WorldWideScience

Sample records for hidden victims easing

  1. [Clinical and psychopathological profile of women victims of psychological partner violence].

    Science.gov (United States)

    Lamy, C; Dubois, F; Jaafari, N; Carl, T; Gaillard, P; Camus, V; El Hage, W

    2009-08-01

    Partner violence is a serious public health problem, due to their potential short-, medium- or long-term physical and psychological consequences. Violence is unbearable when it occurs between family members, and often remains unrevealed, invisible, hidden and repeated. The woman possibly feels trapped in a relationship of imprisonment. International studies have well-explored the psychopathological aspects of physical and sexual abuse within couples, but few explored the clinical profile of women victims of psychological violence or moral harassment. This study aims to define the clinical and psychopathological profile of women who are victims of psychological intimate partner violence. We contacted 628 women who consulted consecutively at the emergency ward of a university hospital covering a 300,000 catchment area. The telephone screening of psychological violence was therefore carried out using the Women's Experience with Battering (WEB) questionnaire (N=226). An optional clinical interview was given to the women declaring themselves as victims of psychological intimate partner violence (N=56) to evaluate the life events and the psychiatric disorders according to the DSM-IV. Finally, 43 participants (77%) gave their opinion on the qualitative aspects of the WEB questionnaire and their level of ease with this report. In 63% (N=35) of the cases, the victims and their partners had a rather high socioprofessional level. Women refer to emergency ward mostly for complaint of vague idiopathic pain (49%) or for psychiatric disorders (52%) with predominance of anxiety (28%) or addictive disorders (19%). The prevalence of potentially traumatic life events was found to be high in this group (83%). The traumatic psychological intimate partner violence was associated with a heightened prevalence of psychiatric comorbidities, like anxiety (72%), depression (100%), posttraumatic stress disorder (100%), and addiction to alcohol (100%) or another psychoactive substance (50

  2. Child and Youth Victimization Known to Police, School, and Medical Authorities. National Survey of Children's Exposure to Violence. Juvenile Justice Bulletin

    Science.gov (United States)

    Finkelhor, David; Ormrod, Richard; Turner, Heather; Hamby, Sherry

    2012-01-01

    Considerable efforts have been made during the last generation to encourage children and their families to report victimization to authorities. Nonetheless, concern persists that most childhood victimization remains hidden. The 2008 inventory of childhood victimization--the National Study of Children's Exposure to Violence (NatSCEV)--allowed an…

  3. 76 FR 20827 - National Crime Victims' Rights Week, 2011

    Science.gov (United States)

    2011-04-13

    ... victims of crime each year. For many citizens, a sense of security remains painfully elusive, and we must... survivors. We have shined a light on hidden crimes like cyberbullying, online child sexual exploitation, and... working to prevent and prosecute financial crimes. My Administration's Financial Fraud Enforcement Task...

  4. Hidden-Markov-Model Analysis Of Telemanipulator Data

    Science.gov (United States)

    Hannaford, Blake; Lee, Paul

    1991-01-01

    Mathematical model and procedure based on hidden-Markov-model concept undergoing development for use in analysis and prediction of outputs of force and torque sensors of telerobotic manipulators. In model, overall task broken down into subgoals, and transition probabilities encode ease with which operator completes each subgoal. Process portion of model encodes task-sequence/subgoal structure, and probability-density functions for forces and torques associated with each state of manipulation encode sensor signals that one expects to observe at subgoal. Parameters of model constructed from engineering knowledge of task.

  5. Implementation of safety signage to ease transportation system in disaster prone area

    Science.gov (United States)

    Vikneswaran, M.; Raffiee, Rabiatul Adawiyah Ahmad; Yusof, Mohammed Alias; Yahya, Muhamad Azani; Subramaniam, S. Ananthan; Loong, Wong Wai; Othman, Maidiana; Galerial, Jessica

    2018-02-01

    The research is conducted to study the exact need of the signage at disaster prone area. The smart signage is needed to increase the safety, reduce the search and rescue time and finally will ease the help to arrive at the relieve center in any condition at any time without interruption. Signage implementation for disaster relief centers is still a foreign matter in Malaysia. The level of preparedness to the natural disaster mainly flood among our citizens is inadequate. Here the signage which usually used as a tool to help and protect the health and safety of the road users, employees and work place visitors. For many years, the signage has played its part miraculously to provide vivid information to the users in whatever condition. The signage also could be used as an indicator or information provider for the natural disaster victims to move to a safer place on time. Sometimes, the victims would not have sufficient time to safe themselves due to lack of information and time. Thus, it can be concluded that the signage at disaster prone area is vital.

  6. To Not Only Being Victims

    Directory of Open Access Journals (Sweden)

    Stefania Fantauzzi

    2017-11-01

    Full Text Available Hannah Arendt is against the idea that Jews were only the victims of history. Starting from the idea that the Age of Enlightenment and the Jewish emancipation put the Jewish tradition and history in crisis, she is adamant that this same history is not only full of suffering, but includes  a hidden tradition of activism that is important to uncover and to claim. The aim of these pages is to analyse the Arendtian thinking of the 30s and 40s in order to show some elements that can help us to understand what the loss of humanity means today and to indicate the possibilities of claiming and recovering it.

  7. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  8. Expert ease

    Energy Technology Data Exchange (ETDEWEB)

    1984-04-01

    Expert-ease allows the most inexperienced of computer users to build an expert system in a matter of hours. It is nothing more or less than a computer based problem-solving system. It allows the expert to preserve his or her knowledge in the form of rules, which can be applied to problems put to the system by the non-expert. The crucial piece of software at the heart of Expert-Ease extracts rules from data, and is called the analogue concept learning system. It was developed by Intelligent Terminals Ltd. and supplied to Export Software International to be incorporated into a commercially attractive package for business users. The resulting product runs on the Act Sirius and the IBM PC and compatibles. It is a well conceived and polished product with a popular appeal that should ensure widespread acceptance even at a cost of >1500 plus vat.

  9. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  10. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  11. Mean ages of homicide victims and victims of homicide-suicide.

    Science.gov (United States)

    Bridges, F Stephen; Tankersley, William B

    2010-02-01

    Using Riedel and Zahn's 1994 reformatted version of an FBI database, the mean age of homicide victims in 2,175 homicide-suicides (4,350 deaths) was compared with that of all other victims of homicides reported for the USA from 1968 to 1975. The overall mean age of homicide victims in homicide-suicides was 1 yr. greater than for victims of homicides not followed by suicides, whereas the mean age for both male and female homicide-suicide victims was, respectively, 3 yr. less and greater than the other homicide victims. The mean age of Black homicide victims of homicide-suicides was 2.4 yr. less than that for Black victims of other homicides, whereas the means for Black and White male homicide victims in homicide-suicides were, respectively, about 4 and 5 yr. less than for victims of other homicides. Also, the mean age of White female homicide victims in homicide-suicides was more than two years greater than for female victims of homicides not followed by suicides. When both sex and race were considered, the mean age for those killed in homicide-suicides relative to those killed in homicides not followed by suicides may represent subpopulations with different mean ages of victims.

  12. "Guess What?": On Hidden-Camera Pranks' Revelation Sequences

    Directory of Open Access Journals (Sweden)

    A. Javier Izquierdo-Martín

    2004-05-01

    Full Text Available Conceived as public communication objects, hidden-camera pranks (HCPs are a type of documentary on ordinary pranks. Defined versus classical Garfinkelian breaching experiments, HCPs also offer a natural form of ethnomethodological experimentation. Here I present some results of an analysis of a sample of forty-nine HCPs' revelation sequences (RSs. These little clips of five to fifty seconds long allow for the description of audio-visual details of the interactional work that actors, accomplices and victims of a HCP have to perform, in a finely coordinated manner in order "to put an end" to an artificially constructed social situation. My study focuses on a set of practical relevances of the work of revelation (offering and awakening (acceptation/rejection endogenously pointed at and topicalized by the agents enmeshed in the HCP situation. URN: urn:nbn:de:0114-fqs0402126

  13. Men as victims: "victim" identities, gay identities, and masculinities.

    Science.gov (United States)

    Dunn, Peter

    2012-11-01

    The impact and meanings of homophobic violence on gay men's identities are explored with a particular focus on their identities as men and as gay men. Homosexuality can pose a challenge to conventional masculinities, and for some gay men, being victimized on account of sexual orientation reawakens conflicts about their masculinity that they thought they had resolved. Being victimized can reinvoke shame that is rooted in failure or unwillingness to uphold masculine norms. For some gay men, victimization therefore has connotations of nonmasculinity that make being a victim an undesirable status, yet that status must be claimed to obtain a response from criminal justice or victim services. Men who experience homophobic abuse are helped by accepting a victim identity, but only if they can quickly move on from it by reconstructing a masculine gay (nonvictim) identity. This process can be facilitated by agencies such as the police and victim services, provided they help men exercise agency in "fighting back," that is, resisting further victimization and recovering.

  14. Predicting Rape Victim Empathy Based on Rape Victimization and Acknowledgment Labeling.

    Science.gov (United States)

    Osman, Suzanne L

    2016-06-01

    Two studies examined rape victim empathy based on personal rape victimization and acknowledgment labeling. Female undergraduates (Study 1, n = 267; Study 2, n = 381) from a Northeast U.S. midsize public university completed the Rape-Victim Empathy Scale and Sexual Experiences Survey. As predicted, both studies found that acknowledged "rape" victims reported greater empathy than unacknowledged victims and nonvictims. Unexpectedly, these latter two groups did not differ. Study 1 also found that acknowledged "rape" victims reported greater empathy than victims who acknowledged being "sexually victimized." Findings suggest that being raped and acknowledging "rape" together may facilitate rape victim empathy. © The Author(s) 2015.

  15. Quantifying the Ease of Scientific Discovery.

    Science.gov (United States)

    Arbesman, Samuel

    2011-02-01

    It has long been known that scientific output proceeds on an exponential increase, or more properly, a logistic growth curve. The interplay between effort and discovery is clear, and the nature of the functional form has been thought to be due to many changes in the scientific process over time. Here I show a quantitative method for examining the ease of scientific progress, another necessary component in understanding scientific discovery. Using examples from three different scientific disciplines - mammalian species, chemical elements, and minor planets - I find the ease of discovery to conform to an exponential decay. In addition, I show how the pace of scientific discovery can be best understood as the outcome of both scientific output and ease of discovery. A quantitative study of the ease of scientific discovery in the aggregate, such as done here, has the potential to provide a great deal of insight into both the nature of future discoveries and the technical processes behind discoveries in science.

  16. Immigrants as crime victims: Experiences of personal nonfatal victimization.

    Science.gov (United States)

    Wheeler, Krista; Zhao, Weiyan; Kelleher, Kelly; Stallones, Lorann; Xiang, Huiyun

    2010-04-01

    Immigrants to the United States are disproportionately victims of homicide mortality in and outside the workplace. Examining their experiences with nonfatal victimization may be helpful in understanding immigrant vulnerability to violence. We compared the annual prevalence of nonfatal personal victimization experienced by immigrant and US-born adults by sociodemographics, employment, occupation, industry, smoking, alcohol and drug use using data from Wave 1 National Epidemiologic Survey on Alcohol and Related Conditions. The prevalence of victimization among immigrants was comparable to that among US-born adults [3.84% (95% CI: 3.18-4.63) vs. 4.10% (95% CI: 3.77-4.44)]. Lower percentages of victimization experienced by immigrants were seen among the unmarried, those age 30-44 years, and among residents of central city areas as compared to those groups among the US-born. For immigrants entering the US as youth, the victimization prevalence declines with greater years of residency in US. Multivariate logistic regression models suggest that, the odds of victimization was significantly associated with age, family income, marital status, central city residency, smoking, and drug use while employment status was not a significant factor. Immigrant workers with farming/forestry occupations might face a higher risk of being victims of violence than their US-born counterparts. The prevalence of victimization among immigrants was comparable to that among US-born adults. Employment status and industry/occupation overall were not significant risk factors for becoming victims of violence. (c) 2010 Wiley-Liss, Inc.

  17. Prayer and the Registered Nurse (PRN): nurses' reports of ease and dis-ease with patient-initiated prayer request.

    Science.gov (United States)

    Minton, Mary E; Isaacson, Mary; Banik, Deborah

    2016-09-01

    To explore nurse comfort with patient-initiated prayer request scenarios. Spiritual care is fundamental to patient care evidenced by Joint Commission requirement of a spiritual assessment on a patient's hospital admission. Prayer is an assessment component. Patients may seek solace and support by requesting prayer from the bedside nurse, the nurse may lack confidence in responding. Absent in the literature are reports specific to nurses' comfort when patients initiate prayer requests. Cross-sectional mixed methods study. Data were collected in early 2014 from 134 nurses in the USA via an online survey using QuestionPro. The qualitative results reported here were collated by scenario and analysed using thematic analysis. The scenario responses revealed patterns of ease and dis-ease in response to patient requests for prayer. The pattern of ease of prayer with patients revealed three themes: open to voice of calm or silence; physical or spiritual; can I call the chaplain. For these nurses, prayer is a natural component of nursing care, as the majority of responses to all scenarios demonstrated an overwhelming ease in response and capacity to pray with patients on request. The pattern of dis-ease of prayer with patients distinguished two themes: cautious hesitancy and whose God. These nurses experienced dis-ease with the patient's request no matter the situation. Educators and administrators must nurture opportunities for students and nurses to learn about and engage in the reflective preparation needed to respond to patient prayer requests. © 2016 John Wiley & Sons Ltd.

  18. Childhood Victimization and Crime Victimization

    Science.gov (United States)

    McIntyre, Jared Kean; Widom, Cathy Spatz

    2011-01-01

    The purpose of this study is to determine whether abused and neglected children are at increased risk for subsequent crime victimization. We ask four basic questions: (a) Does a history of child abuse/neglect increase one's risk of physical, sexual, and property crime victimization? (b) Do lifestyle characteristics (prostitution, running away,…

  19. Extending Quantitative Easing

    DEFF Research Database (Denmark)

    Hallett, Andrew Hughes; Fiedler, Salomon; Kooths, Stefan

    The notes in this compilation address the pros and cons associated with the extension of ECB quantitative easing programme of asset purchases. The notes have been requested by the Committee on Economic and Monetary Affairs as an input for the February 2017 session of the Monetary Dialogue....

  20. An Ecological Approach Toward Prevention and Care of Victims of Domestic Minor Sex Trafficking.

    Science.gov (United States)

    Sanchez, Rosario V; Pacquiao, Dula F

    Sex trafficking is a widespread form of human trafficking that exists globally. The forced sexual exploitation of young women for profit at the hands of traffickers is a human rights violation. Sex trafficking is a form of modern-day slavery where youths are sold as a commodity. It is difficult to determine the wide range of negative health outcomes associated with domestic minor sex trafficking due to the hidden nature of the crime and its lack of statistical data to determine prevalence. Viewing domestic minor sex trafficking through an ecological lens assists in the understanding of the multiple complex interactions between victims, their relationships, and environments that influence their health. Forensic nurses are poised as experts in the healthcare of vulnerable populations and possess the knowledge to understand that social determinants of vulnerability depend on the distinct setting or environment where victims of sex trafficking reside and how different factors affect their victimology, resilience, and well-being.

  1. Reaching out to Ebola victims: Coercion, persuasion or an appeal for self-sacrifice?

    Science.gov (United States)

    Calain, Philippe; Poncin, Marc

    2015-12-01

    The 2014-2015 Ebola crisis in West Africa has highlighted the practical limits of upholding human rights and common ethical principles when applying emergency public-health measures. The role of medical teams in the implementation of quarantine and isolation has been equivocal, particularly when such measures are opposed by communities who are coerced by the temporary suspension of civil liberties. In their encounters with Ebola victims, outreach teams face moral dilemmas, where the boundaries are unclear between coercion, persuasion and appeals for self-sacrifice. For those teams, we propose a set of practical recommendations aimed at respecting the autonomy of epidemic victims and easing tensions within communities. We recognize that some of these recommendations are progressively achievable, depending on the specific stage or setting of an outbreak. Yet with the increasing availability of experimental treatments and research interventions, weighing patients' autonomy against the common good will become an even more pressing ethical obligation. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  2. Moral reasoning and emotion attributions of adolescent bullies, victims, and bully-victims.

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-11-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents aged 12-18 (57% females) reported the frequency of involvement in bullying and victimization. Participants were categorized as bullies (14.3%), bully-victims (3.9%), and victims (9.7%). Moral judgment, moral justifications, and emotion attributions to a hypothetical perpetrator of a moral transgression (relational aggression) were assessed. Bullies showed more morally disengaged reasoning than non-involved students. Bully-victims more frequently indicated that violating moral rules is right. Victims produced more victim-oriented justifications (i.e., more empathy) but fewer moral rules. Among victims, the frequency of morally responsible justifications decreased and the frequency of deviant rules increased with age. The findings are discussed from an integrative moral developmental perspective. ©2011 The British Psychological Society.

  3. Victimization experiences and adolescent substance use: does the type and degree of victimization matter?

    Science.gov (United States)

    Pinchevsky, Gillian M; Fagan, Abigail A; Wright, Emily M

    2014-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only assess these relationships in the short-term using cross-sectional data. This study uses data from the Project on Human Development in Chicago Neighborhoods (PHDCN) to explore the impact of experiencing only indirect victimization, only direct victimization, both forms of victimization, and no victimization on substance use at two time points during adolescence. We find that of those adolescents who are victimized, the majority experience indirect victimization only, followed by experiencing both forms of victimization, and experiencing direct victimization only. Each of the victimization experiences were associated with increased contemporaneous substance use, with the strongest effects for those experiencing multiple forms of violence. For all victims, however, the impact on substance use declined over time.

  4. OptEase and TrapEase Vena Cava Filters: A Single-Center Experience in 258 Patients

    International Nuclear Information System (INIS)

    Onat, Levent; Ganiyusufoglu, Ali Kursat; Mutlu, Ayhan; Sirvanci, Mustafa; Duran, Cihan; Ulusoy, Onur Levent; Hamzaoglu, Azmi

    2009-01-01

    We aimed to evaluate the efficacy and safety of the OptEase and TrapEase (both from Cordis, Roden, Netherlands) vena cava filters in the prevention of pulmonary embolism (PE). Between May 2004 and December 2008, OptEase (permanent/retrievable; n = 228) or TrapEase (permanent; n = 30) vena cava filters were placed in 258 patients (160 female and 98 male; mean age 62 years [range 22 to 97]). Indications were as follows: prophylaxis for PE (n = 239), contraindication for anticoagulation in the presence of PE or DVT (n = 10), and development of PE or DVT despite anticoagulation (n = 9). Medical records were retrospectively reviewed for indications, clinical results, and procedure-related complications during placement and retrieval. Clinical PE did not develop in any of the patients. However, radiologic signs of segmental PE were seen in 6 of 66 patients with follow-up imaging data. Migration or fracture of the filter or cava perforation was not seen in any of the patients. Except for a single case of asymptomatic total cava thrombosis, no thrombotic occlusion was observed. One hundred forty-one patients were scheduled to undergo filter removal; however, 17 of them were not suitable for such based on venography evaluation. Removal was attempted in 124 patients and was successful in 115 of these (mean duration of retention 11 days [range 4 to 23]). Nine filters could not be removed. Permanent/retrievable vena cava filters are safe and effective devices for PE prophylaxis and for the management of venous thromboembolism by providing the option to be left in place.

  5. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  6. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  7. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  8. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  9. Victimization Experiences and the Stabilization of Victim Sensitivity

    Directory of Open Access Journals (Sweden)

    Mario eGollwitzer

    2015-04-01

    Full Text Available People reliably differ in the extent to which they are sensitive to being victimized by others. Importantly, victim sensitivity predicts how people behave in social dilemma situations: Victim-sensitive individuals are less likely to trust others and more likely to behave uncooperatively - especially in socially uncertain situations. This pattern can be explained with the Sensitivity to Mean Intentions (SeMI model, according to which victim sensitivity entails a specific and asymmetric sensitivity to contextual cues that are associated with untrustworthiness. Recent research is largely in line with the model’s prediction, but some issues have remained conceptually unresolved so far. For instance, it is unclear why and how victim sensitivity becomes a stable trait and which developmental and cognitive processes are involved in such stabilization. In the present article, we will discuss the psychological processes that contribute to a stabilization of victim sensitivity within persons, both across the life span (ontogenetic stabilization and across social situations (actual-genetic stabilization. Our theoretical framework starts from the assumption that experiences of being exploited threaten a basic need, the need to trust. This need is so fundamental that experiences that threaten it receive a considerable amount of attention and trigger strong affective reactions. Associative learning processes can then explain (a how certain contextual cues (e.g., facial expressions become conditioned stimuli that elicit equally strong responses, (b why these contextual untrustworthiness cues receive much more attention than, for instance, trustworthiness cues, and (c how these cues shape spontaneous social expectations (regarding other people’s intentions. Finally, avoidance learning can explain why these cognitive processes gradually stabilize and become a trait: the trait which is referred to as victim sensitivity.

