WorldWideScience

Sample records for hidden victims easing

  1. Computer Ease.

    Science.gov (United States)

    Drenning, Susan; Getz, Lou

    1992-01-01

    Computer Ease is an intergenerational program designed to put an Ohio elementary school's computer lab, software library, staff, and students at the disposal of older adults desiring to become computer literate. Three 90-minute instructional sessions allow seniors to experience 1-to-1 high-tech instruction by enthusiastic, nonthreatening…

  2. Hidden realities inside PBL design processes: Is consensus design an impossible clash of interest between the individual and the collective, and is architecture its first victim?

    Directory of Open Access Journals (Sweden)

    Ole Pihl

    2015-06-01

    Full Text Available How do architecture students experience the contradictions between the individual and the group at the Department of Architecture and Design of Aalborg University? The Problem-Based Learning model has been extensively applied to the department’s degree programs in coherence with the Integrated Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions for the education as being intuition, reflection, artistic progression and critical interpretation (Kiib 2004. “As the reflection and critical interpretation are well integrated within the education, mostly parts of the exam evaluation, it seems like the artistic progression and intuition are somewhat drowning within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004 and is Colb (1975 still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004 claims that we are passing from a complex world into one based on super complexity? Could Gaston Bachelard (1958, who writes in his book The Poetic of Space "that poets and artists are born phenomenologists," help architecture and design students in their journey to find his/her own professional expression? This paper investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic progression and intuition within group work by investigating a group of concrete project cases from the Department of Architecture and Design based upon the

  3. Can Magnetic Coil Ease Tinnitus?

    Science.gov (United States)

    ... Research Updates Technology Horizons Can magnetic coil ease tinnitus? VA trial aims to find out February 3, ... pain. See, for example, this 2009 review study . Tinnitus and Veterans Tinnitus has been one of the ...

  4. Yoga May Help Ease Depression

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_167586.html Yoga May Help Ease Depression It's not a cure- ... HealthDay News) -- If you've ever taken a yoga class, you probably know that it can help ...

  5. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  6. Understanding Victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel; Rand, John; Tarp, Finn

    2007-01-01

    that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime....

  7. When is Quantitative Easing effective?

    OpenAIRE

    Hoermann, Markus; Schabert, Andreas

    2011-01-01

    We present a simple macroeconomic model with open market operations that allows examining the effects of quantitative and credit easing. The central bank controls the policy rate, i.e. the price of money in open market operations, as well as the amount and the type of assets that are accepted as collateral for money. When the policy rate is sufficiently low, this set-up gives rise to an (il-)liquidity premium on non-eligible assets. Then, a quantitative easing policy, which increases the size...

  8. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  9. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  10. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main...... the ill parent. These findings contribute to a deeper understanding of the traumatic process of parental ABI that some children experience and emphasize the importance of family-centred interventions that include the children....

  11. Easing access for lifelong learners

    DEFF Research Database (Denmark)

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina

    2015-01-01

    Easing access to higher education (HE) for those engaging in lifelong learning has been a common policy objective across the European Union since the late 1990s. To reach this goal, the transition between vocational and academic routes must be simplified, but European countries are at different...... developmental stages. This article maps the development in Denmark, Finland, Germany and England using a case study approach deploying data triangulation from a national and institutional perspective. It explores the extent/commonality of structural factors for easing access for students engaging in lifelong...... learning. The cases are at widely different stages, but the following factors were considered essential in all countries for opening universities: the establishment of transition paths from secondary education and working life into HE and links between HE, businesses and adult education from a national...

  12. The family of the trauma victim.

    Science.gov (United States)

    Solursh, D S

    1990-03-01

    Emergency room and trauma unit work offers unique challenges to the nurse, both professionally and personally. One of these challenges is understanding and dealing with the behavior of victims' families. Some of the factors that impact on the behavior of families include (1) the sudden and unpredictable nature of trauma; (2) the nature of the relationship of the specific family member and the trauma victim; (3) the issues of responsibility, anger, and guilt; (4) religious beliefs; and (5) trauma sequelae. The development of organ and tissue donor programs and of psychotraumatology as ways to help ease the plight of trauma victims' families are also discussed.

  13. The malleable meaning of subjective ease.

    Science.gov (United States)

    Briñol, Pablo; Petty, Richard E; Tormala, Zakary L

    2006-03-01

    People can generate the same thoughts or process the same information with different degrees of ease, and this subjective experience has implications for attitudes and social judgment. In prior research, it has generally been assumed that the experience of ease or fluency is interpreted by people as something good. In the two experiments reported here, the meaning or value of ease was directly manipulated, and the implications for evaluative judgments were explored. Across experiments, we replicated the traditional ease-of-retrieval effect (more thought-congruent attitudes when thoughts were easy rather than difficult to generate) when ease was described as positive, but we reversed this effect when ease was described as negative. These findings suggest that it is important to consider both the content of metacognition (e.g., "those thoughts were easy to generate") and the value associated with that content (e.g., "ease is good" or "ease is bad").

  14. Cyberstalking victimization

    Directory of Open Access Journals (Sweden)

    Vilić Vida

    2013-01-01

    Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

  15. Child and Youth Victimization Known to Police, School, and Medical Authorities. National Survey of Children's Exposure to Violence. Juvenile Justice Bulletin

    Science.gov (United States)

    Finkelhor, David; Ormrod, Richard; Turner, Heather; Hamby, Sherry

    2012-01-01

    Considerable efforts have been made during the last generation to encourage children and their families to report victimization to authorities. Nonetheless, concern persists that most childhood victimization remains hidden. The 2008 inventory of childhood victimization--the National Study of Children's Exposure to Violence (NatSCEV)--allowed an…

  16. Nanoparticles Ease Aching Joints in Mice

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_161188.html Nanoparticles Ease Aching Joints in Mice Treatment might one ... News) -- New research in mice suggests that tiny nanoparticles might one day be a better way to ...

  17. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression wher...

  18. Types of rape victimization

    Directory of Open Access Journals (Sweden)

    Novaković Milan

    2007-01-01

    Full Text Available Introduction: Behavior of rape victims is an enigma associated with the following phenomena: poverty, transition, legal weaknesses, and unintegrated mental health network. The aim of the study was to investigate rape victimization in relation to anomie, stress and postwar transition-related weaknesses in B&H in the period 1996-2005; and perform a personal analysis of rape victims. Material and methods: The experimental group consisted of rape victims receiving psychiatric treatment: non-violent victimization (n=125. It included random female victims with mental diseases: victimization by abuse of power and unclear victimization. The control group consisted of violent victimization victims (n=125, females. This was a multicentric, longitudinal, prospective study. Intercorrelation, univariate and canonical discrimination analyses were performed. Results Rape offenders were of male gender (c2 = 29.970 statistical significance p<0.001, from broken families was (c2 = 0.830, migration (c2 = 0.064, and heredity (c2 = 0.406. Victimization was classified as non-violent, social, unclear and violent. Non-violent victimization occurred in 19.03% (2001 to 24.46% (2004. Abuse of mental patients was recorded in 16.08% (2002 and 22.61% (2000, and abuse of power in 2.12% (2000 and 3.55% (2000, whereas unclear rape occurred in 0.88% (2004 and 1.74% (2002. We have found that patients from the primary group are significantly more anxious and depressed in total score and in individual items. Conclusion: Non-violent victimization was committed by persons with impaired intelligence, acute psychotic crisis, and substance abuse. Social victimization and criminally unclear rapes were of transitional character. Victimization was caused by (postwar anomy, poverty, stress and violence. It is given insufficient significance because of high prevalence and "dark number" of victims. The study emphasizes the role of psychiatry as well as weakness of the system in the

  19. Juvenile Victimization and Delinquency.

    Science.gov (United States)

    Esbensen, Finn-Aage; Huizinga, David

    1991-01-01

    Demographic characteristics of juvenile victims of crime and a potential relationship between victimization and self-reported delinquency are examined for 877 adolescents from a large midwestern city. Lifetime victimization rates (LVRs) are higher for those involved in delinquency, and LVRs rise with age and higher levels of delinquent behavior.…

  20. Exercise Helps Ease Arthritis Pain and Stiffness

    Science.gov (United States)

    ... prevent falls, improve posture and coordination, and promote relaxation. Be sure to tell your instructor about your condition and avoid positions or movements that can cause pain. Start slowly to ease your joints into exercise if you haven't been active for a while. If you push yourself too ...

  1. The Polish Genetic Database of Victims of Totalitarianisms.

    Science.gov (United States)

    Ossowski, A; Kuś, M; Kupiec, T; Bykowska, M; Zielińska, G; Jasiński, M E; March, A L

    2016-01-01

    members into a common database; (5) making a conclusive, final identification of the victim. PGBOT's first project was to identify victims of the Communist regime buried in hidden mass graves in the Powązki Military Cemetery in Warsaw. Throughout 2012 and 2013, PGBOT carried out archaeological exhumations in the Powązki Military Cemetery that resulted in the recovery of the skeletal remains of 194 victims in several mass graves. Of the 194 sets of remains, more than 50 victims have been successfully matched and identified through genetic evidence.

  2. Entanglement without hidden nonlocality

    Science.gov (United States)

    Hirsch, Flavien; Túlio Quintino, Marco; Bowles, Joseph; Vértesi, Tamás; Brunner, Nicolas

    2016-11-01

    We consider Bell tests in which the distant observers can perform local filtering before testing a Bell inequality. Notably, in this setup, certain entangled states admitting a local hidden variable model in the standard Bell scenario can nevertheless violate a Bell inequality after filtering, displaying so-called hidden nonlocality. Here we ask whether all entangled states can violate a Bell inequality after well-chosen local filtering. We answer this question in the negative by showing that there exist entangled states without hidden nonlocality. Specifically, we prove that some two-qubit Werner states still admit a local hidden variable model after any possible local filtering on a single copy of the state.

  3. Secondary victims of rape

    DEFF Research Database (Denmark)

    Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask

    2012-01-01

    Rape is often a very traumatic experience, which affects not only the primary victim (PV) but also his/her significant others. Studies on secondary victims of rape are few and have almost exclusively studied male partners of female rape victims. This study examined the impact of rape on 107...... secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...

  4. Hidden circuits and argumentation

    Science.gov (United States)

    Leinonen, Risto; Kesonen, Mikko H. P.; Hirvonen, Pekka E.

    2016-11-01

    Despite the relevance of DC circuits in everyday life and schools, they have been shown to cause numerous learning difficulties at various school levels. In the course of this article, we present a flexible method for teaching DC circuits at lower secondary level. The method is labelled as hidden circuits, and the essential idea underlying hidden circuits is in hiding the actual wiring of DC circuits, but to make their behaviour evident for pupils. Pupils are expected to find out the wiring of the circuit which should enhance their learning of DC circuits. We present two possible ways to utilise hidden circuits in a classroom. First, they can be used to test and enhance pupils’ conceptual understanding when pupils are expected to find out which one of the offered circuit diagram options corresponds to the actual circuit shown. This method aims to get pupils to evaluate the circuits holistically rather than locally, and as a part of that aim this method highlights any learning difficulties of pupils. Second, hidden circuits can be used to enhance pupils’ argumentation skills with the aid of argumentation sheet that illustrates the main elements of an argument. Based on the findings from our co-operating teachers and our own experiences, hidden circuits offer a flexible and motivating way to supplement teaching of DC circuits.

  5. How Hidden Can Be Even More Hidden?

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2011-01-01

    The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform. We define five groups of techniques that can make steganogram less susceptible to detection and extraction. For each of the presented group, examples of the usage are provided based on existing network steganography methods. To authors' best knowledge presented approach is the first attempt in the state of the art to systematically describe general solutions that can make steganographic communication more hidden and steganogram extraction harder to perform.

  6. 悠然前行%At Ease

    Institute of Scientific and Technical Information of China (English)

    韦潞

    2002-01-01

    Body is the constant subject I love. I pay epecial attentions to the toes and fingers, which are of interesting design and rich expression. I choose the simple and plain language of paper-cutting.It is a typical language of pllain design and cubic design of sculpture. Only the both approaches are successful can I be satisfied. Only by this I can express wholly my understanding of body and the viewpoint of aesthetics. The art making is very beautiful. I think I will follow its path and go forward by my own rhythms and of course at ease.

  7. Search for Hidden Particles

    CERN Multimedia

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  8. Solar Hidden Photon Search

    CERN Document Server

    Schwarz, Matthias; Redondo, Javier; Ringwald, Andreas; Wiedemann, Guenter

    2011-01-01

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope.

  9. Solar Hidden Photon Search

    Energy Technology Data Exchange (ETDEWEB)

    Schwarz, Matthias; Wiedemann, Guenter [Hamburg Univ. (Germany). Sternwarte; Lindner, Axel; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Redondo, Javier [Max-Planck-Institut fuer Physik und Astrophysik, Muenchen (Germany)

    2011-11-15

    The Solar Hidden Photon Search (SHIPS) is a joint astroparticle project of the Hamburger Sternwarte and DESY. The main target is to detect the solar emission of a new species of particles, so called Hidden Photons (HPs). Due to kinetic mixing, photons and HPs can convert into each other as they propagate. A small number of solar HPs - originating from photon to HP oscillations in the interior of the Sun - can be converted into photons in a long vacuum pipe pointing to the Sun - the SHIPS helioscope. (orig.)

  10. Victimization of Children.

    Science.gov (United States)

    Finkelhor, David; Dziuba-Leatherman, Jennifer

    1994-01-01

    Outlines a general theory of childhood victimology, with a typology that characterizes abuse as extraordinary, acute, or pandemic. Efforts to prevent childhood victimization must recognize its differential character and the importance of the child's stage of development in recognizing and dealing with victimization. (SLD)

  11. Victim/Witness Assistance.

    Science.gov (United States)

    Rosenblum, Robert H.; Blew, Carol Holliday

    This monograph highlights the elements of four victim-assistance programs which demonstrate the range of services currently being offered. It provides a preliminary look at the impact of such programs and points out where more information is needed. Major topics include victim and witness services and monitoring thereof. The two goals of…

  12. Yoga and victims

    Directory of Open Access Journals (Sweden)

    Nikolić-Ristanović Vesna

    2014-01-01

    Full Text Available In this paper the findings of literature review and explorative empirical research of yoga application in the work with victims of various forms of sufferings is presented. The largest notion of victim is accepted, which encompasses victims of crime, victims of human rights violations (including convicted persons, as well as victims of war, natural disasters and other sufferings. After determination of the notion of victim and yoga, the review and analyses of research findings and direct experiences with the application of yoga in victim support and victimisation prevention worldwide and in Serbia, is done. The author’s research findings as well as personal experiences with the application of yoga in the work with prisoners in prison for women in Pozarevac (Serbia, within the workshops that Victimology Society of Serbia implemented during 2012/2013, are presented as well. In the conclusions, contribution of yoga to holistic approach to victim support as well as important role that yoga may have in prevention of victimisation and criminalisation, is stressed. The importance of yoga for support of prisoners as the part of preparation for re-entry and with the aim to prevent recidivism, as well as to enable their more successful reintegration into the society, is particularly emphasised. The paper is based on the research implemented by the author for the purpose of writing the final essey at the course for yoga instructors on International yoga academy, Yoga Allience of Serbia.

  13. Victims of Rape.

    Science.gov (United States)

    Krasner William; And Others

    A scientific, multidisciplinary examination of the social and psychological effects of rape upon female victims is presented, which is then correlated with: (1) the circumstances that surrounded the rape; (2) the victim's personality and social adaptation before she was raped; and (3) the support available from organizations and people who were…

  14. Victimization of Obese Adolescents

    Science.gov (United States)

    Robinson, Sabrina

    2006-01-01

    Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…

  15. Criminal Victimization 1987.

    Science.gov (United States)

    Shim, Kelly H.; DeBerry, Marshall M.

    1988-01-01

    This bulletin presents National Crime Survey (NCS) data updating the preliminary estimates of crime victimization in 1987, which were released in March, 1988. Statistics are presented which show that the overall level of crime increased marginally, while the victimization rate remained stable over the year. The NCS practice of measuring both…

  16. Yoga, Meditation May Ease Some Breast Cancer Symptoms

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_165746.html Yoga, Meditation May Ease Some Breast Cancer Symptoms But ... of life. But mind-body therapies, such as yoga or meditation, may help ease these troubling concerns, ...

  17. Is the victim blameless?

    Science.gov (United States)

    Fattah, E A

    1990-01-01

    The study concerned 50 cases occurring throughout Austria between 1950 and 1962 where murder was committed for the purpose of robbing the victim. Fifty-nine convicted killers and 61 victims were involved and 1950 was chosen as the starting point of the research in order to avoid undue influence from the extraordinary factors affecting criminality during and immediately following the Second World War. Cases were consecutive and unselected apart from a very small number excluded through unavailability of their files for legal reasons at the time when the data were collected. Unsuccessful murder attempts were not excluded since there is no difference between crimes actually carried out and those merely attempted as regards criminogenic factors, the pre-criminal situation, the choice of victim, the relationship and interaction between criminal and victim, and the recourse to homicide. However, the inquiry was confined to cases where guilt had been proven because of the aim to study not only the crime and the victim, but also the relationship of the criminal and victim. The latter is obviously not possible where the murderer remains unknown. Accordingly, since the material comprises a large number of cases over a fairly long period (more than a decade) from all over Austria, it is fair to claim that it provides an overview of the criminality of murder with intent to rob, and of the killers and the victims, for an entire country and over a significant epoch.

  18. Study on the Relation between Garment Style and Ease Distribution

    Institute of Scientific and Technical Information of China (English)

    WANG Zhao-hui; Edward Newton; Roger Ng; ZHANG Wei-yuan

    2004-01-01

    The shape of body and the ease of garment are the important elements in constructing garment style. However, the distribution of ease in garment is uneven and the curves showing different cross-sections of garment style with ease are unavailable in the literature. This information is crucial when the three-dimensional garment style is transformed into two-dimensional garment patterns. Thus, several different X-line style garments are produced by 3D draping technology, and the cubic spline is used to fit the cross sectional curves of BL, WL of body and garment. By comparing cross sections of body and garment, the ease at different location can be derived. Besides, garments in 10 different dimensions and quantities of style ease are included in the current study. By numerical operation on discrete ease data at different location, the fitted functions of ease distribution are obtained.

  19. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  20. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  1. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  2. Coupling of Hidden Sector

    CERN Document Server

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fermions ("sterinos") and sterile mediating bosons ("sterons") of mass dimension 1 (not 2!) - the last described by an antisymmetric tensor field - requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, suggested recently by experiment.

  3. [False victimization syndrome].

    Science.gov (United States)

    Resch, Mária; Bella, Tamás

    2011-04-03

    Criminology and criminal-psychology are sciences dealing mostly with the personality of the criminals as well as the interconnections of crime and deviance. The other player of the crimes - the victim - has recently come into focus posing the question why and how somebody is becoming a victim, and what effect can the victim have when the crime is being committed. The first international publications appeared at the beginning of the third millennium on so-called victims who are convinced to suffer from material, moral or other damages and, accordingly, who would pursue "justice" at any rate. They often appeal against decisions. Considering these facts the procedures are rather thorough and circumspect. A significant part of the law-enforcement staff is heavily involved for long periods. On the other side there is the person considered criminal being actually the real victim. These people are getting alienated from the society because of their reckoned deeds and, because of the distorting influence of the media they are condemned morally. The present study describes the syndromes of fake-victim, their occurrence as well as psychiatric considerations, social appearance and impact. The authors are drawing attention to the existence and significance of this medical-legal problem.

  4. The Culpable Victim in Mendelsohn's Typology.

    Science.gov (United States)

    Sengstock, Mary C.

    This paper provides a review of Benjamin Mendelsohn's delineation of a typology of criminal victims. The typology consists of six categories: (1) completely innocent victims; (2) victims with minor guilt; (3) voluntary victims; (4) victims more guilty than the offender; (5) victims who alone are guilty; and (6) the imaginary victims. It is noted…

  5. Hidden variables and hidden time in quantum theory

    OpenAIRE

    Kurakin, Pavel V.

    2005-01-01

    Bell's theorem proves only that hidden variables evolving in true physical time can't exist; still the theorem's meaning is usually interpreted intolerably wide. The concept of hidden time (and, in general, hidden space-time) is introduced. Such concept provides a whole new class of physical theories, fully compatible with current knowledge, but giving new tremendous possibilities. Those theories do not violate Bell's theorem.

  6. STAND AT EASE/GARY GREEN

    Directory of Open Access Journals (Sweden)

    Gert Van der Westhuizen

    2011-08-01

    Full Text Available Books by ex-conscripts detailing their experiences were few and far betweenin the era of the Border War while more than 500 000 white males were called upfor what was described as “national service”. While books like these are not exactlyflooding the shelves of bookstores, they roll of the presses more regularly now.These works mostly deal with ex-conscript's that actively experienced the war inNamibia and Angola.Stand at ease is different: there is no "cordite and conflict".Green describes himself as a reluctant conscript (one wonders how many ofthe erstwhile national servicemen were of the same view. He was a product of oneof the country's first multi-racial schools - in this case a school that did not subscribeto the former government's apartheid policies.Hence, his period of national service was seen as a necessary evil, somethingthat had to be done - to get it behind one. But he and a few friends were determinedto have as easy a time as possible. Their most important aim was to avoid the"dreaded" call-up to the Border. Green was helped in this endeavour when he wasmedically classified as G3K3. He was called up to 5 South African InfantryBattalion in Ladysmith where he spent a few days before going to Kimberley. Hedid guard duty at 93 Ammunition Depot in Jan Kempdorp in the Northern Capebefore being deployed to the Army Battle School in Lohatla where he spent the restof his days as a national serviceman.He says his time in the military "could hardly be described as constructive orenjoyable", but it was also "a period of unprecedented personal growth and selfdiscovery”.“There is little doubt that during the two years of my conscription, Istopped being a boy and at some point became a man." Green unfortunately does notelaborate too much on this rite of passage.

  7. On the potential of Multiple Systems Estimation for estimating the number of victims of human trafficking across the world : Written for the UNODC, where it appeared as Research Brief ‘Multiple Systems Estimation for estimating the number of victims of human trafficking across the world’

    OpenAIRE

    van Dijk, Jan; van der Heijden, P.G.M.

    2016-01-01

    UNODC has been collecting international statistics on detected victims of trafficking in persons since 2003. At present, there is no sound estimate of the non-detected number of victims of trafficking in persons worldwide. Due to methodological differences and the challenges associated with estimating the sizes of hidden populations such as trafficking victims, this is a task that has so far not been satisfactorily accomplished. However, these efforts are set to gain momentum now that the era...

  8. Identifying biological themes within lists of genes with EASE.

    Science.gov (United States)

    Hosack, Douglas A; Dennis, Glynn; Sherman, Brad T; Lane, H Clifford; Lempicki, Richard A

    2003-01-01

    EASE is a customizable software application for rapid biological interpretation of gene lists that result from the analysis of microarray, proteomics, SAGE and other high-throughput genomic data. The biological themes returned by EASE recapitulate manually determined themes in previously published gene lists and are robust to varying methods of normalization, intensity calculation and statistical selection of genes. EASE is a powerful tool for rapidly converting the results of functional genomics studies from 'genes' to 'themes'.

  9. Judo: Where is the ease road?

    Directory of Open Access Journals (Sweden)

    Saray Santos

    2006-03-01

    Full Text Available This report had the intention of pointing some concerns with Judo practice that are discordant with Jigoro Kano’s ideas when he idealized Judo. In this way, some comments on how Judo practice is changing over time; the cultural differences that hinder the understanding of Judo principles and their application in practice as well as in everyday life are presented. There is also a discussion on how difficult is to teach this martial art that requires persistence to those who lack it. It also describes the difference between being judoist and a Judo fighter. Therefore, this approach aims to motivate practitioners, fighters, teachers and judoists to know, understand and deepen their knowledge about Judo. But it also has the goal to help them to contemplate, criticize and discuss their practices so that they do not leave the ease road to a totally rough one. RESUMO Este relato teve o intuito de apontar algumas questões que não estão indo ao encontro do que foi preconizado por Jigoro kano ao idealizar o Judô. Neste sentido, teceu-se alguns comentários sobre as transformações observadas na prática do Judô em função do tempo; as diferenças culturais que dificultam o entendimento dos princípios do Judô e, com isto, a não utilização destes tanto na prática como no cotidiano e, ainda, comentários sobre a dificuldade de se transmitir uma arte marcial que exige persistência àqueles que não a tem, além de levantar sobre a diferença entre ser judoca e lutador de Judô. Deste modo, com tal abordagem, pretendeu-se instigar praticantes, lutadores, professores e judocas, a conhecer, a compreender, a aprofundar e a continuar aprimorando, e também para que reflitam, critiquem, discutam e, principalmente, que não deixem o caminho suave se tornar de vez, totalmente ríspido.

  10. Victimization and pain

    Directory of Open Access Journals (Sweden)

    Małgorzata K. Szerla

    2013-12-01

    Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.

  11. Between "Victims" and "Criminals"

    DEFF Research Database (Denmark)

    Plambech, Sine

    2014-01-01

    This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...... trafficking”; others were categorized as undocumented migrants—“criminals” guilty of violating immigration laws. Despite the growing political attention devoted to protecting victims of trafficking, I argue that in areas of Nigeria prone to economic insecurity and gender-based violence, the categories...

  12. Genetic parameters of direct and maternal effects for calving ease

    NARCIS (Netherlands)

    Eaglen, S.A.E.; Bijma, P.

    2009-01-01

    Genetic parameters of direct and maternal effects for calving ease in Dutch dairy cattle were estimated using 677,975 calving ease records from second calving. Particular emphasis was given to the presence and impact of environmental dam-offspring covariances on the estimated direct-maternal genetic

  13. Childhood Victimization and Lifetime Revictimization

    Science.gov (United States)

    Widom, Cathy Spatz; Czaja, Sally J.; Dutton, Mary Ann

    2008-01-01

    Objective: To examine the fundamental hypothesis that childhood victimization leads to increased vulnerability for subsequent (re)victimization in adolescence and adulthood and, if so, whether there are differences in rates of experiencing traumas and victimizations by gender, race/ethnicity, and type of childhood abuse and/or neglect. Methods:…

  14. Adolescent sexual victimization

    DEFF Research Database (Denmark)

    Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P

    2012-01-01

    at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early...

  15. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  16. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  17. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  18. Cyber-Victimized Students

    OpenAIRE

    Kaitlyn N. Ryan; Tracey Curwen

    2013-01-01

    Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrenc...

  19. Easing Opioid Dose May Improve Pain and Quality of Life

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_167269.html Easing Opioid Dose May Improve Pain and Quality of Life ... when it comes to long-term use of opioid painkillers, cutting back on the dose of the ...

  20. New Approach Helps Ease Teens' Stubborn Concussion Symptoms

    Science.gov (United States)

    ... sleep problems. Kids given collaborative care went through cognitive behavioral therapy, where they learned relaxation techniques and other tactics to ease depression, anxiety and sleep problems. They also had a ...

  1. Mediterranean Diet May Ease Chronic Pain of Obesity

    Science.gov (United States)

    ... html Mediterranean Diet May Ease Chronic Pain of Obesity Study suggests eating fish, plant-based proteins is ... eating these foods might reduce pain associated with obesity. Because obese people with chronic pain usually also ...

  2. Weight Loss May Ease Psoriasis Symptoms, Study Finds

    Science.gov (United States)

    ... news/fullstory_162876.html Weight Loss May Ease Psoriasis Symptoms, Study Finds Quality-of-life boost seen ... 4, 2017 (HealthDay News) -- Could weight loss combat psoriasis? Danish researchers are reporting that obese people with ...

  3. Hold That Pose: Yoga May Ease Tough Depression

    Science.gov (United States)

    ... html Hold That Pose: Yoga May Ease Tough Depression Study finds weekly sessions, plus deep breathing, helped ... the doctor ordered when it comes to beating depression, new research suggests. Researchers found that weekly sessions ...

  4. Compound in Pot Eases Severe Form of Epilepsy

    Science.gov (United States)

    ... html Compound in Pot Eases Severe Form of Epilepsy Cannabidiol not associated with the 'high' of marijuana, researchers ... children with a rare and devastating form of epilepsy. Cannabidiol -- a non-intoxicating chemical -- reduced seizure frequency by ...

  5. A Little Training Helps Couples Ease into Skin Cancer Checks

    Science.gov (United States)

    ... html A Little Training Helps Couples Ease Into Skin Cancer Checks Study finds the potentially life-saving routine ... 14, 2016 WEDNESDAY, Dec. 14, 2016 (HealthDay News) -- Skin cancer checks between couples don't have to be ...

  6. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  7. Microgenetic analysis of hidden figures

    OpenAIRE

    Marković Slobodan S.; Gvozdenović Vasilije P.

    2006-01-01

    In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenes...

  8. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  9. The Hidden Subgroup Problem

    CERN Document Server

    Wang, Frédéric

    2010-01-01

    We give an overview of the Hidden Subgroup Problem (HSP) as of July 2010, including new results discovered since the survey of arXiv:quant-ph/0411037v1. We recall how the problem provides a framework for efficient quantum algorithms and present the standard methods based on coset sampling. We study the Dihedral and Symmetric HSPs and how they relate to hard problems on lattices and graphs. Finally, we conclude with the known solutions and techniques, describe connections with efficient algorithms as well as miscellaneous variants of HSP. We also bring various contributions to the topic. We show that in theory, we can solve HSP over a given group inductively: the base case is solving HSP over its simple factor groups and the inductive step is building efficient oracles over a normal subgroup N and over the factor group G/N. We apply this analysis to the Dedekindian HSP to get an alternative abelian HSP algorithm based on a change of the underlying group. We also propose a quotient reduction by the normal group...

  10. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs. In......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group.......This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning...

  11. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs of offshor...... of our study is to suggest how hidden costs of offshoring can be mitigated through an explicit orientation towards improving organizational processes and structures as well as experience with offshoring.......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  12. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ... Physical abuse is not the only kind of child abuse. Many children are also victims of neglect, or ...

  13. Road rage victimization among adolescents.

    Science.gov (United States)

    Smart, Reginald G; Stoduto, Gina; Adlaf, Edward M; Mann, Robert E; Sharpley, Justin M

    2007-09-01

    Although much has been learned about road rage among adults, data on road rage experiences among adolescents has not been available previously. We examine the prevalence and demographic correlates of road rage victimization based on a population survey of Ontario students. Based on the 2005 Ontario Student Drug Use Survey, a self-administered survey of Ontario students in grades 7-12 (n = 7726), the contribution of demographic factors (gender, region, driver's license status, grade, overall marks) to three road rage victimization measures was examined with logistic regression analysis. Just over half of students (53.2%) had been victims of shouts, curses and rude gestures in the past year, 8.9% were threatened with damage to their vehicle or personal injury and 6.2% experienced an attempt or actual damage to their vehicle or personal injury. Logistic regression analyses revealed that being a victim of shouting was significantly related to region, driver's license status, and grade. Victimization by threats was significantly related to gender, driver's license, grade, and marks. Being a victim of attempts or actual vehicle damage or injury was significantly related to region, driver's license, and marks. This study provides the first indication of prevalence of road rage victimization among adolescents. Road rage victimization in its milder form is common, involving just over half of Ontario students in grades 7-12. About 1 in 10 students were threatened with vehicle damage or personal injury, and about 1 in 20 were victims of attempts or actual damage or injury.

  14. Korean atomic bomb victims.

    Science.gov (United States)

    Sasamoto, Yukuo

    2009-01-01

    After colonizing Korea, Japan invaded China, and subsequently initiated the Pacific War against the United States, Britain, and their allies. Towards the end of the war, U.S. warplanes dropped atomic bombs on Hiroshima and Nagasaki, which resulted in a large number of Koreans who lived in Hiroshima and Nagasaki suffering from the effects of the bombs. The objective of this paper is to examine the history of Korea atomic bomb victims who were caught in between the U.S., Japan, the Republic of Korea (South Korea) and the Democratic People's Republic of Korea (North Korea).

  15. Perpetrator or victim?

    DEFF Research Database (Denmark)

    Hansen, Helle Rabøl

    and identifies a legally informed matrix, which points out unequivocal positions of perpetrators and victims. The policy document mixes the definition practices, which derive from the Olweus tradition on bullying research, into a law informed kind of discourse. Subsequently the policy document iterates...... a formally legal procedure from the domain of law, which includes 1. a description of the perpetrator, 2. a criminalisation of the act, succeeded by, 3. a claim of punishment and potential fixing of the sentence. As the analyses will show the trajectories of teacher participation, as practiced in everyday...

  16. Difficult OptEase Filter Retrievals After Prolonged Indwelling Times

    Energy Technology Data Exchange (ETDEWEB)

    Van Ha, Thuong G., E-mail: tgvanha@radiology.bsd.uchicago.edu; Kang, Lisa; Lorenz, Jonathan; Zangan, Steven; Navuluri, Rakesh; Straus, Christopher; Funaki, Brian [University of Chicago, Section of Interventional Radiology, Department of Radiology (United States)

    2013-08-01

    PurposeThe OptEase vena cave filter (Cordis, Piscataway, NJ) is commercially available as a retrievable or permanent filter with short recommended indwelling time, presumably due to extensive contact of the filter side struts with the inferior vena cava wall and subsequent neointimal hyperplasia leading to incorporation. Our purpose was to evaluate OptEase filter retrievals with a long indwelling time period that required unconventional retrieval techniques.Materials and MethodsWe retrospectively reviewed patients who underwent OptEase filter retrieval with long undwelling times requiring additional maneuvers for retrieval. Techniques used included rigid endobronchial forceps dissection and wire-through-loop snare. Each patient underwent postretrieval venogram to evaluate for possible complications. In addition, patients had clinical follow-up 2 weeks after the retrieval procedure.ResultsThere were three patients (2 women, 1 man; average age 64 years) who underwent OptEase filter retrieval. The mean indwelling time was 6.4 months. The indwelling filters were successfully retrieved. There were no complications. Postprocedural follow-up showed no clinical pathology.ConclusionUnconventional techniques aided in the retrieval of OptEase filters with long indwelling times.

  17. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  18. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  19. Victim ranking among sex offenders

    NARCIS (Netherlands)

    Buschman, J.; Wilcox, D.; Spreen, M.; Marshall, B.; Bogaerts, S.

    2008-01-01

    A previous exploratory study of the Child Molester Empathy Measure (CMEM) focused on the difference between offenders' normal level of general empathy and the way in which a sample of Dutch offenders viewed their own victims. The authors found that, regardless of their level of general victim empath

  20. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  1. In Memory of Mlassacre Victims

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    China's first National Memorial Day for Nanjing Massacre Victims was held on December 13, 2o14. Chinese President Xi Jinping and other Communist Party of China and state leaders were present at the ceremony held at the memorial hall for the massacre victims in Nanjing, diangsu Provinee.

  2. The dilemmas of victim positioning

    Directory of Open Access Journals (Sweden)

    Dorte Marie Søndergaard

    2015-08-01

    Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.

  3. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  4. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  5. Hidden Variables or Positive Probabilities?

    CERN Document Server

    Rothman, T; Rothman, Tony

    2001-01-01

    Despite claims that Bell's inequalities are based on the Einstein locality condition, or equivalent, all derivations make an identical mathematical assumption: that local hidden-variable theories produce a set of positive-definite probabilities for detecting a particle with a given spin orientation. The standard argument is that because quantum mechanics assumes that particles are emitted in a superposition of states the theory cannot produce such a set of probabilities. We examine a paper by Eberhard who claims to show that a generalized Bell inequality, the CHSH inequality, can be derived solely on the basis of the locality condition, without recourse to hidden variables. We point out that he nonetheless assumes a set of positive-definite probabilities, which supports the claim that hidden variables or "locality" is not at issue here, positive-definite probabilities are. We demonstrate that quantum mechanics does predict a set of probabilities that violate the CHSH inequality; however these probabilities ar...

