy: prevalence and associated factors

    Directory of Open Access Journals (Sweden)

    Ricardo Azevedo da Silva

    2010-09-01

    Full Text Available O objetivo do presente estudo foi verificar a prevalência de transtornos mentais comuns (TMC e sua relação com auto-estima, bem como outros fatores associados à ocorrência de TMC em gestantes. Foi realizado um estudo transversal aninhado a uma coorte no qual participaram gestantes atendidas no serviço de saúde do Sistema Único de Saúde na cidade de Pelotas, Estado do Rio Grande do Sul, Brasil. Foi utilizado para o rastreamento de transtornos mentais comuns o Self-Reporting Questionnaire (SRQ-20 e, para avalia a auto-estima, a Escala de Auto-Estima de Rosenberg. A amostra constituiu-se de 1.267 gestantes, que tinham em média 25 anos (dp = 6,53. A média de auto-estima foi de 9,3 pontos (dp = 4,76 e a prevalência de TMC em gestantes foi de 41,4%. Evidenciou-se, também, que quanto menor a auto-estima da grávida maiores são as chances de associação a TMC (p The aim of this study was to assess the prevalence of common mental disorders and the association with self-esteem and other factors in pregnant women. A nested cross-sectional study was performed in a cohort of pregnant women treated in the public health system in Pelotas, Rio Grande do Sul State, Brazil. The Self-Reporting Questionnaire (SRQ-20 was used to screen for common mental disorders and the Rosenberg's Self-Esteem Scale for self-esteem. The sample consisted of 1,267 pregnant women with a mean age of 25 years (SD = 6.53. Mean self-esteem was 9.3 points (SD = 4.76, and prevalence of common mental disorders was 41.4%. Lower self-esteem was associated with higher odds of common mental disorders (p < 0.001. There was a significant association between higher prevalence of common mental disorders and low self-esteem.

  12. Auto-fotografi som metode

    DEFF Research Database (Denmark)

    Mogensen, Mette

    2014-01-01

    Artiklen sætter fokus på auto-fotografi som metode i arbejdsmiljøforskningen. Den organisationsæstetiske tilgang, som metoden ofte forbindes med, udfordres med afsæt i en performativ og aktørnetværks-teoretisk position. Gennem en analyse af et enkelt auto-fotografi vises hvordan en artikulation af...

  13. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  14. Séminaire de l'enseignement technique : Forum AutoCAD 2006 et AutoCAD Mechanical 2006

    - French version only

    CERN Multimedia

    Davide Vitè

    2005-01-01

    Jeudi 17 novembre 2005 de 14:30 à 16:30 - Training Centre Auditorium, Bât 593 Forum AutoCAD 2006 et AutoCAD Mechanical 2006 CADSCHOOL, CH-1207 GENEVE, Suisse Ce nouveau séminaire de l'Enseignement technique, organisé en forme de forum et en collaboration avec TS-MME et notre entreprise partenaire en formation, sera consacré à la présentation de la nouvelle version d'AutoCAD, AutoCAD 2006 et AutoCAD Mechanical 2006, disponible au CERN. Au programme : Présentation d'AutoCAD Mechanical 2006 Améliorations par rapport à AutoCAD Mechanical 6 Power Pack Questions - Réponses Langue: Français. Séminaire libre, sans inscription. Organisateurs: Manfred Mayer / TS-MME / 74499 ; Davide Vitè / HR-PMD / 75141 Pour plus d'information, veuillez SVP visiter les pages des Séminaires de l'Enseignement Technique à l'adresse http://www.cern.ch/TechnicalTraining/special/TTseminars.asp . ENSEIGNEMENT TECHNIQUE TECHNICAL TRAINING technical.training@cern.ch

  15. Video Games as Mass Art

    Directory of Open Access Journals (Sweden)

    Grant Tavinor

    2011-01-01

    Full Text Available Videogames are one of the most significant developments in the mass arts of recent times. In commercial terms, they are now among the most prominent of the mass arts worldwide. This commercial and cultural success does not exhaust the interest in videogames as a mass art phenomenon because games such as Grand Theft Auto IV and Fallout 3 are structurally radically different from previous forms of mass art. In particular, the ontology of videogames, the nature and identity of their works, and how they are instanced and evaluated is a departure from the familiar mass arts of film and popular music. This paper explores these differences in an attempt to fit videogames into a theory of mass art, but also to provide guidance on the issues of criticism and evaluation that surely follow from their ontological distinctiveness.

  16. AutoCAD platform customization user interface and beyond

    CERN Document Server

    Ambrosius, Lee

    2014-01-01

    Make AutoCAD your own with powerful personalization options Options for AutoCAD customization are typically the domain of administrators, but savvy users can perform their own customizations to personalize AutoCAD. Until recently, most users never thought to customize the AutoCAD platform to meet their specific needs, instead leaving it to administrators. If you are an AutoCAD user who wants to ramp up personalization options in your favorite software, AutoCAD Platform Customization: User Interface and Beyond is the perfect resource for you. Author Lee Ambrosius is recognized as a leader in Au

  17. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  18. Comparación de la prevalencia de discapacidades basada en auto-reportes en países de América Latina

    Directory of Open Access Journals (Sweden)

    Malena Monteverde-Verdenelli

    2014-01-01

    Full Text Available En general, la medición de prevalencias de discapacidades a nivel de población o de grandes muestras se basa en auto-reportes. Resulta de interés evaluar en qué medida dichos auto-reportes permiten realizar comparaciones entre grupos de población. El objetivo del presente trabajo es medir, comparar y analizar la consistencia de las comparaciones de la prevalencia de discapacidades en actividades de la vida diaria (AVD entre poblaciones de América Latina. El análisis incluye las poblaciones de Buenos Aires, Santiago de Chile, Sao Pablo, Ciudad de México, Montevideo y La Habana. Para evaluar la consistencia de las comparaciones basadas en auto-reportes, se estiman prevalencias de discapacidades en AVD y prevalencias de enfermedades crónicas relacionadas con la discapacidad. Luego se comparan los patrones observados en países con ambas condiciones. Las poblaciones de 60 años y más de Buenos Aires y Montevideo reportan menores dificultades para la realización de AVD y menores prevalencias de condiciones crónicas discapacitantes como diabetes, enfermedades pulmonares, enfermedades cerebrovasculares y problemas cognitivos. Sin bien ello sugiere que al menos parte de las diferencias de auto-reporte de discapacidades podrían deberse a diferencias de morbilidad, no se descarta la existencia de efectos por diferencias en factores contextuales o en las propensiones a reportar discapacidades, entre otros. En este sentido, sería de utilidad llevar a cabo estudios ad- hoc que permitan medir simultáneamente diagnósticos y auto-reportes, la implementar instrumentos como viñetas e incluir información sobre factores contextuales (al menos para sub- muestras, y así poder evaluar la existencia de sesgos sistemáticos y la importancia de factores contextuales en los auto-reportes de discapacidades.

  19. Comparación de la prevalencia de discapacidades basada en auto-reportes en países de América Latina

    Directory of Open Access Journals (Sweden)

    Malena Monteverde-Verdenelli

    2016-07-01

    Full Text Available En general, la medición de prevalencias de discapacidades a nivel de población o de grandes muestras se basa en auto-reportes. Resulta de interés evaluar en qué medida dichos auto-reportes permiten realizar comparaciones entre grupos de población. El objetivo del presente trabajo es medir, comparar y analizar la consistencia de las comparaciones de la prevalencia de discapacidades en actividades de la vida diaria (AVD entre poblaciones de América Latina. El análisis incluye las poblaciones de Buenos Aires, Santiago de Chile, Sao Pablo, Ciudad de México, Montevideo y La Habana. Para evaluar la consistencia de las comparaciones basadas en auto-reportes, se estiman prevalencias de discapacidades en AVD y prevalencias de enfermedades crónicas relacionadas con la discapacidad. Luego se comparan los patrones observados en países con ambas condiciones. Las poblaciones de 60 años y más de Buenos Aires y Montevideo reportan menores dificultades para la realización de AVD y menores prevalencias de condiciones crónicas discapacitantes como diabetes, enfermedades pulmonares, enfermedades cerebrovasculares y problemas cognitivos. Sin bien ello sugiere que al menos parte de las diferencias de auto-reporte de discapacidades podrían deberse a diferencias de morbilidad, no se descarta la existencia de efectos por diferencias en factores contextuales o en las propensiones a reportar discapacidades, entre otros. En este sentido, sería de utilidad llevar a cabo estudios ad-hoc que permitan medir simultáneamente diagnósticos y auto-reportes, la implementar instrumentos como viñetas e incluir información sobre factores contextuales (al menos para sub-muestras, y así poder evaluar la existencia de sesgos sistemáticos y la importancia de factores contextuales en los auto-reportes de discapacidades.

  20. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  1. Theft detection and smart metering practices and expectations in the Netherlands

    NARCIS (Netherlands)

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  2. Assessment of Factors Related to Auto-PEEP.

    Science.gov (United States)

    Natalini, Giuseppe; Tuzzo, Daniele; Rosano, Antonio; Testa, Marco; Grazioli, Michele; Pennestrì, Vincenzo; Amodeo, Guido; Marsilia, Paolo F; Tinnirello, Andrea; Berruto, Francesco; Fiorillo, Marialinda; Filippini, Matteo; Peratoner, Alberto; Minelli, Cosetta; Bernardini, Achille

    2016-02-01

    Previous physiological studies have identified factors that are involved in auto-PEEP generation. In our study, we examined how much auto-PEEP is generated from factors that are involved in its development. One hundred eighty-six subjects undergoing controlled mechanical ventilation with persistent expiratory flow at the beginning of each inspiration were enrolled in the study. Volume-controlled continuous mandatory ventilation with PEEP of 0 cm H2O was applied while maintaining the ventilator setting as chosen by the attending physician. End-expiratory and end-inspiratory airway occlusion maneuvers were performed to calculate respiratory mechanics, and tidal flow limitation was assessed by a maneuver of manual compression of the abdomen. The variable with the strongest effect on auto-PEEP was flow limitation, which was associated with an increase of 2.4 cm H2O in auto-PEEP values. Moreover, auto-PEEP values were directly related to resistance of the respiratory system and body mass index and inversely related to expiratory time/time constant. Variables that were associated with the breathing pattern (tidal volume, frequency minute ventilation, and expiratory time) did not show any relationship with auto-PEEP values. The risk of auto-PEEP ≥5 cm H2O was increased by flow limitation (adjusted odds ratio 17; 95% CI: 6-56.2), expiratory time/time constant ratio 15 cm H2O/L s (3; 1.3-6.9), age >65 y (2.8; 1.2-6.5), and body mass index >26 kg/m(2) (2.6; 1.1-6.1). Flow limitation, expiratory time/time constant, resistance of the respiratory system, and obesity are the most important variables that affect auto-PEEP values. Frequency expiratory time, tidal volume, and minute ventilation were not independently associated with auto-PEEP. Therapeutic strategies aimed at reducing auto-PEEP and its adverse effects should be primarily oriented to the variables that mainly affect auto-PEEP values. Copyright © 2016 by Daedalus Enterprises.

  3. Copper wire theft and high voltage electrical burns

    OpenAIRE

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  4. Spot auto-focusing and spot auto-stigmation methods with high-definition auto-correlation function in high-resolution TEM.

    Science.gov (United States)

    Isakozawa, Shigeto; Fuse, Taishi; Amano, Junpei; Baba, Norio

    2018-04-01

    As alternatives to the diffractogram-based method in high-resolution transmission electron microscopy, a spot auto-focusing (AF) method and a spot auto-stigmation (AS) method are presented with a unique high-definition auto-correlation function (HD-ACF). The HD-ACF clearly resolves the ACF central peak region in small amorphous-thin-film images, reflecting the phase contrast transfer function. At a 300-k magnification for a 120-kV transmission electron microscope, the smallest areas used are 64 × 64 pixels (~3 nm2) for the AF and 256 × 256 pixels for the AS. A useful advantage of these methods is that the AF function has an allowable accuracy even for a low s/n (~1.0) image. A reference database on the defocus dependency of the HD-ACF by the pre-acquisition of through-focus amorphous-thin-film images must be prepared to use these methods. This can be very beneficial because the specimens are not limited to approximations of weak phase objects but can be extended to objects outside such approximations.

  5. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  6. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  7. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  8. RxPATROL: a Web-based tool for combating pharmacy theft.

    Science.gov (United States)

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  9. AUTO

    DEFF Research Database (Denmark)

    Gammelgaard Nielsen, Anders; Aagaard, Tine; Diaz, pauline

    2011-01-01

    AUTO is the first assignment that the students of Architecture are introduced to at the Aarhus school of Architecture. The aim is to give students an understanding of design through a generic working method. This by disassembling a car engine and staging its components through a series of castings...

  10. AutoCAD 2014 review for certification official certification preparation

    CERN Document Server

    ASCENT center for technical knowledge

    2014-01-01

    The AutoCAD® 2014 Review for Certification book is intended for users of AutoCAD® preparing to complete the AutoCAD 2014 Certified Professional exam. This book contains a collection of relevant instructional topics, practice exercises, and review questions from the Autodesk Official Training Guides (AOTG) from ASCENT - Center for Technical Knowledge pertaining specifically to the Certified Professional exam topics and objectives. This book is intended for experienced users of AutoCAD in preparation for certification. New users of AutoCAD should refer to the AOTG training guides from ASCENT, such as AutoCAD/AutoCAD LT 2014 Fundamentals, for more comprehensive instruction.

  11. Line Generalization and AutoCAD Map

    Directory of Open Access Journals (Sweden)

    Nada Vučetić

    2001-01-01

    Full Text Available The paper offers the results of original research made on the application of AutoCAD Map in line generalisation. The differences and similarities have been found out between the Douglas-Peucker method and the method of line simplification that is incorporated in AutoCAD Map. There have been also the inaccuracies found out in AutoCAD Map manual relating to the issues of buffer width and tolerance, and the line width before and after simplification. The paper gives recommendations about pseudo nodes dissolving. It has been noticed that AutoCAD Map simplification method is not independent of the order of points. The application of the method is illustrated by an example of coastal line of Istria.

  12. Projecting pipeline construction by AutoDesk Map; Projektierung von Rohrleitungsbaumassnahmen mit AutoDesk Map

    Energy Technology Data Exchange (ETDEWEB)

    Taschendorf, M.; Voigtlaender, M. [Hamburger Wasserwerke GmbH, Hamburg (Germany)

    2005-12-15

    Presented is AutoDesk Map, which enables the construction and planning of big grids for water- and gas supply. In this example industrial equipment is driven as objects in AutoDesk Map. Therefore the consistence of the data is guaranted and comprehensive CAD functions are available for industrial equipment and topologies. (GL)

  13. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  14. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  15. Copper wire theft and high voltage electrical burns.

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  16. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  17. Human neutrophils in auto-immunity.

    Science.gov (United States)

    Thieblemont, Nathalie; Wright, Helen L; Edwards, Steven W; Witko-Sarsat, Véronique

    2016-04-01

    Human neutrophils have great capacity to cause tissue damage in inflammatory diseases via their inappropriate activation to release reactive oxygen species (ROS), proteases and other tissue-damaging molecules. Furthermore, activated neutrophils can release a wide variety of cytokines and chemokines that can regulate almost every element of the immune system. In addition to these important immuno-regulatory processes, activated neutrophils can also release, expose or generate neoepitopes that have the potential to break immune tolerance and result in the generation of autoantibodies, that characterise a number of human auto-immune diseases. For example, in vasculitis, anti-neutrophil cytoplasmic antibodies (ANCA) that are directed against proteinase 3 or myeloperoxidase are neutrophil-derived autoantigens and activated neutrophils are the main effector cells of vascular damage. In other auto-immune diseases, these neutrophil-derived neoepitopes may arise from a number of processes that include release of granule enzymes and ROS, changes in the properties of components of their plasma membrane as a result of activation or apoptosis, and via the release of Neutrophil Extracellular Traps (NETs). NETs are extracellular structures that contain chromatin that is decorated with granule enzymes (including citrullinated proteins) that can act as neo-epitopes to generate auto-immunity. This review therefore describes the processes that can result in neutrophil-mediated auto-immunity, and the role of neutrophils in the molecular pathologies of auto-immune diseases such as vasculitis, rheumatoid arthritis (RA) and systemic lupus erythematosus (SLE). We discuss the potential role of NETs in these processes and some of the debate in the literature regarding the role of this phenomenon in microbial killing, cell death and auto-immunity. Copyright © 2016 Elsevier Ltd. All rights reserved.

  18. MS AutoCad

    DEFF Research Database (Denmark)

    Andersen, Michael Rye; Heinicke, Hugo

    1996-01-01

    Formålet med dette notat er at give en introduktion til tegning af et generalarrangement ved anvendelse af CAD-programmet AutoCAD. Generalarrangementets formål er at skabe en overskuelig præsentation af et skibsprojekt. Det skal gøres indenfor de rammer, som ligger til grund for praktiskprojekter......Formålet med dette notat er at give en introduktion til tegning af et generalarrangement ved anvendelse af CAD-programmet AutoCAD. Generalarrangementets formål er at skabe en overskuelig præsentation af et skibsprojekt. Det skal gøres indenfor de rammer, som ligger til grund...

  19. PERI auto-tuning

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, D H; Williams, S [Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Chame, J; Chen, C; Hall, M [USC/ISI, Marina del Rey, CA 90292 (United States); Dongarra, J; Moore, S; Seymour, K; You, H [University of Tennessee, Knoxville, TN 37996 (United States); Hollingsworth, J K; Tiwari, A [University of Maryland, College Park, MD 20742 (United States); Hovland, P; Shin, J [Argonne National Laboratory, Argonne, IL 60439 (United States)], E-mail: mhall@isi.edu

    2008-07-15

    The enormous and growing complexity of today's high-end systems has increased the already significant challenges of obtaining high performance on equally complex scientific applications. Application scientists are faced with a daunting challenge in tuning their codes to exploit performance-enhancing architectural features. The Performance Engineering Research Institute (PERI) is working toward the goal of automating portions of the performance tuning process. This paper describes PERI's overall strategy for auto-tuning tools and recent progress in both building auto-tuning tools and demonstrating their success on kernels, some taken from large-scale applications.

  20. Copper wire theft and high voltage electrical burns

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  1. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  2. Auto-Interviewing, Auto-Ethnography and Critical Incident Methodology for Eliciting a Self-Conceptualised Worldview

    Directory of Open Access Journals (Sweden)

    Béatrice Boufoy-Bastick

    2004-01-01

    Full Text Available Knowing oneself has been an age-old humanistic concern for many western and oriental philosophers. The same concern is now shared by modern psychologists and anthropologists who seek to understand the "self" and others by eluci­dating their worldviews. This paper presents an auto-anthropological methodology which can ef­fec­tively elucidate one's worldview. This intro­spective qualitative methodology uses integratively three methodological processes, namely auto-inter­viewing, auto-ethnography and critical incident technique to elicit baseline cultural data. The paper reports on how this methodology was used to elicit my current worldview. It first explains how emic data were educed and rendered in emo­tionally enhanced narratives, which were then deconstructed to elicit the major recurring themes in the etic interpretive content analysis. To illus­trate this auto-anthropological methodology, two cultural life events have been used: a critical incident in Singapore and a consciousness raising process in Fiji. The first event revealed my own education ideology while the second made me realise my mitigated support for cultural diversity. URN: urn:nbn:de:0114-fqs0401371

  3. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  4. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    OpenAIRE

    Samuel Andrew Hardy

    2015-01-01

    Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hire...

  5. 新型盗窃行为探析%An Analysis of the New types of Act of Theft

    Institute of Scientific and Technical Information of China (English)

    韩梅

    2013-01-01

    The 8th Amendment of the Criminal Law has added three new types act of theft, which makes the objective essentials of constituting crimes tend to be specific relatively. To study and discuss the new types of act of theft will be helpful for grasping the essence of theft and preventing such crimes more precisely. Indoor theft refers to an act entering relatively isolated residences of others’ living illegally to steal their properties. Theft with weapons refers to an act that the actor carrying the portable weapons banned in the country or other weapons to steal. Pick-pocketing refers to an act that the actor steals others’ properties in public places.%  《刑法修正案(八)》增加了三种新的盗窃行为类型,使盗窃罪的客观构成要件相对趋向于具体化。入户盗窃,是指非法进入他人生活的与外界相对隔离的住所窃取他人财物;携带凶器盗窃,是指行为人随身携带国家禁止个人携带的器械或其他器械进行盗窃的行为;扒窃是指行为人在公共场所盗窃别人随身的财物。对三种新类型盗窃行为方式的研究和探讨,有助于更准确地把握盗窃罪的实质和预防此类犯罪。

  6. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  7. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  8. Application of Auto CAD

    International Nuclear Information System (INIS)

    Park, Yong Un; Kim, Geun Ho

    1989-05-01

    This book has introduction to use this book and explanation of application on Auto CAD, which includes, sub directories, batch files, robot wrist, design of standard paper, title block, robort weld room, robert wrist joint, PC board, plant sym, electro, PID, machines, robots, bubbles, plant, schema, Pid, plant assembly, robots, dim plant, PL-ASSM, plotting line weight control, symbol drawing joint, Auto CAD using script file, set up of workout · MNU, workout MNU, ACAD, LSP and workout · MNU.

  9. Instant AutoIt scripting

    CERN Document Server

    Laso, Emilio Aristides de Fez

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This is a Packt Instant How-to guide, which provides concise and clear recipes for getting started with AutoIt.Instant AutoIt Scripting Essentials How-to is for beginners who wish to know more about automation and programming, system administration developers who intent to automate/manage clusters and servers, and for computer programmers who want to control any PC to create seamless automation apps.

  10. Auto concept y rasgos de personalidad: Un estudio correlacional

    Directory of Open Access Journals (Sweden)

    Débora Cecílio Fernandes

    Full Text Available Este estudio ha investigado las relaciones entre los rasgos de personalidad y auto concepto. Fueron aplicadas la Escala de Traços de Personalidade para Crianças y la Escala de Autoconceito Infanto-Juvenil en 389 niños, con edad de 8 a 10 años de escuelas públicas y particulares. Se han hallado diferencias de sexo para casi todas las medidas hechas. Para los varones, ha sido observado correlaciones positivas entre extroversión y auto conceptos escolar y familiar, neuroticismo y psicoticismo con auto conceptos personal y social, y sociabilidad con auto concepto familiar; y correlaciones negativas entre extroversión y auto concepto social, psicoticismo y auto concepto familiar, y sociabilidad y auto concepto personal. Para las niñas, fueron observadas correlaciones positivas entre el auto concepto social y psicoticismo y sociabilidad con el familiar; y correlaciones negativas entre extroversión y el social, psicoticismo y neuroticismo con el familiar. Los análisis de los grupos extremos confirmaron los datos encontrados.