  10. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  11. EASE: Examination of Anomalous Self-Experience

    Directory of Open Access Journals (Sweden)

    Parnas Josef

    2017-09-01

    Full Text Available Skala EASE jest listą objawów do częściowo ustrukturalizowanego fenomenologicznego badania subiektywnych lub empirycznych nieprawidłowości (anomalii, które można uznać za zaburzenia podstawowej, „minimalnej” samoświadomości. EASE opracowana została na podstawie samoopisów otrzymanych od pacjentów chorujących na zaburzenia ze spektrum schizofrenii. Skala ma duże znaczenie dla opisu, diagnozy oraz diagnozy różnicowej zaburzeń ze spektrum schizofrenii. Prezentowana wersja zawiera istotne szczegółowe kwestie dotyczące zbierania wywiadu oraz opisy objawów psychopatologicznych (Podręcznik, arkusz wyników (Aneks A, listę pozostałych pozycji Skali stosowanych w czasie wywiadu (Aneks B oraz porównawczą listę pozycji EASE/BSABS (Bonner Skala für die Beurteilung von Basissymptomen, Bońska Skala do Oceny Objawów Podstawowych (Aneks C.

  12. Bullies, Victims, and Bully/Victims: Distinct Groups of At-Risk Youth.

    Science.gov (United States)

    Haynie, Denise L.; Nasel, Tonja; Eitel, Patricia; Crump, Aria Davis; Saylor, Keith; Yu, Kai; Simons-Morton, Bruce

    2001-01-01

    Surveyed middle school students on incidents of bullying and victimization. Found that psychosocial and behavioral predictors such as problem behaviors, attitudes toward deviance, peer influences, depressive symptoms, school-related functioning, and parenting linearly separated never bullied or victimized students from the victim group, from the…

  13. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  14. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  15. Psychosocial profile of bullies, victims, and bully-victims: A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Marie eLeiner

    2014-01-01

    Full Text Available While adverse conditions in a child’s life do not excuse inappropriate behavior, they may cause emotional and behavioral problems that require treatment as a preventive measure to reduce the likelihood of bullying. We aimed to identify differences in the psychosocial profiles of adolescents who classified themselves as bullies, victims, or bully-victims. We performed a cross-sectional study in which data were collected between January 2009 and January 2010 from seven university-based clinics in a large metropolitan area with a predominantly Mexican-American population. We collected data on physical aggression among adolescents who self-categorized into the following groups: uninvolved, bullies, victims, and bully-victims. We determined the psychosocial profiles of the adolescents based on responses to the Youth Self Report (YSR and parent’s responses to the Child Behavior Checklist (CBCL. A one-way analysis of variance and multivariate regression analyses were performed to compare the various components of the psychosocial profiles among the groups. Our analysis of the CBCL and the YSR assessments identified differences between the uninvolved group and one or more of the other groups. No significant differences were observed among the bully, victim, and bully-victim groups based on the CBCL. We did find significant differences among those groups based on the YSR, however. Our results suggest that emotional and behavioral problems exist among bullies, victims, and bully-victims. Therefore, treatment should not focus only on the victims of bullying; treatment is equally important for the other groups (bullies and bully-victims. Failure to adequately treat the underlying problems experienced by all three groups of individuals could allow the problems of bullying to continue.

  16. Child victims and poly-victims in China: are they more at-risk of family violence?

    Science.gov (United States)

    Chan, Ko Ling

    2014-11-01

    Multiple forms of violence may co-occur on a child. These may include various forms of child victimization and different types of family violence. However, evidence that child victims are more likely to witness other types of family violence has been lacking in China. Using data of a large and diverse sample of children recruited from 6 regions in China during 2009 and 2010 (N=18,341; 47% girls; mean age=15.9 years), the associations between child victimization and family violence witnessed were examined. Descriptive statistics and the associations between child victimization, demographic characteristics, and family violence witnessed were analyzed. Lifetime and preceding-year rates were 71.7% and 60.0% for any form of child victimization and 14.0% and 9.2% for poly-victimization (having four or more types of victimization), respectively. Family disadvantages (i.e., lower socio-economic status, single parents, and having more than one child in the family) were associated with child victimization and poly-victimization. Witnessing of parental intimate partner violence, elder abuse, and in-law conflict also increased the likelihood of child victimization and poly-victimization, even after the adjustment of demographic factors. Possible mechanisms for the links between family violence and child victimization are discussed. The current findings indicated the need for focusing on the whole family rather than the victim only. For example, screening for different types of family violence when child victims are identified may help early detection of other victims within the family. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  18. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  19. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  20. Difficult OptEase Filter Retrievals After Prolonged Indwelling Times

    Energy Technology Data Exchange (ETDEWEB)

    Van Ha, Thuong G., E-mail: tgvanha@radiology.bsd.uchicago.edu; Kang, Lisa; Lorenz, Jonathan; Zangan, Steven; Navuluri, Rakesh; Straus, Christopher; Funaki, Brian [University of Chicago, Section of Interventional Radiology, Department of Radiology (United States)

    2013-08-01

    PurposeThe OptEase vena cave filter (Cordis, Piscataway, NJ) is commercially available as a retrievable or permanent filter with short recommended indwelling time, presumably due to extensive contact of the filter side struts with the inferior vena cava wall and subsequent neointimal hyperplasia leading to incorporation. Our purpose was to evaluate OptEase filter retrievals with a long indwelling time period that required unconventional retrieval techniques.Materials and MethodsWe retrospectively reviewed patients who underwent OptEase filter retrieval with long undwelling times requiring additional maneuvers for retrieval. Techniques used included rigid endobronchial forceps dissection and wire-through-loop snare. Each patient underwent postretrieval venogram to evaluate for possible complications. In addition, patients had clinical follow-up 2 weeks after the retrieval procedure.ResultsThere were three patients (2 women, 1 man; average age 64 years) who underwent OptEase filter retrieval. The mean indwelling time was 6.4 months. The indwelling filters were successfully retrieved. There were no complications. Postprocedural follow-up showed no clinical pathology.ConclusionUnconventional techniques aided in the retrieval of OptEase filters with long indwelling times.

  1. Difficult OptEase Filter Retrievals After Prolonged Indwelling Times

    International Nuclear Information System (INIS)

    Van Ha, Thuong G.; Kang, Lisa; Lorenz, Jonathan; Zangan, Steven; Navuluri, Rakesh; Straus, Christopher; Funaki, Brian

    2013-01-01

    PurposeThe OptEase vena cave filter (Cordis, Piscataway, NJ) is commercially available as a retrievable or permanent filter with short recommended indwelling time, presumably due to extensive contact of the filter side struts with the inferior vena cava wall and subsequent neointimal hyperplasia leading to incorporation. Our purpose was to evaluate OptEase filter retrievals with a long indwelling time period that required unconventional retrieval techniques.Materials and MethodsWe retrospectively reviewed patients who underwent OptEase filter retrieval with long undwelling times requiring additional maneuvers for retrieval. Techniques used included rigid endobronchial forceps dissection and wire-through-loop snare. Each patient underwent postretrieval venogram to evaluate for possible complications. In addition, patients had clinical follow-up 2 weeks after the retrieval procedure.ResultsThere were three patients (2 women, 1 man; average age 64 years) who underwent OptEase filter retrieval. The mean indwelling time was 6.4 months. The indwelling filters were successfully retrieved. There were no complications. Postprocedural follow-up showed no clinical pathology.ConclusionUnconventional techniques aided in the retrieval of OptEase filters with long indwelling times

  2. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  3. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  4. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  5. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  6. Victimization Experiences and Adolescent Substance Use: Does the Type and Degree of Victimization Matter?

    OpenAIRE

    Pinchevsky, Gillian M.; Fagan, Abigail A.; Wright, Emily M.

    2013-01-01

    Evidence indicates an association between victimization and adolescent substance use, but the exact nature of this relationship remains unclear. Some research focuses solely on the consequences of experiencing indirect victimization (e.g., witnessing violence), others examine direct victimization (e.g., being personally victimized), and still others combine both forms of victimization without assessing the relative impact of each on substance use. Furthermore, many of these studies only asses...

  7. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  8. Understanding victimization

    DEFF Research Database (Denmark)

    Barslund, Mikkel Christoffer; Rand, John; Tarp, Finn

    2007-01-01

    This paper analyzes how economic and non-economic characteristics at the individual, household, and community level affect the risk of victimization in Mozambique. We use a countrywide representative household survey from Mozambique with unique individual level information and show...... that the probability of being victimized is increasing in income, but at a diminishing rate. The effect of income is dependent on the type of crime, and poorer households are vulnerable. While less at risk of victimization, they suffer relatively greater losses when such shocks occur. Lower inequality and increased...... community level employment emerge as effective avenues to less crime...

  9. Reporting Crime Victimizations to the Police and the Incidence of Future Victimizations: A Longitudinal Study.

    Science.gov (United States)

    Ranapurwala, Shabbar I; Berg, Mark T; Casteel, Carri

    2016-01-01

    Law enforcement depends on cooperation from the public and crime victims to protect citizens and maintain public safety; however, many crimes are not reported to police because of fear of repercussions or because the crime is considered trivial. It is unclear how police reporting affects the incidence of future victimization. To evaluate the association between reporting victimization to police and incident future victimization. We conducted a retrospective cohort study using National Crime Victimization Survey 2008-2012 data. Participants were 12+ years old household members who may or may not be victimized, were followed biannually for 3 years, and who completed at least one follow-up survey after their first reported victimization between 2008 and 2012. Crude and adjusted generalized linear mixed regression for survey data with Poisson link were used to compare rates of future victimization. Out of 18,657 eligible participants, 41% participants reported to their initial victimization to police and had a future victimization rate of 42.8/100 person-years (PY) (95% CI: 40.7, 44.8). The future victimization rate of those who did not report to the police (59%) was 55.0/100 PY (95% CI: 53.0, 57.0). The adjusted rate ratio comparing police reporting to not reporting was 0.78 (95%CI: 0.72, 0.84) for all future victimizations, 0.80 (95% CI: 0.72, 0.90) for interpersonal violence, 0.73 (95% CI: 0.68, 0.78) for thefts, and 0.95 (95% CI: 0.84, 1.07) for burglaries. Reporting victimization to police is associated with fewer future victimization, underscoring the importance of police reporting in crime prevention. This association may be attributed to police action and victim services provisions resulting from reporting.

  10. Victim-induced criminality.

    Science.gov (United States)

    Fooner, M

    1966-09-02

    In summary, there are certain issues that need to be dealt with if a coherent system of victim compensation is to be created. 1) Is the victim's entitlement to compensation qualified by his behavior in connection with the crime? If a Texas tycoon visits a clip joint, flashes a fat roll of bills, and gets hit on the head and rolled, is he entitled to compensation? If a man enters into a liaison with another's wife and gets shot by the husband, should his dependents be compensated? If a woman goes walking alone in a disreputable neighborhood and is assaulted, is she entitled to compensation? Unless the answer to such questions is a flat "yes," the adjudication of victim compensation as a "right" would be embarkation upon a vast sea of confusion. On the surface it may seem simpler to bypass the issue of "right" and declare for victim compensation as a matter of social policy-a logical extension of the welfare state approach. But the apparent simplicity may quickly prove illusory, in light of the second issue. 2) Is the victim's entitlement to compensation on the basis of indigency to be qualified by the requirement that an offender be apprehended and his guilt determined by a court? There are two levels to this problem. First, if a severely injured man reports to police that he has been mugged and robbed and if the police cannot apprehend a suspect, how is the administrator of compensation to know that the man is in fact the victim of a crime? The administrator of compensation must determine whether the episode was a criminal act or an argument-and who started it, and who precipitated the violence. What shall be the role of the witnesses, and of investigators? More important is the second level of the problem: How will law-enforcement of ficials and the courts evaluate the testimony of the victim if compensation of the victim may be at stake? In the evaluation of proposals for victim compensation, criminologists may need to think very hard about such questions and

  11. Moral Reasoning and Emotion Attributions of Adolescent Bullies, Victims, and Bully-Victims

    Science.gov (United States)

    Perren, Sonja; Gutzwiller-Helfenfinger, Eveline; Malti, Tina; Hymel, Shelley

    2012-01-01

    This study investigated different facets of moral development in bullies, victims, and bully-victims among Swiss adolescents. Extending previous research, we focused on both bullying and victimization in relation to adolescents' morally disengaged and morally responsible reasoning as well as moral emotion attributions. A total of 516 adolescents…

  12. Digital poly-victimization: The increasing importance of online crime and harassment to the burden of victimization.

    Science.gov (United States)

    Hamby, Sherry; Blount, Zach; Smith, Alli; Jones, Lisa; Mitchell, Kimberly; Taylor, Elizabeth

    2018-01-01

    Many forms of victimization, including bullying and property crime, are increasingly moving online, but most studies of poly-victimization still primarily focus on in-person crime and violence. Few studies have examined the importance of incorporating technology-based victimizations for assessing the true burden of violence. The purpose of this study is to explore whether digital poly-victimization contributes to post-traumatic stress and anxiety/dysphoria symptoms after controlling for in-person poly-victimization. Given that technology use and technology-based victimization are changing rapidly, a mixed methods approach was adopted. In the first two phases, focus groups and cognitive interviews (89 total participants) were used to identify the range of digital victimization and develop the Digital Poly-Victimization Scale. In the third phase, the new measure was included in a community survey (n = 478, 57.5% female; 62.6% earning under $50,000 per year) in a rural Southern region, along with measures of in-person poly-victimization, posttraumatic stress and anxiety/dysphoria symptoms, and other outcomes and personal characteristics. A comprehensive measure of digital poly-victimization indicated that almost 3 in 4 participants (72.3%) had experienced at least one form of digital victimization. The results indicated that digital poly-victimization contributed unique variance to post-traumatic stress and anxiety/dysphoria symptoms (p Digital victimization often presents fewer risks to perpetrators and can be expected to represent an increasing share of the societal burden of violence. Future research on poly-victimization should pay more attention to the role of digital victimization.

  13. A victim-centered approach to justice? Victim satisfaction effects on third-party punishments.

    Science.gov (United States)

    Gromet, Dena M; Okimoto, Tyler G; Wenzel, Michael; Darley, John M

    2012-10-01

    Three studies investigated whether victims' satisfaction with a restorative justice process influenced third-party assignments of punishment. Participants evaluated criminal offenses and victims' reactions to an initial restorative justice conference, and were later asked to indicate their support for additional punishment of the offender. Across the three studies, we found that victim satisfaction (relative to dissatisfaction) attenuates people's desire to seek offender punishment, regardless of offense severity (Study 2) or conflicting reports from a third-party observer (Study 3). This relationship was explained by the informational value of victim satisfaction: Participants inferred that victims felt closure and that offenders experienced value reform, both of which elevated participants' satisfaction with the restorative justice outcome. The informational value communicated by victim satisfaction, and its criminal justice implications, are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  14. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  15. Easing access for lifelong learners

    DEFF Research Database (Denmark)

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina

    2015-01-01

    developmental stages. This article maps the development in Denmark, Finland, Germany and England using a case study approach deploying data triangulation from a national and institutional perspective. It explores the extent/commonality of structural factors for easing access for students engaging in lifelong...

  16. When and Why We See Victims as Responsible: The Impact of Ideology on Attitudes Toward Victims.

    Science.gov (United States)

    Niemi, Laura; Young, Liane

    2016-09-01

    Why do victims sometimes receive sympathy for their suffering and at other times scorn and blame? Here we show a powerful role for moral values in attitudes toward victims. We measured moral values associated with unconditionally prohibiting harm ("individualizing values") versus moral values associated with prohibiting behavior that destabilizes groups and relationships ("binding values": loyalty, obedience to authority, and purity). Increased endorsement of binding values predicted increased ratings of victims as contaminated (Studies 1-4); increased blame and responsibility attributed to victims, increased perceptions of victims' (versus perpetrators') behaviors as contributing to the outcome, and decreased focus on perpetrators (Studies 2-3). Patterns persisted controlling for politics, just world beliefs, and right-wing authoritarianism. Experimentally manipulating linguistic focus off of victims and onto perpetrators reduced victim blame. Both binding values and focus modulated victim blame through victim responsibility attributions. Findings indicate the important role of ideology in attitudes toward victims via effects on responsibility attribution. © 2016 by the Society for Personality and Social Psychology, Inc.

  17. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  18. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  19. Cyber-Victimized Students

    Directory of Open Access Journals (Sweden)

    Kaitlyn N. Ryan

    2013-12-01

    Full Text Available Bullying is a common topic in the media and academic settings. Teachers are regularly expected to provide curriculum and intervene regarding all forms of bullying, including cyber-bullying. Altering the behaviors of those who bully is often the focus of interventions, with less attention being placed on victim impact. The purpose of this article was to provide educators with a review of evidence regarding the occurrence, impact, and interventions for victims of cyber-bullying. Evidence reveals that cyber-bullying can have emotional, social, and academic impacts but that there are very few documented, and even fewer evidence-based, programs for victims of cyber-bullying. We conclude by proposing that school-wide programs and support be developed and provided to victims.

  20. La victime, acteur de la sécurité ? / The victim, a security actor ?

    Directory of Open Access Journals (Sweden)

    Dieu François

    2012-08-01

    Full Text Available What is the position of the victim in security policy? Only recently has the victim been the object, in France and elsewhere, of considerable attention by the social system, which has taken into account the different aspects of victimization. However, the victim is only partially associated to actions led in this domain, either as a source of data on the state of delinquency through public meetings and victimization surveys, or as an auxiliary to prevention with measure of community and situational prevention.Quelle est la place de la victime dans les politiques de sécurité ? Ce n’est que très récemment que la victime a fait l’objet, en France comma ailleurs, d’une attention plus soutenue de la part du système social, avec le développement d’une meilleure prise en charge des différents aspects de la victimisation. Pour autant, la victime n’est associée que très partiellement aux actions conduites en ce domaine, soit comme source de données sur l’état de la délinquance au moyen de réunions publiques et d’enquête de victimation, soit comme auxiliaire de la prévention avec les dispositifs de prévention communautaire et situationnelle.

  1. Victim derogation and victim enhancement as alternate routes to system justification.

    Science.gov (United States)

    Kay, Aaron C; Jost, John T; Young, Sean

    2005-03-01

    Abstract-Numerous studies have documented the potential for victim-blaming attributions to justify the status quo. Recent work suggests that complementary, victim-enhancing stereotypes may also increase support for existing social arrangements. We seek to reconcile these seemingly contradictory findings by proposing that victim derogation and victim enhancement are alternate routes to system justification, with the preferred route depending on the perception of a causal link between trait and outcome. Derogating "losers" (and lionizing "winners") on traits (e.g., intelligence) that are causally related to outcomes (e.g., wealth vs. poverty) serves to increase system justification, as does compensating "losers" (and downgrading "winners") on traits (e.g., physical attractiveness) that are causally unrelated to those outcomes. We provide converging evidence using system-threat and stereotype-activation paradigms.

  2. The dilemmas of victim positioning

    Directory of Open Access Journals (Sweden)

    Dorte Marie Søndergaard

    2015-08-01

    Full Text Available This article centres on some of the dilemmas contained within victim positioning. Such dilemmas are often overlooked by the authorities involved with people subjected to relational aggression. 2 For example, when teachers rule out cases of bullying because the victim has 'participated in' or 'laughed at' some of the bullies' initiatives, or when a rape victim's status as a victim is questioned because, in the lead up to the assault, she was supposedly friendly to the rapist. In these cases, it could be useful to explore the reason for the bullying victim's apparent collusion or to better understand the premises for the rape victim's positioning options in relation to the perpetrator. In other words, it could be fruitful to explore the dynamics and dilemmas of the victim position. In this article, I aim to reflect on the motivational conditions of the victim phenomenon. These reflections are based on an analysis of qualitative data produced through interviews with school children as well as on relevant secondary literature.

  3. Exploring the Characteristics of Personal Victims Using the National Crime Victimization Survey

    National Research Council Canada - National Science Library

    Jairam, Shashi

    1998-01-01

    .... Two statistical methods were used to investigate these hypotheses, logistical regression for victimization prevalence, and negative binomial regression for victimization incidence and concentration...

  4. Is sexual victimization gender specific?

    DEFF Research Database (Denmark)

    Sundaram, Vanita; Laursen, Bjarne; Helweg-Larsen, Karin

    2008-01-01

    The present study investigates the prevalence of sexual victimization and correlations between sexual victimization and indicators of poor health in two representative samples of men and women in Denmark. Specifically, the authors explore the prevalence of self-reported victimization among...... adolescents (N = 5,829) and adults (N = 3,932) and analyze differences in self-reported health outcomes between male and female victims and corresponding controls. Gender differences are found in the reported prevalence of sexual victimization. Significantly more females than males reported forced sexual...... experiences in both samples. Associations between sexual victimization and poor health outcomes are found for both genders. Comparable patterns of association for men and women are found on a number of variables, particularly those pertaining to risk behavior....