  6. Assessment of Electronic Absentee System for Elections (EASE) Grants

    Science.gov (United States)

    2015-06-30

    No. DODIG-2015-135 J U N E 3 0 , 2 0 1 5 Assessment of Electronic Absentee System for Elections (EASE) Grants Mission Our mission is to provide...as leaders in our field . For more information about whistleblower protection, please see the inside back cover. I N T E G R I T Y  E F F I C I E N...A b u s e DODIG-2015-135 (Project No. D2015-D00SPO-0045.000) │ i Results in Brief Assessment of Electronic Absentee System for Elections (EASE

  7. Cyberbullying victimization in adolescents’ population

    Directory of Open Access Journals (Sweden)

    Nešić Marija

    2016-01-01

    Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.

  8. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...... of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring...

  9. Hidden symmetries in jammed systems

    Science.gov (United States)

    Morse, Peter K.; Corwin, Eric I.

    2016-07-01

    There are deep, but hidden, geometric structures within jammed systems, associated with hidden symmetries. These can be revealed by repeated transformations under which these structures lead to fixed points. These geometric structures can be found in the Voronoi tesselation of space defined by the packing. In this paper we examine two iterative processes: maximum inscribed sphere (MIS) inversion and a real-space coarsening scheme. Under repeated iterations of the MIS inversion process we find invariant systems in which every particle is equal to the maximum inscribed sphere within its Voronoi cell. Using a real-space coarsening scheme we reveal behavior in geometric order parameters which is length-scale invariant.

  10. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    Klarenbeek, Annette

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  11. Consequences of Selection for Yield Traits on Calving Ease Performance

    NARCIS (Netherlands)

    Lopez de Maturana, E.; Ugarte, E.; Komen, J.; Arendonk, van J.A.M.

    2007-01-01

    The impact of different breeding goals on the genetic response for calving ease (CE) and yield traits was studied in the Basque Holstein cattle population. The economic value for CE was estimated with a bioeconomic model, using Basque production and market circumstances and taking into account the c

  12. Growing with EASE: Eating, Activity, and Self-Esteem

    Science.gov (United States)

    Huettig, Carol; Rich, Shannon; Engelbrecht, Jo Ann; Sanborn, Charlotte; Essery, Eve; DiMarco, Nancy; Velez, Luisa; Levy, Luba

    2006-01-01

    A diverse group of professionals associated with Texas Woman's University's Institute for Women's Health, working collaboratively with school administrators, teachers, family support teams, and family members, developed Growing with EASE: Eating, Activity, and Self-Esteem, a nutrition program for young children and their families. In tracking the…

  13. First Person Victim

    DEFF Research Database (Denmark)

    Schoenau-Fog, Henrik; Bruni, Luis Emilio; Khalil, Faysal Fuad

    2010-01-01

    Interactive Drama in 3D worlds has great potential for communicating serious themes, however it can become challenging to organize the content in such a way that the theme is communicated clearly while maintaining the feeling of free spatial navigation in the 3D world. In order to address...... this problem, and to propose a way to structure content, we have developed the Interactive Dramatic Experience Model, which attempts to organize narrative events in a 3D world while keeping the freedom of spatial interactivity. In order to exemplify this model, we have chosen to oppose the classic genre...... of violent interactive shooter experiences by allowing the participants to experience the feeling of being a victim of war. An evaluation of the implementation indicated that participants experienced free spatial interaction, while still being able to acquire an understanding of the theme being mediated....

  14. Modeling Multiple Risks: Hidden Domain of Attraction

    CERN Document Server

    Mitra, Abhimanyu

    2011-01-01

    Hidden regular variation is a sub-model of multivariate regular variation and facilitates accurate estimation of joint tail probabilities. We generalize the model of hidden regular variation to what we call hidden domain of attraction. We exhibit examples that illustrate the need for a more general model and discuss detection and estimation techniques.

  15. Pentaquark states with hidden charm

    Science.gov (United States)

    Bijker, Roelof

    2017-07-01

    I develop an extension of the usual three-flavor quark model to four flavors (u, d, s and c), and discuss the classification of pentaquark states with hidden charm. This work is motivated by the recent observation of such states by the LHCb Collatoration at CERN.

  16. Microgenetic analysis of hidden figures

    Directory of Open Access Journals (Sweden)

    Marković Slobodan S.

    2006-01-01

    Full Text Available In this study the phenomenological and processual aspects of the perception of hidden figures were compared. The question was whether the more probable percepts of hidden figures, compared to the less probable percepts, were generated in earlier stages of the perceptual process. In the pilot study the subjects were asked to say what they see in a complex linear pattern. The three most frequent and the three least frequent perceptual descriptions were selected. In the experiment the microgenesis of the perception of hidden figures was investigated. The primed matching paradigm and the same-different task were used. In each experiment two types of test figures were contrasted: the more frequent and the less frequent ones. There were two prime types: identical (equal to test figures and complex (the pattern with hidden test figures. The prime duration was varied, 50 ms and 400 ms. The main result indicates that in the case of complex priming the more frequent test figures were processed significantly faster than the less frequent ones in both prime duration conditions. These results suggest that the faster the processing of a figure, the more probable the perceptual generation of this figure.

  17. Supporting children: Victims of crime, within victim support

    Directory of Open Access Journals (Sweden)

    Walle Vande Ilse

    2004-01-01

    Full Text Available All too often, the victimization of children is automatically associated with child abuse and sexual abuse. However, children are also confronted, either directly or indirectly, with other kinds of criminality. In spite of that children usually do not get appropriate support and assistance. In this paper, the establishment and development of services for the support of children-victims of crime in Belgium, as well as European cooperation in this regard, are described.

  18. The Scope of Sexual Victimization in Germany

    Science.gov (United States)

    Kury, Helmut; Chouaf, Silvia; Obergfell-Fuchs, Joachim; Woessner, Gunda

    2004-01-01

    This study examined the sexual victimization of 309 female students in Germany. The results indicate that the majority of the subjects have been victims of minor offenses and that a minority of subjects was severely victimized. As to the relation of victim and perpetrator, the milder offenses are more likely to be committed by strangers. In…

  19. 78 FR 52877 - VOCA Victim Assistance Program

    Science.gov (United States)

    2013-08-27

    ... criminal justice process, support for human trafficking victims with a myriad of complicated issues... particularly important for human trafficking victims, but also for victims of domestic abuse, identity theft, and other crimes as well. OVC has funded programs providing services for human trafficking victims...

  20. The hidden crime: human trafficking.

    Science.gov (United States)

    Clause, Kristen J; Lawler, Kate Byrnes

    2013-01-01

    As the primary contact in the health care system, nurses can play a role in combating this crime and assisting the victims. Assessment for abuse, neglect, trauma, recurrent sexually transmitted infections (STIs) and fear of a controlling partner is critical. Following up on "red flags" and understanding methods of safe questioning can make the difference between slavery and recovery for victims. Nurses must also know the professional referrals in their areas once a potential victim has been identified. This may be a very dangerous undertaking and must be handled by experienced personnel. Referrals to forensic nurses or physicians, domestic violence professionals or law enforcement may be indicated. Initially, a nurse may want to consult with the agency social worker for guidance. Human trafficking is a human rights crime. Unfortunately, it is more prevalent in all types of communities than most people suspect. Nurses can be heroes to the victims through understanding of this crime and vigilance in the assessment and care of all people they encounter in their practices.

  1. The hidden crime: human trafficking.

    Science.gov (United States)

    Clause, Kristen J; Lawler, Kate Byrnes

    2013-01-01

    As the primary contact in the health care system, nurses can play a role in combating this crime and assisting the victims. Assessment for abuse, neglect, trauma, recurrent sexually transmitted infections (STIs) and fear of a controlling partner is critical. Following up on "red flags" and understanding methods of safe questioning can make the difference between slavery and recovery for victims. Nurses must also know the professional referrals in their areas once a potential victim has been identified. This may be a very dangerous undertaking and must be handled by experienced personnel. Referrals to forensic nurses or physicians, domestic violence professionals or law enforcement may be indicated. Initially, a nurse may want to consult with the agency social worker for guidance. Human trafficking is a human rights crime. Unfortunately, it is more prevalent in all types of communities than most people suspect. Nurses can be heroes to the victims through understanding of this crime and vigilance in the assessment and care of all people they encounter in their practices. To learn more or to help with this cause, visit the Somaly Mam Foundation at www.somaly.org or the U.S. Department of State at www. state.gov.

  2. Punishment goals of crime victims.

    Science.gov (United States)

    Orth, Uli

    2003-04-01

    Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.

  3. Nonintentional behavioural responses to psi : hidden targets and hidden observers

    OpenAIRE

    Anderson, Mary-Jane Charlotte

    2012-01-01

    Psi is the phenomenon of apparently responding to or receiving information by means other than the recognised senses. Psi information may influence human behaviour, without the individual intending this or even being aware of it. This thesis seeks to investigate nonintentional behavioural responses to psi. We present five empirical studies that investigated nonintentional behavioural responses to psi information. In each study, the psi information was hidden from participants, ...

  4. Victimization Experiences and the Stabilization of Victim Sensitivity

    Directory of Open Access Journals (Sweden)

    Mario eGollwitzer

    2015-04-01

    Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.

  5. Serial rapists and their victims: reenactment and repetition.

    Science.gov (United States)

    Burgess, A W; Hazelwood, R R; Rokous, F E; Hartman, C R; Burgess, A G

    1988-01-01

    The major finding in this study of 41 serial rapists is the large numbers of reported and unreported victims. For over 1200 attempted and completed rapes, there were 200 convictions. The hidden rapes or earliest nonreported victims of these men as boys and adolescents were identified from their families, their neighborhood, and their schools. Examining the possible link between childhood sexual abuse and criminal behavior in this sample of 41 serial rapists, 56.1% were judged to have at least one forced or exploitive abuse experience in boyhood, as compared to a study of 2,972 college males reporting 7.3% experiencing boyhood sexual abuse. Looking within the abused samples, 56.1% of the rapists reported forced sex, compared to the college sample's 30.4%. Also, the rapist sample revealed higher rates of family member as abuser (48.4%), compared to 22.2% for the college sample. Retrospective reconstruction of the sexual activities and assertive behaviors of these men as boys reveals that 51% of the boys reenact the abuse as a preadolescent with their earliest victims being known to them (48% as neighborhood girls), family (25% as sisters), or girlfriend (25%). The onset of rape fantasies in midadolescence (mean age 16.9) crystalizes the earlier sexually initiated behaviors into juvenile behaviors of spying, fetish burglaries, molestations, and rapes. Repetition of these juvenile behaviors set their criminal patters on strangers--their next group of victims. To reduce victimization, serial rapists need to be identified early and stopped. This means acknowledging and reporting boy sexual abuse. This includes being sensitive to the reenactment behaviors noted in the initiated activities of abused children, which in turn need to be differentiated from peer play. Closer attention needs to be paid to families with incest behavior to insure that younger children are protected. Adolescents showing early repetitive juvenile delinquent behaviors must be assessed for physical

  6. Legal-Ease Conducting Due Diligence in China

    Institute of Scientific and Technical Information of China (English)

    CHRIS; DEVONSHIRE-ELLIS

    2007-01-01

    Ninety percent of problems when setting up business in China can be avoided by the deployment of due diligence at the front end of the investment planning.Here we point out some of the areas that can hinder a sensible approach to due diligence,the hidden risks and basic checks.The process does not have to be expensive. Purchasing product from China Quality control is one issue of course your responsibility as a buyer to ensure that the product you are purchasing

  7. Leqal-Ease Conducting Due Diligence in China

    Institute of Scientific and Technical Information of China (English)

    CHRIS; DEVONSHIRE-ELLIS

    2007-01-01

    Ninety percent of problems when set- ring up business in China can be avoided by the deployment of due diligence at the front end of the investment planning.Here we point out some of the areas that can hinder a sensible approach to due diligence,the hidden risks and basic checks.The process does not have to be expensive. Chinese business licenses You should ask for a copy.It will list(in Chinese)details of the legally responsible person,the registered address,the amount of registered capital(which is also the limit-

  8. Bullying and Victimization Among Children

    Science.gov (United States)

    Shetgiri, Rashmi

    2013-01-01

    Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839

  9. Demirjian approach of dental age estimation: Abridged for operator ease

    Directory of Open Access Journals (Sweden)

    Vanshika Jain

    2016-01-01

    Full Text Available Background: Present times have seen an alarming increase in incidence of crimes by juveniles and of mass destruction that Highlight the preponderance of individual age estimation. Of the numerous techniques employed for age assessment, dental age estimation (DAE and its correlation with chronological age (CA have been of great significance in the recent past. Demirjian system, considered as gold standard in DAE is a simple and convenient method for DAE, though,, although, referring to multiple tables make it cumbersome and less eco friendly due to excessive paper load. Aim: The present study was aimed to develop a comprehensive chart (DAEcc inclusive of all Demirjian tables and developmental stages of teeth and also to as well as to test the operator ease of 50 undergraduate dental students in performing DAE using this chart. Materials and Methods: The study was performed in two stages, wherein the first stage was aimed at formulation of the comprehensive chart (DAECC which included pictorial representation of calcification stages, the Federation Dentaire Internationale notation of the teeth, and the corresponding scores for each stage with a concluding column at the end to enter the total score. The second stage assessed the applicability of the ease of DAE by DAECC, whereby fifty 2nd year BDS students were asked to trace the calcification stages of the seven permanent left mandibular teeth on a panorex, identify the correct stage, assign the corresponding score, and to calculate the total score for subsequent dental age assessment. Results and Conclusions: showed that average time taken by the students for tracing seven mandibular teeth was 5 min and for assessment of dental age was 7 min. The total time taken for DAE was approximately 12 min, thus making the procedure less time consuming. Hence, this study proposes the use of DAEcc for age estimation due to ease in comprehension and execution of Demirjian system.

  10. Demirjian approach of dental age estimation: Abridged for operator ease

    Science.gov (United States)

    Jain, Vanshika; Kapoor, Priyanka; Miglani, Ragini

    2016-01-01

    Background: Present times have seen an alarming increase in incidence of crimes by juveniles and of mass destruction that Highlight the preponderance of individual age estimation. Of the numerous techniques employed for age assessment, dental age estimation (DAE) and its correlation with chronological age (CA) have been of great significance in the recent past. Demirjian system, considered as gold standard in DAE is a simple and convenient method for DAE, though,, although, referring to multiple tables make it cumbersome and less eco friendly due to excessive paper load. Aim: The present study was aimed to develop a comprehensive chart (DAEcc) inclusive of all Demirjian tables and developmental stages of teeth and also to as well as to test the operator ease of 50 undergraduate dental students in performing DAE using this chart. Materials and Methods: The study was performed in two stages, wherein the first stage was aimed at formulation of the comprehensive chart (DAECC) which included pictorial representation of calcification stages, the Federation Dentaire Internationale notation of the teeth, and the corresponding scores for each stage with a concluding column at the end to enter the total score. The second stage assessed the applicability of the ease of DAE by DAECC, whereby fifty 2nd year BDS students were asked to trace the calcification stages of the seven permanent left mandibular teeth on a panorex, identify the correct stage, assign the corresponding score, and to calculate the total score for subsequent dental age assessment. Results and Conclusions: showed that average time taken by the students for tracing seven mandibular teeth was 5 min and for assessment of dental age was 7 min. The total time taken for DAE was approximately 12 min, thus making the procedure less time consuming. Hence, this study proposes the use of DAEcc for age estimation due to ease in comprehension and execution of Demirjian system. PMID:28123280

  11. On quantum algorithms for noncommutative hidden subgroups

    Energy Technology Data Exchange (ETDEWEB)

    Ettinger, M. [Los Alamos National Lab., NM (United States); Hoeyer, P. [Odense Univ. (Denmark)

    1998-12-01

    Quantum algorithms for factoring and discrete logarithm have previously been generalized to finding hidden subgroups of finite Abelian groups. This paper explores the possibility of extending this general viewpoint to finding hidden subgroups of noncommutative groups. The authors present a quantum algorithm for the special case of dihedral groups which determines the hidden subgroup in a linear number of calls to the input function. They also explore the difficulties of developing an algorithm to process the data to explicitly calculate a generating set for the subgroup. A general framework for the noncommutative hidden subgroup problem is discussed and they indicate future research directions.

  12. Mathematical Modeling of Hidden Intimate Partner Violence in Spain: A Quantitative and Qualitative Approach

    Directory of Open Access Journals (Sweden)

    E. De la Poza

    2016-01-01

    Full Text Available The fact that women are abused by their male partner is something that happens worldwide in the 21st century. In numerous cases, abuse only becomes publicly known when a fatal event occurs and is beyond any possible remedy, that is, when men murder their female partner. Since 2003, 793 (September 4, 2015 women have been assassinated by their significant other or excouple in Spain. Only 7.2% of murdered women had reported their fear and previous intimate partner violence (IPV to the police. Even when the number of female victims is comparable to the number of victims by terrorism, the Government has not assigned an equal amount of resources to diminish the magnitude of this hidden social problem. In this paper, a mathematical epidemiological model to forecast intimate partner violence in Spain is constructed. Both psychological and physical aggressor subpopulations are predicted and simulated. The model’s robustness versus uncertain parameters is studied by a sensitivity analysis.

  13. Examination and treatment of the male rape victim.

    Science.gov (United States)

    Schiff, A F

    1980-11-01

    The number of known male rape victims is on the increase. Rape treatment centers which formerly cared only for female victims have now opened their doors to male victims. The examination and treatment of these victims are discussed.

  14. Suffering in Silence: The Male Incest Victim.

    Science.gov (United States)

    Nasjleti, Maria

    1980-01-01

    The reasons why boys who are victims of incest remain silent are explored in terms of the special meaning of victimization to males. Males' inability to express helplessness and vulnerability is identified as a major contributing factor. (CM)

  15. Men as Victims: "Victim" Identities, Gay Identities, and Masculinities

    Science.gov (United States)

    Dunn, Peter

    2012-01-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they…

  16. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    OpenAIRE

    Stevković Ljiljana

    2013-01-01

    Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization...

  17. Genetic and Environmental Influences on Victims, Bullies and Bully-Victims in Childhood

    Science.gov (United States)

    Ball, Harriet A.; Arseneault, Louise; Taylor, Alan; Maughan, Barbara; Caspi, Avshalom; Moffitt, Terrie E.

    2008-01-01

    Background: Three groups of children are involved in bullying: victims, bullies and bully-victims who are both bullies and victims of bullying. Understanding the origins of these groups is important since they have elevated emotional and behavioural problems, especially the bully-victims. No research has examined the genetic and environmental…

  18. Prevention of victimization following sexual assaults

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria; Sidenius, Katrine

    2004-01-01

    Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...... of women exposed to sexualized coercion and the diversity of perspectives on the events....

  19. Victim/Witness Assistance: A Selected Bibliography.

    Science.gov (United States)

    Cain, Anthony A., Comp.; Kravitz, Marjorie, Comp.

    This annotated bibliography highlights the literature available on two important aspects of assistance to victims and witnesses of crime. The first section, victim and witness services, covers the need, function and implementation of services to assist victims, elements of effective programs and evaluation of specific programs. The second section,…

  20. Attribution of Fault to Rape Victims.

    Science.gov (United States)

    Feinman, Saul

    An experimental design, the impact of the marital status, physical attractiveness, amount of victim resistance, and immediate reaction of the victim as well as sex of observer on attributions of fault to hypothetical rape victims were investigated. Participants were 440 undergraduate students at the University of Wyoming. Each participant was…

  1. Victims and their defenders : A dyadic approach

    NARCIS (Netherlands)

    Sainio, Miia; Veenstra, René; Huitsing, Gijs; Salmivalli, Christina

    2011-01-01

    This study focused on the dyadic defending relationships of victimized children in grades 3, 4, and 5 (N = 7481 children from 356 school classes, mean ages 10-12 years). Most of the victims (72.3%) had at least one defender. Being defended was positively related to victims' adjustment and social sta

  2. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  3. The Violent Victimization of Children, Adolescents, Adults, and the Elderly: Situational Characteristics and Victim Injury.

    Science.gov (United States)

    D Kelsay, James; Skubak Tillyer, Marie; Tillyer, Rob; T Ward, Jeffrey

    2017-01-27

    This study explores the nature and outcome of violent incidents experienced by child, adolescent, adult, and elderly victims. Data from the National Incident-Based Reporting System (NIBRS) are used to determine whether there are differences in the situational characteristics—including location, time of day, weapons, and the victim–offender relationship—of violent victimization experiences across the 4 age groups, including whether situational characteristics influence the likelihood of victim injury. Results indicate that victim injury is most prevalent among adult victims and that the situational characteristics of violent incidents vary by victim age, as do the correlates of victim injury. These findings suggest that of the nature of violent victimization should be examined within the context of victim age, and supports research by scholars who have proposed a model of developmental victimology to identify age-specific victimization patterns.

  4. Rape: Counseling the Traumatized Victim

    Science.gov (United States)

    Heppner, P. Paul; Heppner, Mary

    1977-01-01

    There are at least three goals of intensive rape counseling: identifying and accepting feelings, reorienting perceptions, attributions, and self-statements, and resuming a normal lifestyle. Various counseling techniques can be employed to help rape victims restructure cognitions to reduce negative self-evaluations, physical distress, and loss of…

  5. Hidden Variable Theories and Quantum Nonlocality

    Science.gov (United States)

    Boozer, A. D.

    2009-01-01

    We clarify the meaning of Bell's theorem and its implications for the construction of hidden variable theories by considering an example system consisting of two entangled spin-1/2 particles. Using this example, we present a simplified version of Bell's theorem and describe several hidden variable theories that agree with the predictions of…

  6. Estimating an Activity Driven Hidden Markov Model

    OpenAIRE

    Meyer, David A.; Shakeel, Asif

    2015-01-01

    We define a Hidden Markov Model (HMM) in which each hidden state has time-dependent $\\textit{activity levels}$ that drive transitions and emissions, and show how to estimate its parameters. Our construction is motivated by the problem of inferring human mobility on sub-daily time scales from, for example, mobile phone records.

  7. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  8. Moving with Ease: Feldenkrais Method Classes for People with Osteoarthritis

    Directory of Open Access Journals (Sweden)

    Robert Webb

    2013-01-01

    Full Text Available Objective. To investigate the effects of Feldenkrais Method classes on gait, balance, function, and pain in people with osteoarthritis. Design. Prospective study with pre-/postmeasures. Setting. Community. Participants. Convenience sample of 15 community-dwelling adults with osteoarthritis (mean age 67 years attending Feldenkrais Method classes. Intervention. Series of Feldenkrais Method classes, two classes/week for 30 weeks. Main outcome measures: Western Ontario and McMaster Universities osteoarthritis scale, Human Activity Profile, stair climbing test, 6-minute walk test, timed up-and-go test, Four Square Step Test (4SST, gait analysis, and assessment of quality of life (AQoL. Results. Participants improved on the 4SST and on some gait parameters. They also reported a greater ease of movement. Conclusions. A 30-week series of Feldenkrais classes held twice per week was feasible in the community setting. The lessons led to improvements in performance of the four square step test and changes in gait.

  9. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  10. Heating up the Galaxy with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Dubovsky, Sergei [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Hernández-Chifflet, Guzmán [Center for Cosmology and Particle Physics, Department of Physics, New York University,New York, NY, 10003 (United States); Instituto de Física, Facultad de Ingeniería, Universidad de la República,Montevideo, 11300 (Uruguay)

    2015-12-29

    We elaborate on the dynamics of ionized interstellar medium in the presence of hidden photon dark matter. Our main focus is the ultra-light regime, where the hidden photon mass is smaller than the plasma frequency in the Milky Way. We point out that as a result of the Galactic plasma shielding direct detection of ultra-light photons in this mass range is especially challenging. However, we demonstrate that ultra-light hidden photon dark matter provides a powerful heating source for the ionized interstellar medium. This results in a strong bound on the kinetic mixing between hidden and regular photons all the way down to the hidden photon masses of order 10{sup −20} eV.

  11. Helioscope bounds on hidden sector photons

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, J.

    2007-12-15

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to {chi} hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter {chi} at low masses (m{sub {gamma}}{sub '}<1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  12. Hidden Web信息获取

    Institute of Scientific and Technical Information of China (English)

    陈珂; 陈小英; 徐科

    2007-01-01

    如今Web上越来越多的信息可以通过查询接口获得,但为了获取某Hidden Web站点的页面,用户不得不键入一系列的关键词.由于没有直接指向Hidden Web页面的静态链接,当前大多搜索引擎不能发现和索引这些页面.然而,研究表明,由Hidden Web站点提供的高质量的信息对许多用户来说非常有价值.文章通过研究针对特定类型的表单,建立一个有效的Hidden Web爬虫,以便获取Hidden Web后台数据库信息.

  13. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet chatro

  14. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet chatro

  15. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were......Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...

  16. Hidden scale in quantum mechanics

    CERN Document Server

    Giri, Pulak Ranjan

    2007-01-01

    We show that the intriguing localization of a free particle wave-packet is possible due to a hidden scale present in the system. Self-adjoint extensions (SAE) is responsible for introducing this scale in quantum mechanical models through the nontrivial boundary conditions. We discuss a couple of classically scale invariant free particle systems to illustrate the issue. In this context it has been shown that a free quantum particle moving on a full line may have localized wave-packet around the origin. As a generalization, it has also been shown that particles moving on a portion of a plane or on a portion of a three dimensional space can have unusual localized wave-packet.

  17. The Influence of Direct and Indirect Juvenile Victimization Experiences on Adult Victimization and Fear of Crime.

    Science.gov (United States)

    Grubb, Jonathan A; Bouffard, Leana A

    2015-11-01

    Research has identified that juvenile victimization can play a detrimental role for individuals later in life. While this literature has focused on direct and indirect forms of victimization at different stages of life, the influence of juvenile victimization on fear of crime and violent victimization as an adult has been limited. To expand this body of literature, the present research examines the effects of direct (sexual victimization) and indirect (witnessing parental intimate partner violence) juvenile victimization on fear of crime as well as the prevalence of victimization as an adult. Using telephone survey data collected from randomly selected Texas adults, this study demonstrates that both juvenile sexual victimization and indirect victimization increase the likelihood of adult victimization, whereas juvenile sexual victimization increases the likelihood of adult sexual victimization. In contrast, fear of crime as an adult was not significantly influenced by either juvenile sexual victimization or indirect victimization. A discussion of how these findings relate to previous research, limitations, and implications are also provided.

  18. The dilemmas of victim positioning

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    2015-01-01

    Based on a conceptualization of bullying and relational aggression in groups as an effect of social dynamics rather than individual deficits – this article reflects upon some of the intricate mechanisms and dilemmas involved in victim positioning. Victims of bullying and relational aggression often....... The hopes of (eventual) social belonging may in that sense work paradoxically as a strong agent in the denial of oppression and marginalization. The article is theoretically informed by poststructuralist conceptualizations and grounded in cases of bullying and marginalization (one of them involving rape......). One case is taken from the empirical data produced by the author and a research project on bullying among children (eXbus: Exploring Bullying in School). Two other cases are borrowed from publications of respectively B. Davies from Australia and A. Evaldsson from Shweden. The article opens insights...

  19. Imaging findings of avalanche victims

    Energy Technology Data Exchange (ETDEWEB)

    Grosse, Alexandra B.; Grosse, Claudia A.; Anderson, Suzanne [University Hospital of Berne, Inselspital, Department of Diagnostic, Pediatric and Interventional Radiology, Berne (Switzerland); Steinbach, Lynne S. [University of California San Francisco, Department of Radiology, San Francisco, CA (United States); Zimmermann, Heinz [University Hospital of Berne, Inselspital, Department of Trauma and Emergency Medicine, Berne (Switzerland)

    2007-06-15

    Skiing and hiking outside the boundaries remains an attractive wilderness activity despite the danger of avalanches. Avalanches occur on a relatively frequent basis and may be devastating. Musculoskeletal radiologists should be acquainted with these injuries. Fourteen avalanche victims (11 men and 3 women; age range 17-59 years, mean age 37.4 years) were air transported to a high-grade trauma centre over a period of 2 years. Radiographs, CT and MR images were prospectively evaluated by two observers in consensus. Musculoskeletal findings (61%) were more frequent than extraskeletal findings (39%). Fractures were most commonly seen (36.6%), involving the spine (14.6%) more frequently than the extremities (9.8%). Blunt abdominal and thoracic trauma were the most frequent extraskeletal findings. A wide spectrum of injuries can be found in avalanche victims, ranging from extremity fractures to massive polytrauma. Asphyxia remains the main cause of death along with hypoxic brain injury and hypothermia. (orig.)

  20. Examination of the rape victim.

    Science.gov (United States)

    Wertheimer, A J

    1982-03-01

    Knowledge of the procedure of rape examination can benefit not only obstetrician-gynecologists but also family practitioners, emergency department physicians, and surgeons who may find themselves called upon to examine a victim of sexual assault. In this situation, the physician has a responsibility to the judicial system as well as to the patient. He or she must deliver the best medical and psychologic support possible and collect the appropriate evidence in such a fashion as to give the victim the greatest chance of success if she decides to prosecute. Alternatively, information may be obtained which may help release the accused from suspicion. Having gained an understanding of these steps, the physician can discharge his or her responsibility with confidence and precision.

  1. Hidden torsion, 3-manifolds, and homology cobordism

    CERN Document Server

    Cha, Jae Choon

    2011-01-01

    This paper continues our exploration of homology cobordism of 3-manifolds using our recent results on Cheeger-Gromov rho-invariants associated to amenable representations. We introduce a new type of torsion in 3-manifold groups we call hidden torsion, and an algebraic approximation we call local hidden torsion. We construct infinitely many hyperbolic 3-manifolds which have local hidden torsion in the transfinite lower central subgroup. By realizing Cheeger-Gromov invariants over amenable groups, we show that our hyperbolic 3-manifolds are not pairwise homology cobordant, yet remain indistinguishable by any prior known homology cobordism invariants.

  2. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  3. Visible Effects of Invisible Hidden Valley Radiation

    CERN Document Server

    Carloni, Lisa

    2010-01-01

    Assuming there is a new gauge group in a Hidden Valley, and a new type of radiation, can we observe it through its effect on the kinematic distributions of recoiling visible particles? Specifically, what are the collider signatures of radiation in a hidden sector? We address these questions using a generic SU(N)-like Hidden Valley model that we implement in Pythia. We find that in both the e+e- and the LHC cases the kinematic distributions of the visible particles can be significantly affected by the valley radiation. Without a proper understanding of such effects, inferred masses of "communicators" and of invisible particles can be substantially off.

  4. Hidden systematics of fission channels

    Directory of Open Access Journals (Sweden)

    Schmidt Karl-Heinz

    2013-12-01

    of the fissioning system obey a hidden systematics that can be explained by the number of states in the vicinity of the outer fission barrier as a function of mass asymmetry, if the potential is constructed as the sum of the macroscopic contribution of the compound nucleus and empirically determined fragment shells. This hidden systematics also explains the transition from asymmetric to symmetric fission around 226Th and around 258Fm.

  5. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  6. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  7. Faddeev-Jackiw approach to hidden symmetries

    CERN Document Server

    Wotzasek, C

    1994-01-01

    The study of hidden symmetries within Dirac's formalism does not possess a systematic procedure due to the lack of first-class constraints to act as symmetry generators. On the other hand, in the Faddeev-Jackiw approach, gauge and reparametrization symmetries are generated by the null eigenvectors of the sympletic matrix and not by constraints, suggesting the possibility of dealing systematically with hidden symmetries through this formalism. It is shown in this paper that indeed hidden symmetries of noninvariant or gauge fixed systems are equally well described by null eigenvectors of the sympletic matrix, just as the explicit invariances. The Faddeev-Jackiw approach therefore provide a systematic algorithm for treating all sorts of symmetries in an unified way. This technique is illustrated here by the SL(2,R) Kac-Moody current algebra of the 2-D induced gravity proposed by Polyakov, which is a hidden symmetry in the canonical approach of constrained systems via Dirac's method, after conformal and reparamet...

  8. Fibroid Tumors in Women: A Hidden Epidemic?

    Science.gov (United States)

    ... Issue Past Issues Fibroid Tumors in Women: A Hidden Epidemic? Past Issues / Spring 2007 Table of Contents ... fibroids@rics.bwh.harvard.edu , or visit our Web site: www.fibroids.net . You may also write ...

  9. Hidden Regular Variation: Detection and Estimation

    CERN Document Server

    Mitra, Abhimanyu

    2010-01-01

    Hidden regular variation defines a subfamily of distributions satisfying multivariate regular variation on $\\mathbb{E} = [0, \\infty]^d \\backslash \\{(0,0, ..., 0) \\} $ and models another regular variation on the sub-cone $\\mathbb{E}^{(2)} = \\mathbb{E} \\backslash \\cup_{i=1}^d \\mathbb{L}_i$, where $\\mathbb{L}_i$ is the $i$-th axis. We extend the concept of hidden regular variation to sub-cones of $\\mathbb{E}^{(2)}$ as well. We suggest a procedure of detecting the presence of hidden regular variation, and if it exists, propose a method of estimating the limit measure exploiting its semi-parametric structure. We exhibit examples where hidden regular variation yields better estimates of probabilities of risk sets.

  10. Victim's Rights - Comparative Approach within EU Legislation

    Directory of Open Access Journals (Sweden)

    Monica Pocora

    2015-12-01

    Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.

  11. Recognizing the trafficking in human beings victimization

    Directory of Open Access Journals (Sweden)

    Simeunović-Patić Biljana

    2008-01-01

    Full Text Available In spite of relative prevalence of trafficking in human beings issues in the expert and general public discourse in recent years, recognition of victimization by various specialists that may come across with victims still is being estimated as unsatisfactory. Stereotypes about victims of trafficking in human beings are just one factor that imperils correct and prompt recognition of victims, i.e. victims' identification, as principal prerequisite of their protection and support. Today, there are various efforts to overcome that problem - primarily through the training of professionals and creating the identification guidelines, i.e. lists of indicators of trafficking in human beings victimization; however, these resolves only one part of the problem and reveal some new challenges at the same time.

  12. Victim support services in Serbia: Survey results

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2007-01-01

    Full Text Available From September 1, 2006 to June 1, 2007, within the project "Development of victim support services in Serbia", Victimology Society of Serbia has conducted a survey on organizations in Serbia that are offering support to victims of crime. Aims of the survey were: to identify organizations that are supporting victims of crime either within state institutions and non-governmental organizations; to collect and analyze the data that might be useful for victims, and also to make directory of victim support services in Serbia. The sample encompassed 188 organizations from 55 towns in Serbia. The aim of this paper is point out, through the analysis of the data obtained through the survey, to which extent victims of crime in general, and of some forms of crime in particular can get support in Serbia, which organizations are offering support, what form of support and in which way. .

  13. Variables influencing victim selection in genocide.

    Science.gov (United States)

    Komar, Debra A

    2008-01-01

    While victims of racially motivated violence may be identified through observation of morphological features, those targeted because of their ethnic, religious, or national identity are not easily recognized. This study examines how perpetrators of genocide recognize their victims. Court documents, including indictments, witness statements, and testimony from the International Criminal Tribunals for Rwanda and the former Yugoslavia (FY) detail the interactions between victim and assailant. A total of 6012 decedents were included in the study; only 20.8% had been positively identified. Variables influencing victim selection in Rwanda included location, segregation, incitement, and prior relationship, while significant factors in FY were segregation, location, age/gender, and social data. Additional contributing factors in both countries included self-identification, victim behavior, linguistic or clothing evidence, and morphological features. Understanding the system of recognition used by perpetrators aids investigators tasked with establishing victim identity in such prosecutions.