  11. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  12. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  13. Software planning and analysis for automated design system AutoCAD

    OpenAIRE

    Koskutė, Lina

    2007-01-01

    AutoCAD sistemos papildymas sukurtas tam, kad būtų lengviau ir paprasčiau dirbti su AutoCAD grafine sistema. Funkcijos sukurtos naudojant AutoLisp ir VisualLISP programavimo kalbas. Sistemos papildymą galima įdiegti į bet kurią AutoCAD versiją. Sukurtas papildymas lankstus naujų funkcijų prijungimui, lengvai eksploatuojamas. Funkcijos suskirstytos į keletą grupių pagal jų formatą. AutoCAD system complement is created to make more easy working with AutoCAD graphic system. Functions are crea...

  14. Auto-recognition of surfaces and auto-generation of material removal volume for finishing process

    Science.gov (United States)

    Kataraki, Pramod S.; Salman Abu Mansor, Mohd

    2018-03-01

    Auto-recognition of a surface and auto-generation of material removal volumes for the so recognised surfaces has become a need to achieve successful downstream manufacturing activities like automated process planning and scheduling. Few researchers have contributed to generation of material removal volume for a product but resulted in material removal volume discontinuity between two adjacent material removal volumes generated from two adjacent faces that form convex geometry. The need for limitation free material removal volume generation was attempted and an algorithm that automatically recognises computer aided design (CAD) model’s surface and also auto-generate material removal volume for finishing process of the recognised surfaces was developed. The surfaces of CAD model are successfully recognised by the developed algorithm and required material removal volume is obtained. The material removal volume discontinuity limitation that occurred in fewer studies is eliminated.

  15. Genotoxic damage in auto body shop workers.

    Science.gov (United States)

    Siebel, Anna Maria; Basso da Silva, Luciano

    2010-10-01

    Some studies have shown increased DNA damage among car painters, but other professionals working in auto body and paint shops have not been extensively assessed. The aim of this study was to assess DNA damage in different types of auto body shop workers by measuring micronucleus (MN) levels in exfoliated buccal cells. The mean number of cells with MN per 2000 exfoliated buccal cells was analyzed in three groups of male workers: auto body repair technicians, painters, and office workers (control group). All participants answered a questionnaire inquiring about age, smoking habits, alcohol consumption, work practices, occupational exposure time, job activities, and use of protective equipment. The mean number of cells with MN was 3.50 ± 1.50 in auto body painters, 3.91 ± 2.10 in auto body repair technicians, and 0.80 ± 0.78 in office workers, with a significant difference between the control group and the two other groups (p = 0.0001). Age, occupational exposure time, use of protective masks, alcohol consumption, and smoking habit did not affect MN results. The findings indicate that technicians and painters working in auto body shops are at risk for genotoxic damage, while office workers seem to be protected.

  16. Presença de auto-anticorpos não-tireóide-específicos no soro de pacientes com hipotireoidismo auto-imune

    OpenAIRE

    Soares Débora Vieira; Vanderborght Bart O. M.; Vaisman Mário

    2003-01-01

    Auto-anticorpos contra componentes não-específicos da tireóide foram encontrados no soro de pacientes com doença auto-imune da tireóide. Neste estudo avaliamos a presença de auto-anticorpos antinucleares (ANA), antimúsculo liso (anti-ML) e antimitocôndria (anti-Mc) no soro de pacientes com hipotireoidismo auto-imune (HA), comparando-os a controles saudáveis. Estudamos 70 pacientes com hipotireoidismo auto-imune (tireoidite de Hashimoto ou tireoidite atrófica ) e 70 controles saudáveis (sem di...

  17. Female Infertility and Serum Auto-antibodies: a Systematic Review.

    Science.gov (United States)

    Deroux, Alban; Dumestre-Perard, Chantal; Dunand-Faure, Camille; Bouillet, Laurence; Hoffmann, Pascale

    2017-08-01

    On average, 10 % of infertile couples have unexplained infertility. Auto-immune disease (systemic lupus erythematosus, anti-phospholipid syndrome) accounts for a part of these cases. In the last 20 years, aspecific auto-immunity, defined as positivity of auto-antibodies in blood sample without clinical or biological criteria for defined diseases, has been evoked in a subpopulation of infertile women. A systematic review was performed (PUBMED) using the MESH search terms "infertility" and "auto-immunity" or "reproductive technique" or "assisted reproduction" or "in vitro fertilization" and "auto-immunity." We retained clinical and physiopathological studies that were applicable to the clinician in assuming joint management of both infertility associated with serum auto-antibodies in women. Thyroid auto-immunity which affects thyroid function could be a cause of infertility; even in euthyroidia, the presence of anti-thyroperoxydase antibodies and/or thyroglobulin are related to infertility. The presence of anti-phospholipid (APL) and/or anti-nuclear (ANA) antibodies seems to be more frequent in the population of infertile women; serum auto-antibodies are associated with early ovarian failure, itself responsible for fertility disorders. However, there exist few publications on this topic. The methods of dosage, as well as the clinical criteria of unexplained infertility deserve to be standardized to allow a precise response to the question of the role of serum auto-antibodies in these women. The direct pathogenesis of this auto-immunity is unknown, but therapeutic immunomodulators, prescribed on a case-by-case basis, could favor pregnancy even in cases of unexplained primary or secondary infertility.

  18. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  19. Economic evaluation of epinephrine auto-injectors for peanut allergy.

    Science.gov (United States)

    Shaker, Marcus; Bean, Katherine; Verdi, Marylee

    2017-08-01

    Three commercial epinephrine auto-injectors were available in the United States in the summer of 2016: EpiPen, Adrenaclick, and epinephrine injection, USP auto-injector. To describe the variation in pharmacy costs among epinephrine auto-injector devices in New England and evaluate the additional expense associated with incremental auto-injector costs. Decision analysis software was used to evaluate costs of the most and least expensive epinephrine auto-injector devices for children with peanut allergy. To evaluate regional variation in epinephrine auto-injector costs, a random sample of New England national and corporate pharmacies was compared with a convenience sample of pharmacies from 10 Canadian provinces. Assuming prescriptions written for 2 double epinephrine packs each year (home and school), the mean costs of food allergy over the 20-year model horizon totaled $58,667 (95% confidence interval [CI] $57,745-$59,588) when EpiPen was prescribed and $45,588 (95% CI $44,873-$46,304) when epinephrine injection, USP auto-injector was prescribed. No effectiveness differences were evident between groups, with 17.19 (95% CI 17.11-17.27) quality-adjusted life years accruing for each subject. The incremental cost per episode of anaphylaxis treated with epinephrine over the model horizon was $12,576 for EpiPen vs epinephrine injection, USP auto-injector. EpiPen costs were lowest at Canadian pharmacies ($96, 95% CI $85-$107). There was price consistency between corporate and independent pharmacies throughout New England by device brand, with the epinephrine injection, USP auto-injector being the most affordable device. Cost differences among epinephrine auto-injectors were significant. More expensive auto-injector brands did not appear to provide incremental benefit. Copyright © 2017 American College of Allergy, Asthma & Immunology. Published by Elsevier Inc. All rights reserved.

  20. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  1. Auto-immune Haemolytic Anaemia and Paroxys

    African Journals Online (AJOL)

    who presented with an acute auto-immune haemolytic anaemia. In addition to a persistently positive Coombs test, with specific red cell auto-antibodies, the acidified serum test and the sucrose haemolysis test were repeatedly positive. CASE REPORT. A 24-year-old Indian woman was admitted to hospital in. July 1969.

  2. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  3. [Clinical overview of auto-inflammatory diseases].

    Science.gov (United States)

    Georgin-Lavialle, S; Rodrigues, F; Hentgen, V; Fayand, A; Quartier, P; Bader-Meunier, B; Bachmeyer, C; Savey, L; Louvrier, C; Sarrabay, G; Melki, I; Belot, A; Koné-Paut, I; Grateau, G

    2018-04-01

    Monogenic auto-inflammatory diseases are characterized by genetic abnormalities coding for proteins involved in innate immunity. They were initially described in mirror with auto-immune diseases because of the absence of circulating autoantibodies. Their main feature is the presence of peripheral blood inflammation in crisis without infection. The best-known auto-inflammatory diseases are mediated by interleukines that consisted in the 4 following diseases familial Mediterranean fever, cryopyrinopathies, TNFRSF1A-related intermittent fever, and mevalonate kinase deficiency. Since 10 years, many other diseases have been discovered, especially thanks to the progress in genetics. In this review, we propose the actual panorama of the main known auto-inflammatory diseases. Some of them are recurrent fevers with crisis and remission; some others evaluate more chronically; some are associated with immunodeficiency. From a physiopathological point of view, we can separate diseases mediated by interleukine-1 and diseases mediated by interferon. Then some polygenic inflammatory diseases will be shortly described: Still disease, Schnitzler syndrome, aseptic abscesses syndrome. The diagnosis of auto-inflammatory disease is largely based on anamnesis, the presence of peripheral inflammation during attacks and genetic analysis, which are more and more performant. Copyright © 2018 Société Nationale Française de Médecine Interne (SNFMI). Published by Elsevier SAS. All rights reserved.

  4. Auto-regenerative thermoluminescence dating using zircon inclusions

    International Nuclear Information System (INIS)

    Templer, R.H.

    1993-01-01

    Fired ceramics containing zircon inclusions have been dated by allowing the zircons to regenerate their own thermoluminescence (TL) signal, hence auto-regenerative TL dating. The technique is conceptually straightforward. One first measures the TL accrued since the last heating of the material. The zircon grains are then stored for six months and the TL signal regenerated through self-irradiation is measured. Since the internal dose-rate for zircon is dominated by the internal component the age of the sample is simply given by the ratio of the natural to auto-regenerated signal times the laboratory storage period. The technique, however, requires the measurement of a very small auto-regenerated signal, which introduces a number of experimental and physical complications. The methods for overcoming these problems and successfully dating zircons by auto-regeneration are described. (Author)

  5. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  6. Efficiency calibration of solid track spark auto counter

    International Nuclear Information System (INIS)

    Wang Mei; Wen Zhongwei; Lin Jufang; Liu Rong; Jiang Li; Lu Xinxin; Zhu Tonghua

    2008-01-01

    The factors influencing detection efficiency of solid track spark auto counter were analyzed, and the best etch condition and parameters of charge were also reconfirmed. With small plate fission ionization chamber, the efficiency of solid track spark auto counter at various experiment assemblies was re-calibrated. The efficiency of solid track spark auto counter at various experimental conditions was obtained. (authors)

  7. Low auto-fluorescence fabrication methods for plastic nanoslits.

    Science.gov (United States)

    Yin, Zhifu; Qi, Liping; Zou, Helin; Sun, Lei; Xu, Shenbo

    2016-04-01

    Plastic nanofluidic devices are becoming increasingly important for biological and chemical applications. However, they suffer from high auto-fluorescence when used for on-chip optical detection. In this study, the auto-fluorescence problem of plastic nanofluidic devices was remedied by newly developed fabrication methods that minimise their auto-fluorescence: one by depositing a gold (Au) layer on them, the other by making them ultra-thin. In the first method, the Au layer [minimum thickness is 40 nm on 150 μm SU-8, 50 nm on 1 mm polyethylene terephthalate (PET), and 40 on 2 nm polymethyl methacrylate (PMMA)] blocks the auto-fluorescence of the polymer; in the second method, auto-fluorescence is minimised by making the chips ultra-thin, selected operating thickness of SU-8 is 20 μm, for PET it is 150 μm, and for PMMA it is 0.8 mm.

  8. Rational Thoughts on the Development of Chinese Auto Industry

    Institute of Scientific and Technical Information of China (English)

    Shao Qihui

    2004-01-01

    @@ In order to keep the steady, fast and sustainable development of auto industry, we should have an overall knowledge of the history and current situation of the world auto industry, and have a correct strategic planning and scientific measures towards the Chinese auto industry.

  9. The problem of theft depravity in traditional Russian culture(middle of the 19th - beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Т В Лис

    2008-06-01

    Full Text Available This article touches upon the problem of perceiving and comprehending the theft within its interrelationship with the concept of sin, which is in its turn considered to be one of the most important notions of the Christian ethics. Considering this very aspect theft studies make it easy to pinpoint certain peculiarities of the traditional sense of justice and national morality. In terms of temporal perspective the idea of sin correlates with an image of theft victim. Then the larceny turns into a certain visitation for the recently committed offence or crime. Thus, we can draw up a certain cause-and-effect line: any crime or offence entails punishment, which is actually a crime aimed at somebody, who has committed the crime first. In this case we can talk about the synonymy of crime and punishment as well as about the cumulation of sin.

  10. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  11. A case study from Turkey: Turkish auto-gas market towards sustainability

    International Nuclear Information System (INIS)

    Mme Kaya

    2008-01-01

    Turkish auto-gas market grew uncontrollably trough its initial years, leading to auto-gas product, retrofit cars, auto-gas filing stations and conversion shops in compliance with standards. Moreover, standards were not even adequate for a healthy market. Auto-gas accidents occurred due to mis-applications. Consequently, real benefits of auto-gas could not come into the picture, and general public as well as auto-gas customers came to perceive auto-gas as an inferior, unsafe and low-performance fuel. Today's market is really different than the markets in its initial years and it has covered a long way towards sustainability. To exemplify, the standards and inspections are well established and more strict than before. The image of auto-gas has improved considerably and now customers know that auto-gas is not only economic but also environment-friendly safe and good performance. The critical factor, bringing the market into sustainability and healthiness, are the developments in 4 crucial areas, namely, the government, LPG distribution companies, OEMs and auto-gas conversion firms and lastly, customers. Another important key success factor is cooperation between these 4 forces. The presentation will mainly focus on developments in these areas. (author)

  12. Automatic detection of AutoPEEP during controlled mechanical ventilation

    Directory of Open Access Journals (Sweden)

    Nguyen Quang-Thang

    2012-06-01

    Full Text Available Abstract Background Dynamic hyperinflation, hereafter called AutoPEEP (auto-positive end expiratory pressure with some slight language abuse, is a frequent deleterious phenomenon in patients undergoing mechanical ventilation. Although not readily quantifiable, AutoPEEP can be recognized on the expiratory portion of the flow waveform. If expiratory flow does not return to zero before the next inspiration, AutoPEEP is present. This simple detection however requires the eye of an expert clinician at the patient’s bedside. An automatic detection of AutoPEEP should be helpful to optimize care. Methods In this paper, a platform for automatic detection of AutoPEEP based on the flow signal available on most of recent mechanical ventilators is introduced. The detection algorithms are developed on the basis of robust non-parametric hypothesis testings that require no prior information on the signal distribution. In particular, two detectors are proposed: one is based on SNT (Signal Norm Testing and the other is an extension of SNT in the sequential framework. The performance assessment was carried out on a respiratory system analog and ex-vivo on various retrospectively acquired patient curves. Results The experiment results have shown that the proposed algorithm provides relevant AutoPEEP detection on both simulated and real data. The analysis of clinical data has shown that the proposed detectors can be used to automatically detect AutoPEEP with an accuracy of 93% and a recall (sensitivity of 90%. Conclusions The proposed platform provides an automatic early detection of AutoPEEP. Such functionality can be integrated in the currently used mechanical ventilator for continuous monitoring of the patient-ventilator interface and, therefore, alleviate the clinician task.

  13. Research on data auto-analysis algorithms in the explosive detection system

    International Nuclear Information System (INIS)

    Wang Haidong; Li Yuanjing; Yang Yigang; Li Tiezhu; Chen Boxian; Cheng Jianping

    2006-01-01

    This paper mainly describe some auto-analysis algorithms in explosive detection system with TNA method. These include the auto-calibration algorithm when disturbed by other factors, MCA auto-calibration algorithm with calibrated spectrum, the auto-fitting and integral of hydrogen and nitrogen elements data. With these numerical algorithms, the authors can automatically and precisely analysis the gamma-spectra and ultimately achieve the explosive auto-detection. (authors)

  14. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  15. Development of ATSR (Auto Thermal Steam Reformer)

    International Nuclear Information System (INIS)

    Ono, J.; Yoshino, Y.; Kuwabara, T.; Fujisima, S.; Kobayashi, S.; Maruko, S.

    2004-01-01

    'Full text:' Auto-thermal reformers are used popularly for fuel cell vehicle because they are compact and can start up quickly. On the other hand, steam reformers are used for stationary fuel cell power plant because they are good thermal efficiency. While, there are many cases using the auto- thermal reformer for stationary use with expectation of cost reduction in USA, as well. However, they are still insufficient for its durability, compactness and cost. We have been developing the new type of fuel processing system that is auto-thermal steam reformer (ATSR), which is hybrid of a conventional steam reformer (STR) and a conventional auto-thermal reformer (ATR). In this study, some proto-type of ATSR for field test were designed, tried manufacturing and tested performance and durability. And we have tried to operate with fuel cell stack to evaluate the system interface performance, that is, operability and controllability. (author)

  16. Grand-scale theft: kleptoplasty in parasitic plants?

    Science.gov (United States)

    Krause, Kirsten

    2015-04-01

    The angiosperm Rafflesia lives as an obligate holoparasite in intimate contact with its hosts, vines in the genus Tetrastigma. The hosts are forced to supply the parasite with all the necessary nutrients. Novel data tentatively suggest that the thievery may happen on a larger scale and include entire organellar genomes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    National Research Council Canada - National Science Library

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  18. AutoCAD-To-NASTRAN Translator Program

    Science.gov (United States)

    Jones, A.

    1989-01-01

    Program facilitates creation of finite-element mathematical models from geometric entities. AutoCAD to NASTRAN translator (ACTON) computer program developed to facilitate quick generation of small finite-element mathematical models for use with NASTRAN finite-element modeling program. Reads geometric data of drawing from Data Exchange File (DXF) used in AutoCAD and other PC-based drafting programs. Written in Microsoft Quick-Basic (Version 2.0).

  19. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  20. 46 CFR 78.19-1 - Use of auto pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Use of auto pilot. 78.19-1 Section 78.19-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PASSENGER VESSELS OPERATIONS Auto Pilot § 78.19-1 Use of auto pilot. Except as provided in 33 CFR 164.15, when the automatic pilot is used in— (a...

  1. 46 CFR 97.16-1 - Use of auto pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto pilot. 97.16-1 Section 97.16-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CARGO AND MISCELLANEOUS VESSELS OPERATIONS Auto Pilot § 97.16-1 Use of auto pilot. Except as provided in 33 CFR 164.15, when the automatic pilot is used...

  2. [Stress and auto-immunity].

    Science.gov (United States)

    Delévaux, I; Chamoux, A; Aumaître, O

    2013-08-01

    The etiology of auto-immune disorders is multifactorial. Stress is probably a participating factor. Indeed, a high proportion of patients with auto-immune diseases report uncommon stress before disease onset or disease flare. The biological consequences of stress are increasingly well understood. Glucocorticoids and catecholamines released by hypothalamic-pituitary-adrenal axis during stress will alter the balance Th1/Th2 and the balance Th17/Treg. Stress impairs cellular immunity, decreases immune tolerance and stimulates humoral immunity exposing individuals to autoimmune disease among others. The treatment for autoimmune disease should include stress management. Copyright © 2012 Société nationale française de médecine interne (SNFMI). Published by Elsevier SAS. All rights reserved.

  3. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    Science.gov (United States)

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  4. AUTO-EXPANSIVE FLOW

    Science.gov (United States)

    Physics suggests that the interplay of momentum, continuity, and geometry in outward radial flow must produce density and concomitant pressure reductions. In other words, this flow is intrinsically auto-expansive. It has been proposed that this process is the key to understanding...

  5. The Status and Trend of Chinese Auto EC

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    <正> As a new information industry, E-commerce is becoming a new growth point of economy, and changing the development of traditional industries such as the auto industry. E-commerce would ultimately bring it profound changes. Therefore, many countries are employing E-commerce to impel the development of the auto industry rapidly. As the final large market, China has to keep up with the trend of global auto development. If we did not explore and establish E-commerce actively, with WTO coming, we

  6. Theory and practice of Auto CAD, computer graphics

    International Nuclear Information System (INIS)

    Hwang, Si Won; Choe, Hong Yeong; Shin, Jae Yeon; Lee, Ryong Cheol

    1990-08-01

    This book describes theory and practice of Auto CAD, computer graphics, which deals with peripheral of computer, occurrence of digital line by DDA, BRM, theory of conversion, data base and display and shape modeling. This book gives descriptions of outline of CAD system, Auto CAD, basic function practice, simple figure practice, the third angle projection drawing a little complex single object, machine drawing I, function practice of improved Auto CAD, edit, set up layer, and 3D, and 3D display function.

  7. Auto-focusing accelerating hyper-geometric laser beams

    International Nuclear Information System (INIS)

    Kovalev, A A; Kotlyar, V V; Porfirev, A P

    2016-01-01

    We derive a new solution to the paraxial wave equation that defines a two-parameter family of three-dimensional structurally stable vortex annular auto-focusing hyper-geometric (AH) beams, with their complex amplitude expressed via a degenerate hyper-geometric function. The AH beams are found to carry an orbital angular momentum and be auto-focusing, propagating on an accelerating path toward a focus, where the annular intensity pattern is ‘sharply’ reduced in diameter. An explicit expression for the complex amplitude of vortex annular auto-focusing hyper-geometric-Gaussian beams is derived. The experiment has been shown to be in good agreement with theory. (paper)

  8. Computing Mass Properties From AutoCAD

    Science.gov (United States)

    Jones, A.

    1990-01-01

    Mass properties of structures computed from data in drawings. AutoCAD to Mass Properties (ACTOMP) computer program developed to facilitate quick calculations of mass properties of structures containing many simple elements in such complex configurations as trusses or sheet-metal containers. Mathematically modeled in AutoCAD or compatible computer-aided design (CAD) system in minutes by use of three-dimensional elements. Written in Microsoft Quick-Basic (Version 2.0).