  5. Sexual minority youth victimization and social support: the intersection of sexuality, gender, race, and victimization.

    Science.gov (United States)

    Button, Deeanna M; O'Connell, Daniel J; Gealt, Roberta

    2012-01-01

    In comparison to heterosexual youth, sexual minority youth are more likely to experience victimization. Multiple studies have connected anti-gay prejudice and anti-gay victimization to negative outcomes. Research shows that social support may protect sexual minorities from the harmful effects of anti-gay victimization. However, rates of victimization and the negative outcomes linked to sexual identity within the sexual minority community have been relatively unexplored. Using data from three years of statewide data from heterosexual and sexual minority adolescents in grades 9-12, this study examines victimization, substance use, suicidality, and access to social support by sexuality. Results indicate that sexual minority youth are at increased risk for victimization, substance use, suicidality, and social isolation compared to their heterosexual counterparts. Results also indicate that there is very little bivariate difference within the sexual minority community. Multivariate results indicate differences among sexual minorities' experiences with victimization and substance use.

  6. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  7. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  8. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  9. When a victim becomes violent perpetrator: Violent victimization in childhood, violent criminal behavior in adulthood

    Directory of Open Access Journals (Sweden)

    Stevković Ljiljana

    2013-01-01

    Full Text Available Numerous international research has identified that direct or indirect exposure to violent victimization in a familial context during childhood is a risk factor for violent criminal behavior of victimized children in adulthood. Studies of violent victimization of children in Serbia are rare, and are mostly directed at determining the prevalence, the main characteristics of or the immediate physical, psychological and behavioral consequences of victimization. Empirical analysis of the criminological consequences of early violent victimization in adulthood are an exception in scientific studies in Serbia. The aim of the paper is to present the results of research into the influence of early violent victimization on violent crime of adult men and women. After the introduction a brief overview of the worldwide research confirming the correlation between the experience of violent victimization and subsequent violent behavior is given. The results of the research conducted by the author will then be discussed. The results illustrate the possibility of predicting violent criminal behavior in adulthood based on indicators of direct and indirect victimization in childhood. [Projekat Ministarstva nauke Republike Srbije, br. 179044: Razvoj metodologije evidentiranja kriminaliteta kao osnova kreiranja efikasnih mera za njegovo suzbijanje i prevenciju

  10. Parenting behavior and the risk of becoming a victim and a bully/victim: a meta-analysis study.

    Science.gov (United States)

    Lereya, Suzet Tanya; Samara, Muthanna; Wolke, Dieter

    2013-12-01

    Being bullied has adverse effects on children's health. Children's family experiences and parenting behavior before entering school help shape their capacity to adapt and cope at school and have an impact on children's peer relationship, hence it is important to identify how parenting styles and parent-child relationship are related to victimization in order to develop intervention programs to prevent or mitigate victimization in childhood and adolescence. We conducted a systematic review of the published literature on parenting behavior and peer victimization using MEDLINE, PsychINFO, Eric and EMBASE from 1970 through the end of December 2012. We included prospective cohort studies and cross-sectional studies that investigated the association between parenting behavior and peer victimization. Both victims and those who both bully and are victims (bully/victims) were more likely to be exposed to negative parenting behavior including abuse and neglect and maladaptive parenting. The effects were generally small to moderate for victims (Hedge's g range: 0.10-0.31) but moderate for bully/victims (0.13-0.68). Positive parenting behavior including good communication of parents with the child, warm and affectionate relationship, parental involvement and support, and parental supervision were protective against peer victimization. The protective effects were generally small to moderate for both victims (Hedge's g: range: -0.12 to -0.22) and bully/victims (-0.17 to -0.42). Negative parenting behavior is related to a moderate increase of risk for becoming a bully/victim and small to moderate effects on victim status at school. Intervention programs against bullying should extend their focus beyond schools to include families and start before children enter school. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  12. Sudden death victims

    NARCIS (Netherlands)

    Ceelen, Manon; van der Werf, Christian; Hendrix, Anneke; Naujocks, Tatjana; Woonink, Frits; de Vries, Philip; van der Wal, Allard; Das, Kees

    2015-01-01

    The goal of this study was to ascertain accordance between cause of death established by the forensic physician and autopsy results in young sudden death victims in the Netherlands. Sudden death victims aged 1-45 years examined by forensic physicians operating in the participating regions which also

  13. A latent class analysis of bullies, victims and aggressive victims in Chinese adolescence: relations with social and school adjustments.

    Directory of Open Access Journals (Sweden)

    Aihui Shao

    Full Text Available This study used the latent class analysis (LCA to identify and classify Chinese adolescent children's aggressive behaviors. It was found that (1 Adolescent children could be divided into four categories: general children, aggressive children, victimized children and aggressive victimized children. (2 There were significant gender differences among the aggressive victimized children, the aggressive children and the general children. Specifically, aggressive victimized children and aggressive children had greater probabilities of being boys; victimized children had equal probabilities of being boys or girls. (3 Significant differences in loneliness, depression, anxiety and academic achievement existed among the aggressive victims, the aggressor, the victims and the general children, in which the aggressive victims scored the worst in all questionnaires. (4 As protective factors, peer and teacher supports had important influences on children's aggressive and victimized behaviors. Relative to general children, aggressive victims, aggressive children and victimized children had lower probabilities of receiving peer supports. On the other hand, compared to general children, aggressive victims had lower probabilities of receiving teacher supports; while significant differences in the probability of receiving teacher supports did not exist between aggressive children and victimized children.

  14. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  15. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  16. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  17. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  18. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  19. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  20. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  1. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  2. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  3. EASE-Grid 2.0: Incremental but Significant Improvements for Earth-Gridded Data Sets

    Directory of Open Access Journals (Sweden)

    Matthew H. Savoie

    2012-03-01

    Full Text Available Defined in the early 1990s for use with gridded satellite passive microwave data, the Equal-Area Scalable Earth Grid (EASE-Grid was quickly adopted and used for distribution of a variety of satellite and in situ data sets. Conceptually easy to understand, EASE-Grid suffers from limitations that make it impossible to format in the widely popular GeoTIFF convention without reprojection. Importing EASE-Grid data into standard mapping software packages is nontrivial and error-prone. This article defines a standard for an improved EASE-Grid 2.0 definition, addressing how the changes rectify issues with the original grid definition. Data distributed using the EASE-Grid 2.0 standard will be easier for users to import into standard software packages and will minimize common reprojection errors that users had encountered with the original EASE-Grid definition.

  4. [Minor Victims of Violent Acts in the Context of the Victim Reparation Law].

    Science.gov (United States)

    Hellwig, Katharina; Kröger, Christoph; Franke, Stefanie; Wehrmeyer, Matthias; Heinrichs, Nina

    2018-03-01

    A descriptive analysis of victim compensation applications for children and adolescents as well as sociodemographic and trauma-specific information concerning victims and perpetrators. We did analysis of 100 victim-compensation application files based on a self-developed category system. The files included solely interpersonal trauma, 59 % of which are type II trauma. The most frequent form is sexual violence. The perpetrators stem mostly from children’s homes or peripherals. 79 % of the victims received a diagnosis of a mental disorder, most often posttraumatic stress disorder. Sexually abused children and adolescents make up the majority of the target population in OEG-related trauma outpatient units. Such outpatient units should therefore offer a specific expertise in treating sexually abused children and adolescents.

  5. Victims of cyberstalking in Serbia

    Directory of Open Access Journals (Sweden)

    Kovačević-Lepojević Marina

    2009-01-01

    Full Text Available The aim of this paper is to present research findings on prevalence and characteristics of cyberstalking in Serbia. A web-based questionnaire was used to collect data from a group of respondents who were recruited by snowball sampling via e-mail. A total of 237 respondents completed the online questionnaire. The aim of the first part of this paper is to determine the notion of cyberstalking as well as, to review research about the prevalence and the nature of stalking. The main results are the following: 39,6 % of respondents reported stalking; every fourth stalking victim is a victims of cyberstalking; mostly, cyberstalking victims were female and perpetrators were male. Victims were stalked by: persistent sending of unwanted e-mails and telephone calls, spreading rumors, abusive and negative comments and threats, encouraged other users to harass, threaten or insult, manipulating with victim's personal data, sending malicious programs and files, etc. In Serbia, cyberstalking is not criminalized yet and there are no organizations to whom victims may appeal and ask for help. We are hoping that this research will raise the awareness on cyberstalking and serve as a base for further research and legal reforms regarding cyberstalking victimization in Serbia.

  6. Secondary victims of rape

    DEFF Research Database (Denmark)

    Christiansen, Dorte Mølgaard; Bak, Rikke; Elklit, Ask

    2012-01-01

    secondary victims, including family members, partners, and friends of male and female rape victims. We found that many respondents found it difficult to support the PV and that their relationship with the PV was often affected by the assault. Furthermore, the sample showed significant levels...... of social support for the respondent, and feeling let down by others. The respondents were generally interested in friend-, family-, and partner-focused interventions, particularly in receiving education about how best to support a rape victim...

  7. Support for victims of crime: Analysis of the VDS info and victim support service in 2010

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja

    2011-01-01

    Full Text Available VDS info and victim support service is a victim support service, which was established in 2003 within the Victimology Society of Serbia. The service provides emotional support, information and, if necessary, referral to other relevant services, as well as witness support. The target group of the service are direct and indirect victims of all forms of crime, of both sexes, regardless of any personal characteristics. In addition, support is provided to victims in court, as well as to women victims of violence who are in prison. In most cases victim support is provided by volunteers who are trained to work with victims of crime. This paper analyzes the work of the service in 2010. Special attention is paid to the problems of workplace violence and domestic violence, which are the most common reasons for contacting the service. The aim of the paper is to present the work of the service in the past year, as well as to highlight the trends observed in comparison to the previous period.

  8. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  9. Justice And Legal Certainty For Child Victims

    Directory of Open Access Journals (Sweden)

    Edi Setiadi

    2016-12-01

    Full Text Available Focus of attention in the criminal justice system so far has always been to the perpetrator, whereas parties related to a process of criminal justice encompasses the perpetrator, the victim, and the community. A crime victim, in particular, would suffer more since he/she could experience secondary victimization in the criminal justice system. The law concerning victim and witness protection only states the limitation for the criminal victim to ask for compensation to criminal justice system, either as a victim of direct criminal or a victim of abuse power done by law enforcement officers. Child victims are treated the same way as to adult victims, whilst they have a greater dimension of the problem and effects to be dealt with Mechanism and procedures to be followed are ius constituendum (intended/desirable law, as they only share expectation of indemnity, compensation, and rehabilitation which have not been empirically tested in a real situation.

  10. Weavers' Association easing poverty in Ecuador | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-12

    Oct 12, 2010 ... Weavers' Association easing poverty in Ecuador ... frenzy among the 54 members of Ecuador's Chordeleg Agricultural Craft Centre (CACH). ... Investing in Internet access boosts incomes, concludes Latin American study.

  11. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  12. Big Five Personality Traits of Cybercrime Victims.

    Science.gov (United States)

    van de Weijer, Steve G A; Leukfeldt, E Rutger

    2017-07-01

    The prevalence of cybercrime has increased rapidly over the last decades and has become part of the everyday life of citizens. It is, therefore, of great importance to gain more knowledge on the factors related to an increased or decreased likelihood of becoming a cybercrime victim. The current study adds to the existing body of knowledge using a large representative sample of Dutch individuals (N = 3,648) to study the relationship between cybercrime victimization and the key traits from the Big Five model of personality (i.e., extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience). First, multinomial logistic regression analyses were used to examine the associations between the personality traits and three victim groups, that is, cybercrime victims versus nonvictims, traditional crime victims versus nonvictims, and cybercrime victims versus traditional crime victims. Next, logistic regression analyses were performed to predict victimization of cyber-dependent crimes (i.e., hacking and virus infection) and cyber-enabled crimes (i.e., online intimidation, online consumer fraud, and theft from bank account). The analyses show that personality traits are not specifically associated with cybercrime victimization, but rather with victimization in general. Only those with higher scores on emotional stability were less likely to become a victim of cybercrime than traditional crime. Furthermore, the results indicate that there are little differences between personality traits related to victimization of cyber-enabled and cyber-dependent crimes. Only individuals with higher scores on openness to experience have higher odds of becoming a victim of cyber-enabled crimes.

  13. Evaluation of WebEase: An Epilepsy Self-Management Web Site

    Science.gov (United States)

    DiIorio, Colleen; Escoffery, Cam; McCarty, Frances; Yeager, Katherine A.; Henry, Thomas R.; Koganti, Archana; Reisinger, Elizabeth L.; Wexler, Bethany

    2009-01-01

    People with epilepsy have various education needs and must adopt many self-management behaviors in order to control their condition. This study evaluates WebEase, an Internet-based, theory-driven, self-management program for adults with epilepsy. Thirty-five participants took part in a 6-week pilot implementation of WebEase. The main components of…

  14. Do victims only cry? Victim-survivors and their grassroots organizations in Peru

    NARCIS (Netherlands)

    de Waardt, M.F.; Ouweneel, A.

    2012-01-01

    De Waardt discusses associations of victims of the 1980s violent conflict in Peru, which she relates to the Peruvian cultural tradition of grassroots organizations. She conveys the substantial existence of victim-survivor associations, the social support its members find amongst each other, and the

  15. Understanding Risk-taking Behavior in Bullies, Victims, and Bully Victims Using Cognitive- and Emotion-Focused Approaches.

    Science.gov (United States)

    Poon, Kean

    2016-01-01

    Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth's overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully victim). This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and an emotion-focused model of risk taking, and to clarify how adolescents' characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age = 14.5, M = 65, F = 71) were recruited and grouped according to bullying identity: Bully ( n = 27), Victim ( n = 20), Bully victim ( n = 37) and Control ( n = 52). Cognitive Appraisal of Risky Events (CARE) questionnaire was used to measure participants' expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT) was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  16. Understanding risk-taking behavior in bullies, victims, and bully-victims using cognitive- and emotion-focused approaches.

    Directory of Open Access Journals (Sweden)

    Kean Poon

    2016-11-01

    Full Text Available Bullying and risky behavior are two common problems among adolescents and can strongly affect a youth’s overall functioning when both coexist. Some studies suggest that bullying in adolescence may promote risky behavior as a coping strategy to deal with victimization related stress. Other studies consider bullying as an outcome of high-risk behavior. Despite the association between the two is well-established, no study has examined the risk-taking patterns among bullying groups (i.e., bully, victim, and bully-victim. This study attempted to elucidate the potential relationships between bullying and risk-taking by addressing the two models: a cognitive-focused model and a emotion-focused model of risk taking, and to clarify how adolescents’ characteristics in risk taking associate with bullying outcomes. Method: 136 Chinese adolescents (Mean Age =14.5, M= 65, F =71 were recruited and grouped according to bullying identity: Bully (n =27, Victim (n =20, Bully-victim (n =37 and Control (n =52. Cognitive Appraisal of Risky Events (CARE questionnaire was used to measure participants’ expectancies about the risks, benefits and involvement associated with risky activities. Cambridge Gambling Task (CGT was administered to capture the emotion-laden process in risk taking. Results: Cognitively, Bully was associated with an overestimation of risk while Victim was associated with an underestimation of risk and overrated benefit. Bully-victim exhibited a unique pattern with an overestimation of benefit and risk. All study groups projected higher involvement in risky behavior. Behaviorally, both Bully and Bully-victim were associated with high risk modulation whereas Victim was associated with impulsive decision-making. Interestingly, compared with bully, bully-victim had significantly higher bullying scores, suggesting a wider range and more frequent bullying activities. In conclusion, Bully maybe a group of adolescents that is vigilant in situational

  17. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  18. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  19. Why the bully/victim relationship is so pernicious: a gendered perspective on power and animosity among bullies and their victims.

    Science.gov (United States)

    Rodkin, Philip C; Hanish, Laura D; Wang, Shuai; Logis, Handrea A

    2014-08-01

    The bully/victim relationship was studied in a sample of elementary school children (N = 1,289 in first, third, and fifth grades). Three questions were tested. Does bullying involve a power differential between bully and victim? Are bully/victim dyads participants in a relationship, whether mutual liking or disliking? Does the gender composition of the bully/victim dyad moderate power differential and relational context patterns? Hierarchical linear modeling was used to analyze predictors of the reputational strength of bully/victim ties. The findings revealed that the bully/victim dyads most frequently nominated by peers were characterized by asymmetries in social status, where bullies were increasingly more popular than their victims, and by asymmetries in aggression, where bullies were increasingly less aggressive than their victims. Bullies and victims were likely to select one another as among the children that they least like. Most effects with respect to aggression, popularity, and relationships were moderated by the gender composition of the bully/victim dyad. Implications for a developmental psychopathology perspective on peer bullying and victimization are highlighted.

  20. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  1. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  2. Stakeholder Analysis of an Executable Achitecture Systems Engineering (EASE) Tool

    Science.gov (United States)

    2013-06-21

    The FCR tables and stakeholder feedback are then used as the foundation of a Strengths, Weaknesses, Opportunities, and Threats ( SWOT ) analysis . Finally...the SWOT analysis and stakeholder feedback arc translated into an EASE future development strategy; a series of recommendations regarding...and Threats ( SWOT ) analysis . Finally, the SWOT analysis and stakeholder feedback are translated into an EASE future development strategy; a series

  3. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  4. Peer Victimization and Dating Violence Victimization: The Mediating Role of Loneliness, Depressed Mood, and Life Satisfaction.

    Science.gov (United States)

    Cava, María-Jesús; Buelga, Sofía; Tomás, Inés

    2018-03-01

    Peer victimization and dating violence victimization have serious negative effects on adolescents' health, and they seem to be related. However, the mediating processes in this relationship have not been sufficiently analyzed. The purpose of this study was to analyze the direct and indirect relationships between peer victimization and dating violence victimization, considering the possible mediator role of loneliness, depressed mood, and life satisfaction. These relationships are analyzed in boys and girls, and in early and middle adolescence. From an initial sample of 1,038 Spanish adolescents, those who had or had had in the past 12 months a dating relationship (647 adolescents; 49.1% boys, M = 14.38, SD = 1.43) were included in this study. Multigroup structural equation modeling was used to test a double mediation model simultaneously for boys and girls, testing the invariance of the relationships among variables across genders. The same technique was used to test the model simultaneously for early and middle adolescence, testing the invariance of the relationships among variables across age groups. Results revealed a positive direct relationship between peer victimization and dating violence victimization, as well as the partial mediating role of loneliness and life satisfaction in this relationship. The mediator role of depressed mood was not supported. The same mediational model was confirmed in boys and girls, and in early and middle adolescence. These results highlight the important role of loneliness and life satisfaction to explain the link between peer victimization and dating violence victimization in adolescence. These findings may be useful for developing intervention programs aimed at preventing situations of multiple victimization during adolescence.

  5. Adolescent sexual victimization

    DEFF Research Database (Denmark)

    Bramsen, Rikke Holm; Lasgaard, Mathias; Koss, Mary P

    2012-01-01

    at baseline and first time APSV during a 6-month period. Data analysis was a binary logistic regression analysis. Number of sexual partners and displaying sexual risk behaviors significantly predicted subsequent first time peer-on-peer sexual victimization, whereas a history of child sexual abuse, early......The present study set out to investigate predictors of first time adolescent peer-on-peer sexual victimization (APSV) among 238 female Grade 9 students from 30 schools in Denmark. A prospective research design was utilized to examine the relationship among five potential predictors as measured...... sexual onset and failing to signal sexual boundaries did not. The present study identifies specific risk factors for first time sexual victimization that are potentially changeable. Thus, the results may inform prevention initiatives targeting initial experiences of APSV....

  6. Victimization of Obese Adolescents

    Science.gov (United States)

    Robinson, Sabrina

    2006-01-01

    Peer victimization of obese adolescents has been associated with low self-esteem, body dissatisfaction, social isolation, marginalization, poor psychosocial adjustment, depression, eating disorders, and suicidal ideation and attempts, not to mention poor academic performance. Weight-based peer victimization is defined as unsolicited bullying and…

  7. COMPARISON OF TREND PROJECTION METHODS AND BACKPROPAGATION PROJECTIONS METHODS TREND IN PREDICTING THE NUMBER OF VICTIMS DIED IN TRAFFIC ACCIDENT IN TIMOR TENGAH REGENCY, NUSA TENGGARA

    Directory of Open Access Journals (Sweden)

    Aleksius Madu

    2016-10-01

    Full Text Available The purpose of this study is to predict the number of traffic accident victims who died in Timor Tengah Regency with Trend Projection method and Backpropagation method, and compare the two methods based on the degree of guilt and predict the number traffic accident victims in the Timor Tengah Regency for the coming year. This research was conducted in Timor Tengah Regency where data used in this study was obtained from Police Unit in Timor Tengah Regency. The data is on the number of traffic accidents in Timor Tengah Regency from 2000 – 2013, which is obtained by a quantitative analysis with Trend Projection and Backpropagation method. The results of the data analysis predicting the number of traffic accidents victims using Trend Projection method obtained the best model which is the quadratic trend model with equation Yk = 39.786 + (3.297 X + (0.13 X2. Whereas by using back propagation method, it is obtained the optimum network that consists of 2 inputs, 3 hidden screens, and 1 output. Based on the error rates obtained, Back propagation method is better than the Trend Projection method which means that the predicting accuracy with Back propagation method is the best method to predict the number of traffic accidents victims in Timor Tengah Regency. Thus obtained predicting the numbers of traffic accident victims for the next 5 years (Years 2014-2018 respectively - are 106 person, 115 person, 115 person, 119 person and 120 person.   Keywords: Trend Projection, Back propagation, Predicting.