  14. Supporting Young Crime Victims: Discursive Environments and Formula Narratives

    Science.gov (United States)

    Lofstrand, Cecilia Hansen

    2009-01-01

    Within the crime victim movement and discourse on victimization, a novel victim category has been introduced: the young crime victim. This article analyses the professional discourse formed around the new notion, focusing on the needs of the young crime victim along with the practices, tools, and techniques used to deal with resistance at a…

  15. Victimization, polyvictimization , and health in Swedish adolescents

    Directory of Open Access Journals (Sweden)

    Aho N

    2016-08-01

    Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC

  16. Unexpectedly ease surgery for a worrisome abdominal mass: Pedunculated GISTs☆

    Science.gov (United States)

    Baskiran, Adil; Otan, Emrah; Aydin, Cemalettin; Kayaalp, Cuneyt

    2013-01-01

    INTRODUCTION Discovery of abdominal masses often poses significant diagnostic difficulties. GISTs are mesenchymal masses, with specific histological features. Dimensions may vary from millimeters to giant tumours. We would like to present our case, which had an unexpectedly easy operative course which was easily handled with a simple surgical excision with a short operative duration. PRESENTATION OF CASE A 38 years old female patient was diagnosed to have an abdominal heterogen mass of 15 cm × 12 cm × 10 cm in dimension. Abdominal computed tomography revealed the solid mass between the stomach and pancreas corpus and tail, possibly orginating from the pancreas. With the preoperative diagnosis of locally invasive distal pancreas cancer the patient underwent laparotomy, following the dissection, the mass was observed to be originating from the posterior gastric Wall, extending exophytically with a peduncle of 5 cm in width, without any visual evidence for peritoneal invasion and metastasis. The tumour and the peduncle was resected with stapler device. Total operation time was 30 min. Postoperative course was uneventful. Pathologic diagnosis was gastrointestinal stromal tumour (GIST). DISCUSSION Pedunculated large GISTs are not frequent and they can enlarge as 15 cm in diameter and compress the neighbouring organs. When they were huge, it is difficult to differentiate the origin of the masses. GISTs should be considered in differential diagnosis of giant abdominal masses. CONCLUSION When GISTs are huge and pedunculated, it can be difficult to differentiate the origin of the masses. This case report presents unexpectedly ease surgery for a worrysome abdominal mass. PMID:23999120

  17. Hidden figures are ever present.

    Science.gov (United States)

    Mens, L H; Leeuwenberg, E L

    1988-11-01

    Preference judgments about alternative interpretations of unambiguous patterns can be explained in terms of a rivalry between a preferred and a second-best interpretation (cf. Leeuwenberg & Buffart, 1983). We tested whether this second-best interpretation corresponds to a suppressed but concurrently present interpretation or whether it merely reflects an alternative view that happens to be preferred less often. Two patterns were present immediately following each other with a very short onset asynchrony: a complete pattern and one out of three possible subpatterns of it, corresponding to the best, the second best, or an odd interpretation of the complete pattern. Subjects indicated which subpattern was presented by choosing among the three subpatterns shown after each trial. The scores, corrected for response-bias effects, indicated a relative facilitation of the second-best interpretation, in agreement with its predicted "hidden" presence. This result is more in line with theories that capitalize on the quality of the finally selected representation than with processing models aimed at reaching one single solution as fast and as economically as possible.

  18. Hidden Local Symmetry and Beyond

    CERN Document Server

    Yamawaki, Koichi

    2016-01-01

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H= SU(2)_L x SU(2)_R/SU(2)_V with additional symmetry, the nonlinearly realized scale symmetry. Then the SM does have a dynamical gauge boson of the SU(2)_V HLS, "SM rho meson", in addition to the Higgs as a pseudo dilaton as well as the NG bosons to be absorbed into the W and Z. Based on the recent work done with S. Matsuzaki and H. Ohki, I discuss a novel possibility that the SM rho meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "Dark SM skyrmi...

  19. Hidden local symmetry and beyond

    Science.gov (United States)

    Yamawaki, Koichi

    Gerry Brown was a godfather of our hidden local symmetry (HLS) for the vector meson from the birth of the theory throughout his life. The HLS is originated from very nature of the nonlinear realization of the symmetry G based on the manifold G/H, and thus is universal to any physics based on the nonlinear realization. Here, I focus on the Higgs Lagrangian of the Standard Model (SM), which is shown to be equivalent to the nonlinear sigma model based on G/H = SU(2)L × SU(2)R/SU(2)V with additional symmetry, the nonlinearly-realized scale symmetry. Then, the SM does have a dynamical gauge boson of the SU(2)V HLS, "SM ρ meson", in addition to the Higgs as a pseudo-dilaton as well as the NG bosons to be absorbed in to the W and Z. Based on the recent work done with Matsuzaki and Ohki, I discuss a novel possibility that the SM ρ meson acquires kinetic term by the SM dynamics itself, which then stabilizes the skyrmion dormant in the SM as a viable candidate for the dark matter, what we call "dark SM skyrmion (DSMS)".

  20. Constraining solar hidden photons using HPGe detector

    Energy Technology Data Exchange (ETDEWEB)

    Horvat, R.; Kekez, D., E-mail: Dalibor.Kekez@irb.hr; Krčmar, M.; Krečak, Z.; Ljubičić, A.

    2013-04-25

    In this Letter we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory. With our experimental setup we observe the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, entails both photon into hidden state oscillations and a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in Sun's interior as well as in the detector. We exclude hidden photons with kinetic couplings χ>(2.2×10{sup −13}–3×10{sup −7}) in the mass region 0.2 eV≲m{sub γ{sup ′}}≲30 keV. Our constraints on the mixing parameter χ in the mass region from 20 eV up to 15 keV prove even slightly better then those obtained recently by using data from the CAST experiment, albeit still somewhat weaker than those obtained from solar and HB stars lifetime arguments.

  1. Moral Reasoning and Emotion Attributions of Adolescent Bullies, Victims, and Bully-Victims

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-01-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…

  2. Peer Relations of Bullies, Bully-Victims, and Victims: The Two Social Worlds of Bullying in Second-Grade Classrooms

    Science.gov (United States)

    Farmer, Thomas W.; Petrin, Robert A.; Robertson, Dylan L.; Fraser, Mark W.; Hall, Cristin M.; Day, Steven H.; Dadisman, Kimberly

    2010-01-01

    This study examined the social relations of bullies, victims, and bully-victims in second-grade classrooms. Bully-victims are identified as both bullies and victims. The sample consisted of 537 ethnically diverse second-grade students (247 boys, 290 girls) from 37 classrooms across 11 participating schools. Bullies, bully-victims, and victims…

  3. Lambing Ease is Heritable but not Correlated to Litter Size in Danish Meat Sheep Breeds

    DEFF Research Database (Denmark)

    Sørensen, Anders Christian; Valasek, P; Pedersen, Jørn;

    The aim of this study was to estimate genetic parameters of lambing ease (LE) and litter size (LS) in four common Danish meat sheep breeds. Data from 1990 to 2006 were analysed. A bivariate animal model was used for estimation of genetic parameters. Lambing ease showed a low heritability, both...... the LE and LS was found, which means that selection to improve one trait should not affect the other trait. Lambing ease should therefore be included in the selection criterion....

  4. Weapon Involvement in the Victimization of Children.

    Science.gov (United States)

    Mitchell, Kimberly J; Hamby, Sherry L; Turner, Heather A; Shattuck, Anne; Jones, Lisa M

    2015-07-01

    To report the prevalence of weapons involved in the victimization of youth with particular emphasis on weapons with a "high lethality risk" and how such exposure fits into the broader victimization and life experiences of children and adolescents. Data were collected as part of the Second National Survey of Children's Exposure to Violence, a nationally representative telephone survey of youth ages 2 to 17 years and caregivers (N = 4114) conducted in 2011. Estimates from the Second National Survey of Children's Exposure to Violence indicate that almost 14 million youth, ages 2–17, in the United States have been exposed to violence involving a weapon in their lifetimes as witnesses or victims,or .1 in 5 children in this age group [corrected]. More than 2 million youth in the United States (1 in 33) have been directly assaulted in incidents where the high lethality risk weapons of guns and knives were used. Differences were noted between victimizations involving higher and lower lethality risk weapons as well as between any weapon involvement versus none. Poly-victims, youth with 7 or more victimization types, were particularly likely to experience victimization with any weapon, as well as victimization with a highly lethal weapon compared with nonpoly-victims. Findings add to the field's broadening conceptualization of youth victimization highlighting the potentially highly consequential risk factor of weapon exposure as a component of victimization experiences on the mental health of youth. Further work on improving gun safety practices and taking steps to reduce children's exposure to weapon-involved violence is warranted to reduce this problem. Copyright © 2015 by the American Academy of Pediatrics.

  5. Probing hidden sector photons through the Higgs window

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Jaeckel, J. [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2008-07-15

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  6. Family Context and Criminal Victimization in Adolescence.

    Science.gov (United States)

    Esbensen, Finn-Aage; Huizinga, David; Menard, Scott

    1999-01-01

    Reports using data from the Denver Youth Survey to investigate the influence of family factors in predicting adolescent victimization. Results indicate that family context (particularly parental problem behavior), family involvement, adolescent social isolation from the family, and positive parenting were predictive of adolescent victimization,…

  7. [The victim within the framework of criminology].

    Science.gov (United States)

    Pittaro, P

    1978-01-01

    The Author makes a 'tour d'horizon', albeit summarized, of the problems brought about by the victim "from crime" in the exclusive picture of criminology. After defining the dogmatic relations between criminology and victimology, stating that such a (new) discipline highlights the entirety of the criminal event centering upon the dyad criminal-victim, the latest classifications of the victim viewed individually and also in his manifold relationships with the acting subject, are reviewed, in the attempt of identifying, on the basis of the various situations of victimization as they occur, if not some causal laws proper, at least some constants and some emerging lines susceptible of an in-depth analysis. After hinting to the problems brought about by the victim in the supranational prospect, and by the crimes so-called without a victim, the importance of the victim from the criminalistics and criminal execution angle, is outlined, and the Author closes up, by way of conclusion, and at the operational level, broadly hinting to the most suitable methods for the prevention and repairing in regard of the victims of crime.

  8. Bay Area Students Help Victims and Witnesses.

    Science.gov (United States)

    Mandel, Dave

    1978-01-01

    Aid to Victims and Witnesses (AVW), sponsored by the San Mateo (California) Probation Department and staffed almost entirely by citizen and student volunteers, offers immediate financial and emotional aid to victims of violent crime after police call AVW's hot line. AVW also helps witnesses to crime in court appearances. (MF)

  9. Incest Victims: Inadequate Help by Professionals.

    Science.gov (United States)

    Frenken, Jos; Van Stolk, Bram

    1990-01-01

    Interviews with 130 Dutch professionals helping incest victims and 50 adult women who were incest victims as children found that assistance was hampered by institutional distrust, inability of professionals to stop ongoing incest, frequent breaking off of contact by the young girls, professionals' shortcomings in knowledge and skills, and…

  10. Persecutors, Victims and Rescuers in Harlequin Romances.

    Science.gov (United States)

    Hassencahl, Fran

    Based on a pattern of interaction, in which the interactants fulfill the roles of victim, persecutor, or rescuer, a study of ten Harlequin romantic novels was undertaken to determine what factors provided for the readers' identification with the Harlequin characters. It was found that Harlequin heroines manifested their status as victims by…

  11. SITE OF ACCIDENTS FOR VICTIMS OF ASSAULT

    NARCIS (Netherlands)

    KINGMA, J

    1994-01-01

    The preponderance of males in violence was observed in 82.1% of 2,822 victims of assault (treated for injuries at the emergency unit of a hospital). Sex differences were found for site of occurrence of the violent act. Women became victims of violence most frequently (34.6%) at home and men in the s

  12. Lepton mixing from the hidden sector

    CERN Document Server

    Ludl, P O

    2015-01-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form U_PMNS \\approx V_CKM^\\dagger U_X, where U_X is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) Grand Unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the GUT symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries G_hidden. We explore the conditions under which symmetries G_hidden can produce flavour structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2 x Z2 and G_hidden can lead to the required form of U_X. A different kin...

  13. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  14. Probing Hidden Sector Photons through the Higgs Window.

    OpenAIRE

    Ahlers, M.; Jaeckel, J; Redondo, J.; Ringwald, A.

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light...

  15. Supersymmetric leptogenesis and light hidden sectors

    CERN Document Server

    Weniger, Christoph

    2010-01-01

    Thermal leptogenesis and supergravity are attractive scenarios for physics beyond the standard model. However, it is well known that the super-weak interaction of the gravitino often leads to problems with primordial nucleosynthesis in the standard scenario of matter parity conserving MSSM + three right-handed neutrinos. We will present and compare two related solutions to these problems: 1) The conflict between BBN and leptogenesis can be avoided in presence of a hidden sector with light supersymmetric particles which open new decay channels for the dangerous long-lived particles. 2) If there is a condensate in the hidden sector, such additional decay channels can be alternatively opened by dynamical breaking of matter parity in the hidden sector.

  16. Hidden Markov models estimation and control

    CERN Document Server

    Elliott, Robert J; Moore, John B

    1995-01-01

    As more applications are found, interest in Hidden Markov Models continues to grow. Following comments and feedback from colleagues, students and other working with Hidden Markov Models the corrected 3rd printing of this volume contains clarifications, improvements and some new material, including results on smoothing for linear Gaussian dynamics. In Chapter 2 the derivation of the basic filters related to the Markov chain are each presented explicitly, rather than as special cases of one general filter. Furthermore, equations for smoothed estimates are given. The dynamics for the Kalman filte

  17. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  18. Hidden simplicity of gauge theory amplitudes

    Science.gov (United States)

    Drummond, J. M.

    2010-11-01

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in \\ {N}=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  19. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...... (HNNs) with much fewer parameters than conventional HMMs and other hybrids can obtain comparable performance, and for the broad class task it is illustrated how the HNN can be applied as a purely transition based system, where acoustic context dependent transition probabilities are estimated by neural...

  20. Dark Radiation from a hidden U(1)

    CERN Document Server

    Vogel, Hendrik

    2015-01-01

    We discuss the impact of a hidden sector consisting of Minicharged Particles (MCPs) and massless hidden photons on the expansion history of our Universe. We present parameter scans for the amount of extra relativistic particles (Neff) and the abundance of light nuclei for fermionic MCPs with masses between ~100 keV and 10 GeV and minicharges in the range 10^(-11)-1. Current CMB and BBN data significantly constrain the available parameter space of MCPs. The shown results are a valuable indicator for future experimental searches and are presented in a flexible way so that more accurate results on Neff can be easily interpreted.

  1. Hidden Symmetries, Central Charges and All That

    CERN Document Server

    de Wit, Bernard; Wit, Bernard de; Nicolai, Hermann

    2001-01-01

    In this review we discuss hidden symmetries of toroidal compactifications of eleven-dimensional supergravity. We recall alternative versions of this theory which exhibit traces of the hidden symmetries when still retaining the massive Kaluza-Klein states. We reconsider them in the broader perspective of M-theory which incorporates a more extended variety of BPS states. We also argue for a new geometry that may underly these theories. All our arguments point towards an extension of the number of space-time coordinates beyond eleven.

  2. Hidden Subgroup States are Almost Orthogonal

    CERN Document Server

    Ettinger, M; Knill, E H; Ettinger, Mark; Hoyer, Peter; Knill, Emanuel

    1999-01-01

    It is well known that quantum computers can efficiently find a hidden subgroup $H$ of a finite Abelian group $G$. This implies that after only a polynomial (in $\\log |G|$) number of calls to the oracle function, the states corresponding to different candidate subgroups have exponentially small inner product. We show that this is true for noncommutative groups also. We present a quantum algorithm which identifies a hidden subgroup of an arbitrary finite group $G$ in only a linear (in $\\log |G|$) number of calls to the oracle function. This is exponentially better than the best classical algorithm. However our quantum algorithm requires an exponential amount of time, as in the classical case.

  3. When and Why We See Victims as Responsible: The Impact of Ideology on Attitudes Toward Victims.

    Science.gov (United States)

    Niemi, Laura; Young, Liane

    2016-09-01

    Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.

  4. Family dynamics and young children's sibling victimization.

    Science.gov (United States)

    Tucker, Corinna Jenkins; Finkelhor, David; Turner, Heather; Shattuck, Anne M

    2014-10-01

    This research examines how family dynamics like interparental conflict, family violence, and quality of parenting are associated with young children's experiences of sibling victimization. We use nationally representative data from interviews with caregivers of 1,726 children aged 2 to 9 years of age. We hypothesized different family dynamics predictors for a composite of common types of sibling victimization (property, psychological, and mild physical aggression) in comparison to severe physical sibling victimization (victimization that includes physical aggression with a weapon and/or injury). Multinomial regression results showed that sibling victimization in general was associated with negative family dynamics but that children in the severe group had even less parental warmth, poor parental supervision, and greater exposure to interparental conflict and family violence than children in the common types victimization group. Different aspects of family dynamics contribute to sibling victimization, but possibly in different ways and with different consequences. The findings underscore the importance of a family systems theory approach to clinical and intervention work.

  5. Crime victims in the criminal justice system

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2003-01-01

    Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.

  6. 基于IEC 61850模型的MMS-EASE Lite实现%Analyzing of implement the IEC61850 model with MMS-EASE Lite

    Institute of Scientific and Technical Information of China (English)

    孙锦中

    2010-01-01

    IEC 61850是基于通信网络通信平台的变电站自动化系统唯一国际标准,而MMS(Manufacturing Message Specification)是IEC 61850实现的关键,MMS-EASE Lite是利用MMS实现IEC 61850的重要方法.本文对IEC 61850的ACSI类模型和服务作了介绍,给出了ACSI主要类实例与MMS对象和服务的映射关系及MMS-EASE Lite的实现接口,详细分析ACSI类实例的MMS-EASE Lite实现过程,对利用IEC 61850进行变电站自动化建设具有重要的参考意义.

  7. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2015-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  8. Entropy Rate for Hidden Markov Chains with rare transitions

    OpenAIRE

    2010-01-01

    We consider Hidden Markov Chains obtained by passing a Markov Chain with rare transitions through a noisy memoryless channel. We obtain asymptotic estimates for the entropy of the resulting Hidden Markov Chain as the transition rate is reduced to zero.

  9. The Corporate Illiterates: The Hidden Illiterates of Silicon Valley.

    Science.gov (United States)

    Chase, Sharon

    1991-01-01

    Describes the writing and business communication problems of college-educated workers in Silicon Valley. Discusses hidden illiterates in the universities and in the workplace. Offers solutions for professors and managers faced with the problem of hidden illiterates. (PRA)

  10. Prioritizing Child Pornography Notifications: Predicting Direct Victimization.

    Science.gov (United States)

    Smid, Wineke; Schepers, Klaartje; Kamphuis, Jan Henk; van Linden, Sabine; Bartling, Sarah

    2015-08-01

    The growing number of notifications for child pornography (CP) possession constitutes a capacity problem for police forces entrusted with the investigation of these offenses. Notifications of CP offenses in which the investigation reveals concurrent direct victimization, in the form of contact offenses, grooming, online offending, or the production of CP material, form a potential target group for prioritization. The first of the twofold aims of this study was to validate the occurring distinction between mixed suspects (i.e., CP possession suspects who were also ever associated with direct victimization) and CP-only suspects (i.e., CP possession suspects who were never associated with direct victimization) to predict an outcome of the investigation including direct victimization. The second aim was to explore variables related to direct victimization among CP-only suspects. A total of 150 files of police investigations into notifications for CP offenses were studied. Findings confirmed significantly greater prevalence of direct victimization as an outcome of the investigation among mixed suspects than CP-only suspects (90% vs. 10%). Among CP-only suspects, direct victimization was predicted by (a) prior police contacts, charges, or convictions concerning noncontact sexual offending, (b) the confiscation of more than two computers during the house search, and (c) a more serious nature of the CP material that formed the basis for the notification in terms of younger victims and more extreme content. These variables may point to a small subgroup of heavily invested CP offenders who are at a higher risk to cross the line to direct victimization. Cross-validation of these preliminary findings is indicated. © The Author(s) 2014.

  11. Design and Implementation of Domain based Semantic Hidden Web Crawler

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Web is a wide term which mainly consists of surface web and hidden web. One can easily access the surface web using traditional web crawlers, but they are not able to crawl the hidden portion of the web. These traditional crawlers retrieve contents from web pages, which are linked by hyperlinks ignoring the information hidden behind form pages, which cannot be extracted using simple hyperlink structure. Thus, they ignore large amount of data hidden behind search forms. This paper emphasizes o...

  12. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  13. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  14. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  15. Predictors and protective factors for adolescent Internet victimization

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving

    2012-01-01

    To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....

  16. Mental health in violent crime victims: Does sexual orientation matter?

    Science.gov (United States)

    Cramer, Robert J; McNiel, Dale E; Holley, Sarah R; Shumway, Martha; Boccellari, Alicia

    2012-04-01

    The present study investigates victim sexual orientation in a sample of 641 violent crime victims seeking emergency medical treatment at a public-sector hospital. Victim sexual orientation was examined as it: (a) varies by type of violent crime and demographic characteristics, (b) directly relates to psychological symptoms, and (c) moderates the relationship between victim and crime characteristics (i.e., victim gender, victim trauma history, and type of crime) and psychological symptoms (i.e., symptoms of acute stress, depression, panic, and general anxiety). Results showed that lesbian, gay, bisexual, and transgender (LGBT) victims were more likely to be victims of sexual assault. Heterosexual victims were more likely to be victims of general assault and shootings. LGBT victims demonstrated significantly higher levels of acute stress and general anxiety. Moreover, victim sexual orientation moderated the association of type of crime with experience of panic symptoms. Also, victim sexual orientation moderated the relation of victim trauma history and general anxiety symptoms. Results are discussed in relation to victimization prevalence rates, sexual prejudice theory, and assessment and treatment of violent crime victims.

  17. Variational Hidden Conditional Random Fields with Coupled Dirichlet Process Mixtures

    NARCIS (Netherlands)

    Bousmalis, K.; Zafeiriou, S.; Morency, L.P.; Pantic, Maja; Ghahramani, Z.

    2013-01-01

    Hidden Conditional Random Fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An infinite HCRF is an HCRF with a countably infinite number of hidden states, which rids us not only of the necessit

  18. Perceptual consequences of "hidden" hearing loss.

    Science.gov (United States)

    Plack, Christopher J; Barker, Daphne; Prendergast, Garreth

    2014-09-09

    Dramatic results from recent animal experiments show that noise exposure can cause a selective loss of high-threshold auditory nerve fibers without affecting absolute sensitivity permanently. This cochlear neuropathy has been described as hidden hearing loss, as it is not thought to be detectable using standard measures of audiometric threshold. It is possible that hidden hearing loss is a common condition in humans and may underlie some of the perceptual deficits experienced by people with clinically normal hearing. There is some evidence that a history of noise exposure is associated with difficulties in speech discrimination and temporal processing, even in the absence of any audiometric loss. There is also evidence that the tinnitus experienced by listeners with clinically normal hearing is associated with cochlear neuropathy, as measured using Wave I of the auditory brainstem response. To date, however, there has been no direct link made between noise exposure, cochlear neuropathy, and perceptual difficulties. Animal experiments also reveal that the aging process itself, in the absence of significant noise exposure, is associated with loss of auditory nerve fibers. Evidence from human temporal bone studies and auditory brainstem response measures suggests that this form of hidden loss is common in humans and may have perceptual consequences, in particular, regarding the coding of the temporal aspects of sounds. Hidden hearing loss is potentially a major health issue, and investigations are ongoing to identify the causes and consequences of this troubling condition.

  19. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements

  20. Discovering Hidden Treasures with GPS Technology

    Science.gov (United States)

    Nagel, Paul; Palmer, Roger

    2014-01-01

    "I found it!" Addison proudly proclaimed, as she used an iPhone and Global Positioning System (GPS) software to find the hidden geocache along the riverbank. Others in Lisa Bostick's fourth grade class were jealous, but there would be other geocaches to find. With the excitement of movies like "Pirates of the Caribbean" and…

  1. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover...

  2. Dermatologic hazards from hidden contacts with penicillin

    Energy Technology Data Exchange (ETDEWEB)

    Boonk, W.J.

    1981-01-01

    The unbridled use of penicillin after its discovery by Fleming has resulted in possible hazards to human health due to traces of the drug being present in food and other hidden sources. These hazards may include toxic effects, hypersensitivity reactions and possibly a raising of the frequency and duration of allergy to penicillin.

  3. The structural strength of glass: hidden damage

    NARCIS (Netherlands)

    Veer, F.A.; Rodichev, Y.M.

    2011-01-01

    We discuss “hidden damage” of glass by the rolling process, which results in heterogeneous distribution of microcracks on the edge surface of glass element, which are the fracture source deteriorating glass element strength. It is shown that removal of this damage on the edges of glass elements incr

  4. Computerized Testing: The Hidden Figures Test.

    Science.gov (United States)

    Jacobs, Ronald L.; And Others

    1985-01-01

    This study adapted the Hidden Figures Test for use on PLATO and determined the reliability of the computerized version compared to the paper and pencil version. Results indicate the test was successfully adapted with some modifications, and it was judged reliable although it may be measuring additional constructs. (MBR)

  5. Towards gauge unified, supersymmetric hidden strong dynamics

    CERN Document Server

    Chiang, Cheng-Wei; Ye, Fang

    2016-01-01

    We consider a class of models with extra complex scalars that are charged under both the Standard Model and a hidden strongly coupled $SU(N)_H$ gauge sector, and discuss the scenarios where the new scalars are identified as the messenger fields that mediate the spontaneously broken supersymmetries from the hidden sector to the visible sector. The new scalars are embedded into 5-plets and 10-plets of an $SU(5)_V$ gauge group that potentially unifies the Standard Model gauge groups. They also form a tower of bound states via hidden strong dynamics around the TeV scale. The Higgs bosons remain as elementary particles. Quadratically divergent contributions to the Higgs mass from the Standard Model fermions are canceled by the new scalar contributions to alleviate the fine-tuning problem. We also discuss a supersymmetrized version of this class of models, consisting of the minimal supersymmetric Standard Model plus extra chiral multiplets where the new scalars reside. Due to the hidden strong force, the new low-en...

  6. Hidden Costs and Challenges of Servitization

    DEFF Research Database (Denmark)

    Yang, Yifan; Slepniov, Dmitrij

    of these labels, the potential benefits of servitization are often overshadowed by costs associated with it. By using the cases of Chinese and Danish manufacturing firms, this study takes a closer look at possible hidden costs of servitization and contributes to our understanding of servitization performance...

  7. Fear of property crime: examining the effects of victimization, vicarious victimization, and perceived risk.

    Science.gov (United States)

    Cook, Carrie L; Fox, Kathleen A

    2011-01-01

    Fear of crime research has primarily focused on fear of crime in general or on fear of specific types of violent crimes. This study builds from this line of research by focusing exclusively on the night fear of six types of property crimes, including fear of burglary while away from home, vehicle theft, bicycle theft, property theft, vandalism, and vehicle burglary. This study examines the effects of victimization, vicarious victimization, and perceived risk on fear of property crime. Survey data from college students reveal that victimization and vicarious victimization were not significant predictors of fear of property crime, whereas perceived risk was a consistent and significant predictor of fear of all property crimes.

  8. La victime, acteur de la sécurité ? / The victim, a security actor ?

    Directory of Open Access Journals (Sweden)

    Dieu François

    2012-08-01

    Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.

  9. Quantum Discord, CHSH Inequality and Hidden Variables -- Critical reassessment of hidden-variables models

    CERN Document Server

    Fujikawa, Kazuo

    2013-01-01

    Hidden-variables models are critically reassessed. It is first examined if the quantum discord is classically described by the hidden-variable model of Bell in the Hilbert space with $d=2$. The criterion of vanishing quantum discord is related to the notion of reduction and, surprisingly, the hidden-variable model in $d=2$, which has been believed to be consistent so far, is in fact inconsistent and excluded by the analysis of conditional measurement and reduction. The description of the full contents of quantum discord by the deterministic hidden-variables models is not possible. We also re-examine CHSH inequality. It is shown that the well-known prediction of CHSH inequality $|B|\\leq 2$ for the CHSH operator $B$ introduced by Cirel'son is not unique. This non-uniqueness arises from the failure of linearity condition in the non-contextual hidden-variables model in $d=4$ used by Bell and CHSH, in agreement with Gleason's theorem which excludes $d=4$ non-contextual hidden-variables models. If one imposes the l...

  10. Drawings by Child Victims of Incest.

    Science.gov (United States)

    Yates, Alayne; And Others

    1985-01-01

    Child victims of incest were judged to have more poorly developed impulse controls, a defensive structure which emphasizes repression, and were significantly more variable in the degree to which they expressed sexual features in the drawings. (Author/CL)

  11. Treatment of Child Victims of Incest.

    Science.gov (United States)

    Boatman, Bonny; And Others

    1981-01-01

    Reviews three treatment methods (individual, group, and family therapy) used over a five-year period for child incest victims. Presents common themes, issues, and pitfalls that arose during therapy. Stresses potential benefits of psychotherapy to this population. (Author)

  12. Changing the social contexts of peer victimization.

    Science.gov (United States)

    Leadbeater, Bonnie; Hoglund, Wendy

    2006-02-01

    While school-based prevention programs often target deficits in individual children's social skills in order to limit their aggression or exposure to peer victimization, there is increasing evidence that school-wide and classroom-level factors can affect the success of these programs. We describe the WITS Primary Program which takes a community development approach for the prevention of victimization. It was designed for kindergarten to grade 3 students, and aims to create responsive communities for the prevention of peer victimization by engaging the support of parents, teachers, school counselors, older student, and emergency services personnel. Evidence supporting the program's feasibility and effectiveness are reported. The prevention of peer victimization and bullying may require targeted programs with demonstrated support from many adults in young children's social networks.

  13. The Mourning Ceremony for The Victims

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ At 14:28 on the afternoon of May 19, CCPIT held the Mourning Ceremony for the victims of the May-12 Wenchuan 8.0-magnitude earthquake. Over 300 people including all staff members of CCPIT offices and departments as well as CCPIT enterprises and institutions at-tended the ceremony and mourned for the victims for three min-utes, expressing their deeply-felt grief.

  14. Bully Victims: Psychological and Somatic Aftermaths

    OpenAIRE

    Sansone, Randy A.; Sansone, Lori A.

    2008-01-01

    Bullying is a well-known adversity among school-age children. According to data, approximately 10 percent of US children and adolescents are the victims of frequent bullying by peers. In the aftermath of being bullied, victims may develop a variety of psychological as well as somatic symptoms, some of which may persist into adulthood. Psychological symptoms may include social difficulties, internalizing symptoms, anxiety, depression, suicidal ideation, and eating disorders (i.e., anorexia or ...

  15. [Does a victim's fault exonerate medical responsibility?].

    Science.gov (United States)

    Bernard, M G

    2005-06-01

    Victim fault constitutes a paradox in which the person creates herself her damage and runs the risk to suffer of it. That situation can occur in several cases, exploration or therapeutics. French liability rules consist in application of Civil code articles n(o) 1382 and 1383, but mainly 1147 concerning contractual liability since 1936. Indubitably, victim fault exonerates practitioner from her liability, at least partly. After report of a few files, the author proposes safety rules which can help to avoid problems.

  16. [Avalanche accidents and treatment of avalanche victims].

    Science.gov (United States)

    Skaiaa, Sven Christjar; Thomassen, Øyvind

    2016-03-15

    Avalanches may be provoked spontaneously or as a result of human activity, and they trigger the need for considerable rescue resources. Avalanche search and rescue operations are complex and characterised by physical and mental stress. The guidelines for resuscitation of avalanche victims may be perceived as complex and abstruse, which can lead to suboptimal treatment and an increased strain on rescue teams. The purpose of this article is to summarise the principles for medical treatment of avalanche victims.

  17. [The elderly as victims of violent crime].

    Science.gov (United States)

    Ahlf, E H

    1994-01-01

    Up to now, victimology has only dealt with partial aspects of the situation of the elderly as victims of violent crime. Nevertheless, the Police Crime Statistics enable us to make the following three basic statements: In general, old people are less likely to become victims of violent crime (than young people). The acts of violence committed against the elderly are mainly ones in which there was a relationship between offender and victim before the offense. Elderly women are disproportionately more often victims of purse snatching. The increasing social isolation of old people constitutes not only a specific form of victimization, it probably also increases their susceptibility to become victims. The theory that old people have "a particularly pronounced fear of crime" cannot be generally proven. This question must be considered from differing points of view and depends largely on the individual vulnerability of the old people. In Germany, there has hardly been any empirical study of violence towards the elderly in institutions and in family households (so-called domestic violence). It is believed that more violence takes place in both than in generally assumed.

  18. Adolescent Violent Victimization and Precocious Union Formation.

    Science.gov (United States)

    C Kuhl, Danielle; Warner, David F; Wilczak, Andrew

    2012-11-01

    This article bridges scholarship in criminology and family sociology by extending arguments about "precocious exits" from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization ("street" violence) on the timing of first co-residential union formation-differentiating between marriage and cohabitation-in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance.

  19. The lived experience of victims of crime.

    Science.gov (United States)

    McBrearty, Paula

    2011-01-01

    The focus of this research study was to ascertain the impact of crime on individuals, who presented with an injury to the emergency department. Given the high prevalence of crime in our society today, victims of crime are identified as a growing patient population seeking help in emergency departments. To maximise holistic care for these patients it is important that healthcare professionals gain insight into the experience of being a victim of crime. The study was qualitative in nature and used a phenomenological approach. In-depth, unstructured audio taped interviews were conducted to elicit the essence of the experience of being a victim of crime. The voices of the victims revealed four themes; "Fear, Shock and Disbelief", "Guilt/Self-blame", "Physical and Psychological Scars" and "Lifestyle Changes". The management of victims of crime in the emergency department appears to be concerned exclusively with physical injuries. Unseen is the potential psychological sequelae of the assault. Pivotal to these findings is the absence of psychological follow-up support for these victims of crime. This study affords healthcare professionals working in the emergency department, the opportunity to reflect upon current practice and highlight the value of their role in the provision of optimal care for this patient population.

  20. Factors which predict violence victimization in Nigeria

    Directory of Open Access Journals (Sweden)

    Lincoln J Fry

    2014-01-01

    Full Text Available Background: Violence is a major public health issue, globally as well as in the African continent. This paper looks at Nigeria and begins the process of identifying the factors that predict interpersonal violence in that country. The purpose is to interpret the implications of the results presented here for violence prevention programmes in Nigeria. Materials and Methods : The study is based on the responses of 2324 Nigerians included in Round Four of the Afrobarometer surveys. The study concentrates on 579 respondents who reported either they or someone else in their family had been the victim of violence, defined as being physically attacked, in the past year. Results: A logistical regression analysis revealed five significant factors that predicted interpersonal violence: being the victim of a property crime, the fear of crime, the respondents faith, whethera police station was in the local area and poverty. The findings revealed that 43.7% of the sample had been victimised within the past year and 18.8% had been the victim of both violent and property crimes. One surprising findingwas the number of respondents who were re-victimised; 75% of violence victims also had been property crime victims. Conclusions: These findings suggest that target hardening should be the basis to plan, implement and evaluate violence prevention programmes in Nigeria. Prevention personnel and/or law enforcement need to respond to reported incidents of property and/or violence victimisation and attempt to prepare victims to protect both their premises and their persons in the future.

  1. Victims and contemporary tendencies in crime control

    Directory of Open Access Journals (Sweden)

    Soković Snežana

    2014-01-01

    Full Text Available Victimological dimension of new criminality forms is a specific challenge for contemporary criminal law systems; new time brings new forms of criminality, new victims, but also new ways and opportunities for more efficient protection of victims. At the same time with review and improvement of existing standards of victims` protection, contemporary criminality control systems show strong tendency toward compromising the general position of the victim. Victim’s interests are being instrumentalized because of the justification of changes in criminality control in the direction of significant strengthening of criminal law repression. The crime which is emotionalized with the affective media presentation of the victim justifies stricter penal policy and provides the populist support for repressive criminality control strategies and criminal law expansionism. The aim of the paper is the analysis of the mechanisms of victim “use“ in contemporary criminality control and the examination of its consequences, with special review on domestic circumstances through analysis of the Code on special measures for prevention of crimes against sexual freedom towards juveniles (Marija`s Code.