  9. Double-lumen tubes and auto-PEEP during one-lung ventilation.

    Science.gov (United States)

    Spaeth, J; Ott, M; Karzai, W; Grimm, A; Wirth, S; Schumann, S; Loop, T

    2016-01-01

    Double-lumen tubes (DLT) are routinely used to enable one-lung-ventilation (OLV) during thoracic anaesthesia. The flow-dependent resistance of the DLT's bronchial limb may be high as a result of its narrow inner diameter and length, and thus potentially contribute to an unintended increase in positive end-expiratory pressure (auto-PEEP). We therefore studied the impact of adult sized DLTs on the dynamic auto-PEEP during OLV. In this prospective clinical study, dynamic auto-PEEP was determined in 72 patients undergoing thoracic surgery, with right- and left-sided DLTs of various sizes. During OLV, air trapping was provoked by increasing inspiration to expiration ratio from 1:2 to 2:1 (five steps). Based on measured flow rate, airway pressure (Paw) and bronchial pressure (Pbronch), the pressure gradient across the DLT (ΔPDLT) and the total auto-PEEP in the respiratory system (i.e. the lungs, the DLT and the ventilator circuit) were determined. Subsequently the DLT's share in total auto-PEEP was calculated. ΔPDLT was 2.3 (0.7) cm H2O over the entire breathing cycle. At the shortest expiratory time the mean total auto-PEEP was 2.9 (1.5) cm H2O (range 0-5.9 cm H2O). The DLT caused 27 to 31% of the total auto-PEEP. Size and side of the DLT's bronchial limb did not impact auto-PEEP significantly. Although the DLT contributes to the overall auto-PEEP, its contribution is small and independent of size and side of the DLT's bronchial limb. The choice of DLT does not influence the risk of auto-PEEP during OLV to a clinically relevant extent. DRKS00005648. © The Author 2015. Published by Oxford University Press on behalf of the British Journal of Anaesthesia. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  10. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  11. 47 CFR 80.307 - Compulsory use of radiotelegraph auto alarm.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Compulsory use of radiotelegraph auto alarm. 80.307 Section 80.307 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL... Safety Watches § 80.307 Compulsory use of radiotelegraph auto alarm. The radiotelegraph auto alarm...

  12. Auto MOC-A 2D neutron transport code for arbitrary geometry based on the method of characteristics and customization of AutoCAD

    International Nuclear Information System (INIS)

    Chen Qichang; Wu Hongchun; Cao Liangzhi

    2008-01-01

    A new 2D neutron transport code AutoMOC for arbitrary geometry has been developed. This code is based on the method of characteristics (MOCs) and the customization of AutoCAD. The MOC solves the neutron transport equation along characteristic lines. It is independent of the geometric shape of boundaries and regions. So theoretically, this method can be used to solve the neutron transport equation in highly complex geometries. However, it is important to describe the geometry and calculate intersection points of each characteristic line with every boundary and region in advance. In complex geometries, due to the complications of treating the arbitrary domain, the selection of geometric shapes and efficiency of ray tracing are generally limited. The geometry treatment through the customization of AutoCAD, a widely used computer-aided design software package, is given in this paper. Thanks to the powerful capability of AutoCAD, the description of arbitrary geometry becomes quite convenient. Moreover, with the language Visual Basic for Applications (VBAs), AutoCAD can be customized to carry out the ray tracing procedure with a high flexibility in geometry. The numerical results show that AutoMOC can solve 2D neutron transport problems in a complex geometry accurately and effectively

  13. Auto MOC-A 2D neutron transport code for arbitrary geometry based on the method of characteristics and customization of AutoCAD

    Energy Technology Data Exchange (ETDEWEB)

    Chen Qichang; Wu Hongchun [School of Nuclear Science and Technology, Xi' an Jiaotong University, Xi' an Shaanxi 710049 (China); Cao Liangzhi [School of Nuclear Science and Technology, Xi' an Jiaotong University, Xi' an Shaanxi 710049 (China)], E-mail: caolz@mail.xjtu.edu.cn

    2008-10-15

    A new 2D neutron transport code AutoMOC for arbitrary geometry has been developed. This code is based on the method of characteristics (MOCs) and the customization of AutoCAD. The MOC solves the neutron transport equation along characteristic lines. It is independent of the geometric shape of boundaries and regions. So theoretically, this method can be used to solve the neutron transport equation in highly complex geometries. However, it is important to describe the geometry and calculate intersection points of each characteristic line with every boundary and region in advance. In complex geometries, due to the complications of treating the arbitrary domain, the selection of geometric shapes and efficiency of ray tracing are generally limited. The geometry treatment through the customization of AutoCAD, a widely used computer-aided design software package, is given in this paper. Thanks to the powerful capability of AutoCAD, the description of arbitrary geometry becomes quite convenient. Moreover, with the language Visual Basic for Applications (VBAs), AutoCAD can be customized to carry out the ray tracing procedure with a high flexibility in geometry. The numerical results show that AutoMOC can solve 2D neutron transport problems in a complex geometry accurately and effectively.

  14. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    OpenAIRE

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  15. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  16. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  17. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  18. [Auto-immune disorders as a possible cause of neuropsychiatric syndromes].

    Science.gov (United States)

    Martinez-Martinez, P; Molenaar, P C; Losen, M; Hoffmann, C; Stevens, J; de Witte, L D; van Amelsvoort, T; van Os, J; Rutten, B P F

    2015-01-01

    Changes that occur in the behaviour of voltage-gated ion channels and ligand-gated receptor channels due to gene mutations or auto-immune attack are the cause of channelopathies in the central and peripheral nervous system. Although the relation between molecular channel defects and clinical symptoms has been explained in the case of many neuromuscular channelopathies, the pathophysiology of auto-immunity in neuropsychiatric syndromes is still unclear. To review recent findings regarding neuronal auto-immune reactions in severe neuropsychiatric syndromes. Using PubMed, we consulted the literature published between 1990 and August 2014 relating to the occurrence of auto-immune antibodies in severe and persistent neuropsychiatric syndromes. Auto-antibodies have only limited access to the central nervous system, but if they do enter the system they can, in some cases, cause disease. We discuss recent findings regarding the occurrence of auto-antibodies against ligand-activated receptor channels and potassium channels in neuropsychiatric and neurological syndromes, including schizophrenia and limbic encephalitis. Although the occurrence of several auto-antibodies in schizophrenia has been confirmed, there is still no proof of a causal relationship in the syndrome. We still have no evidence of the prevalence of auto-immunity in neuropsychiatric syndromes. The discovery that an antibody against an ion channel is associated with some neuropsychiatric disorders may mean that in future it will be possible to treat patients by means of immunosuppression, which could lead to an improvement in a patient's cognitive abilities.

  19. Multilevel Parallelization of AutoDock 4.2

    Directory of Open Access Journals (Sweden)

    Norgan Andrew P

    2011-04-01

    Full Text Available Abstract Background Virtual (computational screening is an increasingly important tool for drug discovery. AutoDock is a popular open-source application for performing molecular docking, the prediction of ligand-receptor interactions. AutoDock is a serial application, though several previous efforts have parallelized various aspects of the program. In this paper, we report on a multi-level parallelization of AutoDock 4.2 (mpAD4. Results Using MPI and OpenMP, AutoDock 4.2 was parallelized for use on MPI-enabled systems and to multithread the execution of individual docking jobs. In addition, code was implemented to reduce input/output (I/O traffic by reusing grid maps at each node from docking to docking. Performance of mpAD4 was examined on two multiprocessor computers. Conclusions Using MPI with OpenMP multithreading, mpAD4 scales with near linearity on the multiprocessor systems tested. In situations where I/O is limiting, reuse of grid maps reduces both system I/O and overall screening time. Multithreading of AutoDock's Lamarkian Genetic Algorithm with OpenMP increases the speed of execution of individual docking jobs, and when combined with MPI parallelization can significantly reduce the execution time of virtual screens. This work is significant in that mpAD4 speeds the execution of certain molecular docking workloads and allows the user to optimize the degree of system-level (MPI and node-level (OpenMP parallelization to best fit both workloads and computational resources.

  20. Multilevel Parallelization of AutoDock 4.2.

    Science.gov (United States)

    Norgan, Andrew P; Coffman, Paul K; Kocher, Jean-Pierre A; Katzmann, David J; Sosa, Carlos P

    2011-04-28

    Virtual (computational) screening is an increasingly important tool for drug discovery. AutoDock is a popular open-source application for performing molecular docking, the prediction of ligand-receptor interactions. AutoDock is a serial application, though several previous efforts have parallelized various aspects of the program. In this paper, we report on a multi-level parallelization of AutoDock 4.2 (mpAD4). Using MPI and OpenMP, AutoDock 4.2 was parallelized for use on MPI-enabled systems and to multithread the execution of individual docking jobs. In addition, code was implemented to reduce input/output (I/O) traffic by reusing grid maps at each node from docking to docking. Performance of mpAD4 was examined on two multiprocessor computers. Using MPI with OpenMP multithreading, mpAD4 scales with near linearity on the multiprocessor systems tested. In situations where I/O is limiting, reuse of grid maps reduces both system I/O and overall screening time. Multithreading of AutoDock's Lamarkian Genetic Algorithm with OpenMP increases the speed of execution of individual docking jobs, and when combined with MPI parallelization can significantly reduce the execution time of virtual screens. This work is significant in that mpAD4 speeds the execution of certain molecular docking workloads and allows the user to optimize the degree of system-level (MPI) and node-level (OpenMP) parallelization to best fit both workloads and computational resources.

  1. [Oral diseases in auto-immune polyendocrine syndrome type 1].

    Science.gov (United States)

    Proust-Lemoine, Emmanuelle; Guyot, Sylvie

    2017-09-01

    Auto-immune polyendocrine syndrome type 1 (APS1) also called Auto-immune Polyendocrinopathy Candidiasis Ectodermal Dystrophy (APECED) is a rare monogenic childhood-onset auto-immune disease. This autosomal recessive disorder is caused by mutations in the auto-immune regulator (AIRE) gene, and leads to autoimmunity targeting peripheral tissues. There is a wide variability in clinical phenotypes in patients with APSI, with auto-immune endocrine and non-endocrine disorders, and chronic mucocutaneous candidiasis. These patients suffer from oral diseases such as dental enamel hypoplasia and candidiasis. Both are frequently described, and in recent series, enamel hypoplasia and candidiasis are even the most frequent components of APS1 together with hypoparathyroidism. Both often occur during childhood (before 5 years old for canrdidiasis, and before 15 years old for enamel hypoplasia). Oral candidiasis is recurrent all life long, could become resistant to azole antifungal after years of treatment, and be carcinogenic, leading to severe oral squamous cell carcinoma. Oral components of APS1 should be diagnosed and rigorously treated. Dental enamel hypoplasia and/or recurrent oral candidiasis in association with auto-immune diseases in a young child should prompt APS1 diagnosis. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  2. Tagaotsitav "Auto" / Kristiina Vaarik

    Index Scriptorium Estoniae

    Vaarik, Kristiina

    2001-01-01

    Chris O'Connelli "Auto" Vanemuises, lavastaja Mark Babych. Etendusele tegid muusika ansamblist Bizarre tuntud muusikud Tristan Priimägi ja Lauri Liivak, kes artiklis sellest räägivad. Esietendus 2. detsembril 2000

  3. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Science.gov (United States)

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  4. Development of simulation technology on full auto air conditioning system; Auto eakon no simulation gijutsu no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Fujita, N; Otsubo, Y; Matsumura, K; Sako, H [Mazda Motor Corp., Hiroshima (Japan)

    1997-10-01

    Mazda has developed simulation technology on control of full auto air conditioning system. We have developed the development tool based on the technology, aiming at higher controllability of full auto air conditioning system and shorter development period. The tool performs simulation on control, on-vehicle evaluation of actual load operation, collecting data and analyzing them by personal computer. This paper reports our verification results on effectiveness of the technology/ and the tool. 4 refs., 9 figs.

  5. Intrinsic Tau Acetylation Is Coupled to Auto-Proteolytic Tau Fragmentation.

    Directory of Open Access Journals (Sweden)

    Todd J Cohen

    Full Text Available Tau proteins are abnormally aggregated in a range of neurodegenerative tauopathies including Alzheimer's disease (AD. Recently, tau has emerged as an extensively post-translationally modified protein, among which lysine acetylation is critical for normal tau function and its pathological aggregation. Here, we demonstrate that tau isoforms have different propensities to undergo lysine acetylation, with auto-acetylation occurring more prominently within the lysine-rich microtubule-binding repeats. Unexpectedly, we identified a unique intrinsic property of tau in which auto-acetylation induces proteolytic tau cleavage, thereby generating distinct N- and C-terminal tau fragments. Supporting a catalytic reaction-based mechanism, mapping and mutagenesis studies showed that tau cysteines, which are required for acetyl group transfer, are also essential for auto-proteolytic tau processing. Further mass spectrometry analysis identified the C-terminal 2nd and 4th microtubule binding repeats as potential sites of auto-cleavage. The identification of acetylation-mediated auto-proteolysis provides a new biochemical mechanism for tau self-regulation and warrants further investigation into whether auto-catalytic functions of tau are implicated in AD and other tauopathies.

  6. O impacte da inteligência emocional no desempenho de colaboradores : análise de um caso numa grande instituição financeira em Portugal

    OpenAIRE

    Silva, Francisco Manuel dos Reis Luiz de Oliveira da

    2012-01-01

    Mestrado em Gestão Empresarial Terá a inteligência emocional (IE) um papel relevante no desempenho comercial dos gestores de empresas? O presente trabalho explora esta questão numa grande instituição financeira portuguesa. A amostra (n = 149) incluiu todos os gestores de empresas que responderam ao questionário de avaliação da inteligência emocional de auto-relato (desenvolvido por Schutte et al., 1998) de um universo de trabalho composto por 216 gestores de empresas. O desempenho comercia...

  7. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  8. On the road again: traffic fatalities and auto insurance minimums

    Directory of Open Access Journals (Sweden)

    Pavel A. Yakovlev

    2018-03-01

    Full Text Available Prior research on policy-induced moral hazard effects in the auto insurance market has focused on the impact of compulsory insurance, no-fault liability, and tort liability laws on traffic fatalities. In contrast, this paper examines the moral hazard effect of a previously overlooked policy variable: minimum auto insurance coverage. We hypothesize that state-mandated auto insurance minimums may “over-insure” some drivers, lowering their incentives to drive carefully. Using a longitudinal panel of American states from 1982 to 2006, we find that policy-induced increases in auto insurance minimums are associated with higher traffic fatality rates, ceteris paribus.

  9. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  10. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  11. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  12. Auto Market

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    <正> Editor’s notes: the "online investigation of the updated condition of auto market in China", organized by BAGAE together with 7 websites, ended recently. The participants were from 32 provinces, cities and autonomous regions throughout China. Diplomas of the 4,657 participants were generally high, of which college or/over accounted for 80.7%; the participants were mainly middle-aged and young people in which 92.1% were below 40 years old.

  13. AutoFACT: An Automatic Functional Annotation and Classification Tool

    Directory of Open Access Journals (Sweden)

    Lang B Franz

    2005-06-01

    Full Text Available Abstract Background Assignment of function to new molecular sequence data is an essential step in genomics projects. The usual process involves similarity searches of a given sequence against one or more databases, an arduous process for large datasets. Results We present AutoFACT, a fully automated and customizable annotation tool that assigns biologically informative functions to a sequence. Key features of this tool are that it (1 analyzes nucleotide and protein sequence data; (2 determines the most informative functional description by combining multiple BLAST reports from several user-selected databases; (3 assigns putative metabolic pathways, functional classes, enzyme classes, GeneOntology terms and locus names; and (4 generates output in HTML, text and GFF formats for the user's convenience. We have compared AutoFACT to four well-established annotation pipelines. The error rate of functional annotation is estimated to be only between 1–2%. Comparison of AutoFACT to the traditional top-BLAST-hit annotation method shows that our procedure increases the number of functionally informative annotations by approximately 50%. Conclusion AutoFACT will serve as a useful annotation tool for smaller sequencing groups lacking dedicated bioinformatics staff. It is implemented in PERL and runs on LINUX/UNIX platforms. AutoFACT is available at http://megasun.bch.umontreal.ca/Software/AutoFACT.htm.

  14. Predicting the affinity of Farnesoid X Receptor ligands through a hierarchical ranking protocol: a D3R Grand Challenge 2 case study

    Science.gov (United States)

    Réau, Manon; Langenfeld, Florent; Zagury, Jean-François; Montes, Matthieu

    2018-01-01

    The Drug Design Data Resource (D3R) Grand Challenges are blind contests organized to assess the state-of-the-art methods accuracy in predicting binding modes and relative binding free energies of experimentally validated ligands for a given target. The second stage of the D3R Grand Challenge 2 (GC2) was focused on ranking 102 compounds according to their predicted affinity for Farnesoid X Receptor. In this task, our workflow was ranked 5th out of the 77 submissions in the structure-based category. Our strategy consisted in (1) a combination of molecular docking using AutoDock 4.2 and manual edition of available structures for binding poses generation using SeeSAR, (2) the use of HYDE scoring for pose selection, and (3) a hierarchical ranking using HYDE and MM/GBSA. In this report, we detail our pose generation and ligands ranking protocols and provide guidelines to be used in a prospective computer aided drug design program.

  15. Design Of Toyota Home Service Applications For AUTO2000 Based On Android

    OpenAIRE

    Aswin, Arief Rahmadian

    2016-01-01

    AUTO2000 is a network of sales services, maintenance, repair and supply of spare parts Toyota that was established in 1975 under the name Astra Motor Sales, in 1989 changed its name to AUTO2000 with management that has been handled entirely by PT. Astra International Tbk. Services provided by AUTO2000 one of which is a service of Toyota Home Service, a service provided by the service vehicle Auto 2000 where customers can service their vehicles without having to come to the dealership Auto 200...

  16. Matched-pair analysis to compare the outcomes of a second salvage auto-SCT to systemic chemotherapy alone in patients with multiple myeloma who relapsed after front-line auto-SCT.

    Science.gov (United States)

    Yhim, H-Y; Kim, K; Kim, J S; Kang, H J; Kim, J-A; Min, C-K; Bae, S H; Park, E; Yang, D-H; Suh, C; Kim, M K; Mun, Y-C; Eom, H S; Shin, H J; Yoon, H-J; Kwon, J H; Lee, J H; Kim, Y S; Yoon, S-S; Kwak, J-Y

    2013-03-01

    The aims of this study were to investigate the outcomes of second salvage auto-SCT and to identify the impacts of a second auto-SCT compared with systemic chemotherapy alone on disease outcome. Data from 48 patients who underwent second auto-SCT were matched to 144 patients (1:3) who received systemic chemotherapy alone from the Korean Myeloma Registry. Groups were matched for nine potential prognostic factors and compared for treatment outcomes. The median age of matching-pairs at relapse was 55.5 years. A total of 156 patients (81%) received vincristine, doxorubicin and dexamethasone induction therapy before the first auto-SCT. Thirty-five patients (73%) in the second auto-SCT group received novel agent-based therapies before the second auto-SCT, and similar proportion in both groups received novel therapies after relapse of front-line auto-SCT. With a median follow-up of 55.3 months, patients who underwent a second auto-SCT had significantly better median OS (55.5 vs 25.4 months, P=0.035). In multivariate analysis for OS, SCT, International Staging System III and salvage chemotherapy alone were independent predictors for worse OS. The outcomes of second auto-SCT appear to be superior to those of systemic chemotherapy alone. A randomized trial comparing both treatment strategies is required.

  17. 46 CFR 131.960 - Use of auto-pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto-pilot. 131.960 Section 131.960 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OFFSHORE SUPPLY VESSELS OPERATIONS Miscellaneous § 131.960 Use of auto-pilot. When the automatic pilot is used in areas of high traffic density...

  18. 46 CFR 185.360 - Use of auto pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Use of auto pilot. 185.360 Section 185.360 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS (UNDER 100 GROSS TONS) OPERATIONS Miscellaneous Operating Requirements § 185.360 Use of auto pilot. Whenever an automatic pilot is...

  19. Some advice for Skoda Auto on the Chinese Market

    OpenAIRE

    Guo, Yun

    2017-01-01

    Auto industry is an eternal topic. The development of auto industry can be considered as a vital part of GDP in a country. Meanwhile it is a standard to measure technology in a country. Therefore Czech made Skoda Auto Company. Then Volkswagen Group purchased it. It is means Skoda is also a mem-ber of Volkswagen. The quality of the car is really great. The cars of Skoda are entering into Chinese market. Chinese accepts them, however, compare with some old brands, which are Mercedes-Benz, BMW, ...

  20. Podniková kultura ve ŠKODA AUTO a. s.

    OpenAIRE

    Tomoriová, Sandra

    2012-01-01

    This bachelor thesis called "Corporate Culture in the ŠKODA AUTO a. s." is focused on analysing a current situation of the corporate culture in the ŠKODA AUTO a. s. It compares it with my own definition of the "Simply Clever" corporate culture determined for this company which is nowadays developing. The aim is to suggest recommendations that will lead to the better level of the corporate culture in the ŠKODA AUTO a. s. That means to reach the corporate culture under "Simply clever" condition...

  1. Auto-correlograms and auto-regressive models of trace metal distributions in Cochin backwaters

    Digital Repository Service at National Institute of Oceanography (India)

    Jayalakshmy, K.V.; Sankaranarayanan, V.N.

    Auto-correlation technique has been applied to study fluctuations in concentration profiles of chemical species in Cochin Backwaters (Kerala, India). No stability in time can be detected for particulate Mn at all stations, for Fe at stations 1...

  2. Measurement of anti- acetylcholine receptor auto-antibodies in ...

    African Journals Online (AJOL)

    auto-antibodies in myasthenia gravis. K. J. Steenkamp, W. Duim, M. s. Myer,. S. C. K. Malfeld, R. Anderson. Two different acetylcholine receptor (AChR) preparations derived from ... the detection of AChR auto-antibodies in serum specimens from 20 ... 4°C. Thereafter, 1 ml of washing solution (phosphate- buffered saline ...

  3. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  4. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  5. Auto/Ethnography and the Question of Ethics

    Directory of Open Access Journals (Sweden)

    Wolff-Michael Roth

    2008-10-01

    Full Text Available Auto/ethnography has emerged as an important method in the social sciences for contributing to the project of understanding human actions and concerns. Although the name of the method includes "ethnography," auto/ethnography often is concerned exclusively with an abstract (i.e., undeveloped and abstracting understanding, and therefore the writing, of the Self rather than the writing of the "ethno." Auto/ethnography, such conceived, is a form of therapy, in the best case, and a form of narcissism and autoerotic relation, in the worst case. But because the Self exists in relation to the world, becomes in and through participation in everyday events, and because the human relation is inherently ethical, there are inherent ethical questions where the Other may come to be harmed as much as the Self. URN: urn:nbn:de:0114-fqs0901381

  6. COSMIC SHEAR MEASUREMENT USING AUTO-CONVOLVED IMAGES

    International Nuclear Information System (INIS)

    Li, Xiangchong; Zhang, Jun

    2016-01-01

    We study the possibility of using quadrupole moments of auto-convolved galaxy images to measure cosmic shear. The autoconvolution of an image corresponds to the inverse Fourier transformation of its power spectrum. The new method has the following advantages: the smearing effect due to the point-spread function (PSF) can be corrected by subtracting the quadrupole moments of the auto-convolved PSF; the centroid of the auto-convolved image is trivially identified; the systematic error due to noise can be directly removed in Fourier space; the PSF image can also contain noise, the effect of which can be similarly removed. With a large ensemble of simulated galaxy images, we show that the new method can reach a sub-percent level accuracy under general conditions, albeit with increasingly large stamp size for galaxies of less compact profiles.