  8. Cyberbullying victimization in adolescents’ population

    Directory of Open Access Journals (Sweden)

    Nešić Marija

    2016-01-01

    Full Text Available With the rapid development of communication technology and its wide use by the adolescents, cyberspace became a new risky environment for bullying manifestation and victimization. The significance of the problem lies in the fact that, unlike the traditional bullying, the cyberbullying victimization occurs also out of the school surroundings, it’s characterized by the possible anonymity of the bully, it’s harder to discover it and it could have a much bigger audience. Results of numerous studies show that the prevalence of cyberbullying victimization is 10% to 40% during one school year and that it is related to different negative outcomes - from problems of lower self-esteem to severe psychological and behavioral problems. The aim of the paper is to present basic characteristics and negative outcomes of cyberbullying victimization and also to summarize possible factors which are associated with this form of bullying. Lastly, possible ways of preventive action and coping with cyberbullying victimization will be reviewed.

  9. Bystander Involvement in Peer Victimization: The Value of Looking beyond Aggressors and Victims

    Science.gov (United States)

    Wiens, Brenda A.; Dempsey, Allison

    2009-01-01

    Peer victimization has been a focus of both research and prevention program development. This construct is typically measured from the victim and aggressor perspectives. However, prevention programming often includes an additional bystander perspective. The present study evaluated whether questions regarding witnessing peer victimization…

  10. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  11. Reading Ease of Bilingual Annual Reports.

    Science.gov (United States)

    Courtis, John K.; Hassan, Salleh

    2002-01-01

    Examines reading ease between the English and Chinese versions of 65 corporate annual reports in Hong Kong and the English and Malay versions of 53 annual reports in Malaysia. Notes that the English passages in Malaysian annual reports are easier to read than the English passages in Hong Kong annual reports. Suggests that different language…

  12. Decreases in the proportion of bullying victims in the classroom: Effects on the adjustment of remaining victims

    NARCIS (Netherlands)

    Garandeau, C.F.; Lee, Ihno A.; Salmivalli, Christina

    2018-01-01

    Sharing a classroom environment with other victimized peers has been shown to mitigate the adverse effects of peer victimization on children’s social and psychological adjustment. By extension, this study hypothesized that classroom reductions in the proportion of victims would be harmful for

  13. Latent classes of childhood poly-victimization and associations with suicidal behavior among adult trauma victims: Moderating role of anger.

    Science.gov (United States)

    Charak, Ruby; Byllesby, Brianna M; Roley, Michelle E; Claycomb, Meredith A; Durham, Tory A; Ross, Jana; Armour, Cherie; Elhai, Jon D

    2016-12-01

    The aims of the present study were first to identify discrete patterns of childhood victimization experiences including crime, child maltreatment, peer/sibling victimization, sexual violence, and witnessing violence among adult trauma victims using latent class analysis; second, to examine the association between class-membership and suicidal behavior, and third to investigate the differential role of dispositional anger on the association between class-membership and suicidal behavior. We hypothesized that those classes with accumulating exposure to different types of childhood victimization (e.g., poly-victimization) would endorse higher suicidal behavior, than the other less severe classes, and those in the most severe class with higher anger trait would have stronger association with suicidal behavior. Respondents were 346 adults (N=346; M age =35.0years; 55.9% female) who had experienced a lifetime traumatic event. Sixty four percent had experienced poly-victimization (four or more victimization experiences) and 38.8% met the cut-off score for suicidal behavior. Three distinct classes emerged namely, the Least victimization (Class 1), the Predominantly crime and sibling/peer victimization (Class 2), and the Poly-victimization (Class 3) classes. Regression analysis controlling for age and gender indicated that only the main effect of anger was significantly associated with suicidal behavior. The interaction term suggested that those in the Poly-victimization class were higher on suicidal behavior as a result of a stronger association between anger and suicidal behavior in contrast to the association found in Class 2. Clinical implications of findings entail imparting anger management skills to facilitate wellbeing among adult with childhood poly-victimization experiences. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Use of emergency department services by women victims of violence in Lazio region, Italy.

    Science.gov (United States)

    Farchi, Sara; Polo, Arianna; Asole, Simona; Ruggieri, Maria Pia; Di Lallo, Domenico

    2013-07-19

    Violence against women is a significant health problem and a hidden phenomenon, in Italy that about 31% of the women have been victims of violence once in life. Aims of this study are to describe characteristics of women victims of violence (VV) attending the EDs in the Lazio region in 2008 and to illustrate the frequency and characteristics of previous ED visits. Using the Emergency Information System, visits of women, (15-49 years), in the 60 EDs, for a violent trauma have been analysed. For each VV identified, we considered the last episode and searched for ED attendances in a six year period (2003-08) in order to identify other visits. We performed descriptive analyses of socio-demographic and clinical factors of VV and we analyzed the impact previous ED visits. We compared ED utilization of women VV with a random sample of women with the same age distribution who gave birth in 2008. In 2008, 7,725 ED attendances of women VV were found (1.1% of the ED visits) corresponding to 6,936 women (prevalence = 52.0x10,000). The mean number of ED visits for each woman in five years was 5.0 (1-190). Prevalent diagnoses were contusions (45.8%), neurotic disorders (5.4%) complications of medical care (6.3%). The women were young, approximately 70% were residents in Rome or the surrounding areas. Foreign women were three times more likely to visit the ED for intentional injuries than were Italian women (114.1 vs 44.4 per 10.000). This study shows high prevalence of violence against women in Lazio region, Italy. Most of the women have been visited by the ED several times before the violent episode, often with traumas. ED medical and nursing staff should be prepared and trained to successfully manage victims of violence.

  15. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  16. Victimization, polyvictimization , and health in Swedish adolescents

    Directory of Open Access Journals (Sweden)

    Aho N

    2016-08-01

    Full Text Available Nikolas Aho, Marie Proczkowska Björklund, Carl Göran Svedin Division of Child and Adolescent Psychiatry, Department of Clinical and Experimental Medicine, Linköping University, Linköping, Sweden Abstract: The main objective of this article was to study the relationship between the different areas of victimization (eg, sexual victimization and psychological symptoms, taking into account the full range of victimization domains. The final aim was to contribute further evidence regarding the bias that studies that focus on just one area of victimization may be introduced into our psychological knowledge. The sample included 5,960 second-year high school students in Sweden with a mean age of 17.3 years (range =16–20 years, standard deviation =0.652, of which 49.6% were females and 50.4% males. The Juvenile Victimization Questionnaire and the Trauma Symptom Checklist for Children were used to assess victimization and psychological problems separately. The results show that a majority of adolescents have been victimized, females reported more total events and more sexual victimization and childhood maltreatment, and males were more often victims of conventional crime. The majority of victimization domains as well as the sheer number of events (polyvictimization [PV] proved to be harmful to adolescent health, affecting females more than males. PV explained part of the health effect and had an impact on its own and in relation to each domain. This suggests the possibility that PV to a large degree explains trauma symptoms. In order to understand the psychological effects of trauma, clinicians and researchers should take into account the whole range of possible types of victimization. Keywords: victimization, childhood trauma, psychological symptoms, JVQ, TSCC

  17. Victim's Rights - Comparative Approach within EU Legislation

    Directory of Open Access Journals (Sweden)

    Monica Pocora

    2015-12-01

    Full Text Available Usually is talking about offender rights and rarely about victim's rights. This study aims to analyse victim's rights especially in Romanian legislation from all points of view. Having involuntary fallen victim to crime, the person is often unaware of what information is available. It is therefore important that the onus is not put on the victim to request a certain piece of information. Victims of crimes need to have their important role in the criminal proceedings and he or she has to know about the extension of them rights. Not least, the study is focus on the right of the victim to receive information, not to be made responsible for the practicalities surrounding its delivery.

  18. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  19. Punishment goals of crime victims.

    Science.gov (United States)

    Orth, Uli

    2003-04-01

    Research on subjective punishment goals has focused on the perspective of third-party observers of criminal offenses and neglected the perspective of victims. This study investigates punishment goals among 174 adult crime victims (rape and nonsexual assault) for each participant's real criminal case. Scales measuring support for punishment goals are constructed by factor analysis of an 18-item list. Results show that 5 highly supported goals can be distinguished: retaliation, recognition of victim status, confirmation of societal values, victim security, and societal security. Analysis of relations between punishment goal scales and personal variables, situational variables, and demanded punishment severity corroborates the view that the punishment goals revealed can be classified according to the two independent dichotomies of moral versus instrumental goals, and micro versus macro goals.

  20. The victim of the nuclear accident

    International Nuclear Information System (INIS)

    Carvalho, A.B. de.

    1990-01-01

    This paper shows the effects of the nuclear accident in the victims, in their lives, changes in the behaviour, neurosis including all the psychological aspects. The author compare the victims with nuclear accident like AIDS patients, in terms of people's discrimination. There is another kind of victims. They are the people who gave helpness, for example physicians, firemen and everybody involved with the first aids that suffer together with the victims trying to safe them and to diminish their suffering, combating the danger, the discrimination and the no information. (L.M.J.)

  1. Victims of crime, with special emphasis on victims of work abuse and domestic violence: Analysis of the service VDS info and victim support for 2009

    Directory of Open Access Journals (Sweden)

    Radaković Danica

    2010-01-01

    Full Text Available The aim of this paper is to present the work of the VDS info and victim support service for the period January 1st 2009 - December 31st 2009. It contains the data about victims, type and quality of assistance and support provided by the Service, and also about institutions and organizations the victims contacted before or after contacting the Service and their satisfaction with the help they received.

  2. Computer anxiety as predictor of librarians\\' perceived ease of use of ...

    African Journals Online (AJOL)

    The paper examines the predictive effect of computer anxiety on perceived ease of use of automated library systems by library staff in Nigerian universities. A survey research design was used to collect data on level of computer anxiety and perceptions of ease of use of automated library systems among the library staff.

  3. Bullying and Victimization Among Children

    Science.gov (United States)

    Shetgiri, Rashmi

    2013-01-01

    Bullying among children is a significant public health problem world-wide. Bullying is most commonly defined as repeated, intentional aggression, perpetrated by a more powerful individual or group against a less powerful victim. Trends in victimization and moderate to frequent bullying may be decreasing slightly in the United States, but over 20% of children continue to be involved in bullying. Direct bullying consists of physical and verbal aggression, whereas indirect bullying involves relational aggression. Cyber bullying is an emerging problem which may be more difficult to identify and intervene with than traditional bullying. Bullies, victims, and bully-victims are at risk for negative short and long-term consequences such as depression, anxiety, low self-esteem, and delinquency. Various individual, parental, and peer factors increase the risk for involvement in bullying. Anti-bullying interventions are predominantly school-based and demonstrate variable results. Healthcare providers can intervene in bullying by identifying potential bullies or victims, screening them for co-morbidities, providing counseling and resources, and advocating for bullying prevention. PMID:24007839

  4. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  5. Maladaptive schemas as mediators of the relationship between previous victimizations in the family and dating violence victimization in adolescents.

    Science.gov (United States)

    Calvete, Esther; Gámez-Guadix, Manuel; Fernández-Gonzalez, Liria; Orue, Izaskun; Borrajo, Erika

    2018-07-01

    This study examined whether exposure to family violence, both in the form of direct victimization and witnessing violence, predicted dating violence victimization in adolescents through maladaptive schemas. A sample of 933 adolescents (445 boys and 488 girls), aged between 13 and 18 (M = 15.10), participated in a three-year longitudinal study. They completed measures of exposure to family violence, maladaptive schemas of disconnection/rejection, and dating violence victimization. The findings indicate that witnessing family violence predicts the increase of dating violence victimization over time, through the mediation of maladaptive schemas in girls, but not in boys. Direct victimization in the family predicts dating violence victimization directly, without the mediation of schemas. In addition, maladaptive schemas contribute to the perpetuation of dating violence victimization over time. These findings provide new opportunities for preventive interventions, as maladaptive schemas can be modified. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  7. The hidden crime: human trafficking.

    Science.gov (United States)

    Clause, Kristen J; Lawler, Kate Byrnes

    2013-01-01

    As the primary contact in the health care system, nurses can play a role in combating this crime and assisting the victims. Assessment for abuse, neglect, trauma, recurrent sexually transmitted infections (STIs) and fear of a controlling partner is critical. Following up on "red flags" and understanding methods of safe questioning can make the difference between slavery and recovery for victims. Nurses must also know the professional referrals in their areas once a potential victim has been identified. This may be a very dangerous undertaking and must be handled by experienced personnel. Referrals to forensic nurses or physicians, domestic violence professionals or law enforcement may be indicated. Initially, a nurse may want to consult with the agency social worker for guidance. Human trafficking is a human rights crime. Unfortunately, it is more prevalent in all types of communities than most people suspect. Nurses can be heroes to the victims through understanding of this crime and vigilance in the assessment and care of all people they encounter in their practices.

  8. Sexual Victimization of Youth

    Science.gov (United States)

    Small, Kevonne; Zweig, Janine M.

    2007-01-01

    An estimated 7.0% to 8.1% of American youth report being sexually victimized at some point in their life time. This article presents a background to youth sexual victimization, focusing on prevalence data, challenging issues when studying this problem, risk factors, and common characteristics of perpetrators. Additionally, a type of sexual…

  9. Attracting Assault: Victims' Nonverbal Cues.

    Science.gov (United States)

    Grayson, Betty; Stein, Morris I.

    1981-01-01

    Describes a study in which prison inmates convicted of assault identified potential victims from videotapes. A lab analysis code was used to determine which nonverbal body movement categories differentiated victims and nonvictims. (JMF)

  10. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  11. Incremental discovery of hidden structure: Applications in theory of elementary particles

    International Nuclear Information System (INIS)

    Zytkow, J.M.; Fischer, P.J.

    1996-01-01

    Discovering hidden structure is a challenging, universal research task in Physics, Chemistry, Biology, and other disciplines. Not only must the elements of hidden structure be postulated by the discoverer, but they can only be verified by indirect evidence, at the level of observable objects. In this paper we describe a framework for hidden structure discovery, built on a constructive definition of hidden structure. This definition leads to operators that build models of hidden structure step by step, postulating hidden objects, their combinations and properties, reactions described in terms of hidden objects, and mapping between the hidden and the observed structure. We introduce the operator dependency diagram, which shows the order of operator application and model evaluation. Different observational knowledge supports different evaluation criteria, which lead to different search systems with verifiable sequences of operator applications. Isomorph-free structure generation is another issue critical for efficiency of search. We apply our framework in the system GELL-MANN, that hypothesizes hidden structure for elementary particles and we present the results of a large scale search for quark models

  12. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  13. [From acute victimization at chronic victimization: socio-cognitive approach of differential tolerance threshold].

    Science.gov (United States)

    Forte, M; Przygodzki-Lionet, N; Masclet, G

    2006-01-01

    Work, for many years reduced to a purely instrumental dimension, proves to be a true microcosm of society, with its informal modes, its emotional networks and its series of evils and dilemmas. This human apprehension of the professional sphere tends to reveal a pole with multiple facets, some of which have long been concealed, but whose individual, social and economic extent can't let people ignore them. This social perception, which contributes to regard work as sacred and makes it impervious to any aggression, should be abandoned. Bearing this in mind, our study endeavours to show that "work" and "victim" are far more overlapping than antagonistic realities; it aims at determining the impact of two aggressive methods via the professional pole, namely: moral harassment at work and armed attacks within bank premises. Such an approach tends to unify health psychology, occupational psychology and victimology, thus opening a breach in the stereotyped view which crystallizes the professional sphere into a kind of representative noose devoid of the most human bases. We then suggest, as a first hypothesis, that the nature of the victimization process, resulting from specific aggressive scenarios, would determine different psychological, physiological and relational consequences, apprehended under the generic expression of tolerance threshold. In other words, "mobbing", through its proactive, intentional and obsessional dimension would tend to lower the victims' threshold more than hold-ups, which are characterized by a reactive aspect, and obey unfavourable socio-economic contingencies. Our research also aims at apprehending this dynamic relationship binding victimization types to tolerance thresholds through two analysing factors. These psychological mediators are derived from Lazarus and Folkman's "transactional model of stress", which postulates that stress would rise from the perception people get of the transaction between the requirements of the situation and their

  14. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  15. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  16. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  17. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  18. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  19. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  20. Prevention of victimization following sexual assaults

    DEFF Research Database (Denmark)

    Pedersen, Bodil Maria; Sidenius, Katrine

    2004-01-01

    Centre for Victims of Sexual Assault in Copenhagen is a centre for interdisciplinary research and practice. Goals of the centre are to contribute to the documentation of victimization and to prevent further victimization. Research at the centre aims at the examination of the diversity of conditions...... of women exposed to sexualized coercion and the diversity of perspectives on the events....

  1. Identifying bully victims: definitional versus behavioral approaches.

    Science.gov (United States)

    Green, Jennifer Greif; Felix, Erika D; Sharkey, Jill D; Furlong, Michael J; Kras, Jennifer E

    2013-06-01

    Schools frequently assess bullying and the Olweus Bully/Victimization Questionnaire (BVQ; Olweus, 1996) is the most widely adopted tool for this purpose. The BVQ is a self-report survey that uses a definitional measurement method--describing "bullying" as involving repeated, intentional aggression in a relationship where there is an imbalance of power and then asking respondents to indicate how frequently they experienced this type of victimization. Few studies have examined BVQ validity and whether this definitional method truly identifies the repetition and power differential that distinguish bullying from other forms of peer victimization. This study examined the concurrent validity of the BVQ definitional question among 435 students reporting peer victimization. BVQ definitional responses were compared with responses to a behavioral measure that did not use the term "bullying" but, instead, included items that asked about its defining characteristics (repetition, intentionality, power imbalance). Concordance between the two approaches was moderate, with an area under the receiver operating curve of .72. BVQ responses were more strongly associated with students indicating repeated victimization and multiple forms of victimization, than with power imbalance in their relationship with the bully. Findings indicate that the BVQ is a valid measure of repeated victimization and a broad range of victimization experiences but may not detect the more subtle and complex power imbalances that distinguish bullying from other forms of peer victimization. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  2. Victimization and pain

    Directory of Open Access Journals (Sweden)

    Małgorzata K. Szerla

    2013-12-01

    Full Text Available Pain has several causes. It can be caused not only by operative trauma or cancer. Some patients suffer from pain as a result of being victims of violence. The aim of the study was to introduce diagnosis and treatment of pain problems in patients who are victims of violence, from a physician’s and a psychologist’s common perspective. Physical pain-related primary effects experienced by the victims of domestic violence go far beyond the results which are noticeable directly and confirmed visually in a forensic examination. In the present paper we introduce an ‘invisible’ group of secondary effects of violence. They appear in time, often after several years, in the form of a variety of psychosomatic disorders. The body is devastated insidiously and the secondary effects are visible as vegetative symptoms, a variety of psychosomatic disorders and pain, difficult to diagnose and treat.

  3. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  4. Attitudes toward victim and victimization in the light of the just world theory

    Directory of Open Access Journals (Sweden)

    Simeunović-Patić Biljana

    2017-01-01

    Full Text Available The present paper discusses current empirical status of the Just world theory introduced several decades ago by Melvin Lerner, the content and functions of a just world belief as its central construct, and particularly, the relation between a just world belief and victim blaming and victim derogation phenomena. In the light of existing research evidence, a just world belief and a need to re-establish a “justice” when this belief is threatened, is considered to be an adaptive mechanism that protect a belief that a world is secure and the future is predictable, as well as a confidence in the purposefulness of selfdiscipline, long-term personal investments and social rules respecting. As proposed By the just world theory, when a person faces injustice, i.e. others’ (innocent victims’ suffering, his/her belief in a just world is threatened. Possible reactions to that threat comprise various rational victim helping activities, but also specific cognitive defensive strategies, including cognitive distortion, rationalization and reinterpretation of an event in order to minimize injustice or deny injustice happened at all. In the course of reinterpretation of injustice, victims are often blamed for their former actions, or derogated for their character, in order to indicate them responsible for their own fate and suffering. The findings of research studies suggest that the likelihood of employing cognitive defensive strategies rises if formal responses to crime and victimization lack or fail. This further suggests that an efficient and effective formal social response in terms of both sanctioning of offenders and reparation of victims should be considered highly important in reducing the risk of stigmatization and rejection of victims. Finally, the paper discusses the role of victim’s just world beliefs in post-trauma adaptation and coping processes. In virtue of findings from the existing research literature it may be concluded that victim

  5. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  6. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  7. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  8. Victims of Rape: Repeated Assessment of Depressive Symptoms.