  2. Easing Arthritis: Research offers new hope for people with common joint disease.

    Science.gov (United States)

    ... Navigation Bar Home Current Issue Past Issues Easing Arthritis: Research offers new hope for people with common ... likely help with that. Need more information on Arthritis? From MedlinePlus.gov : For a slideshow with sound ...

  3. Palliative Care Eases Symptoms, Enhances Lives | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Palliative Care Palliative Care Eases Symptoms, Enhances Lives Past Issues / Spring 2014 ... pharmacists, nutritionists, and others. When do I need palliative care? Many adults and children living with serious diseases ...

  4. Rheumatoid Arthritis Drug May Not Ease Chronic Fatigue Syndrome After All

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_163926.html Rheumatoid Arthritis Drug May Not Ease Chronic Fatigue Syndrome After ... had hoped that anakinra (Kineret) -- a medication for rheumatoid arthritis -- also could be used to relieve symptoms of ...

  5. Turning to an Ancient Art to Help Ease PTSD in Veterans

    Science.gov (United States)

    ... https://medlineplus.gov/news/fullstory_162439.html Turning to an Ancient Art to Help Ease PTSD in Veterans Small study suggests ... reduce symptoms, but a larger trial is needed To use the sharing features on this page, please ...

  6. Incendiari e vittime / Arsonists and Victims / Incendiaires et victimes

    Directory of Open Access Journals (Sweden)

    Roberta Bisi

    2008-04-01

    Full Text Available Human beings need fire !Contrary to other living beings, mankind could not live without fire so it is quite astonishing to observe that most of the fires which burn on the earth are caused by man.Many fires spread all over the North Mediterranean area, from Portugal to Turkey, during the summer 2007.Human beings and fire: associated to the sacrifice of Titan Prometheus which was meant to be a sort of pattern to be followed by men to honour the gods.Fire is alive like water and air but it is difficult to capture it with the eyes: we can look at it for a long time before we discover that it never looks like itself.Fire has brought about important changes to human life, giving it much more security and comfort.However, the destructive power of fire is a real threat which not only takes many victims and results in wounded, intoxicated and homeless people but its force also wipes out and destroys places recognized as the heritage of mankind.Les hommes ont besoin du feu! Contrairement à tous les autres êtres vivants, les hommes ne pourraient pas vivre comme ils le font sans le feu; d'autre part, le fait que la plupart des feux qui brûlent sur la planète sont causés par l’homme, représente un aspect inquiétant.Pendant l’été 2007, beaucoup d’incendies ont frappé toute la zone du Nord de la Méditerranée, du Portugal à la Turquie. Hommes et feu : un binôme lié à la création du sacrifice du Titan Prométhée et qui aurait ainsi établi le modèle suivi par les hommes afin d'honorer les dieux.Le feu est vivant, comme l’eau et l'air, mais il est insaisissable au regard, c’est à dire que nous pouvons passer beaucoup de temps à le regarder mais il ne sera jamais égal à lui même. L’usage du feu a rendu la vie de l’homme plus sûre et plus confortable et il a modifié, au cours du temps, la face de la terre.Toutefois, la force déstructrice du feu représente une menace réelle qui fait des victimes, des blessés, des intoxiqu

  7. Implicit happiness and sadness are associated with ease and difficulty: evidence from sequential priming.

    Science.gov (United States)

    Lasauskaite, Ruta; Gendolla, Guido H E; Bolmont, Mylène; Freydefont, Laure

    2017-01-01

    Three experiments tested the hypothesis of implicit associations between happiness and the performance ease concept and between sadness and the performance difficulty concept. All three studies applied a sequential priming paradigm: participants categorized emotion words (Experiment 1) or facial expressions (Experiment 2) as positive or negative or as referring to ease or difficulty (Experiment 3). These targets were preceded by briefly flashed ease- or difficulty-related words or neutral non-words (Experiments 1 and 2) or by happy, sad, or neutral facial expressions (Experiment 3) as primes. As predicted, all three experiments revealed increases in reaction times in the sequential priming task from congruent trials (happiness/ease and sadness/difficulty) over neutral trials to incongruent trials (sadness/ease and happiness/difficulty). The findings provide evidence for implicit associative links of happiness with ease and sadness with difficulty, as posited by the implicit-affect-primes-effort model (Gendolla, Int J Psychophysiol 86:123-135, 2012; Soc Pers Psychol Compass 9:606-619, 2015).

  8. Building Store Satisfaction Centred on Customer Retention in Clothing Retailing: Store Design and Ease of Shopping

    Directory of Open Access Journals (Sweden)

    Gulden Turhan

    2016-01-01

    Full Text Available The study’s research model suggests that store design and ease of shopping are associated with customer retention through a mediated pathway in which store design and ease of shopping influence perceived store satisfaction, which in turn, influences customer retention. This survey was administered to two separate clothing stores offered to either females or males (in total, 533 participants. Using structural equation modelling methodology, data was analysed to explain the interrelations among the variables in the model. The results of an empirical study of a sample of store shoppers revealed that store design and ease of shopping influence customer retention in an indirect way through customer perception of satisfaction with the store. In building store satisfaction that is centred on customer retention, store design and shopping ease differ in their relative influences. This difference is high for females, but for men as low as to be considered negligible in males. As a result, improving customers’ perceptions of store design and ease of shopping is a way to ensure store satisfaction support customer retention. The results of the study provide a new insight into the relationships by suggesting indirect effects of shopping ease and store design on consumer retention by their impacts on store satisfaction, rather than direct effects.

  9. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    Directory of Open Access Journals (Sweden)

    Stevković Ljiljana

    2013-01-01

    Full Text Available Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization. Empirical analysis of the criminological consequences of early violent victimization in adulthood are an exception in scientific studies in Serbia. The aim of the paper is to present the results of research into the influence of early violent victimization on violent crime of adult men and women. After the introduction a brief overview of the worldwide research confirming the correlation between the experience of violent victimization and subsequent violent behavior is given. The results of the research conducted by the author will then be discussed. The results illustrate the possibility of predicting violent criminal behavior in adulthood based on indicators of direct and indirect victimization in childhood. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  10. Bystander Involvement in Peer Victimization: The Value of Looking beyond Aggressors and Victims

    Science.gov (United States)

    Wiens, Brenda A.; Dempsey, Allison

    2009-01-01

    Peer victimization has been a focus of both research and prevention program development. This construct is typically measured from the victim and aggressor perspectives. However, prevention programming often includes an additional bystander perspective. The present study evaluated whether questions regarding witnessing peer victimization…

  11. Help-Seeking in a National Sample of Victimized Latino Women: The Influence of Victimization Types

    Science.gov (United States)

    Sabina, Chiara; Cuevas, Carlos A.; Schally, Jennifer L.

    2012-01-01

    The current study aimed to examine formal and informal help-seeking responses to interpersonal victimization among a national sample of Latino women. In addition, an examination of help-seeking by victimization type was undertaken. Data came from the Sexual Assault Among Latinas (SALAS) study that obtained help-seeking rates among a victimized…

  12. Social Behavior and Peer Relationships of Victims, Bully-Victims, and Bullies in Kindergarten

    Science.gov (United States)

    Perren, Sonja; Alsaker, Francoise D.

    2006-01-01

    Background: Although the prevalence of bully/victim problems in school-age children and adolescents has been investigated in many countries, only a few studies have been carried out among younger children. This study examines social behaviors and peer relationships of children involved in bully/victim problems in kindergarten. Methods: Three…

  13. Mental Health Correlates of the Victim-Perpetrator Relationship among Interpersonally Victimized Adolescents

    Science.gov (United States)

    Lawyer, Steven R.; Ruggiero, Kenneth J.; Resnick, Heidi S.; Kilpatrick, Dean G.; Saunders, Benjamin E.

    2006-01-01

    This research examines mental health correlates of different victim-perpetrator relationships among adolescent victims of interpersonal violence. A large and nationally representative sample of adolescents (N = 4,023) responded to structured telephone interviews concerning mental health functioning (posttraumatic stress disorder--PTSD, major…

  14. Hidden penis release: adjunctive suprapubic lipectomy.

    Science.gov (United States)

    Horton, C E; Vorstman, B; Teasley, D; Winslow, B

    1987-08-01

    We believe the hidden penis may be caused and concealed by a prominent suprapubic fat pad in addition to the restrictive fibrous bands of the dartos fascia fixing the shaft of the penis proximally while loose skin folds prolapse distally over the phallus. A penis of inadequate length or appearance may affect body image. Patients with this problem often require psychological support. Hidden penis may be distinguished from micropenis by palpating adequate corpora and showing a stretched penile length within 2 SD of normal. Excision of suprapubic fat with sectioning of the tethering dartos bands will release and increase the length of the penis. Suprapubic fat pad resection may also be helpful to elongate a short penis in cases of adult microphallus, or after partial penectomy because of trauma or cancer. Circumcision is contraindicated.

  15. Laser experiments explore the hidden sector

    CERN Document Server

    Ahlers, M; Jaeckel, J; Redondo, J; Ringwald, A

    2007-01-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses <~0.05 eV, the charge is now restricted to be less than (3-4)x10^(-7) times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background.

  16. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  17. Hidden geometric correlations in real multiplex networks

    Science.gov (United States)

    Kleineberg, Kaj-Kolja; Boguñá, Marián; Ángeles Serrano, M.; Papadopoulos, Fragkiskos

    2016-11-01

    Real networks often form interacting parts of larger and more complex systems. Examples can be found in different domains, ranging from the Internet to structural and functional brain networks. Here, we show that these multiplex systems are not random combinations of single network layers. Instead, they are organized in specific ways dictated by hidden geometric correlations between the layers. We find that these correlations are significant in different real multiplexes, and form a key framework for answering many important questions. Specifically, we show that these geometric correlations facilitate the definition and detection of multidimensional communities, which are sets of nodes that are simultaneously similar in multiple layers. They also enable accurate trans-layer link prediction, meaning that connections in one layer can be predicted by observing the hidden geometric space of another layer. And they allow efficient targeted navigation in the multilayer system using only local knowledge, outperforming navigation in the single layers only if the geometric correlations are sufficiently strong.

  18. Binary hidden Markov models and varieties

    CERN Document Server

    Critch, Andrew J

    2012-01-01

    The technological applications of hidden Markov models have been extremely diverse and successful, including natural language processing, gesture recognition, gene sequencing, and Kalman filtering of physical measurements. HMMs are highly non-linear statistical models, and just as linear models are amenable to linear algebraic techniques, non-linear models are amenable to commutative algebra and algebraic geometry. This paper examines closely those HMMs in which all the random variables, called nodes, are binary. Its main contributions are (1) minimal defining equations for the 4-node model, comprising 21 quadrics and 29 cubics, which were computed using Gr\\"obner bases in the cumulant coordinates of Sturmfels and Zwiernik, and (2) a birational parametrization for every binary HMM, with an explicit inverse for recovering the hidden parameters in terms of observables. The new model parameters in (2) are hence rationally identifiable in the sense of Sullivant, Garcia-Puente, and Spielvogel, and each model's Zar...

  19. Childhood Victimization, Attachment, Coping, and Substance Use Among Victimized Women on Probation and Parole.

    Science.gov (United States)

    Dishon-Brown, Amanda; Golder, Seana; Renn, Tanya; Winham, Katherine; Higgins, George E; Logan, T K

    2017-06-01

    Justice-involved women report high rates of victimization across their life span, and these experiences contribute to their involvement in the criminal justice (CJ) system. Within this population, research has identified an overlap among victimization and substance use, a high-risk coping mechanism. Furthermore, research indicates attachment style is related to coping and high-risk behaviors. Research is needed to understand the relationship among these mechanisms as they relate to intimate partner violence (IPV). To address this gap, this study investigated the relationship between attachment, coping, childhood victimization, substance use, and IPV among 406 victimized women on probation/parole. Results of 6 multivariate regression analyses were statistically significant, accounting for 8%-13% of the variance in IPV. Particularly, childhood sexual victimization and negative coping were significant in all analyses. Findings provide practitioners, administrators, and policymakers information about the specific needs of justice-involved women.

  20. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  1. Finite State Transducers Approximating Hidden Markov Models

    CERN Document Server

    Kempe, A

    1999-01-01

    This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is especially advantageous for part-of-speech tagging because the resulting transducer can be composed with other transducers that encode correction rules for the most frequent tagging errors. The speed of tagging is also improved. The described methods have been implemented and successfully tested on six languages.

  2. Hidden symmetries in dilaton-axion gravity

    CERN Document Server

    Kechkin, O V

    1996-01-01

    Four--dimensional Einstein--Maxwell--dilaton--axion system restricted to space--times with one non--null Killing symmetry is formulated as the three--dimensional gravity coupled sigma--model. Several alternative representations are discussed and the associated hidden symmetries are revealed. The action of target space isometries on the initial set of (non--dualized ) variables is found. New mulicenter solutions are obtained via generating technique based on the formulation in terms of the non--dualized variables.

  3. Caldera rim collapse: A hidden volcanic hazard

    OpenAIRE

    Merle, Olivier; Michon, Laurent; Bachèlery, Patrick

    2008-01-01

    International audience; Following the emblematic flank collapse of Mount St Helens in 1981, numerous models of flank sliding have been proposed. These models have allowed to largely improve the understanding of mechanisms involved in such landslides, which represent a tremendous risk for populations living around volcanoes. In this article, a new mode of landslide formation, related to buried calderas, is described. The model emphasizes the paramount importance of the hidden ring fault that, ...

  4. Killing and letting die: hidden value assumptions.

    Science.gov (United States)

    Atkinson, G

    1983-01-01

    In this paper I argue for several related theses: first, that the distinction between killing and letting die, as it is drawn by ordinary persons in ordinary contexts, is more complex than is generally understood; second, that the key feature of this complexity lies in the presence of a hidden normative component in what appears to be a straightforwardly descriptive distinction; and, third, that this complexity renders the killing/letting die distinction an inadequate and hazardous guide for moral reasoning.

  5. Online Learning in Discrete Hidden Markov Models

    OpenAIRE

    Alamino, Roberto C.; Caticha, Nestor

    2007-01-01

    We present and analyse three online algorithms for learning in discrete Hidden Markov Models (HMMs) and compare them with the Baldi-Chauvin Algorithm. Using the Kullback-Leibler divergence as a measure of generalisation error we draw learning curves in simplified situations. The performance for learning drifting concepts of one of the presented algorithms is analysed and compared with the Baldi-Chauvin algorithm in the same situations. A brief discussion about learning and symmetry breaking b...

  6. Psychosocial profile of bullies, victims, and bully-victims: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Marie eLeiner

    2014-01-01

    Full Text Available While adverse conditions in a child’s life do not excuse inappropriate behavior, they may cause emotional and behavioral problems that require treatment as a preventive measure to reduce the likelihood of bullying. We aimed to identify differences in the psychosocial profiles of adolescents who classified themselves as bullies, victims, or bully-victims. We performed a cross-sectional study in which data were collected between January 2009 and January 2010 from seven university-based clinics in a large metropolitan area with a predominantly Mexican-American population. We collected data on physical aggression among adolescents who self-categorized into the following groups: uninvolved, bullies, victims, and bully-victims. We determined the psychosocial profiles of the adolescents based on responses to the Youth Self Report (YSR and parent’s responses to the Child Behavior Checklist (CBCL. A one-way analysis of variance and multivariate regression analyses were performed to compare the various components of the psychosocial profiles among the groups. Our analysis of the CBCL and the YSR assessments identified differences between the uninvolved group and one or more of the other groups. No significant differences were observed among the bully, victim, and bully-victim groups based on the CBCL. We did find significant differences among those groups based on the YSR, however. Our results suggest that emotional and behavioral problems exist among bullies, victims, and bully-victims. Therefore, treatment should not focus only on the victims of bullying; treatment is equally important for the other groups (bullies and bully-victims. Failure to adequately treat the underlying problems experienced by all three groups of individuals could allow the problems of bullying to continue.

  7. Lepton mixing from the hidden sector

    Science.gov (United States)

    Ludl, P. O.; Smirnov, A. Yu.

    2015-10-01

    Experimental results indicate a possible relation between the lepton and quark mixing matrices of the form UPMNS≈VCKM†UX , where UX is a matrix with special structure related to the mechanism of neutrino mass generation. We propose a framework which can realize such a relation. The main ingredients of the framework are the double seesaw mechanism, SO(10) grand unification and a hidden sector of theory. The latter is composed of singlets (fermions and bosons) of the grand unified theory (GUT) symmetry with masses between the GUT and Planck scale. The interactions in this sector obey certain symmetries Ghidden. We explore the conditions under which symmetries Ghidden can produce flavor structures in the visible sector. Here the key elements are the basis-fixing symmetry and mediators which communicate information about properties of the hidden sector to the visible one. The interplay of SO(10) symmetry, basis-fixing symmetry identified as Z2×Z2 and Ghidden can lead to the required form of UX. A different kind of new physics is responsible for generation of the CKM mixing. We present the simplest realizations of the framework which differ by nature of the mediators and by symmetries of the hidden sector.

  8. Otoendoscopic treatment of hidden lesions in otomastoiditis

    Institute of Scientific and Technical Information of China (English)

    LIU Yang; SUN Jian-jun; LIN Yong-sheng; ZHAO Dan-heng; ZHAO Jing; LEI Fei

    2010-01-01

    Background Surgical treatments for chronic suppurative and cholesteatoma otitis media have been discussed for several decades, but recurrences still occur because of the complex dissection required and hidden lesions associated with otomastoiditis. This study investigated the technology and strategy behind the use of otoendoscopic-assisted otosurgery.Methods We reported on hidden lesions in 32 ears of patients with otomastoiditis between November 2006 and January 2009. All the patients were treated with the aid of an otoendoscope. The advantages of otoendoscopy, including multi-angle light scattering, aperture illumination, and magnification of the local operative field, were utilized in otologic microsurgery, and otoendoscopic operative techniques were introduced for operative sites such as the epitympanum, aditus of the antrum, facial recess, sinus tympani and the mastoid tip.Results All patients were followed up from 3 months to 2 years after surgery. All patients recovered well within 3 months following surgery, except for one case of epithelialization of the mastoid cavity occurring 6 months after surgery for cholesteatoma on the cerebellar surface and another case with Bezold's abscess, hyperplastic granulation tissue developed at the antrum.Conclusions Otoendoscopy can overcome the technical deficiency of rectilinearity of the visual axis associated with otomicroscopic illumination, which presents a problem when dealing with otomastoiditis lesions in hidden areas. This technique allows such lesions within the complex three-dimensional structure to be visualized and cleaned. Otoendoscopy thus has significant potential for improving the quality of surgery and reducing the risk of postoperative recurrence.

  9. Dark matter in the hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2014-01-01

    The cosmological scenario of the dark matter generated in the hidden gauge theory based on the grand unification is discussed. It is found that the stability of the dark matter halo of our Galaxy and the cosmic ray observation constrain, respectively, the dark matter mass and the unification scale between the standard model and the hidden gauge theory sectors. To obtain a phenomenologically consistent thermal evolution, the entropy of the standard model sector needs to be increased. We therefore propose a scenario where the mini-inflation is induced from the potential coupled to the Standard model sector, in particular the Higgs sector. This scenario makes consistent the current dark matter density as well as the baryon-to-photon ratio for the case of pion dark matter. For the glueball or heavy pion of hidden gauge theory, an additional mini-inflation in the standard model sector before the leptogenesis is required. We also propose the possibility to confirm this scenario by known prospective experimental app...

  10. COMPARISON OF TREND PROJECTION METHODS AND BACKPROPAGATION PROJECTIONS METHODS TREND IN PREDICTING THE NUMBER OF VICTIMS DIED IN TRAFFIC ACCIDENT IN TIMOR TENGAH REGENCY, NUSA TENGGARA

    Directory of Open Access Journals (Sweden)

    Aleksius Madu

    2016-10-01

    Full Text Available The purpose of this study is to predict the number of traffic accident victims who died in Timor Tengah Regency with Trend Projection method and Backpropagation method, and compare the two methods based on the degree of guilt and predict the number traffic accident victims in the Timor Tengah Regency for the coming year. This research was conducted in Timor Tengah Regency where data used in this study was obtained from Police Unit in Timor Tengah Regency. The data is on the number of traffic accidents in Timor Tengah Regency from 2000 – 2013, which is obtained by a quantitative analysis with Trend Projection and Backpropagation method. The results of the data analysis predicting the number of traffic accidents victims using Trend Projection method obtained the best model which is the quadratic trend model with equation Yk = 39.786 + (3.297 X + (0.13 X2. Whereas by using back propagation method, it is obtained the optimum network that consists of 2 inputs, 3 hidden screens, and 1 output. Based on the error rates obtained, Back propagation method is better than the Trend Projection method which means that the predicting accuracy with Back propagation method is the best method to predict the number of traffic accidents victims in Timor Tengah Regency. Thus obtained predicting the numbers of traffic accident victims for the next 5 years (Years 2014-2018 respectively - are 106 person, 115 person, 115 person, 119 person and 120 person.   Keywords: Trend Projection, Back propagation, Predicting.

  11. Body image among victims of sexual and physical abuse.

    Science.gov (United States)

    Kremer, Inbar; Orbach, Israel; Rosenbloom, Tova

    2013-01-01

    This study tries to understand the differences in body experience between victims of sexual abuse and physical abuse. Ninety-eight women completed questionnaires that measured personal information, body-image aberration, body sensitivity and control, and body investment. Findings indicated that victims of sexual abuse demonstrate less body maintenance and protection in addition to greater injury to body sensitivity and control than victims of physical abuse. Moreover, comparing victims of sexual abuse to physical abuse, findings revealed that only victims of sexual abuse report body-image aberrations. Thus, sexual and physical abuse should be addressed discretely because each has differential effects on bodily attitudes of victims.

  12. Developing support service for victims of hate crime

    Directory of Open Access Journals (Sweden)

    Dunn Peter

    2004-01-01

    Full Text Available This article describes the nature and development of Victim Support’s services to victims of hate crime in England and Wales. It provides definitions of hate crime, information about its extent, and considers why services for victims of some forms of hate crime have developed faster than others. It concludes with a summary of points made during a discussion at the 2004 European Forum for Victim Services conference about whether or not services to victims of hate crime should be provided by mainstream victim services or specialist agencies.

  13. Transforming Care for Victims of Violence.

    Science.gov (United States)

    Boatright, Anne C

    2017-06-01

    In this month's Magnet® Perspectives column, Anne Boatright, MSN, RN, SANE, describes her efforts to develop a comprehensive forensic nursing program at Methodist Hospital in Omaha. Ms Boatright transformed a sexual assault nurse examiner (SANE) program into one that provides 24/7 coverage at Methodist's 2 SANE locations and cares not only for victims of sexual assault but also for the victims domestic violence, sex trafficking, strangulation, elder abuse, and neglect. Her work extends beyond the walls of Methodist to the community, where she serves as a core member of the Nebraska Human Trafficking Task Force. She works collaboratively with the Federal Bureau of Investigation and helped Nebraska state senators draft legislation to create a sexual assault payment program. In recognition of her determination to make a difference for victims of violence, she received the 2016 National Magnet Nurse of the Year Award for Transformational Leadership.

  14. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    involves a higher risk of lesions and the possibility of many lesions. More than half of those exposed to manual strangulation or other kinds of violence against the neck were assaulted by a stranger or an ACQ. Half of the women knew the perpetrator and the perpetrator was an ACQ in 26% of the cases...... extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  15. Hidden laser communications through matter. An application of meV-scale hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Jaeckel, Joerg [Durham Univ. (United Kingdom). Inst. for Particle Physics and Phenomenology; Redondo, Javier; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-04-15

    Currently, there are a number of light-shining-through-walls experiments searching for hidden photons - light, sub-eV-scale, abelian gauge bosons beyond the standard model which mix kinetically with the standard photon. We show that in the case that one of these experiments finds evidence for hidden photons, laser communications through matter, using methods from free-space optics, can be realized in the very near future, with a channel capacity of more than 1 bit per second, for a distance up to the Earth's diameter. (orig.)

  16. Support for victims of crime: Analysis of the VDS info and victim support service in 2010

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2011-01-01

    Full Text Available VDS info and victim support service is a victim support service, which was established in 2003 within the Victimology Society of Serbia. The service provides emotional support, information and, if necessary, referral to other relevant services, as well as witness support. The target group of the service are direct and indirect victims of all forms of crime, of both sexes, regardless of any personal characteristics. In addition, support is provided to victims in court, as well as to women victims of violence who are in prison. In most cases victim support is provided by volunteers who are trained to work with victims of crime. This paper analyzes the work of the service in 2010. Special attention is paid to the problems of workplace violence and domestic violence, which are the most common reasons for contacting the service. The aim of the paper is to present the work of the service in the past year, as well as to highlight the trends observed in comparison to the previous period.

  17. Relation between childhood peer victimization and adult perfectionism: are victims of indirect aggression more perfectionistic?

    Science.gov (United States)

    Miller, Jessie L; Vaillancourt, Tracy

    2007-01-01

    Using two independent samples and two different measures of perfectionism, this study investigated the hypothesized relation between retrospective accounts of perceived peer-inflicted emotional abuse during childhood and perfectionism in adulthood. Emotional victimization ('indirect' aggression) is characterized by behavior in which mental harm is inflicted on victims through exclusionary acts, gossiping, and rumor spreading. Study one: Self-reported questionnaires of indirect victimization [DIAS; Bjorkqvist, Lagerspetz, and Osterman, 1992] and perfectionism [multidimensional perfectionism scale; Hewitt and Flett, 1991] were administered to 162 (mean age=20.14 years) female undergraduate psychology students. Results support the predicted positive relationship between recalled indirect peer victimization and current socially prescribed/self-oriented perfectionism. Study two: self-reports of indirect peer victimization and perfectionism (eating disorder inventory-perfectionism) were collected from 196 (mean age=19.5 years) female undergraduate students. Again, recalled indirect peer victimization was a statistically significant predictor of current socially prescribed/self-oriented perfectionism whereas recalled direct (physical, verbal) peer victimization held no relation. Discussion addresses the implications of these results, which hold importance for both the bullying and perfectionism literatures.

  18. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  19. Does aging influence people's metacomprehension? Effects of processing ease on judgments of text learning.

    Science.gov (United States)

    Dunlosky, John; Baker, Julie M C; Rawson, Katherine A; Hertzog, Christopher

    2006-06-01

    In 2 experiments, the authors investigated whether age-related differences exist in metacomprehension by evaluating predictions based on the ease-of-processing (EOP) hypothesis. According to this hypothesis, judgments of how well a text has been learned are based on how easily each text was processed; easier processing results in higher judgments. Participants read either sentence pairs or longer texts and judged their learning of each immediately afterward. Although an age-related difference in the use of processing ease in judgments was observed with sentence pairs, for longer texts older and younger adults' judgments were similarly related to processing ease. In both experiments, age equivalence was also evident in the accuracy of the judgments at predicting performance on the criterion test. The overall pattern of results suggests that judging text learning remains largely intact with aging.

  20. EASE Guidelines for Authors and Translators of Scientific Articles to be Published in English.

    Science.gov (United States)

    2014-06-01

    This concise and readable set of editorial guidelines was first published by the European Association of Science Editors (EASE) in 2010 and is updated annually. It is freely available in more than 20 languages at http://ease.org.uk/publications/author-guidelines. The document is aimed to help scientists worldwide in successful presentation of their research results and in correct translation of manuscripts into English. Moreover, it draws attention to ethical issues, like authorship criteria, plagiarism, conflict of interests, etc. Eight appendices provide examples or more detailed information on selected topics (Abstracts, Ambiguity, Cohesion, Ethics, Plurals, Simplicity, Spelling, and Text-tables). Widespread use of EASE Guidelines should increase the efficiency of international scientific communication.

  1. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  2. Hidden History: A Mobile Application for Discovering Surrounding Landscapes

    OpenAIRE

    2016-01-01

    This thesis work describes the design, development and evaluation of a mobile application called Hidden History. This application lets users discover and explore three types of landscapes (Historic, Scenic and Cultural) using three different modes of discovery (Route, Explore and Tour). Before designing Hidden History, the feature set of other applications that help users explore surrounding landscapes were identified and analyzed. Hidden History was then designed to implement the best fea...

  3. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    OpenAIRE

    DR. ANURADHA; BABITA AHUJA

    2012-01-01

    In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE) that can automatically discover and download data from the Hidden Web databases. ...

  4. ADAPTIVE LEARNING OF HIDDEN MARKOV MODELS FOR EMOTIONAL SPEECH

    Directory of Open Access Journals (Sweden)

    A. V. Tkachenia

    2014-01-01

    Full Text Available An on-line unsupervised algorithm for estimating the hidden Markov models (HMM parame-ters is presented. The problem of hidden Markov models adaptation to emotional speech is solved. To increase the reliability of estimated HMM parameters, a mechanism of forgetting and updating is proposed. A functional block diagram of the hidden Markov models adaptation algorithm is also provided with obtained results, which improve the efficiency of emotional speech recognition.

  5. Hidden Photons in Aharonov-Bohm-Type Experiments

    OpenAIRE

    Arias, Paola; Diaz, Christian; Diaz, Marco Aurelio; Jaeckel, Joerg; Koch, Benjamin; Redondo, Javier

    2016-01-01

    We discuss the Aharonov-Bohm effect in the presence of hidden photons kinetically mixed with the ordinary electromagnetic photons. The hidden photon field causes a slight phase shift in the observable interference pattern. It is then shown how the limited sensitivity of this experiment can be largely improved. The key observation is that the hidden photon field causes a leakage of the ordinary magnetic field into the supposedly field-free region. The direct measurement of this magnetic field ...

  6. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    OpenAIRE

    Criveanu Maria; Ţaicu Marian

    2013-01-01

    Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  7. 78 FR 24319 - National Crime Victims' Rights Week, 2013

    Science.gov (United States)

    2013-04-24

    ... fellow citizens and the basic values that unite us. Let us renew that common cause this week, and let us... victims' rights and services, and by volunteering to serve victims in their time of need. ] IN...

  8. Relationship between Perceptions of Coutrol and Victimization of Chinese Adolescents

    Institute of Scientific and Technical Information of China (English)

    Zhu Bi; Lei Li

    2006-01-01

    This study explores perceptions of control in victims of school bullying.bysurveying 108 adolescents with questionnaires.The result shows that there are significant gender differences in external control in general,intemal control of sociahty,and victimization of physical bullying.Physical victimization decreases as subjects grow older,but unknown control increases.Social victimization is positively correlated with all factors of external control.Verbal victimization is positively correlated with factors of external control of sociality,general and average;and negatively correlated with factors of internal control of sociality and physicality.Victimization of property bullying iS positirely correlated with average external control.External control is a predictor of victimization of social.verbal,and property bullying;internal control of body is that of verbal victimization.

  9. Identifying victims of violence using register-based data

    DEFF Research Database (Denmark)

    Kruse, Marie; Sørensen, Jan; Brønnum-Hansen, Henrik

    2010-01-01

    . We found significant differences between victims and non-victims according to socio-economic status, education, marital status, and ethnic origin, and also between victims by source of identification. CONCLUSIONS: We have identified a study population consisting of individual victims of violence......AIMS: The aim of this study was twofold. Firstly we identified victims of violence in national registers and discussed strengths and weaknesses of this approach. Secondly we assessed the magnitude of violence and the characteristics of the victims using register-based data. METHODS: We used three...... nationwide registers to identify victims of violence: The National Patient Register, the Victim Statistics, and the Causes of Death Register. We merged these data and assessed the degree of overlap between data sources. We identified a reference population by selecting all individuals in Denmark over 15...

  10. A latent class analysis of bullies, victims and aggressive victims in Chinese adolescence: relations with social and school adjustments.

    Directory of Open Access Journals (Sweden)

    Aihui Shao

    Full Text Available This study used the latent class analysis (LCA to identify and classify Chinese adolescent children's aggressive behaviors. It was found that (1 Adolescent children could be divided into four categories: general children, aggressive children, victimized children and aggressive victimized children. (2 There were significant gender differences among the aggressive victimized children, the aggressive children and the general children. Specifically, aggressive victimized children and aggressive children had greater probabilities of being boys; victimized children had equal probabilities of being boys or girls. (3 Significant differences in loneliness, depression, anxiety and academic achievement existed among the aggressive victims, the aggressor, the victims and the general children, in which the aggressive victims scored the worst in all questionnaires. (4 As protective factors, peer and teacher supports had important influences on children's aggressive and victimized behaviors. Relative to general children, aggressive victims, aggressive children and victimized children had lower probabilities of receiving peer supports. On the other hand, compared to general children, aggressive victims had lower probabilities of receiving teacher supports; while significant differences in the probability of receiving teacher supports did not exist between aggressive children and victimized children.

  11. Computational Modeling of Blood Flow in the TrapEase Inferior Vena Cava Filter

    Energy Technology Data Exchange (ETDEWEB)

    Singer, M A; Henshaw, W D; Wang, S L

    2008-02-04

    To evaluate the flow hemodynamics of the TrapEase vena cava filter using three dimensional computational fluid dynamics, including simulated thrombi of multiple shapes, sizes, and trapping positions. The study was performed to identify potential areas of recirculation and stagnation and areas in which trapped thrombi may influence intrafilter thrombosis. Computer models of the TrapEase filter, thrombi (volumes ranging from 0.25mL to 2mL, 3 different shapes), and a 23mm diameter cava were constructed. The hemodynamics of steady-state flow at Reynolds number 600 was examined for the unoccluded and partially occluded filter. Axial velocity contours and wall shear stresses were computed. Flow in the unoccluded TrapEase filter experienced minimal disruption, except near the superior and inferior tips where low velocity flow was observed. For spherical thrombi in the superior trapping position, stagnant and recirculating flow was observed downstream of the thrombus; the volume of stagnant flow and the peak wall shear stress increased monotonically with thrombus volume. For inferiorly trapped spherical thrombi, marked disruption to the flow was observed along the cava wall ipsilateral to the thrombus and in the interior of the filter. Spherically shaped thrombus produced a lower peak wall shear stress than conically shaped thrombus and a larger peak stress than ellipsoidal thrombus. We have designed and constructed a computer model of the flow hemodynamics of the TrapEase IVC filter with varying shapes, sizes, and positions of thrombi. The computer model offers several advantages over in vitro techniques including: improved resolution, ease of evaluating different thrombus sizes and shapes, and easy adaptation for new filter designs and flow parameters. Results from the model also support a previously reported finding from photochromic experiments that suggest the inferior trapping position of the TrapEase IVC filter leads to an intra-filter region of recirculating

  12. Identification of a short region on chromosome 6 affecting direct calving ease in Piedmontese cattle breed.

    Directory of Open Access Journals (Sweden)

    Silvia Bongiorni

    Full Text Available Calving in cattle is affected by calf morphology and by dam characteristics. It is described by two different traits: maternal calving ease, which is the ability to generate dams with good physiological predisposition to calving, and direct calving ease, which is the ability to generate calves that are easily born. The aim of this study was to identify regions of cattle genome harboring genes possibly affecting direct calving ease in the Piedmontese cattle breed. A population of 323 bulls scored for direct calving ease (EBV was analyzed by a medium-density SNP marker panel (54,001 SNPs to perform a genome-wide scan. The strongest signal was detected on chromosome 6 between 37.8 and 38.7 Mb where 13 SNPs associated to direct calving ease were found. Three genes are located in this region: LAP3, encoding for a leucine aminopeptidase involved in the oxytocin hydrolysis; NCAPG, encoding for a non-SMC condensin I complex, which has been associated in cattle with fetal growth and carcass size; and LCORL, which has been associated to height in humans and cattle. To further confirm the results of the genome-wide scan we genotyped additional SNPs within these genes and analyzed their association with direct calving ease. The results of this additional analysis fully confirmed the findings of the GWAS and particularly indicated LAP3 as the most probable gene involved. Linkage Disequilibrium (LD analysis showed high correlation between SNPs located within LAP3 and LCORL indicating a possible selection signature due either to increased fitness or breeders' selection for the trait.