  7. [Dermatological features of auto-inflammatory recurrent fevers].

    Science.gov (United States)

    Escudier, A; Mauvais, F-X; Bastard, P; Boussard, C; Jaoui, A; Koskas, V; Lecoq, E; Michel, A; Orcel, M-C; Truelle, P-E; Wohrer, D; Piram, M

    2018-02-01

    Auto-inflammatory diseases are characterized by unexplained and recurrent attacks of systemic inflammation often involving the skin, joints, or serosal membranes. They are due to a dysfunction or dysregulation of the innate immunity, which is the first line of defense against pathogens. Early recognition of these diseases by the clinician, especially by pediatricians encountering such pathologies in pediatric patients, is primordial to avoid complications. Skin manifestations, common in most auto-inflammatory diseases, are helpful for prompt diagnosis. After a brief physiopathological review, we will describe auto-inflammatory recurrent fevers by their main dermatological presentations: urticarial lesions, neutrophilic dermatoses, panniculitis, other maculopapular eruptions, dyskeratosis, skin vasculitis, and oral aphthous. We finally suggest a decision tree to help clinicians better target genetic exams in patients with recurrent fevers and dermatological manifestations. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  8. 46 CFR 109.585 - Use of auto pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto pilot. 109.585 Section 109.585 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Miscellaneous § 109.585 Use of auto pilot. Except as provided in 33 CFR 164.15, when the automatic pilot is used...

  9. 46 CFR 122.360 - Use of auto pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Use of auto pilot. 122.360 Section 122.360 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS CARRYING MORE THAN 150... Requirements § 122.360 Use of auto pilot. Whenever an automatic pilot is used the master shall ensure that: (a...

  10. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    Institute of Scientific and Technical Information of China (English)

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  11. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  12. [DNA Extraction from Old Bones by AutoMate Express™ System].

    Science.gov (United States)

    Li, B; Lü, Z

    2017-08-01

    To establish a method for extracting DNA from old bones by AutoMate Express™ system. Bones were grinded into powder by freeze-mill. After extraction by AutoMate Express™, DNA were amplified and genotyped by Identifiler®Plus and MinFiler™ kits. DNA were extracted from 10 old bone samples, which kept in different environments with the postmortem interval from 10 to 20 years, in 3 hours by AutoMate Express™ system. Complete STR typing results were obtained from 8 samples. AutoMate Express™ system can quickly and efficiently extract DNA from old bones, which can be applied in forensic practice. Copyright© by the Editorial Department of Journal of Forensic Medicine

  13. ACCTuner: OpenACC Auto-Tuner For Accelerated Scientific Applications

    KAUST Repository

    Alzayer, Fatemah

    2015-01-01

    ciently on the hardware. Following successful approaches to obtain high performance in kernels for cache-based processors using auto-tuning, we approach this compiler-hardware gap in GPUs by employing auto-tuning for the key parameters “gang” and “vector

  14. What factors affect the carriage of epinephrine auto-injectors by teenagers?

    Science.gov (United States)

    Macadam, Clare; Barnett, Julie; Roberts, Graham; Stiefel, Gary; King, Rosemary; Erlewyn-Lajeunesse, Michel; Holloway, Judith A; Lucas, Jane S

    2012-02-02

    Teenagers with allergies are at particular risk of severe and fatal reactions, but epinephrine auto-injectors are not always carried as prescribed. We investigated barriers to carriage. Patients aged 12-18 years old under a specialist allergy clinic, who had previously been prescribed an auto-injector were invited to participate. Semi-structured interviews explored the factors that positively or negatively impacted on carriage. Twenty teenagers with food or venom allergies were interviewed. Only two patients had used their auto-injector in the community, although several had been treated for severe reactions in hospital. Most teenagers made complex risk assessments to determine whether to carry the auto-injector. Most but not all decisions were rational and were at least partially informed by knowledge. Factors affecting carriage included location, who else would be present, the attitudes of others and physical features of the auto-injector. Teenagers made frequent risk assessments when deciding whether to carry their auto-injectors, and generally wanted to remain safe. Their decisions were complex, multi-faceted and highly individualised. Rather than aiming for 100% carriage of auto-injectors, which remains an ambitious ideal, personalised education packages should aim to empower teenagers to make and act upon informed risk assessments.

  15. What factors affect the carriage of epinephrine auto-injectors by teenagers?

    Directory of Open Access Journals (Sweden)

    Macadam Clare

    2012-02-01

    Full Text Available Abstract Background Teenagers with allergies are at particular risk of severe and fatal reactions, but epinephrine auto-injectors are not always carried as prescribed. We investigated barriers to carriage. Methods Patients aged 12-18 years old under a specialist allergy clinic, who had previously been prescribed an auto-injector were invited to participate. Semi-structured interviews explored the factors that positively or negatively impacted on carriage. Results Twenty teenagers with food or venom allergies were interviewed. Only two patients had used their auto-injector in the community, although several had been treated for severe reactions in hospital. Most teenagers made complex risk assessments to determine whether to carry the auto-injector. Most but not all decisions were rational and were at least partially informed by knowledge. Factors affecting carriage included location, who else would be present, the attitudes of others and physical features of the auto-injector. Teenagers made frequent risk assessments when deciding whether to carry their auto-injectors, and generally wanted to remain safe. Their decisions were complex, multi-faceted and highly individualised. Conclusions Rather than aiming for 100% carriage of auto-injectors, which remains an ambitious ideal, personalised education packages should aim to empower teenagers to make and act upon informed risk assessments.

  16. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  17. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  18. Kommest Auto ostmisest huvitub ka Hillar Teder / Andres Eilart

    Index Scriptorium Estoniae

    Eilart, Andres

    2008-01-01

    Kommest Auto ostmise vastu tunnevad huvi suurärimees Andres Sarri, Rootsis Peugeot' sõidukeid müüv Taani päritolu K. W. Bruun Import ja multimiljonär Hillar Teder, kellele kuulub Audisid müüv Reval Auto

  19. Auto fluorescence of intervertebral disc tissue: a new diagnostic tool.

    Science.gov (United States)

    Hoell, T; Huschak, G; Beier, A; Hüttmann, G; Minkus, Y; Holzhausen, H J; Meisel, H J

    2006-08-01

    The paper reports on auto fluorescence phenomena of inter-vertebral human discs. It systematically investigates the auto fluorescence effects of ex vivo disc specimen and reports on surgical cases to demonstrate the potential value of the new method. The paper offers biologic explanations of the phenomenon and discusses the potential value of the UV auto fluorescence technique as a diagnostic tool. Intra- and postoperative observations are made by a surgical microscope with an integrated UV light source. Quantitative measurements were carried out using a photon counter and a spectrometer ex vivo. The auto fluorescence phenomenon allows the differentiation of traumatized and degenerated disc tissue intraoperatively in some cases, it allows the differentiation of bony and collagen endplate in cervical disc surgery. The source of the auto fluorescent light emission are amino acids of the collagen molecules. The proteoglycan components and the liquid components of the disc do not show relevant auto fluorescence. Emission wavelength of disc material is equivalent to color perception. It differs due to different collagen composition of the intervertebral disc components from yellow-green to blue-green and can be visualized in situ by naked eye.UV-auto fluorescence of inter-vertebral discs is a new clinical tool that has the potential to differentiate disc material from the anatomical surrounding, to distinguish between different fractions of the disc and to give information on the quality and status of the disc material. Since the technology has just emerged, it needs further investigations to quantify the clinical observations reported in this paper.

  20. Líneas de Ensamble Auto-balanceables

    OpenAIRE

    Palomino Sánchez, José Manuel

    2011-01-01

    Este documento presenta una monografía de las líneas de ensamble auto-balanceables. Este tipo de líneas se han popularizado con la implementación de la manufactura esbelta en muchas empresas de diferentes ramos. Sin embargo, su estudio es aún incipiente, por lo que el objetivo de este proyecto es hacer una revisión de la literatura existente con el propósito de identificar posibles trabajos en esta área. Las líneas de ensamble auto-balanceables, también descritas en la literatura como Buck...

  1. Cirios, trompetas y altares : el auto de fe como fiesta

    Directory of Open Access Journals (Sweden)

    Doris Moreno Martínez

    1997-01-01

    Full Text Available El análisis del auto de fe en su vertiente festiva nos permite superar la vieja polémica de la historiografía liberal y la historiografia conservadora, en torno a la popularidad/repulsión social de la Inquisición. Trascendiendo las visiones unidireccionales, se intenta aprender el auto de fe general desde una perspectiva global; se integran las vertientes jurídica, religiosa y social a través de algunos de los múltiples ingredientes del auto: sensitivos (luz, colores, sonidos..., sociales (participación activa de artesanos, familiares y asistentes... y simbólicos (orden preeminencial en las procesiones y en los tablados, juramentos..., para configurar el auto de fe como una fiesta compleja. poliédrica. En el auto de fe la Iglesia y el Estado tantas veces enfrentados, mostraban sus respectivos poderes concertados, con toda la capacidad intimidatoría de una simbología muy funcional y efectiva, y los componentes mórbidos de identificación personal del mal y la escenificación dramática.The analysis of the auto de fe on its festive side allows us to overecome the old discussion between the liberal histórical view and the conservative view that surrounds the social popularity/repulsion of the Inquisition. Overcoming the narrow visión we try to understand a global perspective; we intégrate the juridical, religious and social aspects through some of the many ingredients of the auto de fe: sensory (light, colours, sounds..., social (active participation of artisans, families and people present... and symbolical (order of rank in processions on stages and oath taking.... All those aspects combine to make the auto de fe a very complex and many sided festivity. In the auto de fe, the Church and the State, many times oppossed to one another, showed that their respective powers were united, with all the intimidating power of a very effective and functional symbolism and the morbid components of a personal identification of evil and the

  2. Rüütmann taandub Kommest Auto juhtimisest / Kaisa Tahlfeld

    Index Scriptorium Estoniae

    Tahlfeld, Kaisa

    2007-01-01

    AS-i Kommest Auto asutaja ja omanik Toomas Rüütmann loobub ettevõtte juhtimisest, kuid jätkab juhatuse liikmena ning keskendub eksportturgudele ja koostööle edasimüüjatega. Kommest Auto uueks juhiks saab Raido Toonekurg. Lisa: Mis on mis; Taust

  3. Adaptive endpoint detection of seismic signal based on auto-correlated function

    International Nuclear Information System (INIS)

    Fan Wanchun; Shi Ren

    2001-01-01

    Based on the analysis of auto-correlation function, the notion of the distance between auto-correlation function was quoted, and the characterization of the noise and the signal with noise were discussed by using the distance. Then, the method of auto- adaptable endpoint detection of seismic signal based on auto-correlated similarity was summed up. The steps of implementation and determining of the thresholds were presented in detail. The experimental results that were compared with the methods based on artificial detecting show that this method has higher sensitivity even in a low signal with noise ratio circumstance

  4. [Design of blood-pressure parameter auto-acquisition circuit].

    Science.gov (United States)

    Chen, Y P; Zhang, D L; Bai, H W; Zhang, D A

    2000-02-01

    This paper presents the realization and design of a kind of blood-pressure parameter auto-acquisition circuit. The auto-acquisition of blood-pressure parameter controlled by 89C2051 single chip microcomputer is accomplished by collecting and processing the driving signal of LCD. The circuit that is successfully applied in the home unit of telemedicine system has the simple and reliable properties.

  5. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    OpenAIRE

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  6. The auto-amputated adnexa: a review of findings in a pediatric population.

    Science.gov (United States)

    Focseneanu, Mariel A; Omurtag, Kenan; Ratts, Valerie S; Merritt, Diane F

    2013-12-01

    To quantify our experience and that of the literature with diagnosis and management of the auto-amputated adnexa in a pediatric population. Case series and literature review. Tertiary care medical center. Case series of pediatric patients (auto-amputation collected from our medical center and the literature. None. Auto-amputated adnexa. In addition to the 3 cases discussed from our institution, 91 cases of auto-amputated adnexa were identified in the literature dating back to 1943, for a total of 94 cases. Forty-nine percent (46/94) of the cases involved girls in a pediatric population (auto-amputated adnexa. 34 out of 46 cases were analyzed in detail. The right adnexa were involved in 56% of the cases. The most common presenting complaint verbalized by the older girls was pain; however, 8 cases were identified in asymptomatic girls undergoing unrelated diagnostic testing. The auto-amputated adnexa is a rare finding in the pediatric population, but it must be considered as a possible explanation for the incidental finding of absence of the fallopian tube or ovary in the subgroup of patients who undergo surgery for any reason. Patients with an antecedent history of pelvic pain either chronic or intermittent in nature may be diagnosed with torsion or less frequently auto-amputation of the adnexa. A fetal "pelvic mass" or "ovarian cyst" may predispose the adnexa to torsion and subsequent auto-amputation either in-utero or post-delivery. Many of these antenatally diagnosed cysts and even subsequent auto-amputations are completely asymptomatic, however, and do not compromise fertility assuming the contralateral adnexa are normal. Thus expectant management is appropriate for small (less than 4 cm), asymptomatic simple cysts and even suspected auto-amputated adnexa in an asymptomatic patient. Copyright © 2013 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  7. The Durban Auto Cluster

    DEFF Research Database (Denmark)

    Lorentzen, Jochen; Robbins, Glen; Barnes, Justin

    2004-01-01

    The paper describes the formation of the Durban Auto Cluster in the context of trade liberalization. It argues that the improvement of operational competitiveness of firms in the cluster is prominently due to joint action. It tests this proposition by comparing the gains from cluster activities...

  8. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  9. Is Sexual Objectification and Victimization of Females in Video Games Associated With Victim Blaming or Victim Empathy?

    Science.gov (United States)

    Beck, Victoria; Rose, Chris

    2018-04-01

    The goal of this study was to investigate whether the sexual objectification and virtual violence against females in video games increases negative attitudes toward females, when addressing a variety of noted methodological issues. Study participants were randomly assigned to a control group, where participants played Madden NFL 12, or an experimental group, where participants played Grand Theft Auto. In the experimental group, participants played the game with a confederate, who exposed participants to sexual objectification and violence against females. Study results indicated that both the experimental and control groups had equivalently low levels of rape myth acceptance prior to game play. Immediately after game play, there still was no statistically significant difference in rape myth acceptance between groups; however, there was a decrease in rape myth acceptance for the experimental group. The decrease in rape myth acceptance continued and magnified for the experimental group, over time, to the point of creating a statistically significant difference between the two groups for the follow-up measure at the end of the study.

  10. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  11. Family factors associated with auto-aggressiveness in adolescents in Croatia.

    Science.gov (United States)

    Tripković, Mara; Francisković, Tanja; Grgić, Neda; Ercegović, Nela; Graovac, Mirjana; Zecević, Iva

    2013-12-01

    The aim of this research is to look into the roles of families' social situation and cohesion in adolescent auto-aggressiveness in Croatia. The research was conducted on a sample of Zagreb high school students which encompassed 701 pupils of both genders aged 14-19. The basic demographic data were obtained using the Structured Demographic and Family Data Questionnaire. Auto-aggressiveness was tested using a section of the Report on Youth Aged 11-18 and the Scale of Auto-destructiveness--SAD, whereas the family cohesion was tested with the Family Adaptability and Cohesion Evaluation Scales FACES III. The obtained results show differences according to the gender: girls are more prone to auto-aggressiveness than boys (t = -3.385, df = 565, p = 0.001) and girls more often show symptoms of destructiveness (t = -3.809, df = 637, p parents' marital status (chi2 = 18.039, df = 4, p = 0.001), their financial situation (F(2.548) = 4.604, p = 0.010), alcoholic father (chi2 = 9.270, df = 2, p = 0.010), mentally ill mother (t = 5.264, df = 541, p problems (chi2 = 29.98, df = 2, p < 0.001). There is a connection between auto-destructive behavior in adolescents and family factors. Knowledge of family's social situation and cohesion may help understand, prevent and treat auto-aggressiveness in adolescents.

  12. Parliament tears up 'feeble' auto-oil proposals

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    Recent discussions in the European Parliament concerning the ''auto-oil'' proposals, i.e. the effects of automotive fuel specifications on the environment, are described in this paper. Legislative changes or amendments proposed by various national, or other interest groups are also noted. In particular, the sulphur content of diesel fuels is a matter of widespread concern because of its use for city taxis and buses. Further fuel proposals in the ''auto-oil'' style are expected in the near future. (UK)

  13. Genetic aspects of auto-immune profiles of healthy chickens.

    Science.gov (United States)

    Parmentier, Henk K; van der Vaart, Priscilla S; Nieuwland, Mike G B; Savelkoul, Huub F J

    2017-09-01

    Auto-antibody profiles binding liver antigens differed between chicken lines divergently selected for specific antibody responses to SRBC, and were affected by ageing suggesting both genetic and environmental effects. Presence and levels of IgM and IgG antibodies binding chicken liver cell lysate (CLL) fragments in plasma at 5 weeks of age from 10 individual full sibs and their parents from 5 H srbc and 5 L srbc line families was studied to reveal genetic relations. Non-genetic maternal effects were studied by comparing auto-antibody profiles of 36 weeks old hens from 2 other unrelated lines with the profiles from their chicks at hatch. IgM and IgG antibodies from parents and progeny from both H srbc and L srbc lines bound CLL fragments. Significant line and generation differences and their interactions were found for both isotypes. Higher staining of CLL fragments was usually found for H srbc line birds. Lines were clustered by auto-antibody profiles, but staining by birds of both lines in both generations was very individual for IgG and IgM. The current data with full sibs therefore not supported a genetic basis for auto-antibody profiles. IgG but not IgM auto-antibody profiles of chicks correlated with maternal auto-antibody profiles. The results suggest that the auto-antibody repertoire of healthy chickens is largely stochastically initiated and may be affected by environmental challenges during ageing, but genetic mechanisms may underlie staining intensity of individual bound CLL fragments. The present results suggest that identification of fragments or profiles to be used at early age for genetic selection for health traits is not feasible yet. Secondly, the IgM profile of neonatal chickens seems non-organised independent of the maternal profile, but the neonatal IgG profile is much more related with the maternal profile. Consequences of these findings for disease susceptibility or breeding for optimal health are discussed. Copyright © 2017 Elsevier Ltd. All

  14. An Instructional Method for the AutoCAD Modeling Environment.

    Science.gov (United States)

    Mohler, James L.

    1997-01-01

    Presents a command organizer for AutoCAD to aid new uses in operating within the 3-D modeling environment. Addresses analyzing the problem, visualization skills, nonlinear tools, a static view of a dynamic model, the AutoCAD organizer, environment attributes, and control of the environment. Contains 11 references. (JRH)

  15. Depression and auto-aggressiveness in adolescents in Zagreb.

    Science.gov (United States)

    Tripković, Mara; Vuković, Iris Sarajlić; Frančišković, Tanja; Pisk, Sandra Vuk; Krnić, Silvana

    2014-12-01

    The aim of the study was to explore the frequency of depression among the general population of adolescents who were high school students in the city of Zagreb. As depression is associated with increased suicidal risk we wanted to check to what extent depression, as an emotional problem among youth, is associated with auto-aggression in the general population of adolescents. The study was conducted on a sample of high school students in Zagreb and it included 701 students of both genders aged from 14-19 years of age. To test the depression a Beck Depression Inventory (BDI) was administered for youth between 11-18 years of age (Youth Self Report for ages 11-18). To test auto-aggression a Scale of Auto-destructiveness (SAD) was used. Results obtained by this study show that about 20.7% of high school students have mild and borderline depressive disorders while moderate or severe depression shows about 5% of them, whereby depression is statistically significant among girls who, on average, report more symptoms of depression. It has also been proven a significant impact of depression levels (F (2,423)=35.860, p<0.001) on auto-aggression in subjects of both genders. In both genders, moderately depressed show more auto destructiveness than those without depression symptoms (p<0.01). In the group of heavily depressed (n=30), significantly higher self-destructiveness is shown by girls (p<0.01). The data suggest the importance of early recognition, understanding and treatment of depressive symptoms in adolescents in order to reduce the risk of subsequent chronic psychosocial damage.

  16. AutoBayes Program Synthesis System Users Manual

    Science.gov (United States)

    Schumann, Johann; Jafari, Hamed; Pressburger, Tom; Denney, Ewen; Buntine, Wray; Fischer, Bernd

    2008-01-01

    Program synthesis is the systematic, automatic construction of efficient executable code from high-level declarative specifications. AutoBayes is a fully automatic program synthesis system for the statistical data analysis domain; in particular, it solves parameter estimation problems. It has seen many successful applications at NASA and is currently being used, for example, to analyze simulation results for Orion. The input to AutoBayes is a concise description of a data analysis problem composed of a parameterized statistical model and a goal that is a probability term involving parameters and input data. The output is optimized and fully documented C/C++ code computing the values for those parameters that maximize the probability term. AutoBayes can solve many subproblems symbolically rather than having to rely on numeric approximation algorithms, thus yielding effective, efficient, and compact code. Statistical analysis is faster and more reliable, because effort can be focused on model development and validation rather than manual development of solution algorithms and code.

  17. Autosähköinsinöörikoulutuksen kehittäminen

    OpenAIRE

    Kovanen, Pasi

    2017-01-01

    Tässä opinnäytetyössä analysoidaan ja verrataan Metropolian ajoneuvotekniikan tutkinto-ohjelman autosähkötekniikan opetussuunnitelmaa kotimaisten ja ulkomaisten korkeakoulujen opetussuunnitelmiin. Metropolian autosähkötekniikan opetussuunnitelmassa on vertailluista kohteista eniten autosähköteknistä opetusta. Ulkomaisissa korkeakouluissa suoritetuttujen teemahaastattelujen avulla analysoidaan sidosryhmien käyttöä opetusmateriaalin lähteenä, sekä ajoneuvoteollisuuden vaikutusta opetussuun...

  18. Parallel auto-correlative statistics with VTK.

    Energy Technology Data Exchange (ETDEWEB)

    Pebay, Philippe Pierre; Bennett, Janine Camille

    2013-08-01

    This report summarizes existing statistical engines in VTK and presents both the serial and parallel auto-correlative statistics engines. It is a sequel to [PT08, BPRT09b, PT09, BPT09, PT10] which studied the parallel descriptive, correlative, multi-correlative, principal component analysis, contingency, k-means, and order statistics engines. The ease of use of the new parallel auto-correlative statistics engine is illustrated by the means of C++ code snippets and algorithm verification is provided. This report justifies the design of the statistics engines with parallel scalability in mind, and provides scalability and speed-up analysis results for the autocorrelative statistics engine.