    Science.gov (United States)

    Atkeson, Beverly M.; And Others

    1982-01-01

    Investigated depressive symptoms in rape victims (N=115) for one year following their assaults. Depressive symptoms were higher in victims than in controls. By four months postrape, depressive symptoms in the victim group had diminished, and the victims were no longer significantly different from the nonvictim control group. (Author)

  9. EASE-Grid 2.0: Incremental but Significant Improvements for Earth-Gridded Data Sets

    OpenAIRE

    Brodzik, Mary J.; Billingsley, Brendan; Haran, Terry; Raup, Bruce; Savoie, Matthew H.

    2012-01-01

    Defined in the early 1990s for use with gridded satellite passive microwave data, the Equal-Area Scalable Earth Grid (EASE-Grid) was quickly adopted and used for distribution of a variety of satellite and in situ data sets. Conceptually easy to understand, EASE-Grid suffers from limitations that make it impossible to format in the widely popular GeoTIFF convention without reprojection. Importing EASE-Grid data into standard mapping software packages is nontrivial and error-prone. This article...

  10. Hidden Markov Model Application to Transfer The Trader Online Forex Brokers

    Directory of Open Access Journals (Sweden)

    Farida Suharleni

    2012-05-01

    Full Text Available Hidden Markov Model is elaboration of Markov chain, which is applicable to cases that can’t directly observe. In this research, Hidden Markov Model is used to know trader’s transition to broker forex online. In Hidden Markov Model, observed state is observable part and hidden state is hidden part. Hidden Markov Model allows modeling system that contains interrelated observed state and hidden state. As observed state in trader’s transition to broker forex online is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online, whereas as hidden state is broker forex online Marketiva, Masterforex, Instaforex, FBS and Others. First step on application of Hidden Markov Model in this research is making construction model by making a probability of transition matrix (A from every broker forex online. Next step is making a probability of observation matrix (B by making conditional probability of five categories, that is category 1, category 2, category 3, category 4, category 5 by condition of every broker forex online and also need to determine an initial state probability (π from every broker forex online. The last step is using Viterbi algorithm to find hidden state sequences that is broker forex online sequences which is the most possible based on model and observed state that is the five categories. Application of Hidden Markov Model is done by making program with Viterbi algorithm using Delphi 7.0 software with observed state based on simulation data. Example: By the number of observation T = 5 and observed state sequences O = (2,4,3,5,1 is found hidden state sequences which the most possible with observed state O as following : where X1 = FBS, X2 = Masterforex, X3 = Marketiva, X4 = Others, and X5 = Instaforex.

  11. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  12. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  13. Predictors and protective factors for adolescent Internet victimization

    DEFF Research Database (Denmark)

    Helweg-Larsen, Karin; Schütt, Nina; Larsen, Helmer Bøving

    2012-01-01

    To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization.......To examine the rate of Internet victimization in a nationally representative sample of adolescents aged 14-17 and to analyze predictors and protective factors for victimization....

  14. Crime victims in the criminal justice system

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2003-01-01

    Full Text Available Negative social reaction and inadequate reaction of the agencies of the formal control on the primary victimization is leading to the so called secondary victimization that can be a source of trauma and frustration as much as the primary victimization. Due to that, relation of the police and the judiciary towards the crime victims is of a great importance regarding victims’ willingness to report the victimization, their confidence in these agencies, and cooperation during clearing up the crime. In order to realize the victim’s position in the criminal justice system, this paper contains an overview of how the police, prosecutor’s office and courts are functioning. The paper is based on the interviews made with the representatives of these state agencies, as well as on the previous knowledge and realized surveys concerning this topic. The aim of the paper is to emphasize the position and the role of the victim support service in the system of the state intervention, based upon the obtained data, as well as to give some basic information on how victims could report the crime, what are their rights and duties, what can they expect from the competent agencies.

  15. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  16. Searching for hidden-charm baryonium signals in QCD sum rules

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Zhou, Dan [Beihang University, School of Physics, Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, SK (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University, Research Center for Hadron and CSR Physics, Institute of Modern Physics of CAS, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics, State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-11-15

    We give an explicit QCD sum rule investigation for hidden-charm baryonium states with the quark content u anti ud anti dc anti c, spin J = 0/1/2/3, and of both positive and negative parities. We systematically construct the relevant local hidden-charm baryonium interpolating currents, which can actually couple to various structures, including hidden-charm baryonium states, charmonium states plus two pions, and hidden-charm tetraquark states plus one pion, etc. We do not know which structure these currents couple to at the beginning, but after sum rule analyses we can obtain some information. We find some of them can couple to hidden-charm baryonium states, using which we evaluate the masses of the lowest-lying hidden-charm baryonium states with quantum numbers J{sup P} = 2{sup -}/3{sup -}/0{sup +}/1{sup +}/2{sup +} to be around 5.0 GeV. We suggest to search for hidden-charm baryonium states, especially the one of J = 3{sup -}, in the D-wave J/ψππ and P-wave J/ψρ and J/ψω channels in this energy region. (orig.)

  17. Perpetrator or victim?

    DEFF Research Database (Denmark)

    Hansen, Helle Rabøl

    Paper 3: HAN091384 Victim, Perpetrator and Pupil - Teacher Perspectives on Peer Bullying Helle Rabøl Hansen, University of Aarhus This paper investigates the approaches and strategies taken up by two crucial actors in relation to bullying in schools: 1. documents indicating school policies...... and identifies a legally informed matrix, which points out unequivocal positions of perpetrators and victims. The policy document mixes the definition practices, which derive from the Olweus tradition on bullying research, into a law informed kind of discourse. Subsequently the policy document iterates...

  18. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  19. Sexual victimization, partner aggression and alcohol consumption ...

    African Journals Online (AJOL)

    This paper examines the relationship sexual victimization (both childhood sexual victimization and adult sexual victimization), aggression and alcohol consumption. The data for this research is from the Gender, Alcohol and Culture: an International Study (GENACIS). A random sample of 2070 adults (53.8% males and ...

  20. Cyberbullying perpetration and victimization among middle-school students.

    Science.gov (United States)

    Rice, Eric; Petering, Robin; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-03-01

    We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator-victim (i.e., bidirectional cyberbullying behavior). In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator-victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators-victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators-victims. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters.

  1. Cyberbullying Perpetration and Victimization Among Middle-School Students

    Science.gov (United States)

    Rice, Eric; Rhoades, Harmony; Winetrobe, Hailey; Goldbach, Jeremy; Plant, Aaron; Montoya, Jorge; Kordic, Timothy

    2015-01-01

    Objectives. We examined correlations between gender, race, sexual identity, and technology use, and patterns of cyberbullying experiences and behaviors among middle-school students. Methods. We collected a probability sample of 1285 students alongside the 2012 Youth Risk Behavior Survey in Los Angeles Unified School District middle schools. We used logistic regressions to assess the correlates of being a cyberbully perpetrator, victim, and perpetrator–victim (i.e., bidirectional cyberbullying behavior). Results. In this sample, 6.6% reported being a cyberbully victim, 5.0% reported being a perpetrator, and 4.3% reported being a perpetrator–victim. Cyberbullying behavior frequently occurred on Facebook or via text messaging. Cyberbully perpetrators, victims, and perpetrators–victims all were more likely to report using the Internet for at least 3 hours per day. Sexual-minority students and students who texted at least 50 times per day were more likely to report cyberbullying victimization. Girls were more likely to report being perpetrators–victims. Conclusions. Cyberbullying interventions should account for gender and sexual identity, as well as the possible benefits of educational interventions for intensive Internet users and frequent texters. PMID:25602905

  2. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  3. Impact of sexual harassment victimization by peers on subsequent adolescent victimization and adjustment: a longitudinal study.

    Science.gov (United States)

    Chiodo, Debbie; Wolfe, David A; Crooks, Claire; Hughes, Ray; Jaffe, Peter

    2009-09-01

    To examine gender differences in prevalence and types of sexual harassment victimization experienced in grade 9 and how it contributes to relationship victimization and psychological adjustment 2.5 years later. A total of 1734 students from 23 schools completed self-report surveys at entry to grade 9 and end of grade 11. Self-report data were collected on victimization experiences (sexual harassment, physical dating violence, peer violence, and relational victimization) and adjustment (emotional distress, problem substance use, self-harm, suicidal thoughts, maladaptive dieting, feeling unsafe at school, and perpetration of violent delinquency). Separate analyses by sex were prespecified. Sexual harassment victimization was common among boys (42.4%) and girls (44.1%) in grade 9, with girls reporting more sexual jokes, comments, and unwanted touch than among boys, and with boys reporting more homosexual slurs or receiving unwanted sexual content. For girls, sexual harassment victimization in grade 9 was associated with elevated risk of self-harm, suicidal thoughts, maladaptive dieting, early dating, substance use, and feeling unsafe at school. A similar pattern of risk was found for boys, with the exception of dieting and self-harm behaviors. Adjusted odds ratios (AOR) indicated these students were significantly more likely than nonharassed students to report victimization by peers and dating partners 2.5 years later (AOR for boys and girls, respectively; all p harassment (AOR: 2.45; 2.9), physical dating violence (AOR: 2.02; 3.73), and physical peer violence (AOR: 2.75; 2.79). Gr 9 sexual harassment also contributed significantly to emotional distress (AOR: 2.09; 2.24), problem substance use (AOR: 1.79; 2.04), and violent delinquency perpetration (AOR: 2.1; 3.34) 2.5 years later (boys and girls, respectively; all p harassment at the beginning of high school is a strong predictor of future victimization by peers and dating partners for both girls and boys, and

  4. Responding to Children Victimized by Their Peers

    Science.gov (United States)

    Nickerson, Amanda B.; Brock, Stephen E.; Chang, Yiping; O'Malley, Meagan D.

    2006-01-01

    Because victimization results from the dynamic interplay between the victim and his or her parents, peers, and teachers, responding to this problem should involve both direct and indirect interventions. This paper describes and reviews empirically supported direct interventions with victims, as well as indirect interventions with parents, peers,…

  5. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  6. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  7. Frequency of victimization experiences and well-being among online, offline and combined victims on social online network sites of German children and adolescents

    Directory of Open Access Journals (Sweden)

    Michael eGlüer

    2015-12-01

    Full Text Available Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,906 German children and adolescents (grades 5 to 10, mean age = 13.9; SD = 2.1 with and without offline or online victimization experiences who participated in a social online network (SNS. Online questionnaires were used to assess previous victimization (offline, online, combined, and without, somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others. In total, 1,362 (71.4% children and adolescents reported being a member of at least one social online network, and 377 students (28.8% reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%, whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  8. Frequency of Victimization Experiences and Well-Being Among Online, Offline, and Combined Victims on Social Online Network Sites of German Children and Adolescents.

    Science.gov (United States)

    Glüer, Michael; Lohaus, Arnold

    2015-01-01

    Victimization is associated with negative developmental outcomes in childhood and adolescence. However, previous studies have provided mixed results regarding the association between offline and online victimization and indicators of social, psychological, and somatic well-being. In this study, we investigated 1,890 German children and adolescents (grades 5-10, mean age = 13.9; SD = 2.1) with and without offline or online victimization experiences who participated in a social online network (SNS). Online questionnaires were used to assess previous victimization (offline, online, combined, and without), somatic and psychological symptoms, self-esteem, and social self-concept (social competence, resistance to peer influence, esteem by others). In total, 1,362 (72.1%) children and adolescents reported being a member of at least one SNS, and 377 students (28.8%) reported previous victimization. Most children and adolescents had offline victimization experiences (17.5%), whereas 2.7% reported online victimization, and 8.6% reported combined experiences. Girls reported more online and combined victimization, and boys reported more offline victimization. The type of victimization (offline, online, combined) was associated with increased reports of psychological and somatic symptoms, lower self-esteem and esteem by others, and lower resistance to peer influences. The effects were comparable for the groups with offline and online victimization. They were, however, increased in the combined group in comparison to victims with offline experiences alone.

  9. Emotional Problems in Traditional and Cyber Victimization

    Science.gov (United States)

    Sjursø, Ida Risanger; Fandrem, Hildegunn; Roland, Erling

    2016-01-01

    Previous studies show an association between traditional and cyber victimization. However, there seem to be differences in how these forms of being bullied relates to emotional problems in the victims. Few studies focus on symptoms of general anxiety and depression as separate variables when comparing traditional and cyber victimization.…

  10. Perceptions of teachers' support, safety, and absence from school because of fear among victims, bullies, and bully-victims.

    Science.gov (United States)

    Berkowitz, Ruth; Benbenishty, Rami

    2012-01-01

    This study examines the distribution of the types of involvement in school violence (bullies, victims, bully-victims, and students not involved in violence) among the general population of Israeli school students. The prevalence of these different types of involvement was also examined according to gender, age or school level (junior high vs. high school), and ethnicity (Jewish vs. Arab). Further, the study examines the relationships between type of involvement in school violence and students' perceptions of teachers' support, safety, and absence from school because of fear. Data were obtained from a nationally representative, stratified sample of 13,262 students in grades 7-11 who responded to a self-report questionnaire on victimization by, and perpetration of, school violence and on perceptions of school climate. Data revealed that 3.6% of all students were victims of bullying (18.5% of those involved in violence). The proportion of bully-victims among male students was 6.4% (21.9% of all involved) compared with 1.1% (11.2% of all involved) among females. Bully-victims reported the lowest levels of teacher support and feelings of security and missed school because of fear significantly more often. The results point to the uniqueness of the bully-victim group. This group presents multiple challenges for school staff with these students needing special attention. © 2012 American Orthopsychiatric Association.

  11. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  12. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  13. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  14. Social Information Processing Mechanisms and Victimization: A Literature Review.

    Science.gov (United States)

    van Reemst, Lisa; Fischer, Tamar F C; Zwirs, Barbara W C

    2016-01-01

    The aim of the current literature review, which is based on 64 empirical studies, was to assess to what extent mechanisms of the Social Information Processing (SIP) model of Crick and Dodge (1994) are related to victimization. The reviewed studies have provided support for the relation between victimization and several social information processing mechanisms, especially the interpretation of cues and self-efficacy (as part of the response decision). The relationship between victimization and other mechanisms, such as the response generation, was only studied in a few articles. Until now research has often focused on just one step of the model, instead of attempting to measure the associations between multiple mechanisms and victimization in multivariate analyses. Such analyses would be interesting to gain more insight into the SIP model and its relationship with victimization. The few available longitudinal studies show that mechanisms both predict victimization (internal locus of control, negative self-evaluations and less assertive response selection) and are predicted by victimization (hostile attribution of intent and negative evaluations of others). Associations between victimization and SIP mechanisms vary across different types and severity of victimization (stronger in personal and severe victimization), and different populations (stronger among young victims). Practice could focus on these stronger associations and the interpretation of cues. More research is needed however, to investigate whether intervention programs that address SIP mechanisms are suitable for victimization and all relevant populations. © The Author(s) 2014.

  15. Cyber socializing and victimization of women

    Directory of Open Access Journals (Sweden)

    Halder Debarati

    2009-01-01

    Full Text Available Web 2.01 has redefined the virtual life of ordinary individuals and has given wide opportunities to internet users including women to exchange ideas, interact with like minded people and participate in the development of virtual societies as per one's own choices. Social networking websites (SNWs, a segment of Web 2.0 is very popular among the internet users. However, there is a dark side of these SNW's too. They have become havens for offenders to victimize women, the most vulnerable targets in the internet, after children. In this paper, we examine the victimization of women in the social networking websites in general, analyze the trends of such victimization from socio - legal - victimological angle and ascertain the reasons for the growth of such victimization.

  16. Victim support services in England, Wales and Northern Ireland

    Directory of Open Access Journals (Sweden)

    Ćopić Sanja M.

    2002-01-01

    Full Text Available In the paper, authors tried to present activities of one of the oldest European Victim Support Services - Victim Support for England, Wales and Northern Ireland. During 1970s, through practice and research projects, the need for recognizing the physical and psychological status of victims after the crime was committed, as well as the need of providing them with the (informal assistance and support were noticed. That has resulted in establishing numerous of local victim support services (schemes, which united in the National Association of the Victim Support Services in 1979. Significant support was given to the Service in 1980s through the recommendations of the Council of Europe on the assistance for victims of crime and prevention of victimization through direct support given to the victim immediately after the incident, including protection and safety, medical, mental, social and financial support, as well as providing the victim with information on his/her rights, support during the criminal proceeding, assistance in getting compensation etc. Organization and structure of the service, referral system, code of practice and two main programs: Victim Service and Witness Service are reviewed in the paper.

  17. SHIFT: server for hidden stops analysis in frame-shifted translation.

    Science.gov (United States)

    Gupta, Arun; Singh, Tiratha Raj

    2013-02-23

    Frameshift is one of the three classes of recoding. Frame-shifts lead to waste of energy, resources and activity of the biosynthetic machinery. In addition, some peptides synthesized after frame-shifts are probably cytotoxic which serve as plausible cause for innumerable number of diseases and disorders such as muscular dystrophies, lysosomal storage disorders, and cancer. Hidden stop codons occur naturally in coding sequences among all organisms. These codons are associated with the early termination of translation for incorrect reading frame selection and help to reduce the metabolic cost related to the frameshift events. Researchers have identified several consequences of hidden stop codons and their association with myriad disorders. However the wealth of information available is speckled and not effortlessly acquiescent to data-mining. To reduce this gap, this work describes an algorithmic web based tool to study hidden stops in frameshifted translation for all the lineages through respective genetic code systems. This paper describes SHIFT, an algorithmic web application tool that provides a user-friendly interface for identifying and analyzing hidden stops in frameshifted translation of genomic sequences for all available genetic code systems. We have calculated the correlation between codon usage frequencies and the plausible contribution of codons towards hidden stops in an off-frame context. Markovian chains of various order have been used to model hidden stops in frameshifted peptides and their evolutionary association with naturally occurring hidden stops. In order to obtain reliable and persuasive estimates for the naturally occurring and predicted hidden stops statistical measures have been implemented. This paper presented SHIFT, an algorithmic tool that allows user-friendly exploration, analysis, and visualization of hidden stop codons in frameshifted translations. It is expected that this web based tool would serve as a useful complement for

  18. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  19. WebEase: Development of a Web-Based Epilepsy Self-Management Intervention

    OpenAIRE

    DiIorio, Colleen; Escoffery, Cam; Yeager, Katherine A.; Koganti, Archana; Reisinger, Elizabeth; Koganti, Archana; McCarty, Frances; Henry, Thomas R.; Robinson, Elise; Kobau, Rosemarie; Price, Patricia

    2008-01-01

    People with epilepsy must adopt many self-management behaviors, especially regarding medication adherence, stress management, and sleep quality. In response to the need for theory-based self-management programs that people with epilepsy can easily access, the WebEase Web site was created and tested for feasibility, acceptability, and usability. This article discusses the theoretical background and developmental phases of WebEase and lessons learned throughout the development process. The WebE...

  20. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  1. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  2. Divorce Aftermath: Empowering Parents...Easing the Pain.

    Science.gov (United States)

    Staley, Wanda L.

    The increase in divorce rates following the American adoption of no-fault divorce is correlated with radical changes in the lives of many parents and children. However, the dissolution of a marriage does not mean the end of a family. Family ties are forever, and family therapists can assist by easing the pain of divorce and empowering parents to…

  3. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  4. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  5. Self-esteem in adolescent aggression perpetrators, victims and perpetrator-victims, and the moderating effects of depression and family support

    Directory of Open Access Journals (Sweden)

    Peng-Wei Wang

    2013-04-01

    Full Text Available The aims of this study were (1 to examine differences in the level of self-esteem among adolescents with different roles in aggression involvement (aggression perpetrators, victims, perpetrator-victims and neutrals according to gender and (2 to examine the moderating effects of depression and family support on association between aggression involvement and self-esteem. A total of 8085 adolescents in Taiwan completed questionnaires. The relationships between self-esteem and aggression involvement were examined by multiple regression analysis. The moderating effects of depression and family support on the association between aggression involvement and self-esteem were examined. The results showed that in females, aggression victims had lower self-esteem than those in the other three groups (t=−2.940 to 2.173, p0.05. In males, self-esteem in victims and perpetrator-victims was lower than in neutrals and perpetrators (t=−3.339 to −2.704, p0.05 or between perpetrators and neutrals (t=−1.396, p>0.05. Family support had a moderating effect on the association between self-esteem and victimization in males. Depression had a moderating effect on the association between self-esteem and perpetration-victimization and victimization in males. The results indicate that self-esteem in adolescents with different patterns of involvement in aggression is not the same as in those without involvement. The moderating effects of depression and family support should be considered when developing intervention strategies to raise self-esteem in adolescents with aggression involvement.