  13. Bullying and victimization in elementary schools : A comparison of bullies, victims, bully/victims, and uninvolved preadolescents

    NARCIS (Netherlands)

    Veenstra, René; Lindenberg, Siegwart; Oldehinkel, Albertine J.; Winter, Andrea F. de; Verhulst, Frank C.; Ormel, Johan

    2005-01-01

    Research on bullying and victimization largely rests on univariate analyses and on reports from a single informant. Researchers may thus know too little about the simultaneous effects of various independent and dependent variables, and their research may be biased by shared method variance. The data

  14. Simple estimates of the hidden beauty pentaquarks masses

    CERN Document Server

    Kopeliovich, Vladimir

    2015-01-01

    The masses of cryptoexotic pentaquarks with hidden beauty are estimated phenomenologically using the results by the LHCb collaboration which discovered recently the cryptoexotic pentaquarks with hidden charm. The expected masses of the hidden beauty pentaquarks are about $10.8\\, GeV$ and $10.7\\,GeV$ in the limit of some kind of heavy quark symmetry. The states with hidden strangeness considered in similar way have masses above $2\\, Gev$, by several hundreds of $MeV$ higher than states discussed previously in connection with the relatively light positive strangeness pentaquark $\\theta^+$.

  15. Critical scaling in hidden state inference for linear Langevin dynamics

    OpenAIRE

    Bravi, Barbara; Sollich, Peter

    2016-01-01

    We consider the problem of inferring the dynamics of unknown (i.e. hidden) nodes from a set of observed trajectories and we study analytically the average prediction error given by the Extended Plefka Expansion applied to it, as presented in [1]. We focus on a stochastic linear dynamics of continuous degrees of freedom interacting via random Gaussian couplings in the infinite network size limit. The expected error on the hidden time courses can be found as the equal-time hidden-to-hidden cova...

  16. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    OpenAIRE

    Monika Mushevska

    2016-01-01

    The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of ...

  17. Error statistics of hidden Markov model and hidden Boltzmann model results

    Directory of Open Access Journals (Sweden)

    Newberg Lee A

    2009-07-01

    Full Text Available Abstract Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results.

  18. Error statistics of hidden Markov model and hidden Boltzmann model results

    Science.gov (United States)

    Newberg, Lee A

    2009-01-01

    Background Hidden Markov models and hidden Boltzmann models are employed in computational biology and a variety of other scientific fields for a variety of analyses of sequential data. Whether the associated algorithms are used to compute an actual probability or, more generally, an odds ratio or some other score, a frequent requirement is that the error statistics of a given score be known. What is the chance that random data would achieve that score or better? What is the chance that a real signal would achieve a given score threshold? Results Here we present a novel general approach to estimating these false positive and true positive rates that is significantly more efficient than are existing general approaches. We validate the technique via an implementation within the HMMER 3.0 package, which scans DNA or protein sequence databases for patterns of interest, using a profile-HMM. Conclusion The new approach is faster than general naïve sampling approaches, and more general than other current approaches. It provides an efficient mechanism by which to estimate error statistics for hidden Markov model and hidden Boltzmann model results. PMID:19589158

  19. Students' Perceptions of Their Own Victimization: A Youth Voice Perspective

    Science.gov (United States)

    Corby, Emma-Kate; Campbell, Marilyn; Spears, Barbara; Slee, Phillip; Butler, Des; Kift, Sally

    2016-01-01

    This article investigates the perceptions of 156 students who were victims of both traditional and cyberbullying (117 female, 45 male), ages 10 to 17 years, as to which form of bullying was more hurtful. Overall, students perceived traditional victimization to be more hurtful than cyber victimization. Reasons identified in the data to explain the…

  20. 28 CFR 0.91 - Office for Victims of Crime.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Office for Victims of Crime. 0.91 Section...-Office of Justice Programs and Related Agencies § 0.91 Office for Victims of Crime. The Office for Victims of Crime is headed by a Director appointed by the Assistant Attorney General, Office of...

  1. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  2. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... of Justice Programs 28 CFR Part 94 RIN 1121-AA78 International Terrorism Victim Expense Reimbursement... Victims of Crime (OVC) is promulgating this interim-final rule for its International Terrorism Victim... as an incident of international terrorism. DATES: Effective date: This interim-final rule is...

  3. Victimization and Health Risk Factors among Weapon-Carrying Youth

    Science.gov (United States)

    Stayton, Catherine; McVeigh, Katharine H.; Olson, E. Carolyn; Perkins, Krystal; Kerker, Bonnie D.

    2011-01-01

    Objective: To compare health risks of 2 subgroups of weapon carriers: victimized and nonvictimized youth. Methods: 2003-2007 NYC Youth Risk Behavior Surveys were analyzed using bivariate analyses and multinomial logistic regression. Results: Among NYC teens, 7.5% reported weapon carrying without victimization; 6.9% reported it with victimization.…

  4. Students' Perceptions of Their Own Victimization: A Youth Voice Perspective

    Science.gov (United States)

    Corby, Emma-Kate; Campbell, Marilyn; Spears, Barbara; Slee, Phillip; Butler, Des; Kift, Sally

    2016-01-01

    This article investigates the perceptions of 156 students who were victims of both traditional and cyberbullying (117 female, 45 male), ages 10 to 17 years, as to which form of bullying was more hurtful. Overall, students perceived traditional victimization to be more hurtful than cyber victimization. Reasons identified in the data to explain the…

  5. A Longitudinal Examination of Fear Reactions in Victims of Rape.

    Science.gov (United States)

    Calhoun, Karen S.; And Others

    1982-01-01

    Investigated fear reactions in rape victims for one year following their assaults. Following the assault, victims were significantly more fearful than nonvictim controls. Although their overall fearfulness declined somewhat and stabilized by two months postassault, victims remained significantly more fearful than nonvictim controls at 12 months…

  6. From Victim to Taking Control: Support Group for Bullied Schoolchildren

    Science.gov (United States)

    Kvarme, Lisbeth Gravdal; Aabø, Liv Sandnes; Saeteren, Berit

    2016-01-01

    School bullying is a serious problem affecting the victims in their daily lives at school. The aim of this study was to investigate whether support groups were able to help the victims of bullying to overcome their victim status and to explore what it means to be a member of a support group. An exploratory qualitative design, with individual and…

  7. Relations among School Connectedness, Hope, Life Satisfaction, and Bully Victimization

    Science.gov (United States)

    You, Sukkyung; Furlong, Michael J.; Felix, Erika; Sharkey, Jill D.; Tanigawa, Diane; Green, Jennifer Greif

    2008-01-01

    This study investigates the role of school connectedness in mediating the relation between students' sense of hope and life satisfaction for three groups: Bullied Victims, Peer Victims, and Nonvictims. Students in grades 5 to 12 (N = 866) completed the California Bully/Victim Scale, School Connectedness Scale, Children's Hope Scale, and Students'…

  8. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  9. Inmate-on-Inmate Victimization Among Older Male Prisoners

    Science.gov (United States)

    Kerbs, John J.; Jolley, Jennifer M.

    2007-01-01

    Research on the safety and victimization of older prisoners has been limited. This study examines quantitative and qualitative victimization data gathered from face-to-face interviews with 65 male prisoners (ages 50 and above) confined in a state-level prison system. Both victimization rates and narrative descriptions of psychological, property,…

  10. Sexual Abuse Victimization and Psychological Distress among Adolescent Offenders.

    Science.gov (United States)

    Phan, Debra L.; Kingree, J. B.

    2001-01-01

    This study focused on sexual abuse victimization and psychological distress among 272 adolescent offenders. Female respondents reported more sexual abuse victimization and psychological distress than did their male counterparts. Furthermore, church attendance moderated the association between sexual abuse victimization and psychological distress…

  11. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  12. OFDM System Channel Estimation with Hidden Pilot

    Institute of Scientific and Technical Information of China (English)

    YANG Feng; LIN Cheng-yu; ZHANG Wen-jun

    2007-01-01

    Channel estimation using pilot is common used in OFDM system. The pilot is usually time division multiplexed with the informative sequence. One of the main drawbacks is bandwidth losing. In this paper, a new method was proposed to perform channel estimation in OFDM system. The pilot is arithmetically added to the output of OFDM modulator. Receiver uses the hidden pilot to get an accurate estimation of the channel. Then pilot is removed after channel estimation. The Cramer-Rao lower bound for this method was deprived. The performance of the algorithm is then shown. Compared with traditional methods, the proposed algorithm increases the bandwidth efficiency dramatically.

  13. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  14. Hidden photon CDM search at Tokyo

    CERN Document Server

    Suzuki, Jun'ya; Horie, Tomoki; Minowa, Makoto

    2015-01-01

    We report on a search for hidden photon cold dark matter (HP CDM) using a novel technique with a dish antenna. We constructed two independent apparatus: one is aiming at the detection of the HP with a mass of $\\sim\\,\\rm{eV}$ which employs optical instruments, and the other is for a mass of $\\sim5\\times10^{-5}\\, \\rm{eV}$ utilizing a commercially available parabolic antenna facing on a plane reflector. From the result of the measurements, we found no evidence for the existence of HP CDM and set upper limits on the photon-HP mixing parameter $\\chi$.

  15. Maurice Halbwachs: Official and hidden memory

    Directory of Open Access Journals (Sweden)

    Carretero, Angel

    2008-05-01

    Full Text Available This article tries to show, in general terms, how Maurice Halbwachs has discovered presence and vitality in the collective memorieswhich have been excluded from the socially-institutionalized world. In order to decipher his opaque writing, one should try for a sociology of the depths, for a sociological look that, separating itself from the dominant positivism of the social sciences, manages to penetrate the hidden logic that permanently underlies social life. This article seeks to uncover the nature of a collective memory that respects the vicissitudes of time, as well as its difficult relations both with official memory and with the dominant historical record.

  16. Die Beharrlichkeit im Verborgenen Hidden Persistence

    Directory of Open Access Journals (Sweden)

    Paula-Irene Villa

    2003-07-01

    Full Text Available Karin Flaake geht in ihrer psychoanalytischen Interpretation innerfamilialer Konstellationen der Frage nach, wie das Zur-Frau-Werden von jungen Frauen erlebt wird. Dabei kommt den körperliche Wandlungsprozessen der Pubertät und den darin eingelagerten expliziten sowie verborgenen Deutungen des Weiblichen – vor allem des weiblichen Körpers – durch die Eltern eine prominente Rolle zu.Karin Flaake’s psychoanalytical intepretations of family constellations explore how young women experience their coming of age and entering womanhood. Her analysis focuses on the bodily changes which women undergo during puberty and the explicit as well as hidden meanings assigned to them by the parents.

  17. Scaling dimensions in hidden Kerr/CFT

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2011-01-01

    It has been proposed that a hidden conformal field theory (CFT) governs the dynamics of low frequency scattering in a general Kerr black hole background. We further investigate this correspondence by mapping higher order corrections to the massless wave equations in a Kerr background to an expansion within the CFT in terms of higher dimension operators. This implies the presence of infinite towers of CFT primary operators with positive conformal dimensions compatible with unitarity. The exact Kerr background softly breaks the conformal symmetry and the scaling dimensions of these operators run with frequency. The scale-invariant fixed point is dual to a degenerate case of flat spacetime.

  18. Hidden Kerr/CFT at finite frequencies

    CERN Document Server

    Lowe, David A; Skanata, Antun

    2013-01-01

    Massless fields propagating in a generic Kerr black hole background enjoy a hidden SL(2,R)xSL(2,R) symmetry. We determine how the exact mode functions decompose into representations of this symmetry group. This extends earlier results on the low frequency limit of the massless scalar case to finite frequencies and general spin. As an application, we numerically determine the parameters of the representations that appear in quasinormal modes. These results represent a first step to formulating a more precise mapping to a holographic dual conformal field theory for generic black holes.

  19. A New Hidden Web Crawling Approach

    OpenAIRE

    L.Saoudi; A.Boukerram; S.Mhamedi

    2015-01-01

    Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific dom...

  20. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  1. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  2. Fifty Years After, Hidden Children Speak

    Directory of Open Access Journals (Sweden)

    Léa Marcou

    2008-06-01

    Full Text Available “For fifty years, I have not spoken of my childhood years in France during the second world war. A hidden child, I lived under a false name amongst unknown people, being careful – as I had been taught – not to reveal, by a gesture or by a word, that I was Jewish. I knew I was in danger, still not understanding why and I was constantly afraid. I didn't know whether I would see again one day my parents from whom I had been suddenly taken away. Nonetheless what were my pains compared to those of...

  3. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The locations of the breaks are subsequently obtained by assigning states to data points according to the Maximum Posterior Mode (MPM) algorithm. The Integrated Classification Likelihood-Bayesian Information Criterion (ICL-BIC) allows for the determination of the number of regimes by taking into account...... in the monetary policy of United States, the dierent functional form being variants of the Taylor (1993) rule....

  4. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  5. Victim derogation and victim enhancement as alternate routes to system justification.

    Science.gov (United States)

    Kay, Aaron C; Jost, John T; Young, Sean

    2005-03-01

    Abstract-Numerous studies have documented the potential for victim-blaming attributions to justify the status quo. Recent work suggests that complementary, victim-enhancing stereotypes may also increase support for existing social arrangements. We seek to reconcile these seemingly contradictory findings by proposing that victim derogation and victim enhancement are alternate routes to system justification, with the preferred route depending on the perception of a causal link between trait and outcome. Derogating "losers" (and lionizing "winners") on traits (e.g., intelligence) that are causally related to outcomes (e.g., wealth vs. poverty) serves to increase system justification, as does compensating "losers" (and downgrading "winners") on traits (e.g., physical attractiveness) that are causally unrelated to those outcomes. We provide converging evidence using system-threat and stereotype-activation paradigms.

  6. Simulating Peer Support for Victims of Cyberbullying

    NARCIS (Netherlands)

    Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.

    2010-01-01

    This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future incident

  7. Bullying Victims: The Effects Last into College

    Science.gov (United States)

    Adams, Frank D.; Lawrence, Gloria J.

    2011-01-01

    This study examined whether those bullied in schools continued to show the effects of being bullied after they enrolled in an institution of higher education. There were 269 undergraduate students participating in the study. Previous studies (2006; 2008) conducted by the authors suggested the effects of bullying upon both the victim and bully are…

  8. Internet piracy and consequences for victims

    Directory of Open Access Journals (Sweden)

    Savić Miljan

    2016-01-01

    Full Text Available After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total social cost of piracy. However, there are other categories of victims, such as those whose honor was besmirched as a result of piracy, and who suffer the consequences in the form of negative emotional reactions, loss of job as well as those who subsequently commit suicide. The object of this paper is to describe the effects of internet piracy on the victims of this phenomenon, and the goal is the analysis of the various direct and indirect effects of piracy on victims and their motivation for future creation, as well as analysis of prevention measures, with special emphasis on the Republic of Serbia.

  9. Racial and Ethnic Stereotypes and Bullying Victimization

    Science.gov (United States)

    Peguero, Anthony A.; Williams, Lisa M.

    2013-01-01

    Bullying is a serious problem within the U.S. school system. Prior research suggests that victimization is stratified by race and ethnicity. However, few studies consider factors that may moderate this relationship. This article extends research on this topic by considering whether stereotypes moderate bullying among racial and ethnic youth. Youth…

  10. Psychological characteristics of victims of trafficking

    Directory of Open Access Journals (Sweden)

    Larin A.N.

    2015-11-01

    Full Text Available The article describes the main causes of falling into slavery, forms of slave labour, as well as moral-psychological properties and characteristics of potential victims of trafficking. Noted risk factors leading to victimization of the person and increase the possibility of becoming an object for criminal groups specializing in this kind of crime. The number of victims of international trafficking ranges from 600 to 800 thousand people a year, and when you consider human trafficking within the individual countries, the total number of victims ranges from 2 to 4 million people. 80% of trafficked people are women and children, of which 70% are sold to other countries for sexual exploitation. According to the International organization for migration (International Organization of Migration annually only in the European markets of prostitution sold is not less than 500 thousand women. Among the personal factors that affect the increase in the number of such crimes, it is necessary to indicate family trouble, which manifests itself, primarily, to neglect, loss of relationships with family and parents, or in the absence of moral and material support from existing family and friends.

  11. Simulating Peer Support for Victims of Cyberbullying

    NARCIS (Netherlands)

    Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.

    2010-01-01

    This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future

  12. Simulating Peer Support for Victims of Cyberbullying

    NARCIS (Netherlands)

    Van der Zwaan, J.M.; Dignum, M.V.; Jonker, C.M.

    2010-01-01

    This paper proposes a design for an Embodied Conversational Agent (ECA) that empowers victims of cyberbullying by simulating peer support. The anti-cyberbullying buddy helps a child to cope with negative emotions due to a cyberbullying incident and it shows the child how to deal with future incident

  13. Violence Exposure and Victimization among Rural Adolescents

    Science.gov (United States)

    Mykota, David B.; Laye, Adele

    2015-01-01

    Violence exposure is a serious public health concern for adolescents in schools today. Violence exposure can be quite severe and frequent with multiple acts of indirect and direct victimization having lasting effects on the physical, emotional, and intellectual well-being of adolescents. The purpose of the present study is to examine the rates of…

  14. Racial and Ethnic Stereotypes and Bullying Victimization

    Science.gov (United States)

    Peguero, Anthony A.; Williams, Lisa M.

    2013-01-01

    Bullying is a serious problem within the U.S. school system. Prior research suggests that victimization is stratified by race and ethnicity. However, few studies consider factors that may moderate this relationship. This article extends research on this topic by considering whether stereotypes moderate bullying among racial and ethnic youth. Youth…

  15. Evaluation of the adolescent rape victim.

    Science.gov (United States)

    Bechtel, K; Podrazik, M

    1999-08-01

    Adolescents are frequently victims of sexual assault, often by a previously known assailant. This article discusses the initial management of adolescents who have been sexually assaulted, including obtaining the history and performing a careful physical examination, forensic evidence collection, and medical and psychologic therapy.

  16. Adolescents as victims and perpetrators of violence.

    Science.gov (United States)

    Legano, Lori; McHugh, Margaret

    2013-04-01

    The hallmark of adolescent development is risk-taking behavior, mostly benign in nature, with no sequelae in adulthood. For that small number of adolescents for whom risk-taking behaviors are dangerous, for themselves and others, there are common childhood factors that may lead to those behaviors. In studies of adolescent victims, as well as perpetrators, a common theme can be identified, ie, maltreatment. The adolescent who visits Internet chat rooms, meets unknown individuals, and is later sexually assaulted by that individual is often a victim of sexual abuse in earlier childhood. Studies demonstrate that when adolescents are perpetrators of violent acts, they have a history of childhood physical abuse and often ongoing exposure to violence in their homes. For victims and perpetrators, there can be a common source of primary prevention in children rather than secondary interventions later in adolescence. That source can be a medical care provider in a medical home. Discussion of Internet usage with a 10-year-old by a medical provider may prevent later victimization. Identification and provision of services to families involved in domestic violence situations can help children establish positive adult roles with peers and future partners.

  17. Sexual Coercion among Adolescents: Victims and Perpetrators

    Science.gov (United States)

    Lacasse, Anne; Mendelson, Morton J.

    2007-01-01

    Adolescence is a transitional period when the pressure to engage in romantic and sexual relationships can leave teenagers feeling confused and at risk for sexual coercion. Our studies investigated characteristics of male and female perpetrators and victims of peer sexual coercion, focusing on self-esteem, sexist attitudes, and involvement in…

  18. Connections to Rescue Our Victims of Violence

    Science.gov (United States)

    Hardy, Lawrence

    2007-01-01

    In this article, the author focuses on the Washington, D.C. school system and Antonio, a child victim of violence, to discuss the background problems that affect the school performance of children from troubled neighborhoods. People who work in schools know that children--even kindergarten and preschool children--don't come to them as blank slates…

  19. The Perception of Cyberbullying in Adolescent Victims

    Science.gov (United States)

    Sevcikova, Anna; Smahel, David; Otavova, Mlada

    2012-01-01

    The goal of this study was to explore how victims of cyberbullying perceive online aggressive attacks and when they see them as harmful. Interviews were carried out with 16 cybervictimised participants aged 15-17 years. The findings showed differences in the perception of online victimisation when perpetrated by an anonymous Internet user versus…

  20. Professionals' conduct as a condition for minimizing secondary victimization of the victims of spouse abuse

    Directory of Open Access Journals (Sweden)

    Ignjatović Tanja

    2009-01-01

    Full Text Available Through analysis of the 'administrative' aspects of experts' documentation kept by three services in one local community - the police station, the center for social welfare and the primary health care center, the possibility of reducing victimization of victims of partnership violence within the family is the subject of consideration. The results of the analysis point to the necessity of rationalization and standardization of recording and procedures by the professionals.

  1. Associations between Peer Victimization, Fear of Future Victimization and Disrupted Concentration on Class Work among Junior School Pupils

    Science.gov (United States)

    Boulton, Michael J.; Trueman, Mark; Murray, Lindsay

    2008-01-01

    Background: Studies have shown that peer victimization is associated with psychological maladjustment, and have implicated such maladjustment in disrupted ability to concentrate. Aims: To investigate the levels of, and associations between, physical, verbal, and social exclusion victimization, fear of future victimization, and disrupted classroom…

  2. Availability of and ease of access to calorie information on restaurant websites.

    Directory of Open Access Journals (Sweden)

    Gary G Bennett

    Full Text Available OBJECTIVE: Offering calories on restaurant websites might be particularly important for consumer meal planning, but the availability of and ease of accessing this information are unknown. METHODS: We assessed websites for the top 100 U.S. chain restaurants to determine the availability of and ease of access to calorie information as well as website design characteristics. We also examined potential predictors of calorie availability and ease of access. RESULTS: Eighty-two percent of restaurants provided calorie information on their websites; 25% presented calories on a mobile-formatted website. On average, calories could be accessed in 2.35±0.99 clicks. About half of sites (51.2% linked to calorie information via the homepage. Fewer than half had a separate section identifying healthful options (46.3%, or utilized interactive meal planning tools (35.4%. Quick service/fast casual, larger restaurants, and those with less expensive entrées and lower revenue were more likely to make calorie information available. There were no predictors of ease of access. CONCLUSION: Calorie information is both available and largely accessible on the websites of America's leading restaurants. It is unclear whether consumer behavior is affected by the variability in the presentation of calorie information.

  3. Supporting the Development of Emotional Intelligence Competencies to Ease the Transition from Primary to High School

    Science.gov (United States)

    Qualter, P.; Whiteley, H. E.; Hutchinson, J. M.; Pope, D. J.

    2007-01-01

    This study aims to explore (1) whether pupils with high emotional intelligence (EI) cope better with the transition to high school; and (2) whether the introduction of an intervention programme to support the development of EI competencies can increase EI and self-worth, and so ease the negative effects of transition. Results suggest that pupils…

  4. Does Ease to Block a Ball Affect Perceived Ball Speed? Examination of Alternative Hypotheses

    Science.gov (United States)

    Witt, Jessica K.; Sugovic, Mila

    2012-01-01

    According to an action-specific account of perception, the perceived speed of a ball can be a function of the ease to block the ball. Balls that are easier to stop look like they are moving slower than balls that are more difficult to stop. This was recently demonstrated with a modified version of the classic computer game Pong (Witt & Sugovic,…

  5. Text Genre and Science Content: Ease of Reading, Comprehension, and Reader Preference

    Science.gov (United States)

    Cervetti, Gina N.; Bravo, Marco A.; Hiebert, Elfrieda H.; Pearson, P. David; Jaynes, Carolyn A.

    2009-01-01

    This study examined ease of reading, comprehension, and recall and preference for the same scientific content under two conditions: an informational text and a fictional narrative text. Seventy-four third and fourth graders were assessed individually around the reading of fictional narrative and informational texts that were about either snails or…

  6. Alternating skills training and clerkships to ease the transition from preclinical to clinical training

    NARCIS (Netherlands)

    Van Hell, E.A.; Kuks, J.B.; Borleffs, J.C.; Cohen-Schotanus, J.

    2011-01-01

    Background: The transition from preclinical to clinical training is perceived as stressful with a high workload being the main difficulty. To ease this transition, we implemented a dual learning year, where just-in-time skills training and clerkships alternated. Aims: To examine the effect of the

  7. Effects of Ease-of-Pronunciation on Non-Word Memory and Product Judgments

    DEFF Research Database (Denmark)

    Erz, Antonia; Christensen, Bo

    The ease or difficulty of pronunciation can affect judgments. We experimentally show that linguistic fluency has a direct effect on liking and a U-shaped effect on memory of non-words. We further demonstrate that the fluency of novel, fictitious non-word brand names affects novelty and performance...

  8. Design of the exhale airway stents for emphysema (EASE) trial : an endoscopic procedure for reducing hyperinflation

    NARCIS (Netherlands)

    Shah, Pallav L.; Slebos, Dirk-Jan; Cardoso, Paulo F. G.; Cetti, Edward J.; Sybrecht, Gerhard W.; Cooper, Joel D.

    2011-01-01

    Background: Airway Bypass is a catheter-based, bronchoscopic procedure in which new passageways are created that bypass the collapsed airways, enabling trapped air to exit the lungs. The Exhale Airway Stents for Emphysema (EASE) Trial was designed to investigate whether Exhale (R) Drug-Eluting Stent

  9. Alternating skills training and clerkships to ease the transition from preclinical to clinical training

    NARCIS (Netherlands)

    Van Hell, E.A.; Kuks, J.B.; Borleffs, J.C.; Cohen-Schotanus, J.

    2011-01-01

    Background: The transition from preclinical to clinical training is perceived as stressful with a high workload being the main difficulty. To ease this transition, we implemented a dual learning year, where just-in-time skills training and clerkships alternated. Aims: To examine the effect of the du

  10. Immigrant Students at School: Easing the Journey towards Integration. OECD Reviews of Migrant Education

    Science.gov (United States)

    OECD Publishing, 2015

    2015-01-01

    How school systems respond to immigration has an enormous impact on the economic and social well-being of all members of the communities they serve, whether they have an immigrant background or not. "Immigrant Students at School: Easing the Journey towards Integration" reveals some of the difficulties immigrant students encounter--and…

  11. Children's Loneliness, Perceived Ease in Making Friends and Estimated Social Adequacy: Development and Social Metacognition.

    Science.gov (United States)

    Luftig, Richard L.

    1987-01-01

    Investigated the extent of children's loneliness, their perceived ease in making friends, their estimated social competence as a function of grade and sex, and their preferences concerning eight childhood activities. A loneliness scale and a sociometric peer nomination form were administered to 364 students in grades two, four, and six. (Author/BN)

  12. Adolescent Marijuana Use and Perceived Ease of Access Before and After Recreational Marijuana Implementation in Colorado.

    Science.gov (United States)

    Harpin, Scott B; Brooks-Russell, Ashley; Ma, Ming; James, Katherine A; Levinson, Arnold H

    2017-08-17

    As of January 1, 2017, eight states have approved laws for recreational marijuana use. While the social impacts of these changes remain under debate, the influence on adolescent marijuana use is a key policy and health issue across the U.S. To examine changes in adolescent marijuana-use behaviors in the first year after recreational marijuana implementation in Colorado, and to analyze the effect of retail marijuana store proximity on youth use and perceptions. Secondary analysis of Healthy Kids Colorado Survey data from 40 schools surveyed before and after recreational marijuana sales were implemented (2013 student n = 12,240; 2014 student n = 11,931). Self-reported marijuana use, ease of access, and perceived harms were compared between years and by proximity of recreational marijuana stores to surveyed schools. Adolescent marijuana use behaviors, wrongness of use, and perceptions of risk of harm were unchanged from baseline to one-year follow-up. Perceived ease of access to marijuana increased (from 46% to 52%). Proximity of recreational marijuana stores was not significantly associated with perceived ease of access to marijuana. Conclusions/Importance: In the first study of adolescent marijuana use and perceptions after state retail implementation of recreational marijuana, there was little change in adolescent marijuana use but a significant change in perception of ease of access. Public health workers and policymakers should continue to monitor these changes as essential for evaluating the impact of liberalization of marijuana policies.

  13. Revictimization of Victims Sexually Abused by Women

    Directory of Open Access Journals (Sweden)

    Małgorzata H. Kowalczyk

    2017-07-01

    Full Text Available Victims experiencing the sexual abuse are surviving not only physical injustice but above all deep traumas, which very often in different forms, are keeping them company through the entire life. Quite often at establishing different results a sex is underestimated for the perpetrator. Therefore knowing the problem of sexual abuses from a perspective of close as well as distant results is very important in the event that a woman was a perpetrator of these acts – mother, minder. In the present article based on analysis of literature, a problem of results of the sexual abuse was presented at victims which experienced these behaviours on the part of women. In order to draw up discussing the survived specificity by victims was both of sex of the trauma connected with the sexual application as well as close and distant consequences of these events in the form prime victimisation and revictimisation for figure being noticeable in the adult life of psychosexual disorders and social shortages. Amongst the consequence isolated traumatic factors are deserving the particular attention about dynamic character which are provoking the appearance of many symptoms characteristic of children which experienced the sexual violence. Recalled factors it: traumatic sexualisation of child, the betrayal, the stigmatization and the helplessness. The specificity of these factors results from the fact that they will leave distant “tracks” in the psyche and they can undergo the additional reinforcement if a woman is a perpetrator of the sexual violence. It results from frequent attitudes of “denying” towards the sexual violence applied by women. In the study they pointed also at one of possible consequences of the revictimisation process copying patterns of behaviour connected with the sexual exploitation of children in their more late life by victims is which. This process resulting from the alternating identification of the perpetrator and the victim is starting

  14. Criminality and Victimization in Oromia, Ethiopia

    Directory of Open Access Journals (Sweden)

    Nega Jibat

    2015-01-01

    Full Text Available This study analyzed crime statistics of 2011/2012 with objectives to compare the characteristics of criminals based on correlates of crime such as age, gender, types of occupation, level of education, and marital status and to examine features of victimization by age and sex. The study was conducted in Oromia National Regional State. Police crime data of 2011/2012 were used. Furthermore, key informant interview was used. Descriptive statistics such as percentages, frequencies, and ratios were primarily used to analyze the aggregate police data. It is found that sociocultural and structural factors affect criminality and victimization patterns. The total number of criminals reported to and recorded by the police was 96,300, which constitute 85,100 male and 11,200 female offenders. About 37% of these criminals committed violent crime. The ratio of male to female offenders was 7.6:1. The dominance of male over female both in criminality and victimization is the extension of their social position in social structure and result of gender role socialization. Age group 19 to 30 was found to be the most criminal population with the criminal rate of 828 per 100,000 people. Unfortunately, the relationship between educational status, types of occupation/employment, and marital status on one hand and criminality on the other were less than conclusive mainly because of lack of adequate information on such variables for individual criminals and victims or the fact that the police data were only aggregate ones. Victimization rate was higher for males and 31 to 50 age category.

  15. Women's hidden transcripts about abortion in Brazil.

    Science.gov (United States)

    Nations, M K; Misago, C; Fonseca, W; Correia, L L; Campbell, O M

    1997-06-01

    Two folk medical conditions, "delayed" (atrasada) and "suspended" (suspendida) menstruation, are described as perceived by poor Brazilian women in Northeast Brazil. Culturally prescribed methods to "regulate" these conditions and provoke menstrual bleeding are also described, including ingesting herbal remedies, patent drugs, and modern pharmaceuticals. The ingestion of such self-administered remedies is facilitated by the cognitive ambiguity, euphemisms, folklore, etc., which surround conception and gestation. The authors argue that the ethnomedical conditions of "delayed" and "suspended" menstruation and subsequent menstrual regulation are part of the "hidden reproductive transcript" of poor and powerless Brazilian women. Through popular culture, they voice their collective dissent to the official, public opinion about the illegality and immorality of induced abortion and the chronic lack of family planning services in Northeast Brazil. While many health professionals consider women's explanations of menstrual regulation as a "cover-up" for self-induced abortions, such popular justifications may represent either an unconscious or artful manipulation of hegemonic, anti-abortion ideology expressed in prudent, unobtrusive and veiled ways. The development of safer abortion alternatives should consider women's hidden reproductive transcripts.

  16. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  17. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  18. Atlas of solar hidden photon emission

    CERN Document Server

    Redondo, Javier

    2015-01-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup \\`a la Sikivie. In this paper, we compute the flux of transversely polarised HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully io...

  19. Quantum Hidden Subgroup Problems A Mathematical Perspective

    CERN Document Server

    Lomonaco, S J; Lomonaco, Samuel J.; Kauffman, Louis H.

    2002-01-01

    The ultimate objective of this paper is to create a stepping stone to the development of new quantum algorithms. The strategy chosen is to begin by focusing on the class of abelian quantum hidden subgroup algorithms, i.e., the class of abelian algorithms of the Shor/Simon genre. Our strategy is to make this class of algorithms as mathematically transparent as possible. By the phrase "mathematically transparent" we mean to expose, to bring to the surface, and to make explicit the concealed mathematical structures that are inherently and fundamentally a part of such algorithms. In so doing, we create symbolic abelian quantum hidden subgroup algorithms that are analogous to the those symbolic algorithms found within such software packages as Axiom, Cayley, Maple, Mathematica, and Magma. As a spin-off of this effort, we create three different generalizations of Shor's quantum factoring algorithm to free abelian groups of finite rank. We refer to these algorithms as wandering (or vintage Z_Q) Shor algorithms. They...

  20. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  1. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  2. Hidden charm molecules in finite volume

    CERN Document Server

    Albaladejo, Miguel; Nieves, Juan; Oset, Eulogio

    2013-01-01

    In the present paper we address the interaction of pairs of charmed mesons with hidden charm in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and from them some synthetic data are generated. These data are then employed to study the inverse problem of getting the energies of the bound states and phase shifts for $D \\bar D$ or $D^* {\\bar D}^*$. Different strategies are investigated using the lowest two levels for different values of the box size, carrying a study of the errors produced. Starting from the upper level, fits to the synthetic data are carried out to determine the scattering length and effective range plus the binding energy of the ground state. A similar strategy using the effective range formula is considered with a simultaneous fit to the two levels, one above and the other one below threshold. This method turns out to be more...

  3. Laser experiments explore the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Ahlers, M. [Oxford Univ. (United Kingdom). Rudolf Peierls Centre for Theoretical Physics; Gies, H. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik; Jaeckel, J. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Durham Univ. (United Kingdom). Inst. for Particle Physics Phenomenology; Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2007-11-15

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses

  4. Bayesian structural inference for hidden processes.

    Science.gov (United States)

    Strelioff, Christopher C; Crutchfield, James P

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ε-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ε-machines, irrespective of estimated transition probabilities. Properties of ε-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  5. The reciprocal relationship between sexual victimization and sexual assertiveness.

    Science.gov (United States)

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  6. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  7. Development of an ease-of-use remote healthcare system architecture using RFID and networking technologies.

    Science.gov (United States)

    Lin, Shih-Sung; Hung, Min-Hsiung; Tsai, Chang-Lung; Chou, Li-Ping

    2012-12-01

    The study aims to provide an ease-of-use approach for senior patients to utilize remote healthcare systems. An ease-of-use remote healthcare system (RHS) architecture using RFID (Radio Frequency Identification) and networking technologies is developed. Specifically, the codes in RFID tags are used for authenticating the patients' ID to secure and ease the login process. The patient needs only to take one action, i.e. placing a RFID tag onto the reader, to automatically login and start the RHS and then acquire automatic medical services. An ease-of-use emergency monitoring and reporting mechanism is developed as well to monitor and protect the safety of the senior patients who have to be left alone at home. By just pressing a single button, the RHS can automatically report the patient's emergency information to the clinic side so that the responsible medical personnel can take proper urgent actions for the patient. Besides, Web services technology is used to build the Internet communication scheme of the RHS so that the interoperability and data transmission security between the home server and the clinical server can be enhanced. A prototype RHS is constructed to validate the effectiveness of our designs. Testing results show that the proposed RHS architecture possesses the characteristics of ease to use, simplicity to operate, promptness in login, and no need to preserve identity information. The proposed RHS architecture can effectively increase the willingness of senior patients who act slowly or are unfamiliar with computer operations to use the RHS. The research results can be used as an add-on for developing future remote healthcare systems.