  19. AutoCAD-To-GIFTS Translator Program

    Science.gov (United States)

    Jones, Andrew

    1989-01-01

    AutoCAD-to-GIFTS translator program, ACTOG, developed to facilitate quick generation of small finite-element models using CASA/GIFTS finite-element modeling program. Reads geometric data of drawing from Data Exchange File (DXF) used in AutoCAD and other PC-based drafting programs. Geometric entities recognized by ACTOG include points, lines, arcs, solids, three-dimensional lines, and three-dimensional faces. From this information, ACTOG creates GIFTS SRC file, which then reads into GIFTS preprocessor BULKM or modified and reads into EDITM to create finite-element model. SRC file used as is or edited for any number of uses. Written in Microsoft Quick-Basic (Version 2.0).

  20. Research on remote sensing image pixel attribute data acquisition method in AutoCAD

    Science.gov (United States)

    Liu, Xiaoyang; Sun, Guangtong; Liu, Jun; Liu, Hui

    2013-07-01

    The remote sensing image has been widely used in AutoCAD, but AutoCAD lack of the function of remote sensing image processing. In the paper, ObjectARX was used for the secondary development tool, combined with the Image Engine SDK to realize remote sensing image pixel attribute data acquisition in AutoCAD, which provides critical technical support for AutoCAD environment remote sensing image processing algorithms.

  1. Assessment of the Use of AutoCAD in Mechanical Engineering Technical Drawing Education

    OpenAIRE

    Akyürek, Turgut

    2018-01-01

    AutoCAD is one of the widely used software tools in engineering education. In this study, ageneral assessment of AutoCAD for the usage in the mechanical engineering technical drawing educationis made. AutoCAD is assessed in terms of the fulfilment of the requirements defined for the main twotechnical drawing courses. AutoCAD is assessed in terms of its capability in meeting the requirements ofthe technical drawing courses.

  2. AutoClickChem: click chemistry in silico.

    Directory of Open Access Journals (Sweden)

    Jacob D Durrant

    Full Text Available Academic researchers and many in industry often lack the financial resources available to scientists working in "big pharma." High costs include those associated with high-throughput screening and chemical synthesis. In order to address these challenges, many researchers have in part turned to alternate methodologies. Virtual screening, for example, often substitutes for high-throughput screening, and click chemistry ensures that chemical synthesis is fast, cheap, and comparatively easy. Though both in silico screening and click chemistry seek to make drug discovery more feasible, it is not yet routine to couple these two methodologies. We here present a novel computer algorithm, called AutoClickChem, capable of performing many click-chemistry reactions in silico. AutoClickChem can be used to produce large combinatorial libraries of compound models for use in virtual screens. As the compounds of these libraries are constructed according to the reactions of click chemistry, they can be easily synthesized for subsequent testing in biochemical assays. Additionally, in silico modeling of click-chemistry products may prove useful in rational drug design and drug optimization. AutoClickChem is based on the pymolecule toolbox, a framework that may facilitate the development of future python-based programs that require the manipulation of molecular models. Both the pymolecule toolbox and AutoClickChem are released under the GNU General Public License version 3 and are available for download from http://autoclickchem.ucsd.edu.

  3. AutoClickChem: click chemistry in silico.

    Science.gov (United States)

    Durrant, Jacob D; McCammon, J Andrew

    2012-01-01

    Academic researchers and many in industry often lack the financial resources available to scientists working in "big pharma." High costs include those associated with high-throughput screening and chemical synthesis. In order to address these challenges, many researchers have in part turned to alternate methodologies. Virtual screening, for example, often substitutes for high-throughput screening, and click chemistry ensures that chemical synthesis is fast, cheap, and comparatively easy. Though both in silico screening and click chemistry seek to make drug discovery more feasible, it is not yet routine to couple these two methodologies. We here present a novel computer algorithm, called AutoClickChem, capable of performing many click-chemistry reactions in silico. AutoClickChem can be used to produce large combinatorial libraries of compound models for use in virtual screens. As the compounds of these libraries are constructed according to the reactions of click chemistry, they can be easily synthesized for subsequent testing in biochemical assays. Additionally, in silico modeling of click-chemistry products may prove useful in rational drug design and drug optimization. AutoClickChem is based on the pymolecule toolbox, a framework that may facilitate the development of future python-based programs that require the manipulation of molecular models. Both the pymolecule toolbox and AutoClickChem are released under the GNU General Public License version 3 and are available for download from http://autoclickchem.ucsd.edu.

  4. Crashworthiness Assessment of Auto-body Members Considering the Fabrication Histories

    International Nuclear Information System (INIS)

    Huh, Hoon; Song, Jung-Han; Kim, Kee-Poong; Kim, Hyun-Sub

    2005-01-01

    This paper is concerned with crashworthiness of auto-body members considering the effect of fabrication. Most auto-body members are fabricated with sheet metal forming process and welding process that induce fabrication histories such as the plastic work hardening, non-uniform thickness distribution and residual stress. Crash simulation is carried out for auto-body members with LS-DYNA3D in order to identify the fabrication effect on the crashworthiness. The analysis calculated crash mode, the reaction force and the energy absorption for crashworthiness assessment with the forming effect. The result shows that the crash analysis with considering the forming history leads to a different result from that without considering the forming effect. The analysis results demonstrate that the design of auto-body members should be carried out considering the forming history for accurate assessment of the crashworthiness.

  5. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  6. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  7. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  8. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  9. Grandes remolques

    Directory of Open Access Journals (Sweden)

    Editorial, Equipo

    1961-07-01

    Full Text Available El empleo creciente del material pesado auxiliar en la construcción de obras de ingeniería civil ha motivado la fabricación de grandes plataformas, capaces de transportar toda clase de maquinaria auxiliar. En general, este tipo de maquinaria requiere medios de transporte, pues su circulación por carreteras es lenta, obstructiva y cara, siempre que se trate de grandes distancias, caso presente en la mayoría de ocasiones en que se exige un traslado de esta maquinaria de una a otra obra.

  10. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Document Server

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  11. 46 CFR 167.65-35 - Use of auto pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Use of auto pilot. 167.65-35 Section 167.65-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Special Operating Requirements § 167.65-35 Use of auto pilot. Except as provided in 33 CFR 164.15, when...

  12. the impacts of auto-mechanic workshops on the environment of ...

    African Journals Online (AJOL)

    Aladesida

    The extents of groundwater and soil pollution arising from auto-mechanic ..... Conductivity is the ability of a solution to pass electric .... processes used at an auto-mechanic workshop, which ... Levels of Heavy Metals in Top Soils of Motor. Parks ...

  13. Among pasta-loving Mafiosos, drug-selling Columbians and noodle-eating Triads – Race, humour and interactive ethics in Grand Theft Auto III

    OpenAIRE

    Dymek, Mikolaj

    2005-01-01

    This paper explores the intersection of race, humour and interactivity in GTA3. Interactivity has been extensively researched, race issues in games have been scarcely studied (Leonard 2003), but hitherto no research has focused on humour aspects of games despite the popularity of this subject in non-academic discussions on the Internet (BBC News 2001; Perry 2001). Previously, content analysis of games has been focused on narrative aspects (Aarseth 1997; Murray 1998) or psychological links bet...

  14. Auto-Bäcklund transformations for a differential-delay equation

    Science.gov (United States)

    Gordoa, Pilar R.; Pickering, Andrew

    2013-03-01

    Discrete Painlevé equations have, over recent years, generated much interest. One property of such equations that is considered to be particularly important is the existence of auto-Bäcklund transformations, that is, mappings between solutions of the equation in question, usually involving changes in the values of parameters appearing as coefficients. We have recently presented extensions of discrete Painlevé equations to equations involving derivatives as well as shifts in the independent variable. Here we show how auto-Bäcklund transformations can also be constructed for such differential-delay equations. We emphasise that this is the first time that an auto-Bäcklund transformation has been given for a differential-delay equation.

  15. 70 MeV injector auto tuning system handbook

    International Nuclear Information System (INIS)

    Ellis, J.E.; Munn, R.W.; Sandels, E.G.

    1976-06-01

    The handbook is in three sections: (1) description and location; (2) operating instructions; and (3) design notes on the tank and debuncher auto tuning systems for the 70 MeV injector. The purpose of the auto tuning system is to maintain the 'tune' of the four tanks and debuncher to within a few Hz, stabilizing against changes of temperature and other physical factors affecting the resonant frequency of the tanks. (U.K.)

  16. Interpolis SlimOpWeg-programma : de AutoModus-app : vragenlijstonderzoek naar het effect van een app om smartphonegebruik in de auto te verminderen.

    NARCIS (Netherlands)

    Groot-Mesken, J. de Wijnen, W. Stelling-Konczak, A. & Commandeur, J.J.F.

    2017-01-01

    Interpolis SlimOpWeg programme: the AutoModus app; Survey into the effect of an app on reducing smartphone use while driving a car. Within the programme SlimOpWeg the Dutch insurance company Interpolis had a smartphone app developed. The purpose of this ‘AutoModus app’ is to help young drivers to

  17. Sarri võttis Talleksiga taanlastelt Saksa Auto / Villy Paimets

    Index Scriptorium Estoniae

    Paimets, Villy, 1972-

    2005-01-01

    Andres Sarri poolt kontrollitav AS Talleks ostis Taani partnerilt Semler Holding välja 50-protsendilise osaluse AS-is Saksa Auto. Lisa: Viimastel aastatel eestlaste poolt välja ostetud ettevõtted. Diagramm: Saksa Auto tulemused paranesid mullu märgatavalt. Vt. samas: Sarri: me ei tee halbu tehinguid; Peeter Raidla. Tuleristsed 90ndate alguse võimuvõitlusest

  18. Stitching-aware in-design DPT auto fixing for sub-20nm logic devices

    Science.gov (United States)

    Choi, Soo-Han; Sai Krishna, K. V. V. S.; Pemberton-Smith, David

    2017-03-01

    As the technology continues to shrink below 20nm, Double Patterning Technology (DPT) becomes one of the mandatory solutions for routing metal layers. From the view point of Place and Route (P&R), the major concerns are how to prevent DPT odd-cycles automatically without sacrificing chip area. Even though the leading-edge P&R tools have advanced algorithms to prevent DPT odd-cycles, it is very hard to prevent the localized DPT odd-cycles, especially in Engineering Change Order (ECO) routing. In the last several years, we developed In-design DPT Auto Fixing method in order to reduce localized DPT odd-cycles significantly during ECO and could achieve remarkable design Turn-Around Times (TATs). But subsequently, as the design complexity continued increasing and chip size continued decreasing, we needed a new In-design DPT Auto Fixing approach to improve the auto. fixing rate. In this paper, we present the Stitching-Aware In-design DPT Auto Fixing method for better fixing rates and smaller chip design. The previous In-design DPT Auto Fixing method detected all DPT odd-cycles and tried to remove oddcycles by increasing the adjacent space. As the metal congestions increase in the newer technology nodes, the older Auto Fixing method has limitations to increase the adjacent space between routing metals. Consequently, the auto fixing rate of older method gets worse with the introduction of the smaller design rules. With DPT stitching enablement at In-design DRC checking procedure, the new Stitching-Aware DPT Auto Fixing method detects the most critical odd-cycles and revolve the odd-cycles automatically. The accuracy of new flow ensures better usage of space in the congested areas, and helps design more smaller chips. By applying the Stitching-Aware DPT Auto Fixing method to sub-20nm logic devices, we can confirm that the auto fixing rate is improved by 2X compared with auto fixing without stitching. Additionally, by developing the better heuristic algorithm and flow for DPT

  19. Adaptive endpoint detection of seismic signal based on auto-correlated function

    International Nuclear Information System (INIS)

    Fan Wanchun; Shi Ren

    2000-01-01

    There are certain shortcomings for the endpoint detection by time-waveform envelope and/or by checking the travel table (both labelled as the artificial detection method). Based on the analysis of the auto-correlation function, the notion of the distance between auto-correlation functions was quoted, and the characterizations of the noise and the signal with noise were discussed by using the distance. Then, the method of auto-adaptable endpoint detection of seismic signal based on auto-correlated similarity was summed up. The steps of implementation and determining of the thresholds were presented in detail. The experimental results that were compared with the methods based on artificial detecting show that this method has higher sensitivity even in a low SNR circumstance

  20. Approximation auto-coherente a deux particules, pseudogap et supraconductivite dans le modele de Hubbard attractif

    Science.gov (United States)

    Allen, Steve

    2000-10-01

    Dans cette these nous presentons une nouvelle methode non perturbative pour le calcul des proprietes d'un systeme de fermions. Notre methode generalise l'approximation auto-coherente a deux particules proposee par Vilk et Tremblay pour le modele de Hubbard repulsif. Notre methode peut s'appliquer a l'etude du comportement pre-critique lorsque la symetrie du parametre d'ordre est suffisamment elevee. Nous appliquons la methode au probleme du pseudogap dans le modele de Hubbard attractif. Nos resultats montrent un excellent accord avec les donnees Monte Carlo pour de petits systemes. Nous observons que le regime ou apparait le pseudogap dans le poids spectral a une particule est un regime classique renormalise caracterise par une frequence caracteristique des fluctuations supraconductrices inferieure a la temperature. Une autre caracteristique est la faible densite de superfluide de cette phase demontrant que nous ne sommes pas en presence de paires preformees. Les resultats obtenus semblent montrer que la haute symetrie du parametre d'ordre et la bidimensionalite du systeme etudie elargissent le domaine de temperature pour lequel le regime pseudogap est observe. Nous argumentons que ce resultat est transposable aux supraconducteurs a haute temperature critique ou le pseudogap apparait a des' temperatures beaucoup plus grandes que la temperature critique. La forte symetrie dans ces systemes pourraient etre reliee a la theorie SO(5) de Zhang. En annexe, nous demontrons un resultat tout recent qui permettrait d'assurer l'auto-coherence entre les proprietes a une et a deux particules par l'ajout d'une dynamique au vertex irreductible. Cet ajout laisse entrevoir la possibilite d'etendre la methode au cas d'une forte interaction.

  1. Auto-eficacia de docentes de Educação Fisica

    OpenAIRE

    Roberto Tadeu Iaochite

    2007-01-01

    Resumo: Os estudos sobre as crenças de auto-eficácia fundamentados no referencial da teoria social cognitiva têm revelado contribuições significativas para as áreas da educação, psicologia, medicina, educação física, administração, dentre outras. No cenário educacional, esses estudos têm focalizado sobre as crenças de auto-eficácia dos docentes em diferentes contextos, disciplinas e níveis de ensino. Auto-eficácia docente diz respeito a um julgamento que o professor faz acerca das próprias ca...

  2. Utilização do AutoCAD 2004 para quantificação de pesquisas usando fotomicrografias eletrônicas AutoCAD 2004 to quantify electron-photomicrography

    Directory of Open Access Journals (Sweden)

    Carla Albertina Martins Almeida

    2007-08-01

    Full Text Available OBJETIVO: Avaliar o uso do programa AutoCAD 2004 para estudos quantitativos em microscopia eletrônica. MÉTODOS: A demonstração da utilização do AutoCAD 2004 foi feita em um modelo experimental de diabetes induzido em ratos, divididos em Grupo Controle (GC-10 animais e Grupo Diabético (GD - 10 animais, avaliados 1 mês depois da indução do diabetes. Os olhos foram removidos após o sacrifício dos animais e preparados para exame em microscópio eletrônico, tendo sido feitas fotografias dos vasos retinianos. Foi utilizado o programa AutoCAD2004 para avaliar a espessura da membrana basal dos vasos. Os resultados foram avaliados estatisticamente. RESULTADOS: Usando o método proposto foi possível realizar medidas quantitativas na membrana basal de vasos retinianos de ratos diabéticos. CONCLUSÃO: O AutoCAD 2004 se mostrou efetivo, seguro e de fácil utilização para a quantificação de fenômenos biológicos, sendo possível sugerir este meio para a realização de avaliações quantitativas em experimentos biológicos.OBJECTIVE: To determine if the AutoCAD 2004 program is available to be used in quantitative research on electron microscopy. METHODS: A demonstrative of the AutoCAD2004 was done in an experimental model of diabetes induced in rats. The animals were divided by lot in control group animals (GC-10 animals and diabetic group (GD - 10 animals, evaluated 1 month after the diabetes induction. The eyes were removed after sacrifice and prepared to electron microscopy. The retina was photographed and the AutoCAD2004 program was used to measure the basal membrane of retina vessels. The results were submitted to statistical analysis. RESULTS: The AutoCAD2004 was effective to obtain quantitative measures from the basal membrane of retina vessels and there were no difference between the studied groups. CONCLUSION: The AutoCAD2004 was effective, safe and easy to apply to quantify biological parameters, which allowed suggest it to

  3. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  4. Collective Mind: Towards Practical and Collaborative Auto-Tuning

    Directory of Open Access Journals (Sweden)

    Grigori Fursin

    2014-01-01

    Full Text Available Empirical auto-tuning and machine learning techniques have been showing high potential to improve execution time, power consumption, code size, reliability and other important metrics of various applications for more than two decades. However, they are still far from widespread production use due to lack of native support for auto-tuning in an ever changing and complex software and hardware stack, large and multi-dimensional optimization spaces, excessively long exploration times, and lack of unified mechanisms for preserving and sharing of optimization knowledge and research material. We present a possible collaborative approach to solve above problems using Collective Mind knowledge management system. In contrast with previous cTuning framework, this modular infrastructure allows to preserve and share through the Internet the whole auto-tuning setups with all related artifacts and their software and hardware dependencies besides just performance data. It also allows to gradually structure, systematize and describe all available research material including tools, benchmarks, data sets, search strategies and machine learning models. Researchers can take advantage of shared components and data with extensible meta-description to quickly and collaboratively validate and improve existing auto-tuning and benchmarking techniques or prototype new ones. The community can now gradually learn and improve complex behavior of all existing computer systems while exposing behavior anomalies or model mispredictions to an interdisciplinary community in a reproducible way for further analysis. We present several practical, collaborative and model-driven auto-tuning scenarios. We also decided to release all material at c-mind.org/repo to set up an example for a collaborative and reproducible research as well as our new publication model in computer engineering where experimental results are continuously shared and validated by the community.

  5. A visual LISP program for voxelizing AutoCAD solid models

    Science.gov (United States)

    Marschallinger, Robert; Jandrisevits, Carmen; Zobl, Fritz

    2015-01-01

    AutoCAD solid models are increasingly recognized in geological and geotechnical 3D modeling. In order to bridge the currently existing gap between AutoCAD solid models and the grid modeling realm, a Visual LISP program is presented that converts AutoCAD solid models into voxel arrays. Acad2Vox voxelizer works on a 3D-model that is made up of arbitrary non-overlapping 3D-solids. After definition of the target voxel array geometry, 3D-solids are scanned at grid positions and properties are streamed to an ASCII output file. Acad2Vox has a novel voxelization strategy that combines a hierarchical reduction of sampling dimensionality with an innovative use of AutoCAD-specific methods for a fast and memory-saving operation. Acad2Vox provides georeferenced, voxelized analogs of 3D design data that can act as regions-of-interest in later geostatistical modeling and simulation. The Supplement includes sample geological solid models with instructions for practical work with Acad2Vox.

  6. The role of brand image congruity in Iranian consumers’ demand for auto parts

    Directory of Open Access Journals (Sweden)

    Naser Azad

    2014-06-01

    Full Text Available One of the primary issues in handling demands for auto parts in the world is to build a mutual trust between consumers and vendors. When people trust a brand, they purchase more easily and it is possible to develop market. In Iran, there is a growing interest in demand for auto parts and each year, tens of millions of auto parts are getting sold. This paper presents an empirical investigation to detect the effects of brand image on demand for auto parts. Using a sample of 202 randomly selected people who buy/sell auto parts in city of Tehran, Iran, the study determines three variables including brand strength, brand attributes and consumer trust through the implementation of structural equation modeling.

  7. Analysis on the workspace of palletizing robot based on AutoCAD

    Science.gov (United States)

    Li, Jin-quan; Zhang, Rui; Guan, Qi; Cui, Fang; Chen, Kuan

    2017-10-01

    In this paper, a four-degree-of-freedom articulated palletizing robot is used as the object of research. Based on the analysis of the overall configuration of the robot, the kinematic mathematical model is established by D-H method to figure out the workspace of the robot. In order to meet the needs of design and analysis, using AutoCAD secondary development technology and AutoLisp language to develop AutoCAD-based 2D and 3D workspace simulation interface program of palletizing robot. At last, using AutoCAD plugin, the influence of structural parameters on the shape and position of the working space is analyzed when the structure parameters of the robot are changed separately. This study laid the foundation for the design, control and planning of palletizing robots.

  8. High speed auto-charging system for condenser bank

    International Nuclear Information System (INIS)

    Mizuno, Yasunori; Bito, Fumio; Fujita, Kazuhiko; Sometani, Taro

    1987-01-01

    A current-control type high-speed charging system, which is intended for auto-charging of the condenser bank, is developed. Moreover, the system can also serve to compensate the current leakage from the condenser bank so that the charged voltage can be kept constant. The system consists of a sequence circuit, a charging current control circuit (or auto-charging circuit) and a charging circuit. The auto-charging circuit is characterized by the use of a triac to control the current. The current, controlled by the circuit, is supplied to the condenser bank through a step-up transformer and voltage doubler rectifier circuit. It is demonstrated that the use of the high-speed auto-charging circuit can largely decrease the required charging time, compared to constant voltage charging. In addition, the compensation function is shown to serve effectively for maintaining a constant voltage after the completion of charging. The required charging time is decreases as the charging current increases. The maximum charging current is decided by the rating of the traic and the current rating of the rectifier diode in the secondary circuit. Major components of these circuits have decreased impedances to minimize the effect of noise, so that the possibility of an accident can be eliminated. Other various improvements are made in the grounding circuit and the charging protection circuit in order to ensure safety. (Nogami, K.)

  9. 46 CFR 28.875 - Radar, depth sounding, and auto-pilot.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Radar, depth sounding, and auto-pilot. 28.875 Section 28.875 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY UNINSPECTED VESSELS REQUIREMENTS FOR COMMERCIAL FISHING INDUSTRY VESSELS Aleutian Trade Act Vessels § 28.875 Radar, depth sounding, and auto-pilot...