  6. Self-esteem in adolescent aggression perpetrators, victims and perpetrator-victims, and the moderating effects of depression and family support.

    Science.gov (United States)

    Wang, Peng-Wei; Yang, Pin-Chen; Yeh, Yi-Chun; Lin, Huang-Chi; Ko, Chih-Hung; Liu, Tai-Ling; Yen, Cheng-Fang

    2013-04-01

    The aims of this study were (1) to examine differences in the level of self-esteem among adolescents with different roles in aggression involvement (aggression perpetrators, victims, perpetrator-victims and neutrals) according to gender and (2) to examine the moderating effects of depression and family support on association between aggression involvement and self-esteem. A total of 8085 adolescents in Taiwan completed questionnaires. The relationships between self-esteem and aggression involvement were examined by multiple regression analysis. The moderating effects of depression and family support on the association between aggression involvement and self-esteem were examined. The results showed that in females, aggression victims had lower self-esteem than those in the other three groups (t=-2.940 to 2.173, p0.05). In males, self-esteem in victims and perpetrator-victims was lower than in neutrals and perpetrators (t=-3.339 to -2.704, p0.05) or between perpetrators and neutrals (t=-1.396, p>0.05). Family support had a moderating effect on the association between self-esteem and victimization in males. Depression had a moderating effect on the association between self-esteem and perpetration-victimization and victimization in males. The results indicate that self-esteem in adolescents with different patterns of involvement in aggression is not the same as in those without involvement. The moderating effects of depression and family support should be considered when developing intervention strategies to raise self-esteem in adolescents with aggression involvement. Copyright © 2012. Published by Elsevier B.V.

  7. Identifying victims of violence using register-based data

    DEFF Research Database (Denmark)

    Kruse, Marie; Sørensen, Jan; Brønnum-Hansen, Henrik

    2010-01-01

    AIMS: The aim of this study was twofold. Firstly we identified victims of violence in national registers and discussed strengths and weaknesses of this approach. Secondly we assessed the magnitude of violence and the characteristics of the victims using register-based data. METHODS: We used three...... nationwide registers to identify victims of violence: The National Patient Register, the Victim Statistics, and the Causes of Death Register. We merged these data and assessed the degree of overlap between data sources. We identified a reference population by selecting all individuals in Denmark over 15....... RESULTS: In 2006, 22,000 individuals were registered as having been exposed to violence. About 70% of these victims were men. Most victims were identified from emergency room contacts and police records, and few from the Causes of Death Register. There was some overlap between the two large data sources...

  8. The impact of perceived childhood victimization and patriarchal gender ideology on intimate partner violence (IPV) victimization among Korean immigrant women in the USA.

    Science.gov (United States)

    Kim, Chunrye

    2017-08-01

    Childhood victimization experiences are common among intimate partner violence (IPV) victims. This study examines the link between childhood physical and sexual victimization experiences and adulthood IPV among Korean immigrant women in the USA. As Korean immigrants often use physical punishment to discipline their children, and reporting sexual abuse is discouraged due to stigmatization in this community, cultural factors (e.g. patriarchal values) related to childhood victimization and IPV were also examined. Survey data from Korean immigrant women in the USA were collected. Using a case-control design, we compared 64 Korean immigrant women who have experienced IPV in the past year with 63 Korean immigrant women who have never experienced IPV in their lifetime. The findings of this study reveal that IPV victims, compared with non-victims, experienced higher childhood victimization rates. Logistic regression analysis demonstrated that childhood victimization and patriarchal gender ideology strongly predict IPV victimization among Korean immigrants. However, patriarchal values did not moderate the relationship between childhood victimization and IPV. To prevent IPV among Korean immigrant population, we need to make special efforts to prevent childhood abuse and change ingrained cultural attitudes about child physical and sexual abuse among immigrant communities through culturally sensitive programs. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Victimisation and poverty: About victims and victimised in Serbia

    Directory of Open Access Journals (Sweden)

    Ljubičić Milana

    2014-01-01

    Full Text Available This paper is a theoretical analysis of the scientific and public discourse of victimization on the example of Serbia. The analysis has two objectives: to review the justification for the use of the concept of victim defined in the traditional way - within the legal framework; and in relation to this, to offer a different view on victimization. The process of becoming a victim is recognized as a social construct, created as a result of negotiations between the (non- formal social structure: institutions, the media, and the audience - those who stand aside, criminals and victims. In the process, some of the victims are assigned a status of justified, while others are sacrificed. There are rearely true parallels between them. Thus, unlike justified, whose suffering is perceived by public and political structures as a cause for the introduction of penal populism, the sacrificed rarely encounter any empathy. Even when they are victimized by conventional crime, the victims do not have the power to mobilize the public in a loud protest and call for change in legal practice. In the final score, it seems that the role victims are assigned largely depend of their social scale position.

  10. Interparental Conflict, Parenting Behavior, and Children's Friendship Quality as Correlates of Peer Aggression and Peer Victimization Among Aggressor/Victim Subgroups in South Korea.

    Science.gov (United States)

    Shin, Jung-Hee; Hong, Jun Sung; Yoon, Jina; Espelage, Dorothy L

    2014-07-01

    The focus of this study was to examine whether interparental conflict, maternal parenting behaviors, and children's friendship quality varied as a function of peer aggression/victim subgroups among a sample of 227 elementary school children and their mothers in South Korea. Both self-report and peer-report data indicated that the majority of the students were uninvolved in peer aggression situations, and the number of participants in the subgroups (aggressors, victims, and aggressor-victims) varied depending on the source of report. According to the self-report data, victims and aggressor-victims reported a higher level of maternal rejection than uninvolved youth. Aggressors, victims, and aggressor-victims reported higher maternal neglect than uninvolved youth. The highest level of interparental conflict was reported by victims, followed by aggressors. Interestingly, no significant differences were found in positive functioning of friendship quality among the subgroups, although results indicated a significant difference among groups in negative friendship quality. © The Author(s) 2013.

  11. Pre-hospital care time intervals among victims of road traffic injuries in Iran. A cross-sectional study

    Directory of Open Access Journals (Sweden)

    Bigdeli Maryam

    2010-07-01

    Full Text Available Abstract Background Road traffic injuries (RTIs are a major public health problem, requiring concerted efforts both for their prevention and a reduction of their consequences. Timely arrival of the Emergency Medical Service (EMS at the crash scene followed by speedy victim transportation by trained personnel may reduce the RTIs' consequences. The first 60 minutes after injury occurrence - referred to as the "golden hour"- are vital for the saving of lives. The present study was designed to estimate the average of various time intervals occurring during the pre-hospital care process and to examine the differences between these time intervals as regards RTIs on urban and interurban roads. Method A retrospective cross-sectional study was designed and various time intervals in relation to pre-hospital care of RTIs identified in the ambulance dispatch centre in Urmia, Iran from 20 March 2005 to 20 March 2007. All cases which resulted in ambulance dispatches were reviewed and those that had complete data on time intervals were analyzed. Results In total, the cases of 2027 RTI victims were analysed. Of these, 61.5 % of the subjects were injured in city areas. The mean response time for city locations was 5.0 minutes, compared with 10.6 minutes for interurban road locations. The mean on-scene time on the interurban roads was longer than on city roads (9.2 vs. 6.1 minutes, p Conclusion The response, transport and total time intervals among EMS responding to RTI incidents were longer for interurban roads, compared to the city areas. More research should take place on needs-to and access-for EMS on city and interurban roads. The notification interval seems to be a hidden part of the post-crash events and indirectly affects the "golden hour" for victim management and it needs to be measured through the establishment of the surveillance systems.

  12. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  13. Extracting hidden-photon dark matter from an LC-circuit

    International Nuclear Information System (INIS)

    Arias, Paola; Arza, Ariel; Gamboa, Jorge; Mendez, Fernando

    2014-11-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden-photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space.

  14. Extracting Hidden-Photon Dark Matter From an LC-Circuit

    CERN Document Server

    Arias, Paola; Döbrich, Babette; Gamboa, Jorge; Méndez, Fernando

    2015-01-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden- photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space.

  15. Victims of Bullying in Schools

    Science.gov (United States)

    Graham, Sandra

    2016-01-01

    This article provides an overview of current research on bullying (peer victimization, peer harassment) in school, with a focus on victims of such bullying. The 1st section provides a working definition of bullying and its many forms. The 2nd section describes some of the known consequences of being bullied for mental health, physical health, and…

  16. Victimization experiences of adolescents in Malaysia.

    Science.gov (United States)

    Choo, Wan-Yuen; Dunne, Michael P; Marret, Mary J; Fleming, Marylou; Wong, Yut-Lin

    2011-12-01

    There has been little community-based research regarding multiple-type victimization experiences of young people in Asia, and none in Malaysia. This study aimed to estimate prevalence, explore gender differences, as well as describe typical perpetrators and family and social risk factors among Malaysian adolescents. A cross-sectional survey of 1,870 students was conducted in 20 randomly selected secondary schools in Selangor state (mean age: 16 years; 58.8% female). The questionnaire included items on individual, family, and social background and different types of victimization experiences in childhood. Emotional and physical types of victimization were most common. A significant proportion of adolescents (22.1%) were exposed to more than one type, with 3% reporting all four types. Compared with females, males reported more physical, emotional, and sexual victimization. The excess of sexual victimization among boys was due to higher exposure to noncontact events, whereas prevalence of forced intercourse was equal for both genders (3.0%). Although adult male perpetrators predominate, female adults and peers of both genders also contribute substantially. Low quality of parent-child relationships and poor school and neighborhood environments had the strongest associations with victimization. Family structure (parental divorce, presence of step-parent or single parent, or household size), parental drug use, and rural/urban location were not influential in this sample. This study extends the analysis of multiple-type victimization to a Malaysian population. Although some personal, familial, and social factors correlate with those found in western nations, there are cross-cultural differences, especially with regard to the nature of sexual violence based on gender and the influence of family structure. Copyright © 2011 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  17. Adolescent Violent Victimization and Precocious Union Formation.

    Science.gov (United States)

    C Kuhl, Danielle; Warner, David F; Wilczak, Andrew

    2012-11-01

    This article bridges scholarship in criminology and family sociology by extending arguments about "precocious exits" from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization ("street" violence) on the timing of first co-residential union formation-differentiating between marriage and cohabitation-in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance.

  18. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  19. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  20. Secrecy and persistent problems in sexual assault victims.

    NARCIS (Netherlands)

    Ensink, B.J.; Winkel, F.W.; Berlo, van W.

    2001-01-01

    A substantial number of victims of sexual assault refrain from disclosing to others the victimizing episode and its emotional consequences. A prospective study (n = 36 rape victims reporting theirvictimization to the police) and a retrospective study (n = 33) were conducted to examine the

  1. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  2. Availability of and ease of access to calorie information on restaurant websites.

    Directory of Open Access Journals (Sweden)

    Gary G Bennett

    Full Text Available Offering calories on restaurant websites might be particularly important for consumer meal planning, but the availability of and ease of accessing this information are unknown.We assessed websites for the top 100 U.S. chain restaurants to determine the availability of and ease of access to calorie information as well as website design characteristics. We also examined potential predictors of calorie availability and ease of access.Eighty-two percent of restaurants provided calorie information on their websites; 25% presented calories on a mobile-formatted website. On average, calories could be accessed in 2.35±0.99 clicks. About half of sites (51.2% linked to calorie information via the homepage. Fewer than half had a separate section identifying healthful options (46.3%, or utilized interactive meal planning tools (35.4%. Quick service/fast casual, larger restaurants, and those with less expensive entrées and lower revenue were more likely to make calorie information available. There were no predictors of ease of access.Calorie information is both available and largely accessible on the websites of America's leading restaurants. It is unclear whether consumer behavior is affected by the variability in the presentation of calorie information.

  3. Availability of and ease of access to calorie information on restaurant websites.

    Science.gov (United States)

    Bennett, Gary G; Steinberg, Dori M; Lanpher, Michele G; Askew, Sandy; Lane, Ilana B; Levine, Erica L; Goodman, Melody S; Foley, Perry B

    2013-01-01

    Offering calories on restaurant websites might be particularly important for consumer meal planning, but the availability of and ease of accessing this information are unknown. We assessed websites for the top 100 U.S. chain restaurants to determine the availability of and ease of access to calorie information as well as website design characteristics. We also examined potential predictors of calorie availability and ease of access. Eighty-two percent of restaurants provided calorie information on their websites; 25% presented calories on a mobile-formatted website. On average, calories could be accessed in 2.35±0.99 clicks. About half of sites (51.2%) linked to calorie information via the homepage. Fewer than half had a separate section identifying healthful options (46.3%), or utilized interactive meal planning tools (35.4%). Quick service/fast casual, larger restaurants, and those with less expensive entrées and lower revenue were more likely to make calorie information available. There were no predictors of ease of access. Calorie information is both available and largely accessible on the websites of America's leading restaurants. It is unclear whether consumer behavior is affected by the variability in the presentation of calorie information.

  4. Do targets of workplace bullying portray a general victim personality profile?

    Science.gov (United States)

    Glasø, Lars; Matthiesen, Stig Berge; Nielsen, Morten Birkeland; Einarsen, Ståle

    2007-08-01

    The aim of this study is to examine differences in personality between a group of bullied victims and a non-bullied group. The 144 participants, comprising of 72 victims and a matched contrast group of 72 respondents, completed Goldberg's (1999) International Personality Item Pool (IPIP). Significant differences emerged between victims and non-victims on four out of five personality dimensions. Victims tended to be more neurotic and less agreeable, conscientious and extravert than non-victims. However, a cluster analysis revealed that the victim sample can be divided into two personality groups. One cluster, which comprised 64% of the victim sample, do not differ from non-victims as far as personality is concerned. Hence, the results indicate that there is no such thing as a general victim personality profile. However, a small cluster of victims tended to be less extrovert, less agreeable, less conscientious, and less open to experience but more emotional unstable than victims in the major cluster and the control group. Further, both clusters of victims scored higher than non-victims on emotional instability, indicating that personality should not be neglected as being a factor in understanding the bullying phenomenon.

  5. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  6. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  7. Behavioral and Mental Health Correlates of Youth Stalking Victimization

    Science.gov (United States)

    Reidy, Dennis E.; Smith-Darden, Joanne P.; Kernsmith, Poco D.

    2018-01-01

    Introduction Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. Methods A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Results Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. Conclusions These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. PMID:27743623

  8. Growing with EASE: Eating, Activity, and Self-Esteem

    Science.gov (United States)

    Huettig, Carol; Rich, Shannon; Engelbrecht, Jo Ann; Sanborn, Charlotte; Essery, Eve; DiMarco, Nancy; Velez, Luisa; Levy, Luba

    2006-01-01

    A diverse group of professionals associated with Texas Woman's University's Institute for Women's Health, working collaboratively with school administrators, teachers, family support teams, and family members, developed Growing with EASE: Eating, Activity, and Self-Esteem, a nutrition program for young children and their families. In tracking the…

  9. Peer victimization and peer rejection during early childhood

    Science.gov (United States)

    Godleski, Stephanie A.; Kamper, Kimberly E.; Ostrov, Jamie M.; Hart, Emily J.; Blakely-McClure, Sarah J.

    2014-01-01

    Objective The development and course of the subtypes of peer victimization is a relatively understudied topic despite the association of victimization with important developmental and clinical outcomes. Moreover, understanding potential predictors, such as peer rejection and emotion regulation, in early childhood may be especially important to elucidate possible bi-directional pathways between relational and physical victimization and rejection. The current study (N = 97) was designed to explore several gaps and limitations in the peer victimization and peer rejection literature. In particular, the prospective associations between relational and physical victimization and peer rejection over the course of 3.5 months during early childhood (i.e., 3- to 5- years-old) were investigated in an integrated model. Method The study consisted of 97 (42 girls) preschool children recruited from four early childhood schools in the northeast of the US. Using observations, research assistant report and teacher report, relational and physical aggression, relational and physical victimization, peer rejection, and emotion regulation were measured in a short-term longitudinal study. Path analyses were conducted to test the overall hypothesized model. Results Peer rejection was found to predict increases in relational victimization. In addition, emotion regulation was found to predict decreases in peer rejection and physical victimization. Conclusions Implications for research and practice are discussed, including teaching coping strategies for peer rejection and emotional distress. PMID:25133659

  10. Debate of victims studies. 1. ed.

    International Nuclear Information System (INIS)

    Kosovski, E.; Piedade Junior, H.; Mayr, E.

    1990-01-01

    This book shows some aspects and the effects of several types of accidents in the victims, including the psychological considerations, changes in theirs behaviour, concepts, clinical diagnostic, etc. Victims of nuclear, transit terrorism and work accidents are studied. (C.G.C.)

  11. Evaluate the effect of perceived ease and usefulness,customer's ...

    African Journals Online (AJOL)

    Evaluate the effect of perceived ease and usefulness,customer's awareness and confidence by mobile bank on tendency to use (intended use) of mobile bank's system (case study of customers of Khuzestan's Tejarat bankbranches)

  12. TrapEase inferior vena cava filter placement: use of the subclavian vein.

    Science.gov (United States)

    Stone, Patrick A; Aburahma, Ali F; Hass, Stephen M; Hofeldt, Matthew J; Zimmerman, William B; Deel, John T; Deluca, John A

    2004-01-01

    The purpose of this paper was to evaluate the safety and technical success of TrapEase inferior vena cava filter placement via the subclavian vein. As of yet, no reports in the literature have specifically investigated the use of the subclavian vein as a route for deploying TrapEase vena cava filters. Retrospective chart review was conducted of 135 patients with attempted TrapEase inferior vena cava filter placement over a 2-year period. In a majority of cases, the choice of subclavian vein approach was based primarily on surgeon preference. Other circumstances for subclavian vein deployment included cervical immobilization secondary to trauma, desire for concomitant placement of a subclavian long-term central venous access catheter, and patient body habitus limiting exposure to the internal jugular vein. One hundred and thirty-five filters were placed over this 2-year period. The internal jugular vein approach was used in 56 patients, the femoral vein approach in 39 patients, and the subclavian vein approach in 40 patients. Thirty-nine of the 40 TrapEase filter placements using the subclavian vein were successful. Twenty-six were deployed through the right subclavian vein and 14 through the left subclavian vein. The single failed subclavian deployment was due to the inability to pass the guidewire adequately into the inferior vena cava after successful cannulation of the right subclavian vein. The average deployment time for subclavian vein placement was 26 minutes when TrapEase filter placement was the only procedure performed. No insertional complications were encountered, specifically no pneumothoraces confirmed by chest radiography or fluoroscopy. The subclavian vein provides an alternative site of access for the TrapEase inferior vena cava filter. This route is comparable to other alternative methods evaluated both in average deployment time and complication occurrence. Furthermore, the subclavian vein route is valuable in patients with limited central access

  13. Extracting hidden-photon dark matter from an LC-circuit

    International Nuclear Information System (INIS)

    Arias, Paola; Arza, Ariel; Gamboa, Jorge; Mendez, Fernando; Doebrich, Babette

    2015-01-01

    We point out that a cold dark matter condensate made of gauge bosons from an extra hidden U(1) sector - dubbed hidden photons - can create a small, oscillating electric density current. Thus, they could also be searched for in the recently proposed LC-circuit setup conceived for axion cold dark matter search by Sikivie, Sullivan and Tanner. We estimate the sensitivity of this setup for hidden-photon cold dark matter and we find it could cover a sizable, so far unexplored parameter space. (orig.)

  14. How to become a victim of crime

    Directory of Open Access Journals (Sweden)

    Богдан Миколайович Головкін

    2017-03-01

    Full Text Available Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1 the emergence of criminal threats; 2 increasing the degree of social vulnerability to criminal assault; 3 the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations; 4 increase the number of victims of crimes as registered and latent, which helps re-victimization of some of them. As a result of our Internet survey of more than 3002 people (2015 defined the proportion of citizens who every year are victims of crime. By 2015 it is 37 %. However, one in seven respondents already had experience of victimization before. In our view, there is a threshold of permissible viktymizovanosti population not exceeding 40 % and is independent of the level of crime in a calendar year or an. Typically, victims of crime every year are new faces. Re-victimization experiences 15 % of citizens. The risk of becoming a victim of crime depends on the accuracy and timeliness of recognition of sources and types of criminal threats. Showed a rather stereotypical ideas of the criminal threat and showed a disorientation in identifying their sources. The last mentioned some time. Traditionally people cautious attitude to strangers, suspicious issued and may bear criminal intent (62 %; alarming stay at poorly attended locations in the dark (67 % and likelihood of falling into unpredictable situations (44 %. Only 15% of respondents sees the source of victimization in their own dangerous behavior. While the public understanding of the sources of victimization are largely abstract and false character. So, to our knowledge, most people are afraid of violent crime (64 %, but actually experiencing mercenary crimes (60 %. In the context of what has been said quite expected the place called criminal

  15. Toward establishing basic rights of victims in Japan

    Directory of Open Access Journals (Sweden)

    Morosawa Hidemichi

    2008-01-01

    Full Text Available The author talks about improving victim rights in Japan and his important role in it. A period of Victims’ Renaissance in Japan began in the 1990s when the Japanese Association of Victimology and Mito Victim Assistance Cener, first non-governmental community-based integrated victim support center in Japan were established. Since May 1999 to May 2004, four laws such as “Crime Victim Protection Law”, “Child Abuse Prevention Law”, “Law for Proscribing Stalking Behavior” and so on were enacted and six laws were reformed. The word “rights of victim”, did not appear in any laws. After 2000, the National Association of Crime Victims and Surviving Families (NAVS played an important role. This Association achieved a great success in securing victims a position as the subject of rights. In June 2007, Japan changed the Criminal Procedure Law. This new law will be effective on six months after the day of promulgation. Japanese Government will promulgate it till the end of 2007. Under this new law, crime victims will be allowed to take part in criminal trials, and also make statements during trials.