  8. Quantum algorithm for identifying hidden polynomial function graphs

    NARCIS (Netherlands)

    Decker, T.; Draisma, J.; Wocjan, P.

    2009-01-01

    We consider a natural generalization of an abelian Hidden Subgroup Problem where the subgroups and their cosets correspond to graphs of linear functions over a finite field F with d elements. The hidden functions of the generalized problem are not restricted to be linear but can also be m-variate po

  9. Hidden attractor in the Rabinovich system, Chua circuits and PLL

    Science.gov (United States)

    Kuznetsov, N. V.; Leonov, G. A.; Mokaev, T. N.; Seledzhi, S. M.

    2016-06-01

    In this report the existence of hidden attractors in Rabinovich system, phase-locked loop and coupled Chua circuits is considered. It is shown that the existence of hidden attractors may complicate the analysis of the systems and significantly affect the synchronization.

  10. Hidden Curriculum as One of Current Issue of Curriculum

    Science.gov (United States)

    Alsubaie, Merfat Ayesh

    2015-01-01

    There are several issues in the education system, especially in the curriculum field that affect education. Hidden curriculum is one of current controversial curriculum issues. Many hidden curricular issues are the result of assumptions and expectations that are not formally communicated, established, or conveyed within the learning environment.…

  11. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  12. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  13. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  14. Seuss's Butter Battle Book: Is There Hidden Harm?

    Science.gov (United States)

    Van Cleaf, David W.; Martin, Rita J.

    1986-01-01

    Examines whether elementary school children relate to the "harmful hidden message" about nuclear war in Dr. Seuss's THE BUTTER BATTLE BOOK. After ascertaining the children's cognitive level, they participated in activities to find hidden meanings in stories, including Seuss's book. Students failed to identify the nuclear war message in Seuss's…

  15. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  16. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  17. Reaching out to Ebola victims: Coercion, persuasion or an appeal for self-sacrifice?

    Science.gov (United States)

    Calain, Philippe; Poncin, Marc

    2015-12-01

    The 2014-2015 Ebola crisis in West Africa has highlighted the practical limits of upholding human rights and common ethical principles when applying emergency public-health measures. The role of medical teams in the implementation of quarantine and isolation has been equivocal, particularly when such measures are opposed by communities who are coerced by the temporary suspension of civil liberties. In their encounters with Ebola victims, outreach teams face moral dilemmas, where the boundaries are unclear between coercion, persuasion and appeals for self-sacrifice. For those teams, we propose a set of practical recommendations aimed at respecting the autonomy of epidemic victims and easing tensions within communities. We recognize that some of these recommendations are progressively achievable, depending on the specific stage or setting of an outbreak. Yet with the increasing availability of experimental treatments and research interventions, weighing patients' autonomy against the common good will become an even more pressing ethical obligation. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  18. Child victims and poly-victims in China: are they more at-risk of family violence?

    Science.gov (United States)

    Chan, Ko Ling

    2014-11-01

    Multiple forms of violence may co-occur on a child. These may include various forms of child victimization and different types of family violence. However, evidence that child victims are more likely to witness other types of family violence has been lacking in China. Using data of a large and diverse sample of children recruited from 6 regions in China during 2009 and 2010 (N=18,341; 47% girls; mean age=15.9 years), the associations between child victimization and family violence witnessed were examined. Descriptive statistics and the associations between child victimization, demographic characteristics, and family violence witnessed were analyzed. Lifetime and preceding-year rates were 71.7% and 60.0% for any form of child victimization and 14.0% and 9.2% for poly-victimization (having four or more types of victimization), respectively. Family disadvantages (i.e., lower socio-economic status, single parents, and having more than one child in the family) were associated with child victimization and poly-victimization. Witnessing of parental intimate partner violence, elder abuse, and in-law conflict also increased the likelihood of child victimization and poly-victimization, even after the adjustment of demographic factors. Possible mechanisms for the links between family violence and child victimization are discussed. The current findings indicated the need for focusing on the whole family rather than the victim only. For example, screening for different types of family violence when child victims are identified may help early detection of other victims within the family.

  19. Victims of crime, with special emphasis on victims of work abuse and domestic violence: Analysis of the service VDS info and victim support for 2009

    Directory of Open Access Journals (Sweden)

    Radaković Danica

    2010-01-01

    Full Text Available The aim of this paper is to present the work of the VDS info and victim support service for the period January 1st 2009 - December 31st 2009. It contains the data about victims, type and quality of assistance and support provided by the Service, and also about institutions and organizations the victims contacted before or after contacting the Service and their satisfaction with the help they received.

  20. Intergenerational Links in Victimization: Prosocial Friends as a Buffer.

    Science.gov (United States)

    Han, Sohyun C; Margolin, Gayla

    2016-06-01

    This study investigated whether having friends who engaged in more prosocial than antisocial behaviors buffered the associations between family-of-origin aggression and later victimization. Adolescent participants (N=125) and their parents reported on different types of family aggression in early adolescence. Approximately 5 years later, adolescents reported on their victimization experiences with dating partners and friends, and their friends' prosocial and antisocial behaviors. Only father-to-child aggression was significantly associated with dating and friend victimization, with stronger risk for females' dating victimization. Moreover, having friends who engaged in more prosocial than antisocial behaviors had both a direct inverse relationship with dating partner victimization. This also buffered the risk for dating victimization associated with father-daughter aggression. Findings suggest that greater attention be paid to the father-daughter relationship and to the importance of having friends who engage in prosocial behaviors in the prevention of adolescents' victimization.

  1. The concentration of criminal victimization and patterns of routine activities.

    Science.gov (United States)

    Kuo, Shih-Ya; Cuvelier, Steven J; Sheu, Chuen-Jim; Zhao, Jihong Solomon

    2012-06-01

    Although many repeat victimization studies have focused on describing the prevalence of the phenomenon, this study attempted to explain variations in the concentration of victimization by applying routine activities as a theoretical model. A multivariate analysis of repeat victimization based on the 2005 Taiwan criminal victimization data supported the general applicability of the routine activity model developed in Western culture for predicting repeat victimization. Findings that diverged from Western patterns included family income to assault, gender to robbery, and marital status, family income, and major activity to larceny incidents. These disparities illustrated the importance of considering the broader sociocultural context in the association between risk predictors and the concentration of criminal victimization. The contradictory results and nonsignificant variance also reflected untapped information on respondents' biological features and psychological tendencies. Future victimization research would do well to integrate measurements that are sensitive to salient sociocultural elements of the society being studied and individuals' biological and psychological traits.

  2. Workplace mobbing: How the victim's coping behavior influences bystander responses.

    Science.gov (United States)

    Mulder, Roelie; Bos, Arjan E R; Pouwelse, Mieneke; van Dam, Karen

    2017-01-01

    Victims of workplace mobbing show diverse coping behavior. We investigated the impact of this behavior on bystander cognitions, emotions, and helping toward the victim, integrating coping literature with attribution theory. Adult part-time university students (N = 161) working at various organizations participated in a study with a 3(Coping: approach/avoidance/neutral) × 2(Gender Victim: male/female) × 2(Gender Bystander: male/female) design. Victims showing approach (vs. avoidance) coping were considered to be more self-reliant and less responsible for the continuation of the mobbing, and they elicited less anger. Continuation responsibility and self-reliance mediated the relationship between the victim's coping behavior and bystanders' helping intentions. Female (vs. male) participants reported more sympathy for the victim and greater willingness to help, and female (vs. male) victims elicited less anger. Theoretical and practical implications of the findings are discussed.

  3. A Radio for Hidden-Photon Dark Matter Detection

    CERN Document Server

    Chaudhuri, Saptarshi; Irwin, Kent; Mardon, Jeremy; Rajendran, Surjeet; Zhao, Yue

    2014-01-01

    We propose a resonant electromagnetic detector to search for hidden-photon dark matter over an extensive range of masses. Hidden-photon dark matter can be described as a weakly coupled "hidden electric field," oscillating at a frequency fixed by the mass, and able to penetrate any shielding. At low frequencies (compared to the inverse size of the shielding), we find that observable effect of the hidden photon inside any shielding is a real, oscillating magnetic field. We outline experimental setups designed to search for hidden-photon dark matter, using a tunable, resonant LC circuit designed to couple to this magnetic field. Our "straw man" setups take into consideration resonator design, readout architecture and noise estimates. At high frequencies,there is an upper limit to the useful size of a single resonator set by $1/\

  4. Secluded Dark Matter Coupled to a Hidden CFT

    CERN Document Server

    von Harling, Benedict

    2012-01-01

    Models of secluded dark matter offer a variant on the standard WIMP picture and can modify our expectations for hidden sector phenomenology and detection. In this work we extend a minimal model of secluded dark matter, comprised of a U(1)'-charged dark matter candidate, to include a confining hidden-sector CFT. This provides a technically natural explanation for the hierarchically small mediator-scale, with hidden-sector confinement generating m_{gamma'}>0. Furthermore, the thermal history of the universe can differ markedly from the WIMP picture due to (i) new annihilation channels, (ii) a (potentially) large number of hidden-sector degrees of freedom, and (iii) a hidden-sector phase transition at temperatures T << M_{dm} after freeze out. The mediator allows both the dark matter and the Standard Model to communicate with the CFT, thus modifying the low-energy phenomenology and cosmic-ray signals from the secluded sector.

  5. Abelian Hidden Sectors at a GeV

    Energy Technology Data Exchange (ETDEWEB)

    Morrissey, David E.; Poland, David; /Harvard U.; Zurek, Kathryn; /Fermilab /Michigan U.

    2009-04-16

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1){sub x} gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  6. HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB

    Directory of Open Access Journals (Sweden)

    DR. ANURADHA

    2012-06-01

    Full Text Available In this era of digital tsunami of information on the web, everyone is completely dependent on the WWW for information retrieval. This has posed a challenging problem in extracting relevant data. Traditional web crawlers focus only on the surface web while the deep web keeps expanding behind the scene. The web databases are hidden behind the query interfaces. In this paper, we propose a Hidden Web Extractor (HWE that can automatically discover and download data from the Hidden Web databases. Since the only “entry point” to a Hidden Web site is a query interface, the main challenge that a Hidden WebExtractor has to face is how to automatically generate meaningful queries for the unlimited number of website pages.

  7. Gauge Coupling Unification with Hidden Photon, and Minicharged Dark Matter

    CERN Document Server

    Daido, Ryuji; Yokozaki, Norimi

    2016-01-01

    We show that gauge coupling unification is realized with a greater accuracy in the presence of a massless hidden photon which has a large kinetic mixing with hypercharge. We solve the renormalization group equations at two-loop level and find that the GUT unification scale is around $10^{16.5}$ GeV which sufficiently suppresses the proton decay rate, and that the unification depends only on the kinetic mixing, but not on the hidden gauge coupling nor the presence of vector-like matter fields charged under U(1)$_H$ and/or SU(5). Matter fields charged under the unbroken hidden U(1)$_H$ are stable and they contribute to dark matter. Interestingly, they become minicharged dark matter which carries a small but non-zero electric charge, if the hidden gauge coupling is tiny. The minicharged dark matter is a natural outcome of the gauge coupling unification with a hidden photon.

  8. A Hidden-Removal Model of Dam Perspective Drawing

    Institute of Scientific and Technical Information of China (English)

    WANG Zi-ru; ZHOU Hui-cheng; LI Ming-qiu

    2011-01-01

    Aming at water conservancy project visualization, a hidden-removal method of dam perspective drawings is realized by building a hidden-removal mathematical model for overlapping points location to set up the hidden relationship among point and plane, plane and plane in space. On this basis, as an example of panel rockfill dam, a dam hidden-removal perspective drawing is generated in different directions and different visual angles through adapting VC++ and OpenGL visualizing technology. The results show that the data construction of the model is simple which can overcome the disadvantages of considerable and complicated calculation. This method also provides the new means to draw hidden-removal perspective drawings for those landforms and ground objects.

  9. Victimization and its associations with peer rejection and fear of victimization: Moderating effects of individual-level and classroom-level characteristics.

    Science.gov (United States)

    Kollerová, Lenka; Smolík, Filip

    2016-12-01

    Past research has shown that peer victimization by bullying is associated with peer rejection and fear of victimization, but little is known about the interplay between victimization and other characteristics in the prediction of these experiences. We assume that the associations between victimization and peer rejection/fear of victimization are moderated by multiple characteristics, including aspects of peer ecology. The study tested whether the links between victimization and peer rejection/fear of victimization are moderated by gender, peer support, and two features of classroom peer ecology: classroom victimization rate and classroom hierarchy (the variability of popularity among students). The sample included 512 early adolescents attending sixth grade retrieved from 25 elementary school classrooms. Participants completed a set of self-report and peer nomination instruments in classroom settings. Multilevel linear modelling showed that higher levels of peer rejection were associated with higher victimization, male gender, and lower peer support. The association between victimization and peer rejection was attenuated for females and when the classroom victimization rate was higher. A higher fear of victimization was related to higher victimization, female gender, lower peer support, and a higher classroom victimization rate. The link between victimization and fear of victimization was strengthened by female gender and higher levels of classroom hierarchy. The results indicate the relevance of the interplay between victimization and gender and between victimization and classroom peer ecology in understanding peer rejection and fear of victimization. © 2016 The British Psychological Society.

  10. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  11. Victimization and Violent Offending: An Assessment of the Victim-Offender Overlap Among Native American Adolescents and Young Adults.

    Science.gov (United States)

    Reingle, Jennifer M; Maldonado-Molina, Mildred M

    2012-06-01

    The purpose of this article is to evaluate the victim-offender overlap among a nationally representative sample of Native American adolescents and young adults. Data for this study were obtained from 338 Native American youth who participated in the National Longitudinal Study of Adolescent Health (Add Health) Waves I-IV. Group-based trajectory modeling was used to estimate trajectories of violence and victimization separately. Bivariate tests were used to assess the overlap between victimization and violent trajectory groups. Multinomial regression procedures were used to assess the predictors of victimization, offending, and the overlap category of both victimization and offending. Three trajectory groups were found for violence (nonviolent, escalators, and desistors) and victimization (nonvictim, decreasing victimization, and increasing victimization). We found substantial evidence of an overlap between victimization and offending among Native Americans, as 27.5% of the sample reported both victimization and offending. Those in the overlap group had greater number of risk factors present at baseline. These results suggest that the victim-offender overlap is present in Native American adolescents. Explanations and implications are discussed.

  12. Usage Pattern, Perceived Usefulness and Ease of Use of Computer Games among Malaysian Elementary School Students

    Directory of Open Access Journals (Sweden)

    Fatemeh Habibian Naeini

    2012-12-01

    Full Text Available ICT and computer games for academic purposes are aggressively promoted among school children in Malaysia. However, no study has investigated the use of computer games among primary school children and whether ease of use and perceived usefulness affected the actual use of computer games. Thus, the purpose of this study was to investigate the usage of computer games among elementary school children in Malaysia by location, school type and gender. Also investigated was whether ease of use and perceived usefulness effected the use of computer games following the prescriptions of the TAM model. The survey method was employed to collect the data and a questionnaire was administered to 201 primary school students from the National, Chinese and Tamil Schools in Penang. Data was analyzed using oneway ANOVA and Pearson correlation. The findings found that computer ownership and internet access by type of school, location and gender were high and were almost equal by percentage. However, the findings revealed that playing of computer games were at low levels among National school students and also by location and gender. In contrast, more than 50% of SKRJC and SKJRT students reported playing computer games at the medium and high levels. Also, students reported low overall perceptions towards perceived usefulness and ease of use of the games towards their academic performance and there were no significant differences in perceived usefulness and ease of use between the groups by demographic factors. However, further analysis by construct revealed that there was a significant difference in perception towards social value by location with students from urban schools reporting higher means, indicating that urban school students were playing the games as part of their social activities. Finally, following the predictions of the TAM model, it was found that Ease of use was significantly correlated to Perceived usefulness and that both ease of use and perceived

  13. Magneto-Radar Hidden Metal Detector

    Energy Technology Data Exchange (ETDEWEB)

    McEwan, Thomas E. (Las Vegas, NV)

    2005-07-05

    A varying magnetic field excites slight vibrations in an object and a radar sensor detects the vibrations at a harmonic of the excitation frequency. The synergy of the magnetic excitation and radar detection provides increased detection range compared to conventional magnetic metal detectors. The radar rejects background clutter by responding only to reflecting objects that are vibrating at a harmonic excitation field, thereby significantly improving detection reliability. As an exemplary arrangement, an ultra-wideband micropower impulse radar (MIR) is capable of being employed to provide superior materials penetration while providing range information. The magneto-radar may be applied to pre-screening magnetic resonance imaging (MRI) patients, landmine detection and finding hidden treasures.

  14. Effect of Noise on hidden data

    Directory of Open Access Journals (Sweden)

    Garima Tomar

    2012-02-01

    Full Text Available This paper simulates an effective data hiding technique i.e. steganography based on LSB insertion and RSA encryption in order to provide seven million times better security than the previous work. The Main idea of proposed scheme is to encrypt secret data by RSA 1024 algorithm, convert it in to binary sequence bit and then embedded into each cover pixels by modifying the least significant bits (LSBs of cover pixels. The result image is also known as steganography image. The PSNR value of this steganography image is 54.34 db. In this paper Baboon image is used for experimental purpous.This steganography image is transmitted through AWGN channel, and performance is simulated. The image and hidden data are reconstructed with the SNR level ≥9 dB.

  15. Sending Hidden Data via Google Suggest

    CERN Document Server

    Bialczak, Piotr; Szczypiorski, Krzysztof

    2011-01-01

    Google Suggest is a service incorporated within Google Web Search which was created to help user find the right search phrase by proposing the autocompleting popular phrases while typing. The paper presents a new network steganography method called StegSuggest which utilizes suggestions generated by Google Suggest as a hidden data carrier. The detailed description of the method's idea is backed up with the analysis of the network traffic generated by the Google Suggest to prove its feasibility. The traffic analysis was also performed to discover the occurrence of two TCP options: Window Scale and Timestamp which StegSuggest uses to operate. Estimation of method steganographic bandwidth proves that it is possible to insert 100 bits of steganogram into every suggestions list sent by Google Suggest service.

  16. Grand unified hidden-sector dark matter

    Science.gov (United States)

    Lonsdale, Stephen J.; Volkas, Raymond R.

    2014-10-01

    We explore G×G unified theories with the visible and the hidden or dark sectors paired under a Z2 symmetry. Developing a system of "asymmetric symmetry breaking" we motivate such models on the basis of their ability to generate dark baryons that are confined with a mass scale just above that of the proton, as motivated by asymmetric dark matter. This difference is achieved from the distinct but related confinement scales that develop in unified theories that have the two factors of G spontaneously breaking in an asymmetric manner. We show how Higgs potentials that admit different gauge group breaking chains in each sector can be constructed, and demonstrate the capacity for generating different fermion mass scales. Lastly we discuss supersymmetric extensions of such schemes.

  17. Hidden caries’ challenge diagnosis: case report

    Directory of Open Access Journals (Sweden)

    Fernanda Mara de Paiva Bertoli

    2013-06-01

    Full Text Available Introduction: Hidden caries is a term used to describe occlusal dentine caries that is missed on a visual examination, but is large and demineralised enough to be detected by another exam for example, radiographs. Case report: This article reports a case of large dentine caries, which presented as to be a small pit-and-fissure carious lesion on the occlusal surface of the right mandibular permanent first molar in a 10-year-old girl. The treatment included root canal treatment and the sealing of the cavity with composite resin. Conclusion: Careful visual examination, with cleaning and drying of teeth, associated to bitewing radiographs may improve occlusal caries detection. Dentists should examine bitewing radiographs carefully for proximal caries and occlusal demineralization. Radiographs are an effective method of caries diagnosis that can avoid large destruction and allows less invasive treatment.

  18. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  19. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...... out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school...

  20. Nuclear scissors modes and hidden angular momenta

    CERN Document Server

    Balbutsev, E B; Schuck, P

    2016-01-01

    The coupled dynamics of low lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time Dependent Hartree-Fock-Bogoliubov equations. The model of the harmonic oscillator including spin-orbit potential plus quadrupole-quadrupole and spin-spin interactions is considered. New low lying spin dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  1. Hidden expectations within the Danish VET system

    DEFF Research Database (Denmark)

    Hjort-Madsen, Peder

    2011-01-01

    out) within the VET system, because of hidden expectations related to e.g. individualized responsibility, a certain student behavior (sitting still, participating actively), etc. By approaching the VET system as a cultural context (cultural praxis) the subtle reproductive mechanisms of the VET system...... are shown. With empirical examples from different introductory VET courses, it is shown how the school, the teachers and the students themselves are reproducing poor school performance and student background – being it gendered, ethnical or social – and hereby proving to the students, that school......Researching the pressing retention and dropout problems of the Danish VET system (app. 20 pct. of a year group never achieve an upper secondary education) this paper takes its point of departure in the hypothesis that low performing students are kept in a marginal position (at the risk of dropping...

  2. Hidden baryons: The physics of Compton composites

    Science.gov (United States)

    Mayer, Frederick J.

    2016-06-01

    A large fraction of the mass-energy of the Universe appears to be composed of Compton composites. How is it then that these composites are not frequently observed in experiments? This paper addresses this question, and others, by reviewing recent publications that: 1) introduced Compton composites, 2) showed how and where they are formed and 3) explained how they interact with other systems. Though ubiquitous in many physical situations, Compton composites are almost completely hidden in experiments due to their unique interaction characteristics. Still, their presence has been indirectly observed, though not interpreted as such until recently. Looking to the future, direct-detection experiments are proposed that could verify the composites' components. It is with deep sadness that I dedicate this paper to my mentor, collaborator, and friend, Dr. John R. Reitz, who passed away within days of the publication of our paper “Compton Composites Late in the Early Universe”.

  3. Hidden realities inside PBL design processes

    DEFF Research Database (Denmark)

    Pihl, Ole Verner

    2015-01-01

    Design Process, but is a group-based architecture and design education better than that which is individually based? How does PBL affect space, form, and creative processes? Hans Kiib, professor and one of the founders of the Department of Architecture and Design in Aalborg, describes his intentions...... within the group work, as it is closer related to the actual PBL process”. Is the Integrated Design Process (Knudstrup 2004) and is Colb (1975) still current and valid? Can we still use these methodologies when we must create “learning for an unknown future,” as Ronald Barnett (2004) claims that we...... investigates the creative processes of the collective and the individual and clarifies some of the hidden realities behind the PBL-based creative processes, both through an inquiry with the students and a more methodological and theoretical approach. The paper also explores how to integrate artistic...

  4. Aluminium Diphosphamethanides: Hidden Frustrated Lewis Pairs.

    Science.gov (United States)

    Styra, Steffen; Radius, Michael; Moos, Eric; Bihlmeier, Angela; Breher, Frank

    2016-07-04

    The synthesis and characterisation of two aluminium diphosphamethanide complexes, [Al(tBu)2 {κ(2) P,P'-Mes*PCHPMes*}] (3) and [Al(C6 F5 )2 {κ(2) P,P'-Mes*PCHPMes*}] (4), and the silylated analogue, Mes*PCHP(SiMe3 )Mes* (5), are reported. The aluminium complexes feature four-membered PCPAl core structures consisting of diphosphaallyl ligands. The silylated phosphine 5 was found to be a valuable precursor for the synthesis of 4 as it cleanly reacts with the diaryl aluminium chloride [(C6 F5 )2 AlCl]2 . The aluminium complex 3 reacts with molecular dihydrogen at room temperature under formation of the acyclic σ(2) λ(3) ,σ(3) λ(3) -diphosphine Mes*PCHP(H)Mes* and the corresponding dialkyl aluminium hydride [tBu2 AlH]3 . Thus, 3 belongs to the family of so-called hidden frustrated Lewis pairs.

  5. Wavelet domain hidden markovian bayesian document segmentation

    Institute of Scientific and Technical Information of China (English)

    Sun Junxi; Xiao Changyan; Zhang Su; Chen Yazhu

    2005-01-01

    A novel algorithm for Bayesian document segmentation is proposed based on the wavelet domain hidden Markov tree (HMT) model. Once the parameters of model are known, according to the sequential maximum a posterior probability (SMAP) rule, firstly, the likelihood probability of HMT model for each pattern is computed from fine to coarse procedure. Then, the interscale state transition probability is solved using Expectation Maximum (EM) algorithm based on hybrid-quadtree and multiscale context information is fused from coarse to fine procedure. In order to get pixellevel segmentation, the redundant wavelet domain Gaussian mixture model (GMM) is employed to formulate pixel-level statistical property. The experiment results show that the proposed scheme is feasible and robust.

  6. The Detection of Hidden Periodicities in EEG

    Institute of Scientific and Technical Information of China (English)

    YOU Rong-yi

    2007-01-01

    Abstract.A novel method for detecting the hidden periodicities in EEG is proposed.By using a width-varying window in the time domain, the structure function of EEG time series is defined. It is found that the minima of the structure function, within a finite window width, can be found regularly, which indicate that there are some certain periodicities associated with EEG time series. Based on the structure function, a further quadratic structure function of EEG time series is defined. By quadratic structure function, it can be seen that the periodicities of EEG become more obvious, moreover, the period of EEG can be determined accurately. These results will be meaningful for studying the neuron activity inside the human brain.

  7. Hidden fungi, emergent properties: endophytes and microbiomes.

    Science.gov (United States)

    Porras-Alfaro, Andrea; Bayman, Paul

    2011-01-01

    Endophytes are microorganisms that live within plant tissues without causing symptoms of disease. They are important components of plant microbiomes. Endophytes interact with, and overlap in function with, other core microbial groups that colonize plant tissues, e.g., mycorrhizal fungi, pathogens, epiphytes, and saprotrophs. Some fungal endophytes affect plant growth and plant responses to pathogens, herbivores, and environmental change; others produce useful or interesting secondary metabolites. Here, we focus on new techniques and approaches that can provide an integrative understanding of the role of fungal endophytes in the plant microbiome. Clavicipitaceous endophytes of grasses are not considered because they have unique properties distinct from other endophytes. Hidden from view and often overlooked, endophytes are emerging as their diversity, importance for plant growth and survival, and interactions with other organisms are revealed.

  8. A New Hidden Web Crawling Approach

    Directory of Open Access Journals (Sweden)

    L.Saoudi

    2015-10-01

    Full Text Available Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable information of online database which is “hidden” behind the query forms. To access to those information the crawler have to fill the forms with a valid data, for this reason we propose a new approach which use SQLI technique in order to find the most promising keywords of a specific domain for automatic form submission. The effectiveness of proposed framework has been evaluated through experiments using real web sites and encouraging preliminary results were obtained

  9. Probabilistic Resilience in Hidden Markov Models

    Science.gov (United States)

    Panerati, Jacopo; Beltrame, Giovanni; Schwind, Nicolas; Zeltner, Stefan; Inoue, Katsumi

    2016-05-01

    Originally defined in the context of ecological systems and environmental sciences, resilience has grown to be a property of major interest for the design and analysis of many other complex systems: resilient networks and robotics systems other the desirable capability of absorbing disruption and transforming in response to external shocks, while still providing the services they were designed for. Starting from an existing formalization of resilience for constraint-based systems, we develop a probabilistic framework based on hidden Markov models. In doing so, we introduce two new important features: stochastic evolution and partial observability. Using our framework, we formalize a methodology for the evaluation of probabilities associated with generic properties, we describe an efficient algorithm for the computation of its essential inference step, and show that its complexity is comparable to other state-of-the-art inference algorithms.

  10. Identifying Exotic Hidden-Charm Pentaquarks.

    Science.gov (United States)

    Chen, Rui; Liu, Xiang; Li, Xue-Qian; Zhu, Shi-Lin

    2015-09-25

    The LHCb Collaboration at the Large Hadron Collider at CERN discovered two pentaquark states P_{c}(4380) and P_{c}(4450). These two hidden-charm states are interpreted as the loosely bound Σ_{c}(2455)D^{*} and Σ_{c}^{*}(2520)D^{*} molecular states in the boson exchange interaction model, which provides an explanation for why the experimental width of P_{c}(4450) is much narrower than that of P_{c}(4380). The discovery of the new resonances P_{c}(4380) and P_{c}(4450), indeed, opens a new page for hadron physics. The partners of P_{c}(4380) and P_{c}(4450) should be pursued in future experiments.

  11. Forensic odontology involvement in disaster victim identification.

    Science.gov (United States)

    Berketa, John William; James, Helen; Lake, Anthony W

    2012-06-01

    Forensic odontology is one of three primary identifiers designated by Interpol to identify victims of mass casualty events. Forensic odontology is involved in all five phases-Scene, Postmortem, Antemortem, Reconciliation and Debrief. Forward planning, adequate funding, international cooperation and standardization are essential to guarantee an effective response. A Standard Operation Procedure should be utilized to maximize quality, facilitate occupation and health issues, maintain security and form a structure to the relief program. Issues that must be considered in the management of the forensic odontology component of disaster victim identification are given in "Appendix 1". Each stage of the disaster, from initial notification to debrief, is analyzed and a comprehensive checklist of actions suggested.

  12. Perception of secondary victimization in gender violence

    Directory of Open Access Journals (Sweden)

    María Aranda López

    2014-08-01

    Full Text Available Gender violence is a complex phenomenon that does not end with the removal of the abuser, as the abused person can experience secondary victimization. This study examined this process in a sample of 38 battered women. A multicausal approach was used to assess satisfaction with health system, the police, and the judiciary. The study also assessed the role of two variables that have remained unaddressed: family support and perceived danger. The results indicate that dissatisfaction with judicial treatment and legal action plays a key role in the perception of secondary victimization. It was also found that women who perceive less risk value the judicial system more because they do not need the system to take protective measures or other measures for them. Moreover, women who receive family support are more satisfied with the police system.

  13. The prehospital management of avalanche victims.

    Science.gov (United States)

    Kornhall, Daniel K; Martens-Nielsen, Julie

    2016-12-01

    Avalanche accidents are frequently lethal events with an overall mortality of 23%. Mortality increases dramatically to 50% in instances of complete burial. With modern day dense networks of ambulance services and rescue helicopters, health workers often become involved during the early stages of avalanche rescue. Historically, some of the most devastating avalanche accidents have involved military personnel. Armed forces are frequently deployed to mountain regions in order to train for mountain warfare or as part of ongoing conflicts. Furthermore, military units are frequently called to assist civilian organised rescue in avalanche rescue operations. It is therefore important that clinicians associated with units operating in mountain regions have an understanding of, the medical management of avalanche victims, and of the preceding rescue phase. The ensuing review of the available literature aims to describe the pathophysiology particular to avalanche victims and to outline a structured approach to the search, rescue and prehospital medical management.

  14. Developments in victims' rights in Ireland

    OpenAIRE

    Kilcommins, Shane; Leahy, Susan; Spain, Eimear

    2015-01-01

    peer-reviewed This chapter documents some of the legislative and policy developments relating to victims’ rights in Ireland, Internationally, there has been growing recognition of the interests and needs of victims in the criminal justice system over the past few decades, where previous emphasis had been predominantly on the rights of the offender (Christie, 1977; O’Hara, 2005). The result, in Ireland and in other jurisdictions, has been a series of developments which seek to enhance the s...

  15. Internet piracy and consequences for victims

    OpenAIRE

    Savić Miljan; Petrović Nikola M.

    2016-01-01

    After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total...

  16. Interset: A natural language interface for teleoperated robotic assembly of the EASE space structure

    Science.gov (United States)

    Boorsma, Daniel K.

    1989-01-01

    A teleoperated robot was used to assemble the Experimental Assembly of Structures in Extra-vehicular activity (EASE) space structure under neutral buoyancy conditions, simulating a telerobot performing structural assembly in the zero gravity of space. This previous work used a manually controlled teleoperator as a test bed for system performance evaluations. From these results several Artificial Intelligence options were proposed. One of these was further developed into a real time assembly planner. The interface for this system is effective in assembling EASE structures using windowed graphics and a set of networked menus. As the problem space becomes more complex and hence the set of control options increases, a natural language interface may prove to be beneficial to supplement the menu based control strategy. This strategy can be beneficial in situations such as: describing the local environment, maintaining a data base of task event histories, modifying a plan or a heuristic dynamically, summarizing a task in English, or operating in a novel situation.

  17. The person who eases your mind "Ibasyo" and emotional intelligence in interpersonal adaptation

    Directory of Open Access Journals (Sweden)

    Hiroshi Toyota

    2009-11-01

    Full Text Available The present study was carried out to examine the effect of the "Ibasyo" (the person who eases one's mind and emotional intelligence (EI on self-esteem and loneliness. Five hundred and eight Japanese undergraduates were asked to choose one of the alternatives (e. g., myself, mother, friend to answer the question "Who is the person that eases your mind?" Then, they were asked to rate items from scales corresponding to EI, self-esteem and loneliness. Multiple regression analyses indicated that both Ibasyo and EI explained 25% of loneliness, but only EI explained 25% of self-esteem. The analyses also showed differences of sub-abilities in EI that determined the level of loneliness and self-esteem among Ibasyo groups. These results are interpreted as showing the importance of EI in adaptation.

  18. A TODAY VICTIM OF SECOND WORLD WAR.

    Science.gov (United States)

    Hăisan, Anca; Dumea, Mihaela; Ursaru, Manuela; Bulat, C; Cimpoeşu, Diana Carmen

    2015-01-01

    Emergency medicine as a medical specialty has to deal with all kind of emergency situations, from medical to post traumatic acute eyents and from new born to the elderly persons, but also with particular situations like explosions. In Romania nowadays these are accidental explosions and rare like frequency, but may be dramatic due to numbers of victims and multisystem injury that may occur. We present a case of a single victim of accidental detonated bomb, a projectile from the Second World War, which unfortunately still may be found in some areas. The management of the case from first call to 112 until the victim is discharge-involves high professional team work. We use these opportunity to make a brief review of the mechanism through the lesions may appear and also to renew the fact that the most impressive lesion may not be the most severe, and we have to examine carefully in order to find the real life threatening injury of the patient.

  19. Identifying murder victims with endodontic radiographs

    Science.gov (United States)

    Silva, Rhonan Ferreira; Franco, Ademir; Mendes, Solon Diego Santos Carvalho; Picoli, Fernando Fortes; Nunes, Fernando Gomes; Estrela, Carlos

    2016-01-01

    Endodontics is a special branch of dentistry constantly guided by imaging examinations. From a forensic scope, endodontics plays a valuable role providing solid antemortem (AM) radiographic evidence for comparison with postmortem findings in human identifications. This study illustrates the interface between endodontics and forensic odontology describing three cases of human identification based on radiographic endodontic records. From 2009 to 2012, three unknown male victims of murder were examined in a local Brazilian medico-legal institute to retrieve identity and potential cause of death. Specifically, when asked for AM data, a relative of the three victims provided periapical radiographs of endodontic treatments. Based on that, forensic dentists reproduced the same imaging acquisition techniques obtaining similar periapical radiographs, enabling a comparative dental identification. All the victims were positively identified based on patterns of dental morphology and treatment intervention. This study draws the attention of general and forensic dentists highlight the importance of properly recording dental treatments and searching for evidence in AM endodontic data, respectively. PMID:28123272

  20. Childhood victimization experiences of young adults in St. Petersburg, Russia.

    Science.gov (United States)

    Bogolyubova, Olga; Skochilov, Roman; Smykalo, Lyubov

    2015-04-01

    The purpose of this study was to assess the prevalence of childhood victimization experiences in a sample of young adults in St. Petersburg, Russia. The study sample included 743 students aged 19 to 25 from 15 universities in St. Petersburg, Russia. All of the study participants completed a reliable questionnaire assessing the following types of childhood victimization: conventional crime, child maltreatment, peer victimization, sexual victimization, and witnessing violence. Participation in the study was anonymous. High rates of victimization and exposure to violence were reported by the study participants. The majority of the sample experienced at least one type of victimization during childhood or adolescence, and poly-victimization was reported frequently. The most common type of victimization reported was peer or sibling assault (66.94%), followed by witnessing an assault without weapon (63.91%), personal theft (56.19%), vandalism (56.06%), and emotional bullying (49.99%). Sexual assault by a known adult was reported by 1.45% males and 5.16% of females. This study provides new information on the scope of childhood victimization experiences in Russia. Further research is warranted, including epidemiological research with representative data across the country and studies of the impact of trauma and victimization on mental health and well-being of Russian adults and children. © The Author(s) 2014.