  10. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  11. Innovaatioiden esteet ja profiloitumisen keinot AutoPalinin markkinoinnissa

    OpenAIRE

    Vallin, Veera

    2011-01-01

    Tämän opinnäytetyön aiheena olivat innovaatioiden esteet ja profiloitumisen keinot AutoPalinin markkinoinnissa. Työssä tutkittiin ja analysoitiin Satakunnan suurimman autotalon AutoPalinin uusien autojen sanomalehtimainontaa ja selvitettiin ilmoi-tusten sisältöön rajoittavasti vaikuttavia tekijöitä. Tavoitteena oli selittää automainonnan samankaltaisuuden aiheuttajia ja etsiä keinoja jälleenmyyjän parempaan profiloitumiseen painetussa mediassa. Opinnäytetyössä esiteltiin erilaisia sanomal...

  12. A Logistic Regression Based Auto Insurance Rate-Making Model Designed for the Insurance Rate Reform

    Directory of Open Access Journals (Sweden)

    Zhengmin Duan

    2018-02-01

    Full Text Available Using a generalized linear model to determine the claim frequency of auto insurance is a key ingredient in non-life insurance research. Among auto insurance rate-making models, there are very few considering auto types. Therefore, in this paper we are proposing a model that takes auto types into account by making an innovative use of the auto burden index. Based on this model and data from a Chinese insurance company, we built a clustering model that classifies auto insurance rates into three risk levels. The claim frequency and the claim costs are fitted to select a better loss distribution. Then the Logistic Regression model is employed to fit the claim frequency, with the auto burden index considered. Three key findings can be concluded from our study. First, more than 80% of the autos with an auto burden index of 20 or higher belong to the highest risk level. Secondly, the claim frequency is better fitted using the Poisson distribution, however the claim cost is better fitted using the Gamma distribution. Lastly, based on the AIC criterion, the claim frequency is more adequately represented by models that consider the auto burden index than those do not. It is believed that insurance policy recommendations that are based on Generalized linear models (GLM can benefit from our findings.

  13. Auto-regenerative TL dating with zircon inclusions from fired materials

    International Nuclear Information System (INIS)

    Templer, R.H.; Smith, B.W.

    1988-01-01

    In this paper it is shown that it is possible to date fired material using zircon inclusions. The effects of zoning and anomalous fading are overcome using an auto-regenerative dating procedure. The high radioactivity of the grains gives a measurable self-induced TL (thermoluminescence) signal within a few months. Comparison of this ''auto-regenerated'' TL with the natural TL (which has accumulated since the firing) yields the age of the material. A sensitive TL reader capable of recording the auto-regenerated signal after 6 months is also described, and the results of age determinations on a number of known age samples are presented. (author)

  14. AutoTutor and Family: A Review of 17 Years of Natural Language Tutoring

    Science.gov (United States)

    Nye, Benjamin D.; Graesser, Arthur C.; Hu, Xiangen

    2014-01-01

    AutoTutor is a natural language tutoring system that has produced learning gains across multiple domains (e.g., computer literacy, physics, critical thinking). In this paper, we review the development, key research findings, and systems that have evolved from AutoTutor. First, the rationale for developing AutoTutor is outlined and the advantages…

  15. AutoCAD electrical 2013 for electrical control designers

    CERN Document Server

    Tickoo, Sham; CADCIM Technologies

    2013-01-01

    The AutoCAD Electrical 2013 for Electrical Control Designers textbook has been written to assist the engineering students and the practicing designers learn the application of various AutoCAD Electrical tools and options for creating electrical control designs. After reading this textbook, the users will be able to create professional electrical-control drawings easily and effectively. Moreover, the users will be able to automate various control engineering tasks such as building circuits, numbering wires, creating bills of materials, and many more. The textbook takes the users across a wide spectrum of electrical control drawings through progressive examples and numerous illustrations and exercises, thereby making it an ideal guide for both the novice and the advanced users. Salient Features of the Textbook Consists of 14 chapters that are organized in a pedagogical sequence covering various tools and features of AutoCAD Electrical such as schematic drawings, parametric and non-parametric PLC modules, Circu...

  16. AutoCAD electrical 2016 for electrical control designers

    CERN Document Server

    Tickoo, Sham

    2016-01-01

    The AutoCAD Electrical 2016 for Electrical Control Designers textbook has been written to assist the engineering students and the practicing designers who are new to AutoCAD Electrical. Using this textbook, the readers can learn the application of basic tools required for creating professional electrical control drawings with the help of AutoCAD Electrical. Keeping in view the varied requirements of the users, this textbook covers a wide range of tools and features such as schematic drawings, Circuit Builder, panel drawings, parametric and nonparametric PLC modules, stand-alone PLC I/O points, ladder diagrams, point-to-point wiring diagrams, report generation, creation of symbols, and so on. This will help the readers to create electrical drawings easily and effectively. Special emphasis has been laid on the introduction of concepts, which have been explained using text and supported with graphical examples. The examples and tutorials used in this book ensure that the users can relate the information provided...

  17. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  18. Beyond NextGen: AutoMax Overview and Update

    Science.gov (United States)

    Kopardekar, Parimal; Alexandrov, Natalia

    2013-01-01

    Main Message: National and Global Needs - Develop scalable airspace operations management system to accommodate increased mobility needs, emerging airspace uses, mix, future demand. Be affordable and economically viable. Sense of Urgency. Saturation (delays), emerging airspace uses, proactive development. Autonomy is Needed for Airspace Operations to Meet Future Needs. Costs, time critical decisions, mobility, scalability, limits of cognitive workload. AutoMax to Accommodate National and Global Needs. Auto: Automation, autonomy, autonomicity for airspace operations. Max: Maximizing performance of the National Airspace System. Interesting Challenges and Path Forward.

  19. Auto-compensation of ion beam in an accelerator with anode layer

    International Nuclear Information System (INIS)

    Bizyukov, A.A.; Kashaba, A.E.; Sereda, K.N.; Tselujko, A.F.; Yunakov, N.N.

    1997-01-01

    Experiments of studies on the ion beam auto-compensation are described. It is shown that in the accelerators with anode layer in the case of insulated collector there appears the auto-compensation due to excitation of additional non-independent gaseous discharge

  20. Using AutoCAD to improve the visibility of the organizational technological design

    Directory of Open Access Journals (Sweden)

    Lebedeva Irina Mikhailovna

    2014-01-01

    Full Text Available The article describes the issue of increasing the visibility of technological solutions in organizational-technological design. The ability to visualize the main stages of building process technology contributes to organic integration of all the requirements. A special role for the harmonious perception is played by correct display of the lighting facilities, shadowing. Realistic shadows help to analyze the rooms’ insolation of the designed facility and the surrounding areas. We give a justification for the use of AutoCAD in order to automate the process of visualizing the results of organizational-technological design. The author describes the methods of obtaining realistic natural lighting in AutoCAD without significantly increasing the complexity of the process. Engineering companies in 46 % of cases use the software AutoCAD in order to create construction plans. AutoCAD has a variety of possibilities and is constantly evolving. Continuation is one of the benefits of this program. AutoCAD is unique in terms of customization, because, apart from instruction languages, it has two built-in programming languages: AutoLISP and VisualBasic. Because of these specific features AutoCAD allows to create any applications related to graphics implementation. Constant monitoring of lightning changes allows finding the appropriate in terms of aesthetics, ergonomics and insolation decisions on planning and associating a building or structure to the environment. Solar lighting is simulated by a combination of several directional lightning point sources. The author offers a brief description of the program algorithm, which allows automatically managing lighting settings and creating a file with a realistic visualization of the design solutions.

  1. Testing First-Order Logic Axioms in AutoCert

    Science.gov (United States)

    Ahn, Ki Yung; Denney, Ewen

    2009-01-01

    AutoCert [2] is a formal verification tool for machine generated code in safety critical domains, such as aerospace control code generated from MathWorks Real-Time Workshop. AutoCert uses Automated Theorem Provers (ATPs) [5] based on First-Order Logic (FOL) to formally verify safety and functional correctness properties of the code. These ATPs try to build proofs based on user provided domain-specific axioms, which can be arbitrary First-Order Formulas (FOFs). These axioms are the most crucial part of the trusted base, since proofs can be submitted to a proof checker removing the need to trust the prover and AutoCert itself plays the part of checking the code generator. However, formulating axioms correctly (i.e. precisely as the user had really intended) is non-trivial in practice. The challenge of axiomatization arise from several dimensions. First, the domain knowledge has its own complexity. AutoCert has been used to verify mathematical requirements on navigation software that carries out various geometric coordinate transformations involving matrices and quaternions. Axiomatic theories for such constructs are complex enough that mistakes are not uncommon. Second, adjusting axioms for ATPs can add even more complexity. The axioms frequently need to be modified in order to have them in a form suitable for use with ATPs. Such modifications tend to obscure the axioms further. Thirdly, speculating validity of the axioms from the output of existing ATPs is very hard since theorem provers typically do not give any examples or counterexamples.

  2. [THREE CASES OF ACCIDENTAL AUTO-INJECTION OF ADRENALINE].

    Science.gov (United States)

    Yanagida, Noriyuki; Iikura, Katsuhito; Ogura, Kiyotake; Wang, Ling-jen; Asaumi, Tomoyuki; Sato, Sakura; Ebisawa, Motohiro

    2015-12-01

    Reports on accidental auto-injection of adrenaline are few. We encountered three cases of accidental injection of adrenaline. In this study, we have examined and reported the clinical courses and symptoms of our cases. CASE 1 involved a female physician in her 50s who had attended an explanatory meeting on auto-injection of adrenaline. She mistook EpiPen® to be the EpiPen trainer and accidentally injected herself with 0.3 mg EpiPen®. Her systolic/diastolic pressure peaked at 7 min to reach 144/78 mmHg and decreased to 120/77 mmHg at 14 min. Except for palpitation after 7 min, the only subjective symptom was local pain at the injection site. CASE 2 was noted in a 6-year-old boy. He accidentally pierced his right forefinger with 0.15 mg EpiPen®, and after 20 min, his right forefinger was swollen. The swelling improved 80 min after the accidental injection. CASE 3 was noted in a 4-year-old girl. She accidentally injected herself with 0.15 mg EpiPen®. Her systolic/diastolic pressure peaked at 23 min to reach 123/70 mmHg and decreased to 96/86 mmHg at 28 min. Severe adverse effects of accidental auto-injection of adrenaline were not observed in these three cases. Our findings suggest that while handling adrenaline auto-injectors, we should keep in mind the possibility of accidental injection.

  3. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  4. 78 FR 74128 - Proposed CERCLA Administrative Cost Recovery Settlement; Cadie Auto Salvage Site, Belvidere...

    Science.gov (United States)

    2013-12-10

    ... Recovery Settlement; Cadie Auto Salvage Site, Belvidere, Boone County, Illinois AGENCY: Environmental... Auto Salvage Site in Belvidere, Boone County, Illinois with the following settling parties: UOP, LLC... Cadie Auto Salvage Site, Belvidere, Boone County, Illinois and EPA Docket No. and should be addressed to...

  5. 78 FR 77673 - Proposed CERCLA Administrative Cost Recovery Settlement; Cadie Auto Salvage Site, Belvidere...

    Science.gov (United States)

    2013-12-24

    ... Recovery Settlement; Cadie Auto Salvage Site, Belvidere, Boone County, Illinois AGENCY: Environmental... Auto Salvage Site in Belvidere, Boone County, Illinois with the following settling party: Helen E... reference the Cadie Auto Salvage Site, Belvidere, Boone County, Illinois and EPA Docket No. and should be...

  6. Implementasi Penggunaan Aplikasi AutoCAD dalam Meningkatkan Kompetensi Dasar Menggambar teknik bagi Masyarakat

    Directory of Open Access Journals (Sweden)

    Risma Dwi Atmajayani

    2018-05-01

    Full Text Available Dengan berkembangnya teknologi, maka gambarpun ikut mengalami kemajuan dalam penggunaannya. Dengan kecanggihan dan kemajuan teknologi dapat melahirkan suatu cara menggambar dengan media komputer. Teknologi dapat membantu mempercepat menyelesaikan suatu pekerjaan, tidak terkecuali aplikasi CAD (Computer Aided Design. Program yang sering digunakan untuk pengajaran CAD adalah AutoCAD yang merupakan sebuah aplikasi (software yang digunakan untuk menggambar, mendesain gambar, menguji material dimana program tersebut mempunyai kemudahan dan keunggulan untuk membuat gambar secara tepat dan akurat. Berdasarkan temuan dilapangan yang didasari tinjauan langsung, didapatkan informasi bahwa materi AutoCAD yang diperoleh dari jenjang sebelumnya masih banyak yang jauh dari kondisi ideal. Materi AutoCAD yang didapatkan masih banyak tentang teori sedikit praktek, perangkat hardware yang terbatas sampai pada ketersediaan sumber daya manusia yang kurang adalah permasalahan umum yang terjadi. Adapun tujuan yang ingin dicapai adalah (1 Meningkatkan mutu peserta pelatihan melalui workshop pemanfaatan aplikasi AutoCAD (2 Meningkatkan ketrampilan peserta pelatihan dengan membuat suatu proyek desain gambar bangun berbasis aplikasi AutoCAD. Manfaat kegiatan pelatihan adalah: (1 Peserta pelatihan dapat meningkatkan pemahaman tentang program AutoCAD; (2 Peserta pelatihan dapat menyalurkan pengetahuan dan ketrampilan yang didapatkan nantinya kepada yang membutuhkan dan terutama akan sangat membantu para calon civil engineer dalam menyelesaikan pekerjaan yang berkaitan dengan desain rancang bangun; (3 Peserta pelatihan dapat mendesain gambar menggunakan program AutoCAD.

  7. The Auto-Gopher: A Wireline Rotary-Percussive Deep Sampler

    Science.gov (United States)

    Bar-Cohen, Yoseph; Zacny, Kris; Badescu, Mircea; Lee, Hyeong Jae; Sherrit, Stewart; Bao, Xiaoqi; Paulsen, Gale L.; Beegle, Luther

    2016-01-01

    Accessing regions on planetary bodies that potentially preserved biosignatures or are presently habitable is vital to meeting NASA solar system "Search for Life" exploration objectives. To address these objectives, a wireline deep rotary-percussive corer called Auto-Gopher was developed. The percussive action provides effective material fracturing and the rotation provides effective cuttings removal. To increase the drill's penetration rate, the percussive and rotary motions are operated simultaneously. Initially, the corer was designed as a percussive mechanism for sampling ice and was demonstrated in 2005 in Antarctica reaching about 2 m deep. The lessons learned suggested the need to use a combination of rotation and hammering to maximize the penetration rate. This lesson was implemented into the Auto-Gopher-I deep drill which was demonstrated to reach 3-meter deep in gypsum. The average drilling power that was used has been in the range of 100-150 Watt, while the penetration rate was approximately 2.4 m/hr. Recently, a task has started with the goal to develop Auto-Gopher-II that is equipped to execute all the necessary functions in a single drilling unit. These functions also include core breaking, retention and ejection in addition drilling. In this manuscript, the Auto-Gopher-II, its predecessors and their capability are described and discussed.

  8. Gene-Auto: Automatic Software Code Generation for Real-Time Embedded Systems

    Science.gov (United States)

    Rugina, A.-E.; Thomas, D.; Olive, X.; Veran, G.

    2008-08-01

    This paper gives an overview of the Gene-Auto ITEA European project, which aims at building a qualified C code generator from mathematical models under Matlab-Simulink and Scilab-Scicos. The project is driven by major European industry partners, active in the real-time embedded systems domains. The Gene- Auto code generator will significantly improve the current development processes in such domains by shortening the time to market and by guaranteeing the quality of the generated code through the use of formal methods. The first version of the Gene-Auto code generator has already been released and has gone thought a validation phase on real-life case studies defined by each project partner. The validation results are taken into account in the implementation of the second version of the code generator. The partners aim at introducing the Gene-Auto results into industrial development by 2010.

  9. Investigating the Simulink Auto-Coding Process

    Science.gov (United States)

    Gualdoni, Matthew J.

    2016-01-01

    Model based program design is the most clear and direct way to develop algorithms and programs for interfacing with hardware. While coding "by hand" results in a more tailored product, the ever-growing size and complexity of modern-day applications can cause the project work load to quickly become unreasonable for one programmer. This has generally been addressed by splitting the product into separate modules to allow multiple developers to work in parallel on the same project, however this introduces new potentials for errors in the process. The fluidity, reliability and robustness of the code relies on the abilities of the programmers to communicate their methods to one another; furthermore, multiple programmers invites multiple potentially differing coding styles into the same product, which can cause a loss of readability or even module incompatibility. Fortunately, Mathworks has implemented an auto-coding feature that allows programmers to design their algorithms through the use of models and diagrams in the graphical programming environment Simulink, allowing the designer to visually determine what the hardware is to do. From here, the auto-coding feature handles converting the project into another programming language. This type of approach allows the designer to clearly see how the software will be directing the hardware without the need to try and interpret large amounts of code. In addition, it speeds up the programming process, minimizing the amount of man-hours spent on a single project, thus reducing the chance of human error as well as project turnover time. One such project that has benefited from the auto-coding procedure is Ramses, a portion of the GNC flight software on-board Orion that has been implemented primarily in Simulink. Currently, however, auto-coding Ramses into C++ requires 5 hours of code generation time. This causes issues if the tool ever needs to be debugged, as this code generation will need to occur with each edit to any part of

  10. Item Response Theory analysis of the Autonomy over Tobacco Scale (AUTOS).

    Science.gov (United States)

    Wellman, Robert J; Edelen, Maria Orlando; DiFranza, Joseph R

    2015-06-01

    The Autonomy over Tobacco Scale (AUTOS) is composed of 12-symptoms of nicotine dependence. While it has demonstrated excellent reliability and validity, several psychometric properties have yet to be investigated. We aimed to determine (1) whether items functioned differently across demographic groups, (2) the likelihood that individual symptoms would be endorsed by smokers at different levels of diminished autonomy, and (3) the degree of information provided by each item and the reliability of the full AUTOS across the range of diminished autonomy. Data for this study come from two convenience samples of American adult current smokers (n=777; 69% female; 88% white; Mage=34 years, range: 18-78), of whom 66% were daily smokers (Mcigarettes/smoking day=10.1, range: AUTOS online as part of "a research study about the experiences people have when they smoke." After p value correction, items remained invariant across sex and minority status, while two items functioned differently according to age, with minimal impact on the total AUTOS score. Discriminative power of the items was high. The greatest amount of information is provided at just under one-half SD above the mean and the least at the extremes of diminished autonomy. The AUTOS maintains acceptable reliability (>0.70) across the range of diminished autonomy within which more than 95% of smokers' scores could be anticipated to fall. The AUTOS is a versatile and psychometrically sound instrument for measuring the loss of autonomy over tobacco use. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. From Single- to Multi-Objective Auto-Tuning of Programs: Advantages and Implications

    Directory of Open Access Journals (Sweden)

    Juan Durillo

    2014-01-01

    Full Text Available Automatic tuning (auto-tuning of software has emerged in recent years as a promising method that tries to automatically adapt the behaviour of a program to attain different performance objectives on a given computing system. This method is gaining momentum due to the increasing complexity of modern multicore-based hardware architectures. Many solutions to auto-tuning have been explored ranging from simple random search to more sophisticate methods like machine learning or evolutionary search. To this day, it is still unclear whether these approaches are general enough to encompass all the complexities of the problem (e.g. search space, parameters influencing the search space, input data sensitivity, etc., or which approach is best suited for a given problem. Furthermore, the growing interest in auto-tuning a program for several objectives is increasing this confusion even further. The goal of this paper is to formally describe the problem addressed by auto-tuning programs and review existing solutions highlighting the advantages and drawbacks of different techniques for single-objective as well as multi-objective auto-tuning approaches.

  12. Auto-optimisation for three-dimensional conformal radiotherapy of nasopharyngeal carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Wu, V.W.C. E-mail: orvinwu@polyu.edu.hk; Kwong, D.W.L.; Sham, J.S.T.; Mui, A.W.L

    2003-08-01

    Purpose: The purpose of this study was to evaluate the application of auto-optimisation in the treatment planning of three-dimensional conformal radiotherapy (3DCRT) of nasopharyngeal carcinoma (NPC). Methods: Twenty-nine NPC patients were planned by both forward planning and auto-optimisation methods. The forward plans, which consisted of three coplanar facial fields, were produced according to the routine planning criteria. The auto-optimised plans, which consisted of 5-15 (median 9) fields, were generated by the planning system after prescribing the dose requirements and the importance weightings of the planning target volume and organs at risk. Plans produced by the two planning methods were compared by the dose volume histogram, tumour control probability (TCP), conformity index and normal tissue complication probability (NTCP). Results: The auto-optimised plans reduced the average planner's time by over 35 min. It demonstrated better TCP and conformity index than the forward plans (P=0.03 and 0.04, respectively). Besides, the parotid gland and temporo-mandibular (TM) joint were better spared with the mean dose reduction of 31.8 and 17.7%, respectively. The slight trade off was the mild dose increase in spinal cord and brain stem with their maximum doses remaining within the tolerance limits. Conclusions: The findings demonstrated the potentials of auto-optimisation for improving target dose and parotid sparing in the 3DCRT of NPC with saving of the planner's time.

  13. Auto-optimisation for three-dimensional conformal radiotherapy of nasopharyngeal carcinoma

    International Nuclear Information System (INIS)

    Wu, V.W.C.; Kwong, D.W.L.; Sham, J.S.T.; Mui, A.W.L.