  16. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  17. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  18. STS-61B Astronaut Spring During EASE Extravehicular Activity (EVA)

    Science.gov (United States)

    1985-01-01

    The crew assigned to the STS-61B mission included Bryan D. O'Conner, pilot; Brewster H. Shaw, commander; Charles D. Walker, payload specialist; mission specialists Jerry L. Ross, Mary L. Cleave, and Sherwood C. Spring; and Rodolpho Neri Vela, payload specialist. Launched aboard the Space Shuttle Atlantis November 28, 1985 at 7:29:00 pm (EST), the STS-61B mission's primary payload included three communications satellites: MORELOS-B (Mexico); AUSSAT-2 (Australia); and SATCOM KU-2 (RCA Americom). Two experiments were conducted to test assembling erectable structures in space: EASE (Experimental Assembly of Structures in Extravehicular Activity), and ACCESS (Assembly Concept for Construction of Erectable Space Structure). In a joint venture between NASA/Langley Research Center in Hampton, Virginia, and the Marshall Space Flight Center (MSFC), the EASE and ACCESS were developed and demonstrated at MSFC's Neutral Buoyancy Simulator (NBS). In this STS-61B onboard photo, astronaut Spring was working on the EASE during an Extravehicular Activity (EVA). The primary objective of this experiment was to test the structural assembly concepts for suitability as the framework for larger space structures and to identify ways to improve the productivity of space construction.

  19. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  20. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  1. Simple grain mill boosts production and eases women's workload ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... grain mill boosts production and eases women's workload. 11 janvier 2013. Image ... It aims to increase the production, improve the processing, develop new ... farmer societies, women's self-help groups, and the food-processing industry.

  2. Bullying among schoolchildren: differences between victims and aggressors.

    Science.gov (United States)

    Garcia-Continente, Xavier; Pérez-Giménez, Anna; Espelt, Albert; Nebot Adell, Manel

    2013-01-01

    To identify the factors associated with bullying behaviors among adolescents by analyzing victims, aggressors and victims/aggressors separately. A cross-sectional study was performed in a representative sample of 3,089 secondary school students (13-18 years old) in Barcelona (Spain). To define bullying behaviors, we used three questions about different types of mistreatment (jeering, attacking, marginalizing). Compared with secondary school students not involved in bullying, victims, aggressors and victims/aggressors were more likely to be boys and to report negative mood states. Victims were younger, were more overweight or obese and were lighter cannabis users, while aggressors were also younger but reported more antisocial behaviors and more cannabis and alcohol use. Victims/aggressors reported more antisocial behaviors and were overweight. Being involved in bullying, independently of the role adopted, was associated with health-related problems, which can lead to psychological disorders in adulthood. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  3. Sexual violence against children: authors, victims and consequences.

    Science.gov (United States)

    Platt, Vanessa Borges; Back, Isabela de Carlos; Hauschild, Daniela Barbieri; Guedert, Jucélia Maria

    2018-04-01

    The scope of this study was to identify the characteristics of sexual abuse against children including the profiles of the victims and the perpetrators, and associated factors notified in a health service of reference with the database of the Brazilian Case Registry Database, in a city in the south of Brazil. Categorical variables are presented in prevalence with 95% confidence intervals. There were 489 notifications from 2008 to 2014 of confirmed or suspected child sexual abuse. The majority was related to female victims, but the repeated abuse was reported mainly with male victims. In most cases, the abuse took place at the victims' or perpetrators' homes and the main perpetrators of abuse were male and acquainted with the victims. Twelve victims have contracted sexually transmitted infections; pregnancies were six, five of them legally terminated. This study highlights that the child sexual abuse profiles were similar in almost all of Brazilian regions, showing that it is possible to have a coordinated national action to prevent this offence.

  4. Alcohol Involvement in Homicide Victimization in the U.S

    Science.gov (United States)

    Naimi, Timothy S.; Xuan, Ziming; Cooper, Susanna E.; Coleman, Sharon M.; Hadland, Scott E.; Swahn, Monica H.; Heeren, Timothy C.

    2016-01-01

    Background Although the association between alcohol and homicide is well documented, there has been no recent study of alcohol involvement in homicide victimization in U.S. states. The objective of this paper was to determine the prevalence of alcohol involvement in homicide victimization and identify socio-demographic and other factors associated with alcohol involvement in homicide victimization. Methods Data from homicide victims with a reported blood alcohol content (BAC) level were analyzed from 17 states from 2010–12 using the National Violent Death Reporting System. Logistic regression was used to investigate factors associated with the odds of homicide victims having a BAC ≥0.08%. Results Among all homicide victims, 39.9% had a positive BAC including 13.7% with a BAC between 0.01%–0.79% and 26.2% of victims with a BAC ≥0.08%. Males were twice as likely as females to have a BAC ≥0.08% (29.1% vs. 15.2%; p homicide victims having a BAC ≥0.08 included male sex, American Indian/Alaska Native race, Hispanic ethnicity, history of intimate partner violence, and non-firearm homicides. Conclusions Alcohol is present in a substantial proportion of homicide victims in the U.S., with substantial variation by state, demographic and circumstantial characteristics. Future studies should explore the relationships between state-level alcohol policies and alcohol-involvement among perpetrators and victims of homicide. PMID:27676334

  5. Emergency Care of the Snakebite Victim.

    Science.gov (United States)

    Ballard, Carol N.

    1994-01-01

    Describes emergency care of snakebite victims, including noting signs and symptoms of venomous snakebites, keeping the victim calm, and seeking immediate medical attention. Provides information on variables that affect the amount of injected venom and how to distinguish nonpoisonous from poisonous snakes. (LP)

  6. Trafficking in persons : A victim's perspective

    NARCIS (Netherlands)

    Rijken, Conny; Rijken, Conny; Piotrowicz, Ryszard; Uhl, Baerbel Heide

    2017-01-01

    Historically, protection and assistance to victims of human trafficking in many countries is anchored in migration law and dependent on whether or not a residence permit is granted to the victim. Apart from some limited exceptions, cooperation with law enforcement authorities in criminal

  7. Victimization by Siblings in Children with Disability or Weight Problems.

    Science.gov (United States)

    Tucker, Corinna J; Finkelhor, David; Turner, Heather

    Children with a physical disability, psychological disorder, or of nonnormative weight are often targets of peer victimization. Sibling victimization, however, is more common than peer victimization, but rarely explored. We investigated linkages between sibling victimization and whether children had a physical disability, psychological disorder (i.e., internalizing disorder, attention deficit disorder/attention-deficit hyperactivity disorder), and were perceived by parents as being thinner than average or overweight. Also, we explored how the extent and kinds of sibling victimization experiences were related to these characteristics in childhood. A US probability sample of adult caregivers of a child aged 0 to 9 (N = 780; 50% women; mean age 4.58) in 2-child households who completed a telephone interview. Controlling for other forms of maltreatment and individual and family characteristics, children with a physical disability and parent-perceived children who are thinner than average and children who are overweight experienced more sibling victimization. Children with an internalizing disorder experienced less sibling victimization. Sibling victimization did not differ for children with and without ADHD. Children perceived to be overweight by parents and children with a physical disability were at increased risk of experiencing more types of sibling victimization. Children with a physical disability had greater odds of being victims of property victimization by a sibling. Children with a physical disability or perceived as different from average weight are at risk for sibling victimization. Using a nationally representative sample, this is the first study to highlight the importance of screening for sibling victimization in families of children with a disability and/or nonnormative weight status.

  8. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  9. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  10. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  11. Adolescent Violent Victimization and Precocious Union Formation*

    Science.gov (United States)

    C. Kuhl, Danielle; Warner, David F.; Wilczak, Andrew

    2013-01-01

    This article bridges scholarship in criminology and family sociology by extending arguments about “precocious exits” from adolescence to consider early union formation as a salient outcome of violent victimization for youths. Research indicates that early union formation is associated with several negative outcomes; yet the absence of attention to union formation as a consequence of violent victimization is noteworthy. We address this gap by drawing on life course theory and data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effect of violent victimization (“street” violence) on the timing of first co-residential union formation—differentiating between marriage and cohabitation—in young adulthood. Estimates from Cox proportional hazard models show that adolescent victims of street violence experience higher rates of first union formation, especially marriage, early in the transition to adulthood; however, this effect declines with age, as such unions become more normative. Importantly, the effect of violent victimization on first union timing is robust to controls for nonviolent delinquency, substance abuse, and violent perpetration. We conclude by discussing directions for future research on the association between violent victimization and coresidential unions with an eye toward the implications of such early union formation for desistance. PMID:24431471

  12. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  13. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  14. Rumination mediates the association between cyber-victimization and depressive symptoms.

    Science.gov (United States)

    Feinstein, Brian A; Bhatia, Vickie; Davila, Joanne

    2014-06-01

    The current study examined the 3-week prospective associations between cyber-victimization and both depressive symptoms and rumination. In addition, a mediation model was tested, wherein rumination mediated the association between cyber-victimization and depressive symptoms. Participants (N = 565 college-age young adults) completed online surveys at two time points 3 weeks apart. Results indicated that cyber-victimization was associated with increases in both depressive symptoms and rumination over time. Furthermore, results of the path analysis indicated that cyber-victimization was associated with increases in rumination over time, which were then associated with greater depressive symptoms, providing support for the proposed mediation effect for women, but not men. Findings extend previous correlational findings by demonstrating that cyber-victimization is associated with increases in symptomatology over time. Findings also suggest that the negative consequences of cyber-victimization extend beyond mental health problems to maladaptive emotion regulation. In fact, rumination may be a mechanism through which cyber-victimization influences mental health problems, at least for women. Mental health professionals are encouraged to assess cyber-victimization as part of standard victimization assessments and to consider targeting maladaptive emotion regulation in addition to mental health problems in clients who have experienced cyber-victimization.

  15. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents: A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    Eijnden, R.J.J.M. van den; Vermulst, A.A.; Rooij, A.J. van; Scholte, R.H.J.; Mheen, H. van de

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  16. The Bidirectional Relationships Between Online Victimization and Psychosocial Problems in Adolescents : A Comparison with Real-Life Victimization

    NARCIS (Netherlands)

    van den Eijnden, Regina; Vermulst, Ad; van Rooij, Antonius J.; Scholte, Ron; van de Mheen, Dike

    2014-01-01

    Although peer victimization is of major concern and adolescents spend increasing amounts of time on the Internet, relatively little is known about the psychosocial antecedents and consequences of online victimization. The main aim of this study was to compare the psychosocial antecedents and

  17. How to become a victim of crime

    OpenAIRE

    Богдан Миколайович Головкін

    2017-01-01

    Victimization from crime – a higher degree of social vulnerability criminal, contributing to the commission of crimes against them in certain circumstances. Victimization takes place in space and time, and includes four stages: 1) the emergence of criminal threats; 2) increasing the degree of social vulnerability to criminal assault; 3) the harm to individuals who find themselves in a vulnerable state at appropriate conditions (situations); 4) increase the number of victims of crimes as regis...

  18. The Effects of Victim Age, Perceiver Gender, and Parental Status on Perceptions of Victim Culpability When Girls or Women Are Sexually Abused.

    Science.gov (United States)

    Klettke, Bianca; Mellor, David

    2018-05-01

    This study investigated perceptions of victim culpability in sexual assaults against girls and women according to victim age, perceiver gender, and perceiver parental status. Overall, 420 jury-eligible participants completed an online survey recording their attributions of guilt, responsibility, and blame toward 10-, 15-, and 20-year-old girls and women in relation to sexual assault. Attributions of culpability were affected by whether the victim physically or verbally resisted the abuse, wore sexually revealing clothes, or was described as having acted promiscuously. Fifteen-year-old victims were perceived as more culpable for the abuse than 10-year-old victims. Implications of these findings are discussed.

  19. The Association Between Familial Homelessness, Aggression, and Victimization Among Children.

    Science.gov (United States)

    Jetelina, Katelyn K; Reingle Gonzalez, Jennifer M; Cuccaro, Paula M; Peskin, Melissa F; Elliott, Marc N; Coker, Tumaini R; Mrug, Sylvie; Davies, Susan L; Schuster, Mark A

    2016-12-01

    The purpose of this study was to evaluate the relationship between the number of periods children were exposed to familial homelessness and childhood aggression and victimization. Survey data were obtained from 4,297 fifth-grade children and their caregivers in three U.S. cities. Children and primary caregivers were surveyed longitudinally in 7th and 10th grades. Family homelessness, measured at each wave as unstable housing, was self-reported by the caregiver. Children were categorized into four mutually exclusive groups: victim only, aggressor only, victim-aggressor, and neither victim nor aggressor at each time point using validated measures. Multinomial, multilevel mixed models were used to evaluate the relationship among periods of homelessness and longitudinal victimization, aggression, and victim aggression compared to children who were nonvictims and nonaggressors. Results suggest that children who experienced family homelessness were more likely than domiciled children to report aggression and victim aggression but not victimization only. Multivariate analyses suggested that even brief periods of homelessness were positively associated with aggression and victim aggression (relative to neither) compared to children who were never homeless. Furthermore, childhood victimization and victim aggression significantly decreased from 5th grade to 10th grade while aggression significantly increased in 10th grade. Children who experienced family homelessness for brief periods of time were significantly more likely to be a victim-aggressor or aggressor compared to those who were never homeless. Prevention efforts should target housing security and other important factors that may reduce children's likelihood of aggression and associated victimization. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  20. Commentary (Victim Participation in the International Criminal Court)

    DEFF Research Database (Denmark)

    Marchuk, Iryna

    2014-01-01

    Victim participation is one of the most innovative aspects introduced in the legal framework of the International Criminal Court (hereinafter – ICC), which has not featured in the practices of other international criminal courts and tribunals. The approach of the ad hoc tribunals to victims...... was very ‘consumer like’ because victims were solely used as witnesses to testify about the crimes attributed to the accused, but they were not granted broad participatory rights in the proceedings. The drafters of the Rome Statute acknowledged wide-ranging interests of victims who, apart from seeking...

  1. Quality of life of victims, bullies, and bully/victims among school-aged children in the Netherlands

    NARCIS (Netherlands)

    Klein Velderman, M.; Dorst, A.G. van; Wiefferink, C.H.; Detmar, S.B.; Paulussen, T.G.W.M.

    2008-01-01

    Two studies were conducted to examine the Quality of Life (QoL) of victims, bullies and bully/victims among Dutch school-aged children. Study 1 studied associations of QoL dimensions with self-reported victimisation in the Dutch sample from the KIDSCREEN Project (N = 1,669). Study 2 examined QoL of

  2. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  3. Modeling the mental health effects of victimization among homeless persons

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F.; Pollio, David

    2014-01-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults. PMID:18703266

  4. Modeling the mental health effects of victimization among homeless persons.

    Science.gov (United States)

    Perron, Brian Edward; Alexander-Eitzman, Ben; Gillespie, David F; Pollio, David

    2008-11-01

    Homeless persons are victims of violent and non-violent crime at higher rates than housed populations. While studies have suggested that victimization can induce or exacerbate mental health problems, there is very little known about factors that may buffer the effects of victimization. This cross-sectional study examined the influence of victimization on depressive symptoms in over 9600 homeless and mentally ill adults participating in the Access to Community Care and Effective Services and Supports study (ACCESS) conducted in multiple cities across the USA relationships between victimization, depressive symptoms, and perceived safety were tested within a structural equation modeling framework using data collected at the baseline interview. The overall model exhibited a good fit with the data. Non-physical victimization was associated with higher levels of depressive symptoms, and physical victimization was associated with lower levels of perceived safety. As hypothesized, perceived safety was a significant partial mediator of depressive symptoms. These results underscore the complexity of the relationships between victimization and depression in homeless adults and the importance of addressing different types of victimization in homeless and mentally ill adults.

  5. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  6. Intraosseous Administration of Antidotes in the Chemical Weapons Victim - An Alternative to the Intravenous Route

    International Nuclear Information System (INIS)

    Borron, S. W.; Arias, J. C.

    2007-01-01

    Hazardous materials paradigms call for definitive treatment of chemical victims to begin in the 'warm zone' during decontamination. This delay may result in lethal outcomes, particularly in the case of multiple victims, where rescue may be delayed due to insufficient numbers of rescue teams. It is virtually impossible for rescuers in full protective gear to establish intravenous lines. In recent years, significant advances have been made in intraosseous (IO) infusion devices. An IO device developed in our institution, the EZ-IO, is very easily placed by rescuers in typical work uniforms. IO placement takes longer while in protective gear, but is feasible. The IO is equivalent to an intravenous line, allowing more rapid administration of antidotes in the event of chemical mass casualties. Antidotes not amenable to intramuscular administration and even those often given IM may be more effective given IO. IO administration has the following possible advantages over intravenous or intramuscular antidote administration: 1. Drugs administered IO reach the vascular system virtually instantaneously. 2. IO administration may be performed in protective clothing and could theoretically be employed while awaiting rescue. 3. IO administration may be preferred over intravenous administration in the warm zone. In summary, IO administration of antidotes should be further evaluated for use in chemical disasters. The ease and speed of placement, ready access to the vascular tree, and potential for earlier intervention make it a potentially ideal means of vascular access and antidotal administration in the mass casualty situation. (author)

  7. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  8. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  9. Between "Victims" and "Criminals"

    DEFF Research Database (Denmark)

    Plambech, Sine

    2014-01-01

    This article is about the lives of Nigerian sex workers after deportation from Europe, as well as the institutions that intervene in their migration trajectories. In Europe, some of these women's situations fit the legal definitions of trafficking, and they were categorized as “victims of human...... trafficking”; others were categorized as undocumented migrants—“criminals” guilty of violating immigration laws. Despite the growing political attention devoted to protecting victims of trafficking, I argue that in areas of Nigeria prone to economic insecurity and gender-based violence, the categories...

  10. The reciprocal relationship between sexual victimization and sexual assertiveness.

    Science.gov (United States)

    Livingston, Jennifer A; Testa, Maria; VanZile-Tamsen, Carol

    2007-03-01

    Low sexual assertiveness has been proposed as a possible mechanism through which sexual revictimization occurs, yet evidence for this has been mixed. In this study, prospective path analysis was used to examine the relationship between sexual refusal assertiveness and sexual victimization over time among a community sample of women. Results provide support for a reciprocal relationship, with historical victimization predicting low sexual assertiveness and low sexual assertiveness predicting subsequent victimization. The effect of recent sexual victimization on subsequent sexual assertiveness also was replicated prospectively. These findings suggest that strengthening sexual assertiveness may help reduce vulnerability to future victimization.

  11. There are no "innocent victims": the influence of just world beliefs and prior victimization on rape myth acceptance.

    Science.gov (United States)

    Vonderhaar, Rebecca L; Carmody, Dianne Cyr

    2015-06-01

    Utilizing data from an online survey of 979 university students, this study explores the relationship between prior sexual assault victimization experiences, belief in a just world, and acceptance of rape myths. Results indicated that men, younger respondents, and those with less education were more likely to support rape myths. Support for just world beliefs and rape myths were also positively associated, while rape victims exhibited less support for rape myths than non-victims. Implications for future studies are discussed. © The Author(s) 2014.

  12. Devenir victime des pesticides:Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel, Jean-Noël; Prete, Giovanni

    2014-01-01

    Cet article analyse les effets du recours au droit sur la mobilisation des travailleurs agricoles victimes des pesticides. Il repose sur une enquête qualitative auprès des membres de l’association Phyto-victimes, qui réunit ces agriculteurs, ainsi que de leurs proches et des professionnels du droit avec lesquels ils interagissent. À partir de ce matériau, nous retraçons les parcours suivis par les agriculteurs pour obtenir une reconnaissance de leur statut de victimes des pesticides. Nous ren...