  1. Victim support services in England, Wales and Northern Ireland

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2002-01-01

    Full Text Available In the paper, authors tried to present activities of one of the oldest European Victim Support Services - Victim Support for England, Wales and Northern Ireland. During 1970s, through practice and research projects, the need for recognizing the physical and psychological status of victims after the crime was committed, as well as the need of providing them with the (informal assistance and support were noticed. That has resulted in establishing numerous of local victim support services (schemes, which united in the National Association of the Victim Support Services in 1979. Significant support was given to the Service in 1980s through the recommendations of the Council of Europe on the assistance for victims of crime and prevention of victimization through direct support given to the victim immediately after the incident, including protection and safety, medical, mental, social and financial support, as well as providing the victim with information on his/her rights, support during the criminal proceeding, assistance in getting compensation etc. Organization and structure of the service, referral system, code of practice and two main programs: Victim Service and Witness Service are reviewed in the paper.

  2. Relative-Price Changes and Demand Factors in the Period of Quantitative Easing in Japan

    OpenAIRE

    Hayo, Bernd; Ono, Hiroyuki

    2010-01-01

    Concentrating on the period of quantitative easing in Japan, this paper reexamines the correlation between the asymmetry of sectoral relative-price changes and the aggregate inflation rate. This correlation is widely interpreted as evidence that short-run inflation is determined by supply-side factors; however, we study whether, in addition to the inflation rate, monetary environment and aggregate demand explain this correlation. Using producer price index data, we show, first, that the posit...

  3. Intention to Use Smartphone Through Perceived Compatibility, Perceived Usefulness, and Perceived Ease of Use

    Directory of Open Access Journals (Sweden)

    Harries Arizonia Ismail

    2016-04-01

    Full Text Available This research is aimed to test the influence of perceived compatibility perceived usefulness, perceived ease of use and intention to use smartphone using five hypotheses. Purposive sampling was used as the technique of sample collection. There are representative samples that are 92 respondents, consists of lecturers, students, and employees from AKI University in Semarang city. The data had been analyzed by using Structural Equation Modeling (SEM and it was processed using AMOS program version 16.0. The result of the hypothesis shows that there is a positive and significant influence on perceived compatibility toward perceived usefulness, perceived compatibility toward perceived ease of use, perceived ease of use toward perceived usefulness, perceived ease of use toward intention to use. However, perceived usefulness toward intention to use is not significant. It can be caused that reason of owning smartphones is only a prestige and the users do not understand benefit of it’s features.Tujuan penelitian ini menguji pengaruh persepsi kesesuaian, persepsi kemanfaatan, persepsi kemudahan dan minat penggunaan smartphone. Teknik pengambilan sampel menggunakan purposive sampling. Jumlah sampel sebanyak 92 responden yang terdiri dari dosen, mahasiswa dan karyawan universitas AKI di kota Semarang. Data dianalisis menggunakan Structural Equation Modelling (SEM dan diolah dengan program AMOS versi 16.0. Hasil pengujian hipotesis menunjukkan pengaruh positif dan signifikan pada persepsi kesesuaian terhadap persepsi kemanfaatan, persepsi kesesuaian terhadap persepsi kemudahan penggunaan, persepsi kemudahan penggunaan terhadap persepsi kemanfaatan dan persepsi kemudahan penggunaan terhadap minat penggunaan. Namun demikian, pengaruh persepsi kemanfaatan terhadap minat penggunaan hasil dinyatakan tidak signifikan. Hal ini dikarenakan responden hanya menggunakan smartphones untuk prestis.JEL Classification: M3, M31

  4. CO-MOVEMENTS OF REGIME SHIFTS IN GBP CURRENCY PAIRS AROUND BOE QUANTITATIVE EASING ANNOUNCEMENTS

    Directory of Open Access Journals (Sweden)

    Radu LUPU

    2014-10-01

    Full Text Available In the current post-crisis era, the events with the highest probability to move the financial markets are the announcements of financial authorities concerning the quantitative easing decisions. The objective of this paper is to build an analysis of the existence of connections among the GBP currency pairs in terms of regime switching that could be related to the moments when the Bank of England generated announcements about its monetary decisions.

  5. Using HPGe detector for a solar hidden-photons search

    CERN Document Server

    Horvat, R; Krcmar, M; Krecak, Z; Ljubicic, A

    2012-01-01

    In this paper we report on the results of our search for photons from a U(1) gauge factor in the hidden sector of the full theory, by observing the single spectrum in a HPGe detector arising as a result of the photoelectric-like absorption of hidden photons emitted from the Sun on germanium atoms inside the detector. The main ingredient of the theory used in our analysis, a severely constrained kinetic mixing from the two U(1) gauge factors and massive hidden photons, leads to both photon into hidden states oscillations and to a minuscule coupling of hidden photons to visible matter, of which the latter our experimental setup has been designed to observe. On a theoretical side, full account was taken of the effects of refraction and damping of photons while propagating in the Sun's interior. We exclude hidden photons with kinetic couplings chi > (1.5x10^{-6}-2.6x10^{-11}) for the mass region 1.7x10^{-4} eV < m_\\gamma' < 3.4 eV. Our constraints on the mixing parameter chi at sub-eV hidden-photon masses p...

  6. The Performance of Indian Equity Funds in the Era of Quantitative Easing

    Directory of Open Access Journals (Sweden)

    Ömer Faruk Tan

    2015-10-01

    Full Text Available This study aims to evaluate the performance of Indian equity funds between January 2009 and October 2014. This study period coincides with the period of quantitative easing during which the developing economies in financial markets have been influenced. After the global financial crisis of 2008 came a period of quantitative easing (QE, creating an increase in the money supply and leading to a capital flow from developed countries to developing countries. During this 5-year 10-month period, in which the relevant quantitative easing continued, Indian CNX500 price index yielded approximately 21% compounded on average, per annum. In this study, Indian equity funds are examined in order to compare these funds’ performance within this period. Within this scope, 12 Indian equity funds are chosen. In order to measure these funds’ performances, the Sharpe ratio (1966, Treynor ratio (1965, Jensen’s alpha (1968 methods are used. Jensen’s alpha is also used in identifying selectivity skills of fund managers. Additionally, the Treynor & Mazuy (1966 regression analysis method is applied to show the market timing ability of fund managers.

  7. Source Memory for Mental Imagery: Influences of the Stimuli's Ease of Imagery.

    Directory of Open Access Journals (Sweden)

    Antonia Krefeld-Schwalb

    Full Text Available The present study investigated how ease of imagery influences source monitoring accuracy. Two experiments were conducted in order to examine how ease of imagery influences the probability of source confusions of perceived and imagined completions of natural symmetric shapes. The stimuli consisted of binary pictures of natural objects, namely symmetric pictures of birds, butterflies, insects, and leaves. The ease of imagery (indicating the similarity of the sources and the discriminability (indicating the similarity of the items of each stimulus were estimated in a pretest and included as predictors of the memory performance for these stimuli. It was found that confusion of the sources becomes more likely when the imagery process was relatively easy. However, if the different processes of source monitoring-item memory, source memory and guessing biases-are disentangled, both experiments support the assumption that the effect of decreased source memory for easily imagined stimuli is due to decision processes and misinformation at retrieval rather than encoding processes and memory retention. The data were modeled with a Bayesian hierarchical implementation of the one high threshold source monitoring model.

  8. Source Memory for Mental Imagery: Influences of the Stimuli's Ease of Imagery.

    Science.gov (United States)

    Krefeld-Schwalb, Antonia; Ellis, Andrew W; Oswald, Margit E

    2015-01-01

    The present study investigated how ease of imagery influences source monitoring accuracy. Two experiments were conducted in order to examine how ease of imagery influences the probability of source confusions of perceived and imagined completions of natural symmetric shapes. The stimuli consisted of binary pictures of natural objects, namely symmetric pictures of birds, butterflies, insects, and leaves. The ease of imagery (indicating the similarity of the sources) and the discriminability (indicating the similarity of the items) of each stimulus were estimated in a pretest and included as predictors of the memory performance for these stimuli. It was found that confusion of the sources becomes more likely when the imagery process was relatively easy. However, if the different processes of source monitoring-item memory, source memory and guessing biases-are disentangled, both experiments support the assumption that the effect of decreased source memory for easily imagined stimuli is due to decision processes and misinformation at retrieval rather than encoding processes and memory retention. The data were modeled with a Bayesian hierarchical implementation of the one high threshold source monitoring model.

  9. The effects of retrieval ease on health issue judgments: implications for campaign strategies.

    Science.gov (United States)

    Chang, Chingching

    2010-12-01

    This paper examines the effects of retrieving information about a health ailment on judgments of the perceived severity of the disease and self-efficacy regarding prevention and treatment. The literature on metacognition suggests that recall tasks render two types of information accessible: the retrieved content, and the subjective experience of retrieving the content. Both types of information can influence judgments. Content-based thinking models hold that the more instances of an event people can retrieve, the higher they will estimate the frequency of the event to be. In contrast, experience-based thinking models suggest that when people experience difficulty in retrieving information regarding an event, they rate the event as less likely to occur. In the first experiment, ease of retrieval was manipulated by asking participants to list either a high or low number of consequences of an ailment. As expected, retrieval difficulty resulted in lower perceived disease severity. In the second experiment, ease of retrieval was manipulated by varying the number of disease prevention or treatment measures participants attempted to list. As predicted, retrieval difficulty resulted in lower self-efficacy regarding prevention and treatment. In experiment three, when information regarding a health issue was made accessible by exposure to public service announcements (PSAs), ease-of-retrieval effects were attenuated. Finally, in experiment four, exposure to PSAs encouraged content-based judgments when the issue was of great concern.

  10. On-Demand Mobility (ODM) Technical Pathway: Enabling Ease of Use and Safety

    Science.gov (United States)

    Goodrich, Ken; Moore, Mark

    2015-01-01

    On-demand mobility (ODM) through aviation refers to the ability to quickly and easily move people or equivalent cargo without delays introduced by lack of, or infrequently, scheduled service. A necessary attribute of ODM is that it be easy to use, requiring a minimum of special training, skills, or workload. Fully-autonomous vehicles would provide the ultimate in ease-of-use (EU) but are currently unproven for safety-critical applications outside of a few, situationally constrained applications (e.g. automated trains operating in segregated systems). Applied to aviation, the current and near-future state of the art of full-autonomy, may entail undesirable trade-offs such as very conservative operational margins resulting in reduced trip reliability and transportation utility. Furthermore, acceptance by potential users and regulatory authorities will be challenging without confidence in autonomous systems in developed in less critical, but still challenging applications. A question for the aviation community is how we can best develop practical ease-of-use for aircraft that are sized to carry a small number of passengers (e.g. 1-9) or equivalent cargo. Such development is unlikely to be a single event, but rather a managed, evolutionary process where responsibility and authority transitions from human to automation agents as operational experience is gained with increasingly intelligent systems. This talk presents a technology road map being developed at NASA Langley, as part of an overall strategy to foster ODM, for the development of ease-of-use for ODM aviation.

  11. Effect of Ease of Doing Business to Economic Growth among Selected Countries in Asia

    Directory of Open Access Journals (Sweden)

    Teodorica G. Ani

    2015-12-01

    Full Text Available Economic activity requires a streamlined regulatory environment and effectual policies that are transparent and accessible to all. The study aimed to explain the effect of ease of doing business to economic growth among selected economies in Asia for the year 2014. The study covered 29 economies in East Asia, Southeast Asia, and South Asia. Ease of doing business is determined by the ten Doing Business indicators (DBI of the World Bank. In the study, Gross Domestic Product (GDP was used as the proxy variable for economic growth. Descriptive research was the research design used. Multiple regression determined the effect of doing business to economic growth. Compared to other economies, Singapore has the best regulatory performance. It achieved the easiest to do business to five indicators, namely, Starting Business, Registering Property, Protecting Investors, Trading Across Borders, and Enforcing Contracts. In addition, China showed the highest economic growth. The study found out that the variations in ease of doing business was explained by dealing with construction permits, getting credit, registering property and trading across borders. Dealing with construction permits and getting credit have negative effect to Gross Domestic Product while registering property and trading across borders have positive effect. Trading across borders greatly affect gross domestic product among selected countries in Asia. The research proposed inputs to policy which may increase the awareness of local government units of different economies on the simplification of the policies of the different components used in measuring doing business.

  12. Hidden photon dark matter search with large metallic mirror

    Energy Technology Data Exchange (ETDEWEB)

    Doebrich, Babette; Lindner, Axel [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Daumiller, Kai; Engel, Ralph; Roth, Markus [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany); Kowalski, Marek [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; Redondo, Javier [Zaragoza Univ. (Spain)

    2014-10-15

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  13. Suppressing the QCD axion abundance by hidden monopoles

    Energy Technology Data Exchange (ETDEWEB)

    Kawasaki, Masahiro [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Takahashi, Fuminobu [Tokyo Univ., Miyagi (Japan). Dept. of Physics; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; Yamada, Masaki [Tokyo Univ., Chiba (Japan). Inst. for Cosmic Ray Research; Tokyo Univ., Chiba (Japan). Kavli IPMU (WPI), UTIAS; DESY Hamburg (Germany)

    2015-11-15

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10{sup 12} GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  14. Suppressing the QCD axion abundance by hidden monopoles

    Directory of Open Access Journals (Sweden)

    Masahiro Kawasaki

    2016-02-01

    Full Text Available We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 1012GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei–Quinn symmetry is spontaneously broken after inflation.

  15. Naturally light hidden photons in LARGE volume string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, M. [LPTHE, Univ. Pierre et Marie Curie, Paris (France); Jaeckel, J. [Inst. for Particle Physics Phenomenology, Univ. Durham (United Kingdom); Redondo, J.; Ringwald, A. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2009-09-15

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  16. Investigation of dairy cattle ease of movement on new methyl methacrylate resin aggregate floorings.

    Science.gov (United States)

    Franco-Gendron, N; Bergeron, R; Curilla, W; Conte, S; DeVries, T; Vasseur, E

    2016-10-01

    Freestall dairy farms commonly present issues with cattle slips and falls caused by smooth flooring and manure slurry. This study examined the effect of 4 new methyl methacrylate (MMA) resin aggregate flooring types (1-4) compared with rubber (positive) and concrete (negative control) on dairy cow (n=18) ease of movement when walking on straight and right-angled corridors. Our hypothesis was that cow ease of movement when walking on the MMA surfaces would be better than when walking on traction milled concrete, and at least as good as when walking on rubber. Cattle ease of movement was measured using kinematics, accelerometers, and visual observation of gait and associated behaviors. Stride length, swing time, stance time, and hoof height were obtained from kinematic evaluation. Acceleration and asymmetry of variance were measured with accelerometers. Locomotion score and behaviors associated with lameness, such as arch back, head bob, tracking up, step asymmetry, and reluctance to bear weight were visually observed. Stride length, swing time, stance time, and the number of steps taken were the only variables affected by flooring type. Differences between flooring types for these variables were tested using a generalized linear mixed model with cow as a random effect, week as a random block factor, and flooring type as a fixed effect. Multiple comparisons with a Scheffé adjustment were done to analyze differences among flooring types. Stride length was 0.14 m longer (better) on rubber when compared with concrete, and 0.11 and 0.17 m shorter on MMA 1 and 2 compared with rubber. On MMA 3 and 4, stride length did not differ from either rubber or concrete. Swing time was 0.04 s shorter (worse) on MMA 1 than on rubber, but did not differ from any other flooring. Stance time was 0.18 s longer (worse) on MMA 2 when compared with rubber, but it did not differ from any other treatment. The number of steps was higher on MMA 4 compared with rubber (4.57 vs. 3.95 steps), but

  17. Commentary (Victim Participation in the International Criminal Court)

    DEFF Research Database (Denmark)

    Marchuk, Iryna

    2014-01-01

    was very ‘consumer like’ because victims were solely used as witnesses to testify about the crimes attributed to the accused, but they were not granted broad participatory rights in the proceedings. The drafters of the Rome Statute acknowledged wide-ranging interests of victims who, apart from seeking......Victim participation is one of the most innovative aspects introduced in the legal framework of the International Criminal Court (hereinafter – ICC), which has not featured in the practices of other international criminal courts and tribunals. The approach of the ad hoc tribunals to victims...... that have firmly established practices in dealing with victims and were largely followed by other chambers. Although the jurisprudence has received a mixed bag of reviews in professional and academic circles, it is important to highlight the contribution of the judges to the interpretation of the victim...

  18. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    Directory of Open Access Journals (Sweden)

    Monika Mushevska

    2016-01-01

    Full Text Available The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of age, which are victims of different kinds of crime or witnesses of different kinds of crime, in spite of the role that they have in the crime act. In all proceedings that directly or indirectly child victims involved it is important to act in a way that is the best and most appropriate for the child.

  19. When are victims unlikely to cooperate with the police?

    Science.gov (United States)

    Felson, Richard B; Lantz, Brendan

    2016-01-01

    Data from the National Incident-Based Reporting System (NIBRS) are used to examine the tendency for victims of physical assault, sexual assault, and robbery to refuse to cooperate with the police (N= 3,856,171). Analyses of physical assaults involving homosexual and heterosexual couples did not support the hypothesis that women attacked by their male partners are less likely to cooperate than victims of other assaults. Analyses of violent offenses more generally showed that victims of violence were more likely to refuse to cooperate if they knew the offender in any way than if the offender was a stranger. In the case of physical and sexual assault, these effects were mainly observed for minor incidents. Finally, victims of sexual assault were more likely to cooperate with the police than victims of physical assault. The findings suggest the importance of comparing the victim's reactions to intimate partner violence and sexual assault to their reactions to other offenses.

  20. Bullying among schoolchildren: differences between victims and aggressors.

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; Espelt, Albert; Nebot Adell, Manel

    2013-01-01

    To identify the factors associated with bullying behaviors among adolescents by analyzing victims, aggressors and victims/aggressors separately. A cross-sectional study was performed in a representative sample of 3,089 secondary school students (13-18 years old) in Barcelona (Spain). To define bullying behaviors, we used three questions about different types of mistreatment (jeering, attacking, marginalizing). Compared with secondary school students not involved in bullying, victims, aggressors and victims/aggressors were more likely to be boys and to report negative mood states. Victims were younger, were more overweight or obese and were lighter cannabis users, while aggressors were also younger but reported more antisocial behaviors and more cannabis and alcohol use. Victims/aggressors reported more antisocial behaviors and were overweight. Being involved in bullying, independently of the role adopted, was associated with health-related problems, which can lead to psychological disorders in adulthood. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  1. The Impact of Inmate and Prison Characteristics on Prisoner Victimization.

    Science.gov (United States)

    Steiner, Benjamin; Ellison, Jared M; Butler, H Daniel; Cain, Calli M

    2017-01-01

    A considerable amount of research has been directed at understanding the sources of inmate misconduct (offending within prison), whereas few studies have focused on identifying the causes and correlates of prisoner victimization. The sources of inmate victimization should be distinguished from those of offending, however, because the policy implications of each focus differ to some extent. In order to determine the predictors of inmate victimization and stimulate further research on the topic, we systematically reviewed studies of the causes/correlates of prisoner victimization published between 1980 and 2014. Our findings revealed that predictor variables reflecting inmates' background characteristics (e.g., history of victimization), their institutional routines and experiences (e.g., history of misconduct), and prison characteristics (e.g., population size) all influence victimization. © The Author(s) 2015.

  2. Nuclear tests: the late indemnification of victims; Essais nucleaire: l'indemnisation tardive des victimes

    Energy Technology Data Exchange (ETDEWEB)

    Charbonneau, S. [Bordeaux-1 Univ., 33 (France)

    2010-04-15

    The author briefly recalls the historical context of the creation of the CEA and outlines the silence and denial about the radioactive contamination of military personnel during the nuclear tests performed in the Algerian Sahara and in Polynesia. He also outlines the continuous action of the association of veterans and victims of these nuclear tests which gathered proofs of health consequences. He comments the content and scope of application of laws which have been lately adopted (in 2010) to acknowledge these facts and indemnify the victims

  3. A Latent Class Analysis of Victimization among Middle and High School Students in California

    Science.gov (United States)

    Berkowitz, Ruth; De Pedro, Kris Tunac; Gilreath, Tamika D.

    2015-01-01

    School victimization is associated with negative social-emotional outcomes and risky behaviors. Most studies have provided definitions and measures of victimization, depicting a limited characterization of victimization in schools. More nuanced analyses of school victimization are needed to assess the heterogeneous pattern of victimization in…

  4. Repeat Victimization in a High-Risk Neighborhood Sample of Adolescents.

    Science.gov (United States)

    Menard, Scott; Huizinga, David

    2001-01-01

    Used longitudinal Denver Youth Survey data to examine repeat victimization and concentration of victimization among a relatively few high-frequency victims and intermittency of victimization in a sample of adolescents in a high-risk neighborhood. Chronic, multiple, intermittent victimization was the usual pattern among respondents. Men had higher…

  5. [The victim as object of the medico-legal intervention].

    Science.gov (United States)

    Magalhães, Teresa

    2005-01-01

    We present a reflection about the victim as the object of the medico-legal intervention, that opens perspectives not only to the evidence research (as a techno-scientific contribute to support Justice in what concerns bio-psycho-social questions), but also to the support of victims which, in a last analysis, is no more than another aspect of this the social contribution of this science to ensure the best interest of the victim. This reflection aims to contribute to a better knowledge of the victim in his/her various perspectives. Accordingly, during the exposition, we refer some contributes of Victimology towards the understanding of the victims' behaviour's. Afterwards, we focus on the problems related to the aetiologies (with a particular reference to trauma), levels and consequences (physical, psychological and socio-economical) of victimization, as well as the methodologies of victims approach, medico-legal evaluation and reparation. Considering victims as being not only those who suffer directly the consequences of the victimizing phenomena, but also those that suffer from it indirectly and even secondarily, we shall approach the topic regarding both perspectives. We highlight the importance of understanding the victim as a person, not just understanding him/her confined to the organic aspect (as it used to be until recently in certain fields of medico-legal intervention, and as it still happens due to some legal obligations, for instance in the Labour Law), but considering the person in a global way (body, capacities, life situations and subjectivity). In conclusion, we highlight the importance of this topic to the medico-legal mission, while taking part in various multidisciplinary interventions and being involved in strategies and measures which purpose is to prevent violence, promote safety, avoid secondary victimization and revictimization as well as guarantee the victims' protection and reintegration, in a work attitude that should happen, even more and

  6. Protection of juveniles: Victims of abuse and neglect in Serbia

    Directory of Open Access Journals (Sweden)

    Stevanović Ivana

    2005-01-01

    Full Text Available This paper is dedicated to analyses of the protection of juveniles - victims of abuse and neglect in criminal legal system of the Republic of Serbia. Particular attention is paid to of criminal acts against sexual integrity and family life of juveniles. The position of juveniles as witnesses in the criminal procedure has been viewed from the aspect of specify and vulnerability of the child, as well as through terms of secondary and tertiary victimization of minor as a victim.

  7. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  8. Psychological processes in young bullies versus bully-victims.

    Science.gov (United States)

    van Dijk, Anouk; Poorthuis, Astrid M G; Malti, Tina

    2017-02-08

    Some children who bully others are also victimized themselves ("bully-victims") whereas others are not victimized themselves ("bullies"). These subgroups have been shown to differ in their social functioning as early as in kindergarten. What is less clear are the motives that underlie the bullying behavior of young bullies and bully-victims. The present study examined whether bullies have proactive motives for aggression and anticipate to feel happy after victimizing others, whereas bully-victims have reactive motives for aggression, poor theory of mind skills, and attribute hostile intent to others. This "distinct processes hypothesis" was contrasted with the "shared processes hypothesis," predicting that bullies and bully-victims do not differ on these psychological processes. Children (n = 283, age 4-9) were classified as bully, bully-victim, or noninvolved using peer-nominations. Theory of mind, hostile intent attributions, and happy victimizer emotions were assessed using standard vignettes and false-belief tasks; reactive and proactive motives were assessed using teacher-reports. We tested our hypotheses using Bayesian model selection, enabling us to directly compare the distinct processes model (predicting that bullies and bully-victims deviate from noninvolved children on different psychological processes) against the shared processes model (predicting that bullies and bully-victims deviate from noninvolved children on all psychological processes alike). Overall, the shared processes model received more support than the distinct processes model. These results suggest that in early childhood, bullies and bully-victims have shared, rather than distinct psychological processes underlying their bullying behavior.

  9. Effect of childhood victimization on occupational prestige and income trajectories.

    Directory of Open Access Journals (Sweden)

    Cristina A Fernandez

    Full Text Available Violence toward children (childhood victimization is a major public health problem, with long-term consequences on economic well-being. The purpose of this study was to determine whether childhood victimization affects occupational prestige and income in young adulthood. We hypothesized that young adults who experienced more childhood victimizations would have less prestigious jobs and lower incomes relative to those with no victimization history. We also explored the pathways in which childhood victimization mediates the relationships between background variables, such as parent's educational impact on the socioeconomic transition into adulthood.A nationally representative sample of 8,901 young adults aged 18-28 surveyed between 1999-2009 from the National Longitudinal Survey of Youth 1997 (NLSY were analyzed. Covariate-adjusted multivariate linear regression and path models were used to estimate the effects of victimization and covariates on income and prestige levels and on income and prestige trajectories. After each participant turned 18, their annual 2002 Census job code was assigned a yearly prestige score based on the 1989 General Social Survey, and their annual income was calculated via self-reports. Occupational prestige and annual income are time-varying variables measured from 1999-2009. Victimization effects were tested for moderation by sex, race, and ethnicity in the multivariate models.Approximately half of our sample reported at least one instance of childhood victimization before the age of 18. Major findings include 1 childhood victimization resulted in slower income and prestige growth over time, and 2 mediation analyses suggested that this slower prestige and earnings arose because victims did not get the same amount of education as non-victims.Results indicated that the consequences of victimization negatively affected economic success throughout young adulthood, primarily by slowing the growth in prosperity due to lower

  10. Commentary (Victim Participation in the International Criminal Court)

    DEFF Research Database (Denmark)

    Marchuk, Iryna

    2014-01-01

    Victim participation is one of the most innovative aspects introduced in the legal framework of the International Criminal Court (hereinafter – ICC), which has not featured in the practices of other international criminal courts and tribunals. The approach of the ad hoc tribunals to victims...... was very ‘consumer like’ because victims were solely used as witnesses to testify about the crimes attributed to the accused, but they were not granted broad participatory rights in the proceedings. The drafters of the Rome Statute acknowledged wide-ranging interests of victims who, apart from seeking...

  11. Isovector and hidden-beauty partners of the X(3872)

    Energy Technology Data Exchange (ETDEWEB)

    Høgaasen, Hallstein, E-mail: hallstein.hogasen@fys.uio.no [Department of Physics, University of Oslo, Box 1048, NO-0316 Oslo (Norway); Kou, Emi, E-mail: kou@lal.in2p3.fr [Laboratoire de l' Accélérateur Linéaire, Université Paris-Sud, IN2P3-CNRS, Centre Scientifique d' Orsay, 91898 Orsay Cedex (France); Richard, Jean-Marc, E-mail: j-m.richard@ipnl.in2p3.fr [Université de Lyon, Institut de Physique Nucléaire de Lyon, UCBL–IN2P3-CNRS, 4, rue Enrico Fermi, 69622 Villeurbanne Cedex (France); Sorba, Paul, E-mail: paul.sorba@lapth.cnrs.fr [LAPTh, Laboratoire d' Annecy-le-Vieux de Physique Théorique, CNRS, Université de Savoie, BP 110, 74941 Annecy-le-Vieux Cedex (France)

    2014-05-01

    The isovector partners of the X(3872), recently found at BES III, Belle and CLEO-c were predicted in a simple model based on the chromomagnetic interaction among quarks. The extension to the hidden-beauty sector is discussed.

  12. Local clustering in scale-free networks with hidden variables.

    Science.gov (United States)

    van der Hofstad, Remco; Janssen, A J E M; van Leeuwaarden, Johan S H; Stegehuis, Clara

    2017-02-01

    We investigate the presence of triangles in a class of correlated random graphs in which hidden variables determine the pairwise connections between vertices. The class rules out self-loops and multiple edges. We focus on the regime where the hidden variables follow a power law with exponent τ∈(2,3), so that the degrees have infinite variance. The natural cutoff h_{c} characterizes the largest degrees in the hidden variable models, and a structural cutoff h_{s} introduces negative degree correlations (disassortative mixing) due to the infinite-variance degrees. We show that local clustering decreases with the hidden variable (or degree). We also determine how the average clustering coefficient C scales with the network size N, as a function of h_{s} and h_{c}. For scale-free networks with exponent 2vanish only for networks as large as N=10^{9}.

  13. A Bell-type Theorem Without Hidden Variables

    CERN Document Server

    Stapp, Henry P

    2002-01-01

    Bell's theorem rules out local hidden-variable theories. The locality condition is the demand that what an experimenter freely chooses to measure in one space-time region has no influence in a second space-time region that is spacelike separated from the first. The hidden-variable stipulation means that this demand is implemented through requirements on an assumed-to-exist substructure involving hidden variables. The question thus arises whether the locality condition itself fails, or only its implementation by means of the assumed hidden-variable structure. This paper shows that any theory that satisfies two generally accepted features of orthodox quantum theory and that yields certain predictions of quantum theory cannot satisfy the afore-mentioned locality condition. These two features are that the choices made by the experimenters can be treated as localized free variables and that such free choices do not affect outcomes that have already occurred.

  14. Modelling proteins' hidden conformations to predict antibiotic resistance

    Science.gov (United States)

    Hart, Kathryn M.; Ho, Chris M. W.; Dutta, Supratik; Gross, Michael L.; Bowman, Gregory R.

    2016-10-01

    TEM β-lactamase confers bacteria with resistance to many antibiotics and rapidly evolves activity against new drugs. However, functional changes are not easily explained by differences in crystal structures. We employ Markov state models to identify hidden conformations and explore their role in determining TEM's specificity. We integrate these models with existing drug-design tools to create a new technique, called Boltzmann docking, which better predicts TEM specificity by accounting for conformational heterogeneity. Using our MSMs, we identify hidden states whose populations correlate with activity against cefotaxime. To experimentally detect our predicted hidden states, we use rapid mass spectrometric footprinting and confirm our models' prediction that increased cefotaxime activity correlates with reduced Ω-loop flexibility. Finally, we design novel variants to stabilize the hidden cefotaximase states, and find their populations predict activity against cefotaxime in vitro and in vivo. Therefore, we expect this framework to have numerous applications in drug and protein design.

  15. Recent Applications of Hidden Markov Models in Computational Biology

    Institute of Scientific and Technical Information of China (English)

    Khar Heng Choo; Joo Chuan Tong; Louxin Zhang

    2004-01-01

    This paper examines recent developments and applications of Hidden Markov Models (HMMs) to various problems in computational biology, including multiple sequence alignment, homology detection, protein sequences classification, and genomic annotation.

  16. Self-similarity of complex networks and hidden metric spaces

    CERN Document Server

    Serrano, M Angeles; Boguna, Marian

    2007-01-01

    We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

  17. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  18. Dark matter in the nonabelian hidden gauge theory

    CERN Document Server

    Yamanaka, Nodoka; Gongyo, Shinya; Iida, Hideaki

    2015-01-01

    We discuss the dark matter in the hidden gauge theory. We propose a scenario where the mini-inflation dilutes the dark matter density. This scenario is consistent with the current baryon number asymmetry.

  19. Hidden Symmetry from Supersymmetry in One-Dimensional Quantum Mechanics

    Directory of Open Access Journals (Sweden)

    Alexander A. Andrianov

    2009-06-01

    Full Text Available When several inequivalent supercharges form a closed superalgebra in Quantum Mechanics it entails the appearance of hidden symmetries of a Super-Hamiltonian. We examine this problem in one-dimensional QM for the case of periodic potentials and potentials with finite number of bound states. After the survey of the results existing in the subject the algebraic and analytic properties of hidden-symmetry differential operators are rigorously elaborated in the Theorems and illuminated by several examples.

  20. Stabilization of stochastic systems with hidden Markovian jumps

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper considers the adaptive control of discrete-time hybrid stochastic systems with unknown randomly jumping parameters described by a finite-state hidden Markov chain. An intuitive yet longstanding conjecture in this area is that such hybrid systems can be adaptively stabilized whenever the rate of transition of the hidden Markov chain is small enough. This paper provides a rigorous positive answer to this conjecture by establishing the global stability of a gradient-algorithm-based adaptive linear-quadratic control.

  1. Extracting hidden trails and roads under canopy using LIDAR

    OpenAIRE

    Krougios, Prokopios

    2008-01-01

    The field of Remote Sensing has been greatly benefited by the development of LIDAR. The extraction of bare earth under tree canopies and especially the identification of hidden trails are important tools for military and civilian operations in dense forests. LIDAR data from Sequoia National Park in California (2008) and Fort Belvoir Military Base in Virginia (2007) were two areas that were selected for analysis. Quick Terrain Modeler software was used in order to recognize hidden trails....

  2. Physical nature of a hidden mass in the Universe

    Energy Technology Data Exchange (ETDEWEB)

    Doroshkevich, A.G.; Khlopov, M.Yu. (AN SSSR, Moscow. Inst. Prikladnoj Matematiki)

    1984-04-01

    The problem of an origin of the hidden mass of the Universe is discussed. Observation astronomic data on large-scale Universe structure and hidden mass distribution within the framework of the adiabatic theory of galaxies formation point out the dominance in nowadays Universe of weakly-interacting particles with 15-60 eV mass. Restrictions are obtained for a possible admixture of other relict particles.

  3. Hidden Markov Models with Factored Gaussian Mixtures Densities

    Institute of Scientific and Technical Information of China (English)

    LI Hao-zheng; LIU Zhi-qiang; ZHU Xiang-hua

    2004-01-01

    We present a factorial representation of Gaussian mixture models for observation densities in Hidden Markov Models(HMMs), which uses the factorial learning in the HMM framework. We derive the reestimation formulas for estimating the factorized parameters by the Expectation Maximization (EM) algorithm. We conduct several experiments to compare the performance of this model structure with Factorial Hidden Markov Models(FHMMs) and HMMs, some conclusions and promising empirical results are presented.

  4. Aligning the Hidden Curriculum of Management Education With PRME

    DEFF Research Database (Denmark)

    Blasco, Maribel

    2012-01-01

    This article argues that mainstreaming responsible management education in line with the Principles of Responsible Management Education (PRME) requires close attention to the hidden curriculum (HC), that is, the implicit dimensions of educational experiences. Altering formal curricular goals...... combined with transformative learning and communities of practice theory, the article offers an inquiry-based framework for PRME implementation that takes these moral learning and socialization processes into account. It provides suggestions for how to address the hidden curriculum both in the diagnostic...

  5. Accidental hanging: a novel mobile suspension apparatus partially hidden inside the clothes.

    Science.gov (United States)

    Kodikara, Sarathchandra

    2012-12-01

    Accidental hanging is uncommon. An immobile/fixed and exposed suspension apparatus is seen in almost all cases of hanging. A 50-year-old man, who was drunk, was trying to steal an iron rod by hiding it under his clothing. To secure hiding, he attached it to his body by a loose ligature around the neck, the waist belt of the sarong, and another band around the waist and by his underwear. Sometime later, because of ethanol intoxication, he fell asleep in the sitting position. While he was sitting on the floor, the iron rod was lifted up accidentally, and its upper end was wedged against the wall behind the victim, and the lower end was fixed against the floor. When he fell asleep, the weight of the tilted head acted as the constricting force compressing the neck by the ligature that was used to attach the iron rod to the neck. The cause of death was concluded as hanging in a man with ethanol intoxication. This case highlights a novel mobile suspension apparatus partially hidden inside the clothes, in a case of accidental hanging. A similar case has not been reported in the forensic literature.