    2003-01-01

    Purpose: The purpose of this study was to evaluate the application of auto-optimisation in the treatment planning of three-dimensional conformal radiotherapy (3DCRT) of nasopharyngeal carcinoma (NPC). Methods: Twenty-nine NPC patients were planned by both forward planning and auto-optimisation methods. The forward plans, which consisted of three coplanar facial fields, were produced according to the routine planning criteria. The auto-optimised plans, which consisted of 5-15 (median 9) fields, were generated by the planning system after prescribing the dose requirements and the importance weightings of the planning target volume and organs at risk. Plans produced by the two planning methods were compared by the dose volume histogram, tumour control probability (TCP), conformity index and normal tissue complication probability (NTCP). Results: The auto-optimised plans reduced the average planner's time by over 35 min. It demonstrated better TCP and conformity index than the forward plans (P=0.03 and 0.04, respectively). Besides, the parotid gland and temporo-mandibular (TM) joint were better spared with the mean dose reduction of 31.8 and 17.7%, respectively. The slight trade off was the mild dose increase in spinal cord and brain stem with their maximum doses remaining within the tolerance limits. Conclusions: The findings demonstrated the potentials of auto-optimisation for improving target dose and parotid sparing in the 3DCRT of NPC with saving of the planner's time

  14. Introduction to AutoCAD 2013 2D and 3D design

    CERN Document Server

    Yarwood, Alf

    2013-01-01

    Master the complexities of the world's bestselling 2D and 3D software with Alf Yarwood's Introduction to AutoCAD 2013. Ideally suited to new users of AutoCAD, this book will be a useful resource for drawing modules in both vocational and introductory undergraduate courses in engineering and construction.Alf Yarwood has once again produced a comprehensive, step-by-step introduction to the latest release of AutoCAD. Covering all the basic principles and acting as an introduction to 2D drawing, it also contains extensive coverage of all 3D topics, including 3D solid modelling a

  15. Should we systematically test patients with clinically isolated syndrome for auto-antibodies?

    Science.gov (United States)

    Negrotto, Laura; Tur, Carmen; Tintoré, Mar; Arrambide, Georgina; Sastre-Garriga, Jaume; Río, Jordi; Comabella, Manuel; Nos, Carlos; Galán, Ingrid; Vidal-Jordana, Angela; Simon, Eva; Castilló, Joaquín; Palavra, Filipe; Mitjana, Raquel; Auger, Cristina; Rovira, Àlex; Montalban, Xavier

    2015-12-01

    Several autoimmune diseases (ADs) can mimic multiple sclerosis (MS). For this reason, testing for auto-antibodies (auto-Abs) is often included in the diagnostic work-up of patients with a clinically isolated syndrome (CIS). The purpose was to study how useful it was to systematically determine antinuclear-antibodies, anti-SSA and anti-SSB in a non-selected cohort of CIS patients, regarding the identification of other ADs that could represent an alternative diagnosis. From a prospective CIS cohort, we selected 772 patients in which auto-Ab levels were tested within the first year from CIS. Baseline characteristics of auto-Ab positive and negative patients were compared. A retrospective revision of clinical records was then performed in the auto-Ab positive patients to identify those who developed ADs during follow-up. One or more auto-Ab were present in 29.4% of patients. Only 1.8% of patients developed other ADs during a mean follow-up of 6.6 years. In none of these cases the concurrent AD was considered the cause of the CIS. In all cases the diagnosis of the AD resulted from the development of signs and/or symptoms suggestive of each disease. Antinuclear-antibodies, anti-SSA and anti-SSB should not be routinely determined in CIS patients but only in those presenting symptoms suggestive of other ADs. © The Author(s), 2015.

  16. Auto-oscillations of temperature and defect density in impure crystals under irradiation

    International Nuclear Information System (INIS)

    Selishchev, P.A.; Sugakov, V.I.

    1990-01-01

    Appearance of auto-oscillations in temperature and defect density of impurity crystals under irradiation is studied. It is shown that at certain critical parameters stationary distribution of temperature and defect density of the sample irradiated becomes unstable as regards the formation of temporal dissipative structures: auto-oscillations of temperature and defect density. Critical parameters are determined (the rate of defect formation, temperature of crystal environment, etc.) and the frequency of appearing auto-oscillations, its dependence on irradiation conditions and crystal properties are found

  17. Clinical utility of anti-p53 auto-antibody: systematic review and focus on colorectal cancer.

    Science.gov (United States)

    Suppiah, Aravind; Greenman, John

    2013-08-07

    Mutation of the p53 gene is a key event in the carcinogenesis of many different types of tumours. These can occur throughout the length of the p53 gene. Anti-p53 auto-antibodies are commonly produced in response to these p53 mutations. This review firstly describes the various mechanisms of p53 dysfunction and their association with subsequent carcinogenesis. Following this, the mechanisms of induction of anti-p53 auto-antibody production are shown, with various hypotheses for the discrepancies between the presence of p53 mutation and the presence/absence of anti-p53 auto-antibodies. A systematic review was performed with a descriptive summary of key findings of each anti-p53 auto-antibody study in all cancers published in the last 30 years. Using this, the cumulative frequency of anti-p53 auto-antibody in each cancer type is calculated and then compared with the incidence of p53 mutation in each cancer to provide the largest sample calculation and correlation between mutation and anti-p53 auto-antibody published to date. Finally, the review focuses on the data of anti-p53 auto-antibody in colorectal cancer studies, and discusses future strategies including the potentially promising role using anti-p53 auto-antibody presence in screening and surveillance.

  18. Diagnostic Utility of Auto-Antibodies in Inflammatory Muscle Diseases.

    Science.gov (United States)

    Allenbach, Y; Benveniste, O

    2015-01-01

    To date, there are four main groups of idiopathic inflammatory myopathies (IIM): polymyositis (PM), dermatomyositis (DM), immune-mediated necrotizing myopathy (IMNM) and sporadic inclusion body myositis; based on clinical presentation and muscle pathology. Nevertheless, important phenotypical differences (either muscular and/or extra-muscular manifestations) within a group persist. In recent years, the titration of different myositis-specific (or associated) auto-antibodies as a diagnostic tool has increased. This is an important step forward since it may facilitate, at a viable cost, the differential diagnosis between IIM and other myopathies. We have now routine access to assays for the detection of different antibodies. For example, IMNM are related to the presence of anti-SRP or anti-HMGCR. PM is associated with anti-synthetase antibodies (anti-Jo-1, PL-7, PL-12, OJ, and EJ) and DM with anti-Mi-2, anti-SAE, anti-TIF-1-γ and anti-NXP2 (both associated with cancer) or anti-MDA5 antibodies (associated with interstitial lung disease). Today, over 30 myositis specific and associated antibodies have been characterised, and all groups of myositis may present one of those auto-antibodies. Most of them allow identification of homogenous patient groups, more precisely than the classical international classifications of myositis. This implies that classification criteria could be modified accordingly, since these auto-antibodies delineate groups of patients suffering from myositis with consistent clinical phenotype (muscular and extra-muscular manifestations), common prognostic (cancer association, presence of interstitial lung disease, mortality and risk of relapse) and treatment responses. Nevertheless, since numerous auto-antibodies have been recently characterised, the exact prevalence of myositis specific antibodies remains to be documented, and research of new auto-antibodies in the remaining seronegative group is still needed.

  19. Auto-imunidade e colágeno V Autoimmunity and collagen V

    Directory of Open Access Journals (Sweden)

    Cristiane Carla de Oliveira

    2006-06-01

    Full Text Available As proteínas da matriz extracelular (MEC e seus componentes estão sendo amplamente estudados na literatura médica, assim como sua relação com o remodelamento tecidual presente nas doenças reumáticas. Neste artigo, mostramos a importância do estudo do colágeno do tipo V no entendimento da etiologia da esclerodermia, no que se refere ao desencadeamento da auto-imunidade nesta enfermidade. Estudos em nosso laboratório demonstram que a sensibilização com colágeno do tipo V em coelhos pode resultar em um modelo animal de esclerodermia. Diante destes fatos, sugerimos que pesquisas neste campo podem ser de grande valia no desenvolvimento de novas condutas terapêuticas.The extracellular matrix (ECM proteins and their components have been widely studied in medical literature, as well its relationship with the tecidual remodeling present in the rheumatic disease. In this paper we show the importance of understanding the role of type V collagen as an important trigger of rheumatic autoimmune diseases. Studies in our laboratory demonstrate that type V collagen sensibilization in rabbits, could result in an animal scleroderma model. In this way we suggested that researches in this field can be worthy in development of new therapeutic procedures.

  20. Grand Theft Auto is a "Sandbox" Game, but There are Weapons, Criminals, and Prostitutes in the Sandbox: Response to Ferguson and Donnellan (2017).

    Science.gov (United States)

    Gabbiadini, Alessandro; Bushman, Brad J; Riva, Paolo; Andrighetto, Luca; Volpato, Chiara

    2017-12-01

    In this issue, (Ferguson, C. J., & Donnellan, B. D., Journal of Youth and and Adolescence, published online 21 June 2017) criticize one of our studies (Gabbiadini, A., Riva, P., Andrighetto, L., Volpato, C., & Bushman, B. J., PLoS ONE, 11: 1-14, 2016) that found violent sexist video games can reduce empathy for female violence victims in male players who identify with violent male game characters, and do so by increasing masculine beliefs. Their main criticism is a "straw person" argument built on a claim that we never made (i.e., a direct effect of sexist-violent video games on empathy). They also made several other criticisms of our article. We appreciate the opportunity to respond to their criticisms in this article. We also point out some flaws in their reanalysis. Despite their criticisms, the core contributions of our original article remain intact.

  1. A new data integration approach for AutoCAD and GIS

    Science.gov (United States)

    Ye, Hongmei; Li, Yuhong; Wang, Cheng; Li, Lijun

    2006-10-01

    GIS has its advantages both on spatial data analysis and management, particularly on the geometric and attributive information management, which has also attracted lots attentions among researchers around world. AutoCAD plays more and more important roles as one of the main data sources of GIS. Various work and achievements can be found in the related literature. However, the conventional data integration from AutoCAD to GIS is time-consuming, which also can cause the information loss both in the geometric aspects and the attributive aspects for a large system. It is necessary and urgent to sort out new approach and algorithm for the efficient high-quality data integration. In this paper, a novel data integration approach from AutoCAD to GIS will be introduced based on the spatial data mining technique through the data structure analysis both in the AutoCAD and GIS. A practicable algorithm for the data conversion from CAD to GIS will be given as well. By a designed evaluation scheme, the accuracy of the conversion both in the geometric and the attributive information will be demonstrated. Finally, the validity and feasibility of the new approach will be shown by an experimental analysis.

  2. Clinical laboratory evaluation of the Auto-Microbic system for rapid identification of Enterobacteriaceae.

    OpenAIRE

    Hasyn, J J; Cundy, K R; Dietz, C C; Wong, W

    1981-01-01

    The capability of the Auto-Microbic system (Vitek Systems, Inc., Hazelwood, Mo.) has been expanded to identify members of the family Enterobacteriaceae with the use of a sealed, disposable accessory card (the Enterobacteriaceae Biochemical Card) containing 26 biochemical tests. To judge the accuracy of the AutoMicrobic system's identification in a hospital laboratory, 933 Enterobacteriaceae isolates were studied. The AutoMicrobic system provided the correct identification for 905 of the isola...

  3. Instant Autodesk AutoCAD 2014 customization with .NET

    CERN Document Server

    Nelson, Tom

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. An instruction-based guide with examples written in the C# programming language. VB.NET programmers can also take advantage of these examples by using one of the free conversion websites to convert the examples to VB.NET.Clear, step-by-step instructions and complete code examples illustrate the processes, making it easy to develop your own custom AutoCAD tools.This book is perfect if you are interested in customizing AutoCAD 2014 using the .NET API. You should have a basic familiari

  4. Auto Body Welding 2 (Course Outline), Automotive Body Repair and Refinishing 1: 9033.04.

    Science.gov (United States)

    Dade County Public Schools, Miami, FL.

    The 90-hour course is a foundation quinmester course in welding for the auto body repairman. The outline consists of seven blocks of instruction (orientation, 6 hours; auto body oxyacetylene welding, 10 hours; electric arc welding equipment, 6 hours; auto body electric arc welding, 8 hours; position welding, 40 hours; electric spot welders, 16…

  5. Flipped-Adversarial AutoEncoders

    OpenAIRE

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  6. Auto Euroopa Liidus kallim / Sulev Oll

    Index Scriptorium Estoniae

    Oll, Sulev, 1964-

    2001-01-01

    Euroopa Liiduga liitumisel tuleb uue auto eest välja käia vähemalt 10 000 krooni rohkem, kuna plaanide kohaselt ei tohi liikmesriikides autode hinnaerinevused ületada 12%. Ilmunud ka: Delovõje Vedomosti, 28. märts 2001, lk. 7

  7. A voxel visualization and analysis system based on AutoCAD

    Science.gov (United States)

    Marschallinger, Robert

    1996-05-01

    A collection of AutoLISP programs is presented which enable the visualization and analysis of voxel models by AutoCAD rel. 12/rel. 13. The programs serve as an interactive, graphical front end for manipulating the results of three-dimensional modeling software producing block estimation data. ASCII data files describing geometry and attributes per estimation block are imported and stored as a voxel array. Each voxel may contain multiple attributes, therefore different parameters may be incorporated in one voxel array. Voxel classification is implemented on a layer basis providing flexible treatment of voxel classes such as recoloring, peeling, or volumetry. A versatile clipping tool enables slicing voxel arrays according to combinations of three perpendicular clipping planes. The programs feature an up-to-date, graphical user interface for user-friendly operation by non AutoCAD specialists.

  8. Europe's Auto/Oil 2 program, understanding the cost-benefits of NGV's

    NARCIS (Netherlands)

    Weide, J. van der

    2000-01-01

    In the mid-nineties in Europe, the so-called Auto/Oil 1 Program was carried out. The aim was to improve air quality in urban areas by setting new emissions standards based on improved vehicle and fuel technology. The program was carried out by the auto and oil industry under leadership of the

  9. Procedural Attack! Procedural Generation for Populated Virtual Cities: A Survey

    Directory of Open Access Journals (Sweden)

    Werner Gaisbauer

    2017-06-01

    Full Text Available On the one hand, creating rich virtual worlds "by hand" like in the game Grand Theft Auto V is hugely expensive and limited to large studios. On the other hand, procedural content generation (PCG allows tiny teams to create huge worlds like Hello Games did with only four people (in the beginning for the recently released game No Man's Sky. Following in the footsteps of Hello Games, this paper tries to equip the reader with an overview about the state-of-the-art of how to build such a virtual world, i.e., a populated virtual city with buildings, streets, parks, vegetation, humans, and vehicles, using just PCG assets. Each PCG asset that is envisioned to bring the city to life is grouped and discussed in detail and the latest research trends in PCG are presented together with open questions. Using the above-mentioned PCG assets, instead of months, a city can be built in a mere couple of minutes by a user without much experience in designing 3D assets. The city can then be used for many applications like games, virtual reality (VR, or film.

  10. Promoting inclusive education, civic scientific literacy, and global citizenship with videogames

    Science.gov (United States)

    Marino, Matthew T.; Hayes, Michael T.

    2012-12-01

    In this response to Yupanqui Munoz and Charbel El-Hani's paper, "The student with a thousand faces: From the ethics in videogames to becoming a citizen", we examine their critique of videogames in science education. Munoz and El-Hani present a critical analysis of videogames such as Grand Theft Auto, Street Fight, Command and Conquer: Generals, Halo, and Fallout 3 using Neil Postman's (1993) conceptualization of technopoly along with Bill Green and Chris Bigum's (1993) notion of the cyborg curriculum. Our contention is that these games are not representative of current educational videogames about science, which hold the potential to enhance civic scientific literacy across a diverse range of students while promoting cross-cultural understandings of complex scientific concepts and phenomenon. We examine games that have undergone empirical investigation in general education science classrooms, such as River City, Quest Atlantis, Whyville, Resilient Planet, and You Make Me Sick!, and discuss the ways these videogames can engage students and teachers in a constructivist dialogue that enhances science education. Our critique extends Munoz and El-Hani's discussion through an examination of the ways videogames can enhance science education by promoting inclusive education, civic scientific literacy, and global citizenship.

  11. La importancia de ser grande

    OpenAIRE

    Baisre, J. A.

    2007-01-01

    Se responde a las preguntas ¿por qué los mamíferos marinos son los animales más grandes del planeta?, ¿Por qué los peces no pueden ser más grandes?. Éstas y otras interrogantes son respondidas de forma sencilla y clara.

  12. The Devil and his Dramatic Function in Calderon’s Autos Sacramentales

    Directory of Open Access Journals (Sweden)

    Luis Iglesias Feijoo

    2014-05-01

    Full Text Available In some Calderón’s autos sacramentales the character of the Devil draws the plot and establishes the dramatic action as a demiurge. He elaborates plans and strategies to confuse the Man, but he always fails. This function approaches the autos to the metatheater. Finally certain parallels with Shakespeare are suggested.

  13. Auto-correlation analysis of wave heights in the Bay of Bengal

    Indian Academy of Sciences (India)

    Time series observations of significant wave heights in the Bay of Bengal were subjected to auto- correlation analysis to determine temporal variability scale. The analysis indicates an exponen- tial fall of auto-correlation in the first few hours with a decorrelation time scale of about six hours. A similar figure was found earlier ...

  14. Auto-estima dos alunos de graduação de enfermagem

    Directory of Open Access Journals (Sweden)

    Lucila Amaral Carneiro Vianna

    2002-10-01

    Full Text Available Este estudo avalia a auto-estima dos alunos de Graduação em Enfermagem, que por meio da Oficina desenvolvem mecanismos para melhoria da auto-estima, acreditando ser a fase mais propícia para se tornarem multiplicadores das ações de saúde. METODOLOGIA: foi realizado com 156 alunos do 3º ano. Foram utilizadas técnicas do sociodrama, da neurolingüística e a avaliação foi elaborada segundo Minayo. Foi possível verificar que a auto-estima é normalmente confundida com a auto-imagem e estas são estereotipadas, em ambos os sexos. Por estar voltado e preocupado com o bem estar e a qualidade de vida do cliente / paciente, o profissional de enfermagem negligencia a si próprio. Neste caso, a Oficina, foi essencial para que os alunos pudessem resgatar maior conhecimento interior sobre si, e que para prestar assistência eficaz aos clientes/pacientes, devem estar saudáveis física e psicologicamente.

  15. Investigation of natural gas theft by magnetic remanence mapping.

    Science.gov (United States)

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  16. MICRO AUTO GASIFICATION SYSTEM: EMISSIONS CHARACTERIZATION

    Science.gov (United States)

    A compact, CONEX-housed waste to energy unit, Micro Auto Gasification System (MAGS), was characterized for air emissions from burning of military waste types. The MAGS unit is a dual chamber gasifier with a secondary diesel-fired combustor. Eight tests were conducted with multipl...

  17. Lowest auto-detachment state of the water anion

    International Nuclear Information System (INIS)

    Houfek, K.; Cizek, M.

    2016-01-01

    Because of the abundance of water in living tissue the reactive low-energy electron collisions with the water molecule represent an important step in the radiation damage of cells. In this paper, the potential energy surface of the ground state of the water anion H_2O"- is carefully mapped using multireference configuration interaction (MRCI) calculations for a large range of molecular geometries. Particular attention is paid to a consistent description of both the O"-+H_2 and OH"-+H asymptotes and to a relative position of the anion energy to the ground state energy of the neutral molecule. The auto-detachment region, where the anion state crosses to the electronic continuum is identified. The local minimum in the direction of the O"- + H_2 channel previously reported by Werner et al. [J. Chem. Phys. 87, 2913 (1987)] is found to be slightly off the linear geometry and is separated by a saddle from the auto-detachment region. The auto-detachment region is directly accessible from the OH"-+H asymptote. For the molecular geometries in the auto-detachment region and in its vicinity we also performed fixed-nuclei electron-molecule scattering calculations using the R-matrix method. Tuning of consistency of a description of the correlation energy in both the multireference CI and R-matrix calculations is discussed. Two models of the correlation energy within the R-matrix method that are consistent with the quantum chemistry calculations are found. Both models yield scattering quantities in a close agreement. The results of this work will allow a consistent formulation of the nonlocal resonance model of the water anion in a future publication

  18. Realization of method of characteristics based on customization of AutoCAD

    International Nuclear Information System (INIS)

    Chen Qichang; Wu Hongchun; Cao Liangzhi

    2009-01-01

    The method of characteristics (MOC) solves the neutron transport equation along each characteristics line. Theoretically, it is independent of the geometry shape of boundary and region. However, the geometry should be described, and ray tracing should be carried out firstly. In most of the existing MOC codes, the geometry description and ray tracing still have more or less limitation. To wipe off these geometry limitations for using MOC in more complex fuel assembly calculation, a new MOC code AutoMOC based on the customization of AutoCAD was developed. The numerical results show that AutoMOC not only has high flexibility in geometry but also gives accurate solutions in comparison with state-of-the-art methodologies. (authors)

  19. Antecedents affecting Thai auto parts enterprise organizational performance

    Directory of Open Access Journals (Sweden)

    Somyos Phoosawad

    2017-04-01

    Full Text Available Thailand is ranked 12th in the world in automotive production, with 57 of the world’s top 100 auto parts manufacturers having factories in Thailand. The industry employs 525,000 workers and represents 12% of Thailand’s gross domestic production (GDP. The automotive industry has also been identified as a core industry in the transition to Thailand 4.0, with digitally enabled, knowledge workers key to its success. This study, therefore, undertook structural equation modeling to conduct an analysis of variables affecting Thai auto parts industry enterprises organizational performance. Using purposive sampling, 320 executives in the Thai automotive industry were selected whose responses to the question constructs were captured using a five-point Likert type agreement scale. Results determined that leadership skills have a significant effect on management skills, and that management skills have a direct and positive effect on management innovation. Additionally, innovation thus far has been viewed as an external process, primarily in response to customer demands or ‘home office’ requirements. Research findings, therefore, suggest that the Thai auto parts industry must develop innovative leadership management which is crucial to sustaining a competitive, domestic capability.

  20. AutoBayes Program Synthesis System System Internals

    Science.gov (United States)

    Schumann, Johann Martin

    2011-01-01

    This lecture combines the theoretical background of schema based program synthesis with the hands-on study of a powerful, open-source program synthesis system (Auto-Bayes). Schema-based program synthesis is a popular approach toward program synthesis. The lecture will provide an introduction into this topic and discuss how this technology can be used to generate customized algorithms. The synthesis of advanced numerical algorithms requires the availability of a powerful symbolic (algebra) system. Its task is to symbolically solve equations, simplify expressions, or to symbolically calculate derivatives (among others) such that the synthesized algorithms become as efficient as possible. We will discuss the use and importance of the symbolic system for synthesis. Any synthesis system is a large and complex piece of code. In this lecture, we will study Autobayes in detail. AutoBayes has been developed at NASA Ames and has been made open source. It takes a compact statistical specification and generates a customized data analysis algorithm (in C/C++) from it. AutoBayes is written in SWI Prolog and many concepts from rewriting, logic, functional, and symbolic programming. We will discuss the system architecture, the schema libary and the extensive support infra-structure. Practical hands-on experiments and exercises will enable the student to get insight into a realistic program synthesis system and provides knowledge to use, modify, and extend Autobayes.