  6. Reduced-Rank Hidden Markov Models

    CERN Document Server

    Siddiqi, Sajid M; Gordon, Geoffrey J

    2009-01-01

    We introduce the Reduced-Rank Hidden Markov Model (RR-HMM), a generalization of HMMs that can model smooth state evolution as in Linear Dynamical Systems (LDSs) as well as non-log-concave predictive distributions as in continuous-observation HMMs. RR-HMMs assume an m-dimensional latent state and n discrete observations, with a transition matrix of rank k <= m. This implies the dynamics evolve in a k-dimensional subspace, while the shape of the set of predictive distributions is determined by m. Latent state belief is represented with a k-dimensional state vector and inference is carried out entirely in R^k, making RR-HMMs as computationally efficient as k-state HMMs yet more expressive. To learn RR-HMMs, we relax the assumptions of a recently proposed spectral learning algorithm for HMMs (Hsu, Kakade and Zhang 2009) and apply it to learn k-dimensional observable representations of rank-k RR-HMMs. The algorithm is consistent and free of local optima, and we extend its performance guarantees to cover the RR-...

  7. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  8. A hidden classical symmetry of QCD

    CERN Document Server

    Glozman, L Ya

    2016-01-01

    The classical part of the QCD partition function (the integrand) has, ignoring irrelevant exact zero modes of the Dirac operator, a local SU(2N_F) \\supset SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A symmetry which is absent at the Lagrangian level. This symmetry is broken anomalously and spontaneously. Effects of spontaneous breaking of chiral symmetry are contained in the near-zero modes of the Dirac operator. If physics of anomaly is also encoded in the same near-zero modes, then their truncation on the lattice should recover a hidden classical SU(2N_F) symmetry in correlators and spectra. This naturally explains observation on the lattice of a large degeneracy of hadrons, that is higher than the SU(N_F)_L \\times SU(N_F)_R \\times U(1)_A chiral symmetry, upon elimination by hands of the lowest-lying modes of the Dirac operator. We also discuss an implication of this symmetry for the high temperature QCD.

  9. Seiberg duality versus hidden local symmetry

    CERN Document Server

    Abel, Steven

    2012-01-01

    It is widely believed that the emergent magnetic gauge symmetry of SQCD is analogous to a hidden local symmetry (HLS). We explore this idea in detail, deriving the entire (spontaneously broken) magnetic theory by applying the HLS formalism to spontaneously broken SU(N) SQCD. We deduce the K\\"ahler potential in the HLS description, and show that gauge and flavour symmetry are smoothly restored along certain scaling directions in moduli space. We propose that it is these symmetry restoring directions, associated with the R-symmetry of the theory, that allow full Seiberg duality. Reconsidering the origin of the magnetic gauge bosons as the rho-mesons of the electric theory, colour-flavour locking allows a simple determination of the parameter "a". Its value continuously interpolates between a=2 on the baryonic branch of moduli space - corresponding to "vector meson dominance" - and a=1 on the mesonic branch. Both limiting values are consistent with previous results in the literature. The HLS formalism is further...

  10. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  11. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  12. Natural Inflation with Hidden Scale Invariance

    CERN Document Server

    Barrie, Neil D; Liang, Shelley

    2016-01-01

    We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: $n_s-1\\approx 0.025\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$ and $r\\approx 0.0667\\left(\\frac{N_{\\star}}{60}\\right)^{-1}$, where $N_{\\star}\\approx 30-65$ is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  13. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  14. Stochastic precipitation generator with hidden state covariates

    Science.gov (United States)

    Kim, Yongku; Lee, GyuWon

    2017-08-01

    Time series of daily weather such as precipitation, minimum temperature and maximum temperature are commonly required for various fields. Stochastic weather generators constitute one of the techniques to produce synthetic daily weather. The recently introduced approach for stochastic weather generators is based on generalized linear modeling (GLM) with covariates to account for seasonality and teleconnections (e.g., with the El Niño). In general, stochastic weather generators tend to underestimate the observed interannual variance of seasonally aggregated variables. To reduce this overdispersion, we incorporated time series of seasonal dry/wet indicators in the GLM weather generator as covariates. These seasonal time series were local (or global) decodings obtained by a hidden Markov model of seasonal total precipitation and implemented in the weather generator. The proposed method is applied to time series of daily weather from Seoul, Korea and Pergamino, Argentina. This method provides a straightforward translation of the uncertainty of the seasonal forecast to the corresponding conditional daily weather statistics.

  15. Coulomb gauge model for hidden charm tetraquarks

    Science.gov (United States)

    Xie, W.; Mo, L. Q.; Wang, Ping; Cotanch, Stephen R.

    2013-08-01

    The spectrum of tetraquark states with hidden charm is studied within an effective Coulomb gauge Hamiltonian approach. Of the four independent color schemes, two are investigated, the (qcbar)1(cqbar)1 singlet-singlet (molecule) and the (qc)3(qbarcbar)3 triplet-triplet (diquark), for selected JPC states using a variational method. The predicted masses of triplet-triplet tetraquarks are roughly a GeV heavier than the singlet-singlet states. There is also an interesting flavor dependence with (qqbar)1 (ccbar1) states about half a GeV lighter than (qcbar)1(qbarc)1. The lightest 1++ and 1-- predictions are in agreement with the observed X (3872) and Y (4008) masses suggesting they are molecules with ωJ / ψ and ηhc, rather than D*Dbar* and DDbar, type structure, respectively. Similarly, the lightest isovector 1++ molecule, having a ρJ / ψ flavor composition, has mass near the recently observed charged Zc (3900) value. These flavor configurations are consistent with observed X, Y and Zc decays to ππJ / ψ.

  16. Hidden topological angles and Lefschetz thimbles

    CERN Document Server

    Behtash, Alireza; Schaefer, Thomas; Unsal, Mithat

    2015-01-01

    We demonstrate the existence of hidden topological angles (HTAs) in a large class of quantum field theories and quantum mechanical systems. HTAs are distinct from theta-parameters in the lagrangian. They arise as invariant angle associated with saddle points of the complexified path integral and their descent manifolds (Lefschetz thimbles). Physical effects of HTAs become most transparent upon analytic continuation in $n_f$ to non-integer number of flavors, reducing in the integer $n_f$ limit to a $\\mathbb Z_2$ valued phase difference between dominant saddles. In ${\\cal N}=1$ super Yang-Mills theory we demonstrate the microscopic mechanism for the vanishing of the gluon condensate. The same effect leads to an anomalously small condensate in a QCD-like $SU(N)$ gauge theory with fermions in the two-index representation. The basic phenomenon is that, contrary to folklore, the gluon condensate can receive both positive and negative contributions in a semi-classical expansion. In quantum mechanics, a HTA leads to ...

  17. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  18. Hidden Web Data Extraction Using Dynamic Rule Generation

    Directory of Open Access Journals (Sweden)

    Anuradha

    2011-08-01

    Full Text Available World Wide Web is a global information medium of interlinked hypertext documents accessed via computers connected to the internet. Most of the users rely on traditional search engines to search theinformation on the web. These search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called Hidden Web which is hidden to present-day search engines. It lies behind search forms and this part of the web containing an almost endless amount of sources providing high quality information stored in specialized databases can be found in the depths of the WWW. A large amount of this Hidden web is structured i.e Hidden websites contain the information in the form of lists and tables. However visiting dozens of these sites and analyzing the results is very much time consuming task for user. Hence, it is desirable to build a prototype which will minimize user’s effort and give him high quality information in integrated form. This paper proposes a novel method that extracts the data records from the lists and tables of various hidden web sites of same domain using dynamic rule generation and forms a repository which is used for later searching. By searching the data from this repository, user will find the desired data at one place. It reduces the user’s effort to look at various result pages of different hidden websites.

  19. Market-oriented management method of coalmine accident hidden dangers

    Institute of Scientific and Technical Information of China (English)

    LIU Zhao-xia; LI Xing-dong; LU Ying; REN Da-wei

    2007-01-01

    By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method-"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism"into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.

  20. QCD sum rule study of hidden-charm pentaquarks

    CERN Document Server

    Chen, Hua-Xing; Chen, Wei; Steele, T G; Liu, Xiang; Zhu, Shi-Lin

    2016-01-01

    We study the mass spectra of hidden-charm pentaquarks having spin $J = {1\\over2},{3\\over2},{5\\over2}$ and quark contents $uud c \\bar c$. We systematically construct all the relevant local hidden-charm pentaquark currents, and select some of them to perform QCD sum rule analyses. We find that the $P_c(4380)$ and $P_c(4450)$ can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. We also find the lowest-lying hidden-charm $J^P = 1/2^-$ pentaquark state of mass $4.33^{+0.17}_{-0.13}$ GeV, while the $J^P = 1/2^+$ mass prediction of 4.7--4.9 GeV is significantly higher. Similarly, the lowest-lying hidden-charm $J^P = 3/2^-$ pentaquark state mass is $4.37^{+0.18}_{-0.13}$ GeV, consistent with the $J^P = 3/2^-$ $P_c(4380)$, while the $J^P = 3/2^+$ is also significantly higher with a mass above 4.6 GeV. The hidden-charm $J^P = 5/2^-$ pentaquark state mass is 4.5--4.6 GeV, slightly larger than the $J^P = 5/2^+$ $P_c(4450)$.

  1. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully (bul

  2. Child Sexual Abuse and Psychological Impairment in Victims: Results of an Online Study Initiated by Victims

    Science.gov (United States)

    Schaefer, Gerard A.; Mundt, Ingrid A.; Ahlers, Christoph J.; Bahls, Christian

    2012-01-01

    Sexual abuse of children has been a topic of scientific investigation for the past few decades. Research in this area, however, is rarely initiated, conceptualized, and conducted by victims themselves. Apart from possibly having painted a one-sided picture of sexual abuse, this presumed dominance of nonvictims might also have marginalized victims…

  3. Persons with cancer diagnosis as victims/survivors: Patterns of victimization, empowering support and posttraumatic growth

    Directory of Open Access Journals (Sweden)

    Nikolić-Ristanović Vesna

    2015-01-01

    Full Text Available The paper deals with the analyses of primary and secondary victimisation patterns to which cancer diagnosed persons are exposed, as well as an analyses of their needs and the adequacy of the support they receive from persons from their close surrounding, from professionals as well as from state institutions and nongovernmental organizations. The main aim of the paper is to examine applicability of basic victimological concepts such as the notion of victim-survivor, victimization, victim needs, agency v. passivity, self help, social support, posttraumatic disorder/ growth, to the experiences of persons with cancer diagnosis. Consequently the experiences of persons with cancer diagnosis are compared with the experiences of crime victims. On the basis of this analyses, recommendations regarding the possible exchange of experiences and unification of knowledge about crime victims’ and cancer diagnosed persons’ needs, as the basis for the improvement of existing and the development of new mechanisms of support and (self help beneficial for both groups are presented. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  4. The Joint Development of Traditional Bullying and Victimization with Cyber Bullying and Victimization in Adolescence

    Science.gov (United States)

    Jose, Paul E.; Kljakovic, Moja; Scheib, Emma; Notter, Olivia

    2012-01-01

    The present study investigated the stabilities of and interrelationships among traditional (i.e., face-to-face) bullying, traditional victimhood, cyber bullying, and cyber victimhood among adolescents over time. About 1,700 adolescents aged 11-16 years at Time 1 self-reported levels of both bullying and victimization in four contexts (in school,…

  5. The Joint Development of Traditional Bullying and Victimization with Cyber Bullying and Victimization in Adolescence

    Science.gov (United States)

    Jose, Paul E.; Kljakovic, Moja; Scheib, Emma; Notter, Olivia

    2012-01-01

    The present study investigated the stabilities of and interrelationships among traditional (i.e., face-to-face) bullying, traditional victimhood, cyber bullying, and cyber victimhood among adolescents over time. About 1,700 adolescents aged 11-16 years at Time 1 self-reported levels of both bullying and victimization in four contexts (in school,…

  6. Derecho victimal y victimodogmática

    OpenAIRE

    Rodríguez Manzanera, Luis

    2012-01-01

    Este artículo fue preparado para el Encuentro Internacional en homenaje al Prof. Dr. Antonio Beristain Ipiña, celebrado en el Instituto Vasco de Criminología, en Donostia-San Sebastián, a princi- pios de noviembre de 2011. El tema general del encuentro fue “Hacia una Justicia Victimal” y, en una de sus partes se analizó el concepto de justicia victimal en el Derecho Penal. [ES] En la última década del siglo XX, proliferan en todo el mundo las disposiciones leg...

  7. National evaluation for calving ease, gestation length and birth weight by linear and threshold model methodologies.

    Science.gov (United States)

    Lee, Deukhwan; Misztal, Ignacy; Bertrand, J Keith; Rekaya, Romdhane

    2002-01-01

    Data included 393,097 calving ease, 129,520 gestation length, and 412,484 birth weight records on 412,484 Gelbvieh cattle. Additionally, pedigrees were available on 72,123 animals. Included in the models were effects of sex and age of dam, treated as fixed, as well as direct, maternal genetic and permanent environmental effects and effects of contemporary group (herd-year-season), treated as random. In all analyses, birth weight and gestation length were treated as continuous traits. Calving ease (CE) was treated either as a continuous trait in a mixed linear model (LM), or as a categorical trait in linear-threshold models (LTM). Solutions in TM obtained by empirical Bayes (TMEB) and Monte Carlo (TMMC) methodologies were compared with those by LM. Due to the computational cost, only 10,000 samples were obtained for TMMC. For calving ease, correlations between LM and TMEB were 0.86 and 0.78 for direct and maternal genetic effects, respectively. The same correlations but between TMEB and TMMC were 1.00 and 0.98, respectively. The correlations between LM and TMMC were 0.85 and 0.75, respectively. The correlations for the linear traits were above.97 between LM and TMEB but as low as 0.91 between LM and TMMC, suggesting insufficient convergence of TMMC. Computing time required was about 2 hrs, 5 hrs, and 6 days for LM, TMEB and TMMC, respectively, and memory requirements were 169, 171, and 445 megabytes, respectively. Bayesian implementation of threshold model is simple, can be extended to multiple categorical traits, and allows easy calculation of accuracies; however, computing time is prohibitively long for large models.

  8. Comparison of glottic visualisation and ease of intubation with different laryngoscope blades

    Directory of Open Access Journals (Sweden)

    Atul P Kulkarni

    2013-01-01

    Full Text Available Context: Literature suggests glottic view is better with straight blades while tracheal intubation is easier with curved blades. Aims: To compare glottic view and ease of intubation with Macintosh, Miller, McCoy blades and the Trueview® laryngoscope. Settings and Design: This prospective randomised study was undertaken in operation theatres of a 550 bedded tertiary referral cancer centre after approval from the Institutional Review Board. Methods: We compared the Macintosh, Miller, McCoy blades and the Trueview® laryngoscope for glottic visualisation and ease of tracheal intubation; in 120 patients undergoing elective cancer surgery; randomly divided into four groups. After induction of anaesthesia laryngoscopy was performed and trachea intubated. We recorded: Visualisation of glottis (Cormack Lehane grade, ease of intubation, number of attempts; need to change the blade and need for external laryngeal manipulation. Statistical Analysis: Demographic data, Mallampati classification were compared using the Chi-square test. A P<0.05 was considered significant. Results: Grade 1 view was obtained most often (87% patients with Trueview® laryngoscope. Intubation was easier (Grade 1 with Trueview® and McCoy blades (93% each. Seven patients needed two attempts; one patient in Miller group needed three attempts. No patient in McCoy and Trueview® Groups required external laryngeal manipulation. Conclusions: We found that in patients with normal airway glottis was best visualised with Miller blade and Trueview® laryngoscope however, the trachea was more easily intubated with McCoy and Macintosh blades and Trueview® laryngoscope.

  9. Cumulative t-link threshold models for the genetic analysis of calving ease scores

    Directory of Open Access Journals (Sweden)

    Tempelman Robert J

    2003-09-01

    Full Text Available Abstract In this study, a hierarchical threshold mixed model based on a cumulative t-link specification for the analysis of ordinal data or more, specifically, calving ease scores, was developed. The validation of this model and the Markov chain Monte Carlo (MCMC algorithm was carried out on simulated data from normally and t4 (i.e. a t-distribution with four degrees of freedom distributed populations using the deviance information criterion (DIC and a pseudo Bayes factor (PBF measure to validate recently proposed model choice criteria. The simulation study indicated that although inference on the degrees of freedom parameter is possible, MCMC mixing was problematic. Nevertheless, the DIC and PBF were validated to be satisfactory measures of model fit to data. A sire and maternal grandsire cumulative t-link model was applied to a calving ease dataset from 8847 Italian Piemontese first parity dams. The cumulative t-link model was shown to lead to posterior means of direct and maternal heritabilities (0.40 ± 0.06, 0.11 ± 0.04 and a direct maternal genetic correlation (-0.58 ± 0.15 that were not different from the corresponding posterior means of the heritabilities (0.42 ± 0.07, 0.14 ± 0.04 and the genetic correlation (-0.55 ± 0.14 inferred under the conventional cumulative probit link threshold model. Furthermore, the correlation (> 0.99 between posterior means of sire progeny merit from the two models suggested no meaningful rerankings. Nevertheless, the cumulative t-link model was decisively chosen as the better fitting model for this calving ease data using DIC and PBF.

  10. Genetic parameters of calving ease using sire-maternal grandsire model in Korean Holsteins

    Directory of Open Access Journals (Sweden)

    Mahboob Alam

    2017-09-01

    Full Text Available Objective Calving ease (CE is a complex reproductive trait of economic importance in dairy cattle. This study was aimed to investigate the genetic merits of CE for Holsteins in Korea. Methods A total of 297,614 field records of CE, from 2000 to 2015, from first parity Holstein heifers were recorded initially. After necessary data pruning such as age at first calving (18 to 42 mo, gestation length, and presence of sire information, final datasets for CE consisted of 147,526 and 132,080 records for service sire calving ease (SCE and daughter calving ease (DCE evaluations, respectively. The CE categories were ordered and scores ranged from CE1 to CE5 (CE1, easy; CE2, slight assistance; CE3, moderate assistance; CE4, difficult calving; CE5, extreme difficulty calving. A linear transformation of CE score was obtained on each category using Snell procedure, and a scaling factor was applied to attain the spread between 0 (CE5 and 100% (CE1. A sire-maternal grandsire model analysis was performed using ASREML 3.0 software package. Results The estimated direct heritability (h2 from SCE and DCE evaluations were 0.11±0.01 and 0.08±0.01, respectively. Maternal h2 estimates were 0.05±0.02 and 0.04±0.01 from SCE and DCE approaches, respectively. Estimates of genetic correlations between direct and maternal genetic components were −0.68±0.09 (SCE and −0.71±0.09 (DCE. The average direct genetic effect increased over time, whereas average maternal effect was low and consistent. The estimated direct predicted transmitting ability (PTA was desirable and increasing over time, but the maternal PTA was undesirable and decreasing. Conclusion The evidence on sufficient genetic variances in this study could reflect a possible selection improvement over time regarding ease of calving. It is expected that the estimated genetic parameters could be a valuable resource to formulate sire selection and breeding plans which would be directed towards the reduction of

  11. Injury incidence, reactivity and ease of handling of horses kept in groups

    DEFF Research Database (Denmark)

    Keeling, L. J.; Bøe, K. E.; Christensen, Janne Winther;

    2016-01-01

    . Injuries were recorded before mixing the horses into treatment groups, the day after mixing and four weeks later. Reactivity of horses to a moving novel object and the behaviour of a horse being removed from its group and the reactions of other group members towards this horse and the handler were...... evaluated. It was hypothesized that a more socially variable group composition has beneficial effects on behaviour, ease of handling and reducing reactivity whereas frequent changes in group composition has negative consequences, resulting in more injuries. We found that differences in treatment effects...

  12. Correlation between carbon-carbon bond length and the ease of retro Diels-Alder reaction

    Indian Academy of Sciences (India)

    Sambasivarao Kotha; Shaibal Banerjee; Mobin Shaikh

    2014-09-01

    The bond length between C8-C9 in (1′R,4′S,4a′R,8a′S)-6′,7′-dimethyl-1′,4′,4a′,8a′-tetrahydrospiro [cyclopropane-1,9′-[1,4]methanonaphthalene]-5′,8′-dione is 1.571 (2) Å and between C7-C12 is 1.567 (2) Å which are longer than the corresponding bond length for saturated bicyclic systems (1.531-1.535Å). This paper reports the correlation between bond length and the ease of retro Diels−Alder reaction.

  13. ACADEMIC MOBBING: HIDDEN HEALTH HAZARD AT WORKPLACE

    Directory of Open Access Journals (Sweden)

    KHOO SB

    2010-01-01

    Full Text Available Academic mobbing is a non-violent, sophisticated, ‘ganging up’ behaviour adopted by academicians to “wear and tear” a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are “hidden” to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to “eliminate” the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  14. Psychological processes in young bullies versus bully‐victims

    Science.gov (United States)

    Poorthuis, Astrid M. G.; Malti, Tina

    2017-01-01

    Some children who bully others are also victimized themselves (“bully‐victims”) whereas others are not victimized themselves (“bullies”). These subgroups have been shown to differ in their social functioning as early as in kindergarten. What is less clear are the motives that underlie the bullying behavior of young bullies and bully‐victims. The present study examined whether bullies have proactive motives for aggression and anticipate to feel happy after victimizing others, whereas bully‐victims have reactive motives for aggression, poor theory of mind skills, and attribute hostile intent to others. This “distinct processes hypothesis” was contrasted with the “shared processes hypothesis,” predicting that bullies and bully‐victims do not differ on these psychological processes. Children (n = 283, age 4–9) were classified as bully, bully‐victim, or noninvolved using peer‐nominations. Theory of mind, hostile intent attributions, and happy victimizer emotions were assessed using standard vignettes and false‐belief tasks; reactive and proactive motives were assessed using teacher‐reports. We tested our hypotheses using Bayesian model selection, enabling us to directly compare the distinct processes model (predicting that bullies and bully‐victims deviate from noninvolved children on different psychological processes) against the shared processes model (predicting that bullies and bully‐victims deviate from noninvolved children on all psychological processes alike). Overall, the shared processes model received more support than the distinct processes model. These results suggest that in early childhood, bullies and bully‐victims have shared, rather than distinct psychological processes underlying their bullying behavior. PMID:28181256

  15. 78 FR 64245 - AG Survey of Transitional Housing Assistance for Victims of Domestic Violence, Dating Violence...

    Science.gov (United States)

    2013-10-28

    ... Survey of Transitional Housing Assistance for Victims of Domestic Violence, Dating Violence, Stalking, or... Transitional Housing Assistance Program Grant for Victims of Domestic Violence, Dating Violence, Stalking, or... 300 Transitional Housing Assistance Program Grant for Victims of Domestic Violence, Dating...

  16. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  17. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  18. Trajectories of Intimate Partner Violence Victimization

    Directory of Open Access Journals (Sweden)

    Kevin M. Swartout

    2012-08-01

    Full Text Available Introduction: The purposes of this study were to assess the extent to which latent trajectories of female intimate partner violence (IPV victimization exist; and, if so, use negative childhood experiences to predict trajectory membership.Methods: We collected data from 1,575 women at 5 time-points regarding experiences during adolescence and their 4 years of college. We used latent class growth analysis to fit a series of personcentered, longitudinal models ranging from 1 to 5 trajectories. Once the best-fitting model was selected, we used negative childhood experience variables—sexual abuse, physical abuse, and witnessing domestic violence—to predict most-likely trajectory membership via multinomial logistic regression.Results: A 5-trajectory model best fit the data both statistically and in terms of interpretability. The trajectories across time were interpreted as low or no IPV, low to moderate IPV, moderate to low IPV, high to moderate IPV, and high and increasing IPV, respectively. Negative childhood experiences differentiated trajectory membership, somewhat, with childhood sexual abuse as a consistent predictor of membership in elevated IPV trajectories.Conclusion: Our analyses show how IPV risk changes over time and in different ways. These differential patterns of IPV suggest the need for prevention strategies tailored for women that consider victimization experiences in childhood and early adulthood. [West J Emerg Med. 2012;13(3:272–277.

  19. Fire fatality study: demographics of fire victims.

    Science.gov (United States)

    Barillo, D J; Goode, R

    1996-03-01

    Injury or death caused by fire is frequent and largely preventable. This study was undertaken to define the populations, locations, times and behaviours associated with fatal fires. Seven hundred and twenty-seven fatalities occurring within the State of New Jersey, between the years 1985 and 1991, were examined retrospectively. Most deaths were attributed to a combination of smoke inhalation and burn injury. Five hundred and seventy-four fatalities occurred in residential fires. Smoking materials were the most common source of ignition for residential fires. More than half of the fatal residential fires started between the hours of 11 p.m. and 7 a.m. Children and the elderly represented a disproportionate percentage of fire victims. Victims under the age of 11 years or over the age of 70 years constituted 22.1 per cent of the state population but 39.5 per cent of all fire fatalities. Fire-prevention efforts should target home fire safety, and should concentrate on children and the elderly. The development of fire-safe smoking materials should be encouraged.

  20. Legal aid for victims in criminal proceedings in Portugal

    OpenAIRE

    Costa Ramos, Vânia

    2014-01-01

    The following article gives an overview of legal aid for victims in criminal cases in Portugal. It addresses the issues of a victim’s access to a lawyer, when and how the right is granted (right to legal assistance), and under what circumstances the victim has a right to financial legal aid (right to financial legal aid).

  1. The criminal victimization of children and women in international perspective

    NARCIS (Netherlands)

    van Dijk, Jan; Kury, Helmut; Redo, Slawomir; Shea, Evelyn

    2016-01-01

    Abstract In this article we will present an overview of the results of the national and international crime victims surveys regarding the distribution of victimization according to age and gender with a focus on violent crime. The results show a consistent inversed relationship between age and crimi

  2. The criminal victimization of children and women in international perspective

    NARCIS (Netherlands)

    van Dijk, Jan; Kury, Helmut; Redo, Slawomir; Shea, Evelyn

    2016-01-01

    Abstract In this article we will present an overview of the results of the national and international crime victims surveys regarding the distribution of victimization according to age and gender with a focus on violent crime. The results show a consistent inversed relationship between age and

  3. Age Diversity Among Victims of Hebephilic Sexual Offenders.

    Science.gov (United States)

    Stephens, Skye; Seto, Michael C; Goodwill, Alasdair M; Cantor, James M

    2016-08-25

    Hebephilia refers to sexual interest in pubescent children who are beginning to show early signs of sexual development but are sexually immature. The present study examined the relationship between hebephilia and victim age choice in a sample of 2,238 adult male sexual offenders. On average, offenders were 39 years old at the time of their assessments, and approximately half (48%) were referred by probation or parole offices. Assessment data included self-report, sexual arousal measured by volumetric phallometry, and victims' ages. Results suggested that, similar to pedophilia, hebephilia had a medium sized association with a greater number of victims under age 11 and a small sized association with a greater number of victims ages 11 to 14. Unlike pedophilia, a small positive association was consistently found between hebephilia and a greater number of victims ages 15 or 16. Furthermore, a small positive association was observed between victim age polymorphism and hebephilia and pedophilia. The present results suggested that hebephilia was associated with a greater number of victims age 14 or younger and had similar victim age correlates to pedophiles.

  4. Close Relationships and Attributions for Peer Victimization among Late Adolescents

    Science.gov (United States)

    Chen, Xiaochen; Graham, Sandra

    2012-01-01

    This study examined the effect of close relationships (best friendship and romantic relationship) on late adolescents' casual attributions for peer victimization. A total of 1106 twelfth grade students completed self-report measures of perceived peer victimization, self-blame attribution, psychological maladjustment (loneliness and social…

  5. Siblings of Oedipus: Brothers and Sisters of Incest Victims.

    Science.gov (United States)

    de Young, Mary

    1981-01-01

    Investigates the roles and problems of siblings of incest victims, describes the dynamics of the incestuous family, and identifies some behavior problems of children whose siblings were incest victims. Data from two siblings' lives are presented to illustrate points. (Author/DB)

  6. 77 FR 25345 - National Crime Victims' Rights Week, 2012

    Science.gov (United States)

    2012-04-27

    ... rape that will shed new light on how often this crime occurs, and we continue to combat sexual violence... April 27, 2012 Part V The President Proclamation 8804--National Crime Victims' Rights Week, 2012 #0; #0... Crime Victims' Rights Week, 2012 By the President of the United States of America A Proclamation...

  7. Cyberbullying Perpetration and Victimization Among Middle-School Students

    Science.gov (United States)

    Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-01-01

    Objectives. We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. Methods. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator–victim (i.e., bidirectional cyberbullying behavior). Results. In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator–victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators–victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators–victims. Conclusions. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters. PMID:25602905

  8. Victim Confidentiality on Sexual Assault Response Teams (SART)

    Science.gov (United States)

    Cole, Jennifer

    2011-01-01

    The purpose of this study is to examine how professionals and paraprofessionals involved with a Sexual Assault Response Team (SART) understand and navigate different professional statutory requirements for victim confidentiality. Telephone surveys are conducted with 78 professionals: medical (27.8%), criminal justice (44.3%), and victim advocacy…

  9. Tracking Offenders: The Child Victim. Bureau of Justice Statistics Bulletin.

    Science.gov (United States)

    Manson, Donald A.; Sedgwick, Jeffrey L., Ed.

    This research focused on the criminal justice system's handling of offenders against children, comparing it with the processing of offenders against all victims. Data were obtained from California, New York, Ohio, Pennsylvania, Utah, and Virginia for offenses against children and against all victims in the areas of kidnapping, sexual assault,…

  10. Grooming the Victim: An Analysis of a Perpetrator's Seduction Letter.

    Science.gov (United States)

    Singer, Mark I.; And Others

    1992-01-01

    This paper reviews the literature on the sexual victimization of adolescent males, with emphasis on victim selection factors and strategies. A letter written by a middle-aged man to entice a teenage boy into sexual activity is then presented and analyzed. (DB)

  11. Characteristics of Child Sexual Abuse Victims According to Perpetrator Gender.

    Science.gov (United States)

    Rudin, Margaret M.; And Others

    1995-01-01

    Comparison of 87 child abuse victims of lone female perpetrators with 93 victims of lone male perpetrators found that female perpetrators abused children 3.3 years younger than male perpetrators. Both female and male perpetrators abused more girls than boys and did not differ in severity of abuse. (Author/DB)

  12. Sexual Assault Victims' Acknowledgment Status and Revictimization Risk

    Science.gov (United States)

    Littleton, Heather; Axsom, Danny; Grills-Taquechel, Amie

    2009-01-01

    How a victim of rape characterizes her assault has potential implications for her postassault experiences and revictimization risk. Prior research has identified several potential benefits to not conceptualizing one's experience as a form of victimization. The current study sought to identify whether there are costs to not acknowledging rape as…

  13. The Legal Duty to Incorporate Mistakes of the Victim

    NARCIS (Netherlands)

    L.T. Visscher (Louis)

    2008-01-01

    textabstractAbstract: In many jurisdictions, potential injurers are under a legal duty to incorporate possible mistakes of the potential victim. I distinguish three types of mistakes. First, victims might make mistakes because it is too costly to avoid them (e.g. little children in traffic). Second,

  14. What Actually Makes Bullying Stop? Reports from Former Victims

    Science.gov (United States)

    Frisen, Ann; Hasselblad, Tove; Holmqvist, Kristina

    2012-01-01

    School bullying is a serious, worldwide problem which is not easily counteracted. The present study focuses on the perspective of former victims, asking them what it was that made the bullying stop in their case. Participants were 273 18-year-old former victims in Sweden, a country in which schools are doing extensive work against bullying and the…

  15. 75 FR 20889 - National Crime Victims' Rights Week, 2010

    Science.gov (United States)

    2010-04-21

    .... Though crime rates have declined in recent years, crime and its devastating effects still require our... Documents#0;#0; ] Proclamation 8499 of April 16, 2010 National Crime Victims' Rights Week, 2010 By the.... This week, we renew our commitment to supporting crime victims and preventing crimes that threaten...

  16. Differences in Bullying Victimization between Students with and without Disabilities

    Science.gov (United States)

    Bear, George G.; Mantz, Lindsey S.; Glutting, Joseph J.; Yang, Chunyan; Boyer, Deborah E.

    2015-01-01

    Prevalence rates for bullying victimization among children with disabilities have varied greatly in the research literature. Two reasons for such variability were the focus of this study: (a) rates vary as a function of disability type, and (b) rates vary based on the bullying measure and criteria used to classify students as bullying victims. The…

  17. The interrelation between victimization and bullying inside young offender institutions.

    Science.gov (United States)

    Häufle, Jenny; Wolter, Daniel

    2015-01-01

    Bullying and victimization are serious problems within prisons. Young Offender Institutions (YOIs), in particular, suffer from high rates of inmate-on-inmate violence. More recent theories about the development of bullying in closed custody institutions imply a relationship between the experience of victimization and the usage of bullying. In our study, we test this linkage using longitudinal survey data taken at two time-points from 473 inmates (aged 15-24) inside three YOIs in Germany. We first analyze the extent of bullying and victimization, and then used a longitudinal structural equation model to predict inmate bullying behavior at time 2 based on victimization that occurred at time 1. Age is used as a predictor variable to account for differences in the amount of victimization and bullying. Results suggest that bullying and victimization are high in the YOIs, which were subject to research. Most inmates reported being a bully and a victim at the same time. Younger inmates use more direct physical bullying but not psychological bullying. An increase in psychological bullying over time can significantly be explained by victimization at an earlier measurement time point. Our study therefore supports recent theoretical assumptions about the development of bullying behavior. Possible implications for prevention and intervention are discussed. © 2014 Wiley Periodicals, Inc.

  18. Attachment Styles among Bullies, Victims and Uninvolved Adolescents

    Science.gov (United States)

    Koiv, Kristi

    2012-01-01

    Attachment theory provides a frame for understanding the role of attachment styles in the development of bullying behaviour in adolescence. The present study examined attachment styles (secure, avoidant and anxious/ambivalent) that differentiated bullies, victims, bully/victims and uninvolved adolescents. A total of 1,921 students (1,006 girls and…

  19. Acculturation and Dating Violence Victimization among Filipino and Samoan Youths

    Science.gov (United States)

    Chung-Do, Jane J.; Goebert, Deborah A.

    2009-01-01

    Dating violence victimization is an important public health issue. Recent studies on minority youths have found higher risks of dating violence victimization compared to White youths. This study examined the influence of acculturation components on youths' experiences of dating violence by utilizing data from a survey of 193 Samoan and Filipino…

  20. Violent online games exposure and cyberbullying/victimization among adolescents.

    Science.gov (United States)

    Lam, Lawrence T; Cheng, Zaohuo; Liu, Xinmin

    2013-03-01

    This population-based cross-sectional survey examined the association between exposure to violent online games and cyberbullying and victimization in adolescents recruited from two large cities utilizing a stratified two-stage random cluster sampling technique. Cyberbullying and victimization were assessed by the E-victimization and E-bullying scales validated in a previous study. Exposure to violent online games was measured by self-nomination of the degree of violent content in the games played. Results indicated that the majority (74.3 percent) of respondents did not experience any cyberbullying or victimization in the last 7 days before the survey, 14.4 percent reported to be victimized via cyberspace, 2.9 percent admitted that they had bullied others, and 8.4 percent reported to be both perpetrators- and- victims. One hundred and eighty seven (15.3 percent) considered games they were playing were of moderate to severe violence. Students who had been involved in cyberbullying as well as being victimized were two times as likely to have been exposed to violent online games, and nearly four times as likely for those involved in bullying others. Exposure to violent online games was associated with being a perpetrator as well as a perpetrator-and-victim of cyberbullying. Parents and clinicians need to be aware of the potential harm of these exposures. The policy implications of results were also discussed.