  1. Anti-pentraxin 3 auto-antibodies might be protective in lupus nephritis: a large cohort study.

    Science.gov (United States)

    Yuan, Mo; Tan, Ying; Pang, Yun; Li, Yong-Zhe; Song, Yan; Yu, Feng; Zhao, Ming-Hui

    2017-11-01

    Anti-pentraxin 3 (PTX3) auto-antibodies were found to be associated with the absence of renal involvement in systemic lupus erythematosus (SLE). This study is to investigate the prevalence of anti-PTX3 auto-antibodies and their clinical significance based on a large Chinese lupus nephritis cohort. One hundred and ninety-six active lupus nephritis patients, 150 SLE patients without clinical renal involvement, and 100 healthy controls were enrolled. Serum anti-PTX3 auto-antibodies and PTX3 levels were screened by enzyme-linked immunosorbent assay (ELISA). The associations between anti-PTX3 auto-antibodies and clinicopathological parameters in lupus nephritis were further analyzed. Anti-PTX3 auto-antibodies were less prevalent in active lupus nephritis patients compared with SLE without renal involvement (19.4% (38/196) versus 40.7% (61/150), p auto-antibodies were negatively correlated with proteinuria in lupus nephritis (r = -.143, p = .047). The levels of proteinuria, serum creatinine, and the prevalence of thrombotic microangiopathy were significantly higher in patients with higher PTX3 levels (≥3.207 ng/ml) and without anti-PTX3 auto-antibodies compared with patients with lower PTX3 levels (auto-antibodies (4.79 (3.39-8.28) versus 3.95 (1.78-7.0), p = .03; 168.84 ± 153.63 versus 101.44 ± 47.36, p = .01; 34.1% (14/41) versus 0% (0/9), p = .04; respectively). Anti-PTX3 auto-antibodies were less prevalent in active lupus nephritis patients compared with SLE without renal involvement and associated with less severe renal damage, especially with the combined evaluation of serum PTX3 levels.

  2. Auto-tuning systems for J-PARC LINAC RF cavities

    International Nuclear Information System (INIS)

    Fang, Z.; Kobayashi, T.; Fukui, Y.; Futatsukawa, K.; Michizono, S.; Yamaguchi, S.; Anami, S.; Suzuki, H.; Sato, F.; Shinozaki, S.; Chishiro, E.

    2014-01-01

    The 400-MeV proton linear accelerator (LINAC) at the Japan Proton Accelerator Research Complex (J-PARC) consists of 324-MHz low-β and 972-MHz high-β accelerator sections. From October 2006 to May 2013, only the 324-MHz low-β accelerator section was in operation. From the summer of 2013 the J-PARC LINAC was upgraded by installing the 972-MHz high-β accelerator section, and the proton beam was successfully accelerated to 400 MeV in January 2014. Auto-tuning systems for the J-PARC LINAC RF cavities have been successfully developed. A first generation design, an auto-tuning system using a mechanical tuner controller, was developed and operated for the first 3 years. Then the second-generation auto-tuning system was developed using a new approach to the RF cavity warm-up process, and this was applied to the accelerator operation for the subsequent 4 years. During the RF cavity warm-up process in this system, the mechanical tuner is constantly fixed and the input RF frequency is automatically tuned to the cavity resonance frequency using the FPGA (Field-Programmable Gate Array) of the digital feedback RF control system. After the input power level reaches the required value, input RF frequency tuning is stopped and it is switched to the operation frequency. Then, the mechanical tuner control begins operation. This second-generation auto-tuning system was extremely effective for the 324-MHz cavity operation. However, if we apply this approach to the 972-MHz RF cavities, an interlock due to the RF cavity reflection amplitude occasionally occurs at the end of the warm-up process. In order to solve this problem a third generation novel auto-tuning system was successfully developed in December 2013 and applied to the operation of the J-PARC LINAC, including the 972-MHz ACS RF cavities. During the warm-up process both the mechanical tuner controller and the input RF frequency tuning are in operation, and good matching between the input RF frequency and the RF cavity is

  3. Auto-tuning systems for J-PARC LINAC RF cavities

    Energy Technology Data Exchange (ETDEWEB)

    Fang, Z., E-mail: fang@post.kek.jp [High Energy Accelerator Research Organization (KEK), 1-1 Oho, Tsukuba, Ibaraki 305-0801 (Japan); Kobayashi, T.; Fukui, Y.; Futatsukawa, K.; Michizono, S.; Yamaguchi, S.; Anami, S. [High Energy Accelerator Research Organization (KEK), 1-1 Oho, Tsukuba, Ibaraki 305-0801 (Japan); Suzuki, H.; Sato, F.; Shinozaki, S.; Chishiro, E. [Japan Atomic Energy Agency (JAEA), 2-4 Shirane Shirakata, Tokai-mura, Naka-gun, Ibaraki 319-1195 (Japan)

    2014-12-11

    The 400-MeV proton linear accelerator (LINAC) at the Japan Proton Accelerator Research Complex (J-PARC) consists of 324-MHz low-β and 972-MHz high-β accelerator sections. From October 2006 to May 2013, only the 324-MHz low-β accelerator section was in operation. From the summer of 2013 the J-PARC LINAC was upgraded by installing the 972-MHz high-β accelerator section, and the proton beam was successfully accelerated to 400 MeV in January 2014. Auto-tuning systems for the J-PARC LINAC RF cavities have been successfully developed. A first generation design, an auto-tuning system using a mechanical tuner controller, was developed and operated for the first 3 years. Then the second-generation auto-tuning system was developed using a new approach to the RF cavity warm-up process, and this was applied to the accelerator operation for the subsequent 4 years. During the RF cavity warm-up process in this system, the mechanical tuner is constantly fixed and the input RF frequency is automatically tuned to the cavity resonance frequency using the FPGA (Field-Programmable Gate Array) of the digital feedback RF control system. After the input power level reaches the required value, input RF frequency tuning is stopped and it is switched to the operation frequency. Then, the mechanical tuner control begins operation. This second-generation auto-tuning system was extremely effective for the 324-MHz cavity operation. However, if we apply this approach to the 972-MHz RF cavities, an interlock due to the RF cavity reflection amplitude occasionally occurs at the end of the warm-up process. In order to solve this problem a third generation novel auto-tuning system was successfully developed in December 2013 and applied to the operation of the J-PARC LINAC, including the 972-MHz ACS RF cavities. During the warm-up process both the mechanical tuner controller and the input RF frequency tuning are in operation, and good matching between the input RF frequency and the RF cavity is

  4. Estudo de caso controlo emparelhado da depressão, sintomas psicopatológicos, auto-estima e auto-conceito em mulheres obesas e normativas

    OpenAIRE

    Carneiro, Ana

    2010-01-01

    O presente estudo teve como objectivo avaliar se existem diferenças estatisticamente significativas no que respeita à auto – estima e ao auto – conceito em mulheres obesas, utentes de uma unidade de saúde a usufruir de apoio psicoterapêutico comparativamente com mulheres normativas. Pretendeu-se ainda verificar a existência de indicadores de maior incidência de depressão e de sintomas psicopatológicos nas mulheres obesas relativamente às mulheres normativas. A amostra foi constituída po...

  5. Retrofitting the AutoBayes Program Synthesis System with Concrete Syntax

    Science.gov (United States)

    Fischer, Bernd; Visser, Eelco

    2004-01-01

    AutoBayes is a fully automatic, schema-based program synthesis system for statistical data analysis applications. Its core component is a schema library. i.e., a collection of generic code templates with associated applicability constraints which are instantiated in a problem-specific way during synthesis. Currently, AutoBayes is implemented in Prolog; the schemas thus use abstract syntax (i.e., Prolog terms) to formulate the templates. However, the conceptual distance between this abstract representation and the concrete syntax of the generated programs makes the schemas hard to create and maintain. In this paper we describe how AutoBayes is retrofitted with concrete syntax. We show how it is integrated into Prolog and describe how the seamless interaction of concrete syntax fragments with AutoBayes's remaining legacy meta-programming kernel based on abstract syntax is achieved. We apply the approach to gradually mitigate individual schemas without forcing a disruptive migration of the entire system to a different First experiences show that a smooth migration can be achieved. Moreover, it can result in a considerable reduction of the code size and improved readability of the code. In particular, abstracting out fresh-variable generation and second-order term construction allows the formulation of larger continuous fragments.

  6. 75 FR 24753 - The Walker Auto Group, Inc., Miamisburg, OH; Notice of Negative Determination Regarding...

    Science.gov (United States)

    2010-05-05

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-72,471] The Walker Auto Group... Auto Group, Inc., Miamisburg, Ohio, was based on the finding that the subject firm did not shift abroad... of the subject firm should be eligible for TAA because the Walker Auto Group, Inc., Miamisburg, Ohio...

  7. Long-term outcome of patients with multiple [corrected] myeloma-related advanced renal failure following auto-SCT.

    Science.gov (United States)

    Glavey, S V; Gertz, M A; Dispenzieri, A; Kumar, S; Buadi, F; Lacy, M; Hayman, S R; Kapoor, P; Dingli, D; McCurdy, A; Hogan, W J; Gastineau, D A; Leung, N

    2013-11-01

    Renal failure commonly complicates multiple myeloma (MM) and is associated with reduced survival. It is not clear whether auto-SCT results in improved renal function or attainment of independence from dialysis in patients with advanced renal impairment due to MM. We conducted a retrospective cohort study of all patients who underwent auto-SCT for MM complicated by advanced renal failure at our institution over a 10-year period (2000-2010). We aimed to assess the association between auto-SCT and renal outcome in patients with serum creatinine (SCr) over 3 mg/dL, attributable to MM, including those who were dialysis dependent. Thirty patients (2.8% of all auto-SCT patients) met inclusion criteria. Fourteen of 15 patients who were dialysis dependent before auto-SCT remained dialysis dependent in the long term despite hematological response (HR). Of the remaining 15 patients with SCr >3 mg/dL, an improvement in glomerular filtration rate (GFR) from 15 to 19.4 mL/min/1.73 m(2) was noted post auto-SCT (P=0.035); however, neither HR post auto-SCT or pre-existing renal function were independently associated with renal outcome. Auto-SCT was not associated with independence from dialysis in patients with renal failure due to MM at our institution. Although auto-SCT was associated with an improvement in GFR in patients with SCr >3 mg/dL, this improvement was not related to HR.

  8. AutoPowerOff plug banks - a story with energy saving perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Hjort Jensen, Anders (The Danish Electricity Saving Trust (Denmark)); Fjordbak, Troels (IT Energy ApS (Denmark))

    2009-07-01

    Denmark uses around 35 TWh of electricity per year, with residential dwellings accounting for around 10 TWh of this figure. Standby consumption comprises around 12% of power used in homes. If every Danish home installed AutoPowerOff plug banks, savings exceeding 500 GWh per year would be possible, equivalent to 5% of household electricity consumption, or 1.5% of the total in Denmark. This paper describes the estimated standby consumption in Danish homes in 2006, and possible energy savings through the use of AutoPowerOff plug banks. The estimates were subsequently used as background information for a 2007-2008 campaign to promote the wider use of these devices in Denmark. In order to increase the sale of AutoPowerOff plug banks by 1 million units, it was agreed that retail chains selling consumer electronics would include an AutoPowerOff when selling a TV or PC. A nationwide TV advertising campaign was launched featuring the names of participating retailers. Sales of AutoPowerOff plug banks in the first 7 months of 2008 passed the 515,000 mark, with over 1 million units now installed in 2.5 million Danish households. Annual savings are estimated to be over 80 GWh, equivalent to 40,000 tons of CO{sub 2}. This equates to potential savings on an EU-wide basis of more than 7 TWh, or 3.6 million tons of CO{sub 2} in Denmark.

  9. Auto Carrier Transporter Loading and Unloading Improvement

    National Research Council Canada - National Science Library

    Miller, Brian

    2003-01-01

    .... Any reduction in time and energy will result in a significant savings of money. The intent of this research is to develop an algorithm to solve the Auto Carrier Transport Pickup and Delivery Problem...

  10. Skill Formation in Malaysia: The Case of Auto Parts Industry

    OpenAIRE

    Sadoi, Yuri

    1998-01-01

    This study takes the auto parts industry in Malaysia to demonstrate the difficulties a developing country faces in promoting skill development. Auto parts production needs a wide range of production techniques, which in turn require many types and levels of skilled workers. Realizing the importance of skilled workers, the Malaysian government has been emphasizing skill formation by increasing the number of technical schools, introducing a skill certification system, and giving a tax incentive...

  11. Up and running with AutoCAD 2014 2D and 3D drawing and modeling

    CERN Document Server

    Gindis, Elliot

    2013-01-01

    Get ""Up and Running"" with AutoCAD using Gindis's combination of step-by-step instruction, examples, and insightful explanations. The emphasis from the beginning is on core concepts and practical application of AutoCAD in architecture, engineering and design. Equally useful in instructor-led classroom training, self-study, or as a professional reference, the book is written with the user in mind by a long-time AutoCAD professional and instructor based on what works in the industry and the classroom. Strips away complexities, both real and perceived, and reduces AutoCAD t

  12. Phenotypic modulation of auto-reactive cells by insertion of tolerogenic molecules via MSC-derived exosomes.

    Science.gov (United States)

    Mokarizadeh, Aram; Delirezh, Nowruz; Morshedi, Ahhmad; Mosayebi, Ghasem; Farshid, Amir-Abbas; Dalir-Naghadeh, Bahram

    2012-01-01

    Auto-reactive cells-mediated immune responses are responsible for the current tissue damages during autoimmunity. Accordingly, functional modulation of auto-reactive cells has been a pivotal aim in many of recent studies. In the current study, we investigated the possibility for insertion of regulatory molecules onto auto-reactive cells through exosomal nano-shuttles as a novel approach for phenotype modification of auto-reactive cells. The exosomes were isolated from supernatant of mesenchymal stem cells culture. Resultant exosomes co-cultured with lymphocytes were harvested from established EAE mice in the presence of antigenic MOG35-55 peptide. After 24 hr, insertion of exosomal tolerogenic molecules (PD-L1, TGF-β, galectin-1) onto auto-reactive cells were explored through flow cytometry. The potency of exosomal inserted membrane molecules to modulate phenotype of auto-reactive lymphocytes was assessed upon ELISA test for their-derived cytokines IFN-γ and IL-17. Incorporation of exosomal molecules into lymohocytes' membrane was confirmed by flow cytometric analyses for surface levels of mentioned molecules. Additionally, the decreased secretion of IFN-γ and IL-17 were detected in exosome pre-treated lymphocytes upon stimulation with MOG peptide. Mesenchymal stem cells -derived exosomes showed to be efficient organelles for insertion of bioactive tolerogenic molecules onto auto-reactive cells and modulation of their phenotypes.

  13. Auto-trilevel versus bilevel positive airway pressure ventilation for hypercapnic overlap syndrome patients.

    Science.gov (United States)

    Su, Mei; Huai, De; Cao, Juan; Ning, Ding; Xue, Rong; Xu, Meijie; Huang, Mao; Zhang, Xilong

    2018-03-01

    Although bilevel positive airway pressure (Bilevel PAP) therapy is usually used for overlap syndrome (OS), there is still a portion of OS patients in whom Bilevel PAP therapy could not simultaneously eliminate residual apnea events and hypercapnia. The current study was expected to explore whether auto-trilevel positive airway pressure (auto-trilevel PAP) therapy with auto-adjusting end expiratory positive airway pressure (EEPAP) can serve as a better alternative for these patients. From January of 2014 to June of 2016, 32 hypercapnic OS patients with stable chronic obstructive pulmonary diseases (COPD) and moderate-to-severe obstructive sleep apnea syndrome (OSAS) were recruited. Three variable modes of positive airway pressure (PAP) from the ventilator (Prisma25ST, Weinmann Inc., Germany) were applicated for 8 h per night. We performed the design of each mode at each night with an interval of two nights with no PAP treatment as a washout period among different modes. In Bilevel-1 mode (Bilevel-1), the expiratory positive airway pressure (EPAP) delivered from Bilevel PAP was always set as the lowest PAP for abolishment of snoring. For each patient, the inspiratory positive airway pressure (IPAP) was constantly set the same as the minimal pressure for keeping end-tidal CO 2 (ETCO 2 ) ≤45 mmHg for all three modes. However, the EPAP issued by Bilevel PAP in Bilevel-2 mode (Bilevel-2) was kept 3 cmH 2 O higher than that in Bilevel-1. In auto-trilevel mode (auto-trilevel) with auto-trilevel PAP, the initial part of EPAP was fixed at the same PAP as that in Bilevel-1 while the EEPAP was automatically regulated to rise at a range of ≤4 cmH 2 O based on nasal airflow wave changes. Comparisons were made for parameters before and during or following treatment as well as among different PAP therapy modes. The following parameters were compared such as nocturnal apnea hypopnea index (AHI), minimal SpO 2 (minSpO 2 ), arousal index, sleep structure and efficiency

  14. Analyzing the Impact of Theft and Vandalism in Relation to the Sustainability of Renewable Energy Development Projects in Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Eugene C.X. Ikejemba

    2018-03-01

    Full Text Available Theft and vandalism impede the sustainability of renewable energy (RE development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances on implemented projects. We utilize a consumer clinic approach to generate data that represents the situation. We define our instigators practically (Government Inequality, Crime to Survive, Sabotage and demarcate the actions of the offenders into 4 types: (1 vandalization of small RE projects (SPv; (2 theft of RE infrastructures from small RE projects (SPt; (3 vandalization of large RE projects (LPv; and (4 theft of RE infrastructures from large RE projects (LPt. To counteract these actions we define three types of security interference: human, societal and technical. We model the career of an RE criminal as a multi-stage Markov model. In every stage the offender can commit any of the offences SPv, SPt, LPv, LPt, or go to rest. Transition probabilities are our means to reflect offender maturity. Crucial to our model is that they are affected by the level of interference installed at the project site. Calibrated on a dialogue with 144 respondents, our Markov model directs us to adequate interferences per project. Specifically, for large projects technical and human security are the most effective, whereas, for small projects we recommend societal security. The paper introduces a mathematical model of the career of a RE-offender including the influence of security interference and calibrates the parameters through an ethnographic approach.

  15. Grand unified theories. Pt. 2

    International Nuclear Information System (INIS)

    Ellis, J.

    1982-01-01

    The author gives an introduction to the construction of grand unified theories on the base of the SU(3)xSU(2)xU(1) model of the strong, weak, and electromagnetic interactions. Especially he discusses the proton decay, neutrino masses and oscillations, and cosmological implications in connection with grand unified theories. (orig./HSI)

  16. Auto-Scaling of Geo-Based Image Processing in an OpenStack Cloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Sanggoo Kang

    2016-08-01

    Full Text Available Cloud computing is a base platform for the distribution of large volumes of data and high-performance image processing on the Web. Despite wide applications in Web-based services and their many benefits, geo-spatial applications based on cloud computing technology are still developing. Auto-scaling realizes automatic scalability, i.e., the scale-out and scale-in processing of virtual servers in a cloud computing environment. This study investigates the applicability of auto-scaling to geo-based image processing algorithms by comparing the performance of a single virtual server and multiple auto-scaled virtual servers under identical experimental conditions. In this study, the cloud computing environment is built with OpenStack, and four algorithms from the Orfeo toolbox are used for practical geo-based image processing experiments. The auto-scaling results from all experimental performance tests demonstrate applicable significance with respect to cloud utilization concerning response time. Auto-scaling contributes to the development of web-based satellite image application services using cloud-based technologies.

  17. Auto-Generated Semantic Processing Services

    Science.gov (United States)

    Davis, Rodney; Hupf, Greg

    2009-01-01

    Auto-Generated Semantic Processing (AGSP) Services is a suite of software tools for automated generation of other computer programs, denoted cross-platform semantic adapters, that support interoperability of computer-based communication systems that utilize a variety of both new and legacy communication software running in a variety of operating- system/computer-hardware combinations. AGSP has numerous potential uses in military, space-exploration, and other government applications as well as in commercial telecommunications. The cross-platform semantic adapters take advantage of common features of computer- based communication systems to enforce semantics, messaging protocols, and standards of processing of streams of binary data to ensure integrity of data and consistency of meaning among interoperating systems. The auto-generation aspect of AGSP Services reduces development time and effort by emphasizing specification and minimizing implementation: In effect, the design, building, and debugging of software for effecting conversions among complex communication protocols, custom device mappings, and unique data-manipulation algorithms is replaced with metadata specifications that map to an abstract platform-independent communications model. AGSP Services is modular and has been shown to be easily integrable into new and legacy NASA flight and ground communication systems.

  18. 46 CFR 35.20-45 - Use of Auto Pilot-T/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Use of Auto Pilot-T/ALL. 35.20-45 Section 35.20-45 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Navigation § 35.20-45 Use of Auto Pilot—T/ALL. Except as provided in 33 CFR 164.13, when the automatic pilot is used in: (a) Areas...

  19. Auto-Regulatory RNA Editing Fine-Tunes mRNA Re-Coding and Complex Behaviour in Drosophila

    Science.gov (United States)

    Savva, Yiannis A.; Jepson, James E.C; Sahin, Asli; Sugden, Arthur U.; Dorsky, Jacquelyn S.; Alpert, Lauren; Lawrence, Charles; Reenan, Robert A.

    2014-01-01

    Auto-regulatory feedback loops are a common molecular strategy used to optimize protein function. In Drosophila many mRNAs involved in neuro-transmission are re-coded at the RNA level by the RNA editing enzyme dADAR, leading to the incorporation of amino acids that are not directly encoded by the genome. dADAR also re-codes its own transcript, but the consequences of this auto-regulation in vivo are unclear. Here we show that hard-wiring or abolishing endogenous dADAR auto-regulation dramatically remodels the landscape of re-coding events in a site-specific manner. These molecular phenotypes correlate with altered localization of dADAR within the nuclear compartment. Furthermore, auto-editing exhibits sexually dimorphic patterns of spatial regulation and can be modified by abiotic environmental factors. Finally, we demonstrate that modifying dAdar auto-editing affects adaptive complex behaviors. Our results reveal the in vivo relevance of auto-regulatory control over post-transcriptional mRNA re-coding events in fine-tuning brain function and organismal behavior. PMID:22531175

  20. Albuquerque/Middle Rio Grande Urban Waters Viewer

    Science.gov (United States)

    These data have been compiled in support of the Middle Rio Grande/Albuquerque Urban Waters Partnership for the region including Albuquerque, New Mexico.The Middle Rio Grande/Albuquerque Urban Waters Federal Partnership is co-chaired by the U.S. Dept. of Housing and Urban Development and the U.S. Environmental Protection Agency. There are also a number of other federal agencies engaged in projects with Tribal, State, and local officials, and community stakeholders. Like many western river ecosystems, the Middle Rio Grande faces numerous challenges in balancing competing needs within a finite water supply and other resource constrains. Historical practices by our ancestors and immigrants to the Middle Rio Grande have established the conditions that we have inherited. Long-term drought exacerbated by climate change is changing conditions that affect natural and human communities as we strive to improve our precious Rio Grande.The Middle Rio Grande/Albuquerque Urban Waters Federal Partnership will reconnect our urban communities, particularly those that are overburdened or economically distressed, with the waterway by improving coordination among federal agencies and collaborating with community-led revitalization efforts. Our projects will improve our community water systems and promote their economic, environmental and social benefits. Specifically, the Middle Rio Grande/Albuquerque Urban Waters Federal Partnership will support the development of the Valle de Oro