  13. Childhood victimization experiences of young adults in St. Petersburg, Russia.

    Science.gov (United States)

    Bogolyubova, Olga; Skochilov, Roman; Smykalo, Lyubov

    2015-04-01

    The purpose of this study was to assess the prevalence of childhood victimization experiences in a sample of young adults in St. Petersburg, Russia. The study sample included 743 students aged 19 to 25 from 15 universities in St. Petersburg, Russia. All of the study participants completed a reliable questionnaire assessing the following types of childhood victimization: conventional crime, child maltreatment, peer victimization, sexual victimization, and witnessing violence. Participation in the study was anonymous. High rates of victimization and exposure to violence were reported by the study participants. The majority of the sample experienced at least one type of victimization during childhood or adolescence, and poly-victimization was reported frequently. The most common type of victimization reported was peer or sibling assault (66.94%), followed by witnessing an assault without weapon (63.91%), personal theft (56.19%), vandalism (56.06%), and emotional bullying (49.99%). Sexual assault by a known adult was reported by 1.45% males and 5.16% of females. This study provides new information on the scope of childhood victimization experiences in Russia. Further research is warranted, including epidemiological research with representative data across the country and studies of the impact of trauma and victimization on mental health and well-being of Russian adults and children. © The Author(s) 2014.

  14. Applicability of a motor rehabilitation system in stroke victims

    Directory of Open Access Journals (Sweden)

    Maíra Izzadora Souza Carneiro

    Full Text Available Abstract Introduction: The recovery of stroke patients is long and boring due to the repetitive nature of the exercises used and the length of treatment. Thus, we started using virtual reality as an alternative and, because of its advantages, health professionals are adapting video games for physical therapy. However, there are some limitations, such as the fact that games are designed for entertainment and not for therapeutic purposes. Objective: In order to mitigate gaps in assistive devices for physical therapy, this study describes the development and applicability of a computer support system for motor rehabilitation - Ikapp - in stroke victims. Methods: Twenty-seven stroke patients filled out a socioeconomic questionnaire, tested Ikapp during five minutes and answered a usability and satisfaction questionnaire about handling the tool. The chi-square test was used to analyze any association between sociodemographic factors and the features of the system. Results: The Ikapp system can be an excellent device to assist neurological rehabilitation of stroke patients, as participants questionnaires showed that 85.2% were satisfied in regard to motivation and inclusion of Ikapp in physiotherapy and 77.8% relative to ease of interaction with the tool. Conclusion: The Ikapp system proved to be an easy-to-use and accessible computer support system for patients with functional limitations.

  15. Symbolic Victimization and Real World Fear.

    Science.gov (United States)

    Morgan, Michael

    1983-01-01

    Examines the relationship between victimization of characters in television drama and susceptibility to the viewers' cultivation of a sense of personal risk in the real world. Found that viewers whose fictional counterparts are more likely to be shown as victims show stronger associations between viewing and perceived vulnerability. (PD)

  16. Teacher Victimization in Authoritative School Environments

    Science.gov (United States)

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  17. Cyberbullying: who are the victims? A comparison of victimization in internet chatrooms and victimization in school

    NARCIS (Netherlands)

    Katzer, C.; Fetchenhauer, D.; Belschak, F.

    2009-01-01

    Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet

  18. Family as a factor of risk prevention and victim behaviour

    Directory of Open Access Journals (Sweden)

    Artur A. Rean

    2015-03-01

    Full Text Available The paper examines psychological factors victim behaviour. The definition of victim behaviour is given and it is emphasized that such conduct is not necessarily passivebehaviour of the victim. Victimization and behaviour can be active and aggressive. It is shown that antisocial, deviant behaviour of children and adolescents seriously increases the risk of victimization. Family as the most important institution of socialization is considered both as a preventing factor and risk factor of victim behaviour. The role of the family in shaping the victim behaviour is revealed in the following issues: aggressive, conflict behaviour is personal inclination or absence of the “proper” skills; interdependence of the severity of punishment and child aggression; punishment for child aggression (between siblings: what is the result?; ignoring aggression – is it the best solution?; victims of sexual violence and causes of victim behaviour; demonstrative accentuation as a risk factor in rape victim behaviour; happy family – can it be a risk factor for victim behaviour? For a long time, social deviant personality development has been believed to deal with structural deformation of the family, which is defined as a single-parent family, i.e. absence of one parent (usually the father. It is now proved that the major factor of family negative impact on personal development is not structural but psychosocial family deformation. A really happy family, psychologically happy family is the cornerstone of preventing victim behaviour. The victim behaviour being mainly determined by personal qualities does not negate this conclusion, but only strengthens it, as the qualities mentioned above are shaped in many respects within family socialization, are determined by family upbringing styles and features of interpersonal relationships inside the family.

  19. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  20. Sexual victimization and family violence among urban African American adolescent women: do violence cluster profiles predict partner violence victimization and sex trade exposure?

    Science.gov (United States)

    Kennedy, Angie C; Bybee, Deborah; Kulkarni, Shanti J; Archer, Gretchen

    2012-11-01

    Guided by an intersectional feminist perspective, we examined sexual victimization, witnessing intimate partner violence (IPV) in the family, and familial physical abuse among a sample of 180 urban African American adolescent women. We used cluster analysis to better understand the profiles of cumulative victimization, and the relationships between profiles and IPV victimization and personal exposure to the sex trade. Just under one third of the sample reported sexual victimization, with cooccurrence with both forms of family violence common. The cluster profile with high levels of severe family violence was associated with the highest rate of IPV victimization and sex trade exposure.

  1. Cyber Victimization and Depressive Symptoms in Sexual Minority College Students

    Science.gov (United States)

    Ramsey, Jaimi L.; DiLalla, Lisabeth F.; McCrary, Megan K.

    2016-01-01

    This study investigated the relations between sexual orientation, cyber victimization, and depressive symptoms in college students. Study aims were to determine whether sexual minority college students are at greater risk for cyber victimization and to examine whether recent cyber victimization (self-reported cyber victimization over the last…

  2. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  3. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  4. Observer reactions to emotional victims of serious crimes : Stereotypes and expectancy violations

    NARCIS (Netherlands)

    Bosma, Alice; Mulder, Eva; Pemberton, Antony; Vingerhoets, Ad

    2018-01-01

    Negative observer reactions towards victims may be related to people’s expectations of the characteristics and demeanor of an ideal victim. We examined how expressed emotion, victim sex, and type of victimization influence observers’ perceptions of victim credibility, victim character, and harm. Our

  5. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  6. Devenir victime des pesticides : Le recours au droit et ses effets sur la mobilisation des agriculteurs Phyto-victimes

    OpenAIRE

    Jouzel , Jean-Noël; Prete , Giovanni

    2014-01-01

    International audience; A partir du cas de l’association Phyto-victimes, qui regroupe des agriculteurs souffrant de maladies chroniques qu’ils imputent aux pesticides, l’article met en évidence les effets ambigus du droit sur les mobilisations de victimes. L’article met en évidence les mécanismes par lesquels le droit amène des exploitants agricoles exposés à des pesticides et tombés malades à prendre conscience de leur statut de victimes, du préjudice qu’ils ont subi et des responsabilités e...

  7. Victims of educator-targeted bullying: a qualitative study

    Directory of Open Access Journals (Sweden)

    Corene de Wet

    2010-01-01

    Full Text Available I report on findings emanating from in-depth personal interviews with victims of educator-targeted bullying (ETB. Qualitative content analysis was used to analyse the narratives. The findings indicate that the victims of ETB were exposed repeatedly over time to verbal, non-verbal, psychological, and physical abuse during and after school hours. ETB had a negative influence on the victims' private lives, as well as on teaching and on learning. Lastly, I found that ETB may lead to a breakdown of relations between victims and the bullies' parents and the members of the community in which schools are situated.

  8. Temperamental Differences in Children’s Reactions to Peer Victimization

    Science.gov (United States)

    Sugimura, Niwako; Rudolph, Karen D.

    2015-01-01

    Objective This research examined the hypothesis that temperament and sex moderate the contribution of peer victimization to children’s subsequent adjustment (aggression and depressive symptoms). Method Children (125 boys, 158 girls; M age = 7.95 years, SD = 0.32; 77.7% White, 22.3% minority) and teachers reported on overt and relational victimization. Parents rated children’s temperament (inhibitory control and negative emotionality) and depressive symptoms, and teachers reported on children’s overt and relational aggression. Results Across a one-year time period, (a) overt victimization predicted overt aggression in girls with poor inhibitory control; (b) overt and relational victimization predicted depressive symptoms in girls with high negative emotionality; and (c) relational victimization predicted depressive symptoms in boys with low negative emotionality. Conclusions This research helps to explain individual variation in children’s reactions to peer victimization, and has implications for person-by-environment models of development. Moreover, this research informs the development of targeted intervention programs for victimized youth that bolster specific resources depending on their temperament. PMID:22420650

  9. Workplace Victimization and Discrimination in China: A Nationwide Survey.

    Science.gov (United States)

    Zhang, Huiping

    2017-09-01

    Workplace victimization and discrimination have been intensively studied in the West, especially on the antecedents and consequences of this phenomenon. Surprisingly, little is known about the incidence and associated health problems of workplace victimization and discrimination in contemporary China. Using a representative nationwide sample of 1,138 Chinese employees conducted in 2015, this study attempted to estimate the prevalence, risk factors, and associated consequences of workplace victimization and discrimination in China. It is found that the prevalence rate of preceding 5-year workplace discrimination and victimization was 33% and 12.9%, respectively. Male employees who perceived higher work gains were less likely to experience workplace victimization and those who had higher career efficacy and unemployment anxiety were more likely to experience job discrimination or victimization. Female employees who received tertiary education were less likely to experience job discrimination and being married tended not to experience workplace victimization. Perceived job discrimination had negative impact on male employees' job satisfaction as well as on female employees' happiness. The implications of these findings are finally discussed in the Chinese context.

  10. Cyberstalking victimization

    Directory of Open Access Journals (Sweden)

    Vilić Vida

    2013-01-01

    Full Text Available Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications’ abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.

  11. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  12. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  13. Bullying and victimization in elementary schools : A comparison of bullies, victims, bully/victims, and uninvolved preadolescents

    NARCIS (Netherlands)

    Veenstra, René; Lindenberg, Siegwart; Oldehinkel, Albertine J.; Winter, Andrea F. de; Verhulst, Frank C.; Ormel, Johan

    Research on bullying and victimization largely rests on univariate analyses and on reports from a single informant. Researchers may thus know too little about the simultaneous effects of various independent and dependent variables, and their research may be biased by shared method variance. The

  14. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  15. Lambing Ease is Heritable but not Correlated to Litter Size in Danish Meat Sheep Breeds

    DEFF Research Database (Denmark)

    Sørensen, Anders Christian; Valasek, P; Pedersen, Jørn

    The aim of this study was to estimate genetic parameters of lambing ease (LE) and litter size (LS) in four common Danish meat sheep breeds. Data from 1990 to 2006 were analysed. A bivariate animal model was used for estimation of genetic parameters. Lambing ease showed a low heritability, both...... the LE and LS was found, which means that selection to improve one trait should not affect the other trait. Lambing ease should therefore be included in the selection criterion....

  16. Network Exposure and Homicide Victimization in an African American Community

    Science.gov (United States)

    Wildeman, Christopher

    2014-01-01

    Objectives. We estimated the association of an individual’s exposure to homicide in a social network and the risk of individual homicide victimization across a high-crime African American community. Methods. Combining 5 years of homicide and police records, we analyzed a network of 3718 high-risk individuals that was created by instances of co-offending. We used logistic regression to model the odds of being a gunshot homicide victim by individual characteristics, network position, and indirect exposure to homicide. Results. Forty-one percent of all gun homicides occurred within a network component containing less than 4% of the neighborhood’s population. Network-level indicators reduced the association between individual risk factors and homicide victimization and improved the overall prediction of individual victimization. Network exposure to homicide was strongly associated with victimization: the closer one is to a homicide victim, the greater the risk of victimization. Regression models show that exposure diminished with social distance: each social tie removed from a homicide victim decreased one’s odds of being a homicide victim by 57%. Conclusions. Risk of homicide in urban areas is even more highly concentrated than previously thought. We found that most of the risk of gun violence was concentrated in networks of identifiable individuals. Understanding these networks may improve prediction of individual homicide victimization within disadvantaged communities. PMID:24228655

  17. The Victim-Offender Overlap and Fear of In-School Victimization: A Longitudinal Examination of Risk Assessment Models

    Science.gov (United States)

    Melde, Chris; Esbensen, Finn-Aage

    2009-01-01

    Reports of serious violence in schools have raised general awareness and concern about safety in America's schools. In this article, the authors examine the extent to which in-school victimization is associated with students' perceived risk and fear of victimization. By expanding on Ferraro's risk assessment framework, the current study explores…

  18. Learning and inference in a nonequilibrium Ising model with hidden nodes.

    Science.gov (United States)

    Dunn, Benjamin; Roudi, Yasser

    2013-02-01

    We study inference and reconstruction of couplings in a partially observed kinetic Ising model. With hidden spins, calculating the likelihood of a sequence of observed spin configurations requires performing a trace over the configurations of the hidden ones. This, as we show, can be represented as a path integral. Using this representation, we demonstrate that systematic approximate inference and learning rules can be derived using dynamical mean-field theory. Although naive mean-field theory leads to an unstable learning rule, taking into account Gaussian corrections allows learning the couplings involving hidden nodes. It also improves learning of the couplings between the observed nodes compared to when hidden nodes are ignored.

  19. GENDER-BASED RESTORATIVE JUSTICE FOR VICTIMS OF VIOELENCE AGAINST WOMEN

    Directory of Open Access Journals (Sweden)

    Cahya Wulandari

    2015-01-01

    Full Text Available Positive law is less oriented towards the protection of victims, especially women. Restorative justice appears to protect and resolve problems with the interests of the victim-oriented. This article discuss the form of legal protection for victims of violence against women, gender-based and describe the form of restorative justice for victims of gender-based violence against women. Positive criminal law does not accommodate both the interests of the victim to determine the crime against him self and to restore his suffering. This is caused due to the dominance of retributive justice in the settlement mind set crime through the criminal law. The restorative justice allows for an active role in the completion of a crime victim who happens also allows the imposition of sanctions that are beneficial to the recovery of the suffering of the victims.

  20. Workplace mobbing: How the victim's coping behavior influences bystander responses.

    Science.gov (United States)

    Mulder, Roelie; Bos, Arjan E R; Pouwelse, Mieneke; van Dam, Karen

    2017-01-01

    Victims of workplace mobbing show diverse coping behavior. We investigated the impact of this behavior on bystander cognitions, emotions, and helping toward the victim, integrating coping literature with attribution theory. Adult part-time university students (N = 161) working at various organizations participated in a study with a 3(Coping: approach/avoidance/neutral) × 2(Gender Victim: male/female) × 2(Gender Bystander: male/female) design. Victims showing approach (vs. avoidance) coping were considered to be more self-reliant and less responsible for the continuation of the mobbing, and they elicited less anger. Continuation responsibility and self-reliance mediated the relationship between the victim's coping behavior and bystanders' helping intentions. Female (vs. male) participants reported more sympathy for the victim and greater willingness to help, and female (vs. male) victims elicited less anger. Theoretical and practical implications of the findings are discussed.

  1. Predictors of Latent Trajectory Classes of Dating Violence Victimization

    Science.gov (United States)

    Brooks-Russell, Ashley; Foshee, Vangie; Ennett, Susan

    2014-01-01

    This study identified classes of developmental trajectories of physical dating violence victimization from grades 8 to 12 and examined theoretically-based risk factors that distinguished among trajectory classes. Data were from a multi-wave longitudinal study spanning 8th through 12th grade (n = 2,566; 51.9% female). Growth mixture models were used to identify trajectory classes of physical dating violence victimization separately for girls and boys. Logistic and multinomial logistic regressions were used to identify situational and target vulnerability factors associated with the trajectory classes. For girls, three trajectory classes were identified: a low/non-involved class; a moderate class where victimization increased slightly until the 10th grade and then decreased through the 12th grade; and a high class where victimization started at a higher level in the 8th grade, increased substantially until the 10th grade, and then decreased until the 12th grade. For males, two classes were identified: a low/non-involved class, and a victimized class where victimization increased slightly until the 9th grade, decreased until the 11th grade, and then increased again through the 12th grade. In bivariate analyses, almost all of the situational and target vulnerability risk factors distinguished the victimization classes from the non-involved classes. However, when all risk factors and control variables were in the model, alcohol use (a situational vulnerability) was the only factor that distinguished membership in the moderate trajectory class from the non-involved class for girls; anxiety and being victimized by peers (target vulnerability factors) were the factors that distinguished the high from the non-involved classes for the girls; and victimization by peers was the only factor distinguishing the victimized from the non-involved class for boys. These findings contribute to our understanding of the heterogeneity in physical dating violence victimization during

  2. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  3. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  4. Complicated basins and the phenomenon of amplitude death in coupled hidden attractors

    Energy Technology Data Exchange (ETDEWEB)

    Chaudhuri, Ushnish [Department of Physics, Sri Venkateswara College, University of Delhi, New Delhi 110021 (India); Department of Physics, National University of Singapore, Singapore 117551 (Singapore); Prasad, Awadhesh, E-mail: awadhesh@physics.du.ac.in [Department of Physics and Astrophysics, University of Delhi, Delhi 110007 (India)

    2014-02-07

    Understanding hidden attractors, whose basins of attraction do not contain the neighborhood of equilibrium of the system, are important in many physical applications. We observe riddled-like complicated basins of coexisting hidden attractors both in coupled and uncoupled systems. Amplitude death is observed in coupled hidden attractors with no fixed point using nonlinear interaction. A new route to amplitude death is observed in time-delay coupled hidden attractors. Numerical results are presented for systems with no or one stable fixed point. The applications are highlighted.

  5. Male Rape Victim and Perpetrator Blaming

    Science.gov (United States)

    Sleath, Emma; Bull, Ray

    2010-01-01

    One of four possible vignettes manipulated by (a) level of rape myth contained within them (low vs. high) and (b) type of rape (stranger vs. acquaintance) was presented to participants followed by scales measuring victim blame, perpetrator blame, belief in a just world, sex-role egalitarian beliefs, and male rape myth acceptance. Victim blaming…

  6. Protective Factors for Psychotic Symptoms Among Poly-victimized Children.

    Science.gov (United States)

    Crush, Eloise; Arseneault, Louise; Jaffee, Sara R; Danese, Andrea; Fisher, Helen L

    2018-04-06

    Experiencing victimization in early life has been repeatedly shown to be associated with the emergence of psychotic symptoms in childhood. However, most victimized children do not develop psychotic symptoms and why this occurs is not fully understood. This study investigated which individual, family-level, and wider community characteristics were associated with an absence of psychotic symptoms among children at risk for psychosis by virtue of their exposure to multiple victimization experiences (poly-victimization). Participants were from the Environmental Risk Longitudinal Twin Study, a nationally representative cohort of 2232 UK-born twins. Exposure to maltreatment, bullying and domestic violence prior to age 12 was determined from interviews with mothers, children, and observations by research workers at ages 5, 7, 10, and 12. Children were interviewed about psychotic symptoms at age 12. Protective factors were measured at ages 5, 7, 10, and 12. Childhood poly-victimization was associated with age-12 psychotic symptoms (OR = 4.61, 95% CI 2.82-7.52), but the majority of poly-victimized children did not report symptoms (80.7%). Having a relatively high IQ, more positive atmosphere at home, and higher levels of neighborhood social cohesion were found to be protective against childhood psychotic symptoms among poly-victimized children and also in the whole sample. However, "protected" poly-victimized children displayed elevated levels of other mental health problems compared to nonvictimized children. Children's characteristics, family context, and the wider community were all found to protect children from developing early psychotic symptoms, even when they were victimized multiple times. These findings indicate targets for multilevel preventive interventions.

  7. Internet piracy and consequences for victims

    Directory of Open Access Journals (Sweden)

    Savić Miljan

    2016-01-01

    Full Text Available After the evolution of technology made it possible to perform actions via the Internet that constitute copyright violations, the analysis of the effects of internet piracy on social welfare became the subject of academic polemics. The main and the biggest victims of Internet piracy are the holders of copyright and related rights, however, the damage that piracy causes them comes from multiple sources, is difficult to quantify and is only a part of the total social cost of piracy. However, there are other categories of victims, such as those whose honor was besmirched as a result of piracy, and who suffer the consequences in the form of negative emotional reactions, loss of job as well as those who subsequently commit suicide. The object of this paper is to describe the effects of internet piracy on the victims of this phenomenon, and the goal is the analysis of the various direct and indirect effects of piracy on victims and their motivation for future creation, as well as analysis of prevention measures, with special emphasis on the Republic of Serbia.

  8. Race, Ethnicity, and Adolescent Violent Victimization.

    Science.gov (United States)

    Tillyer, Marie Skubak; Tillyer, Rob

    2016-07-01

    The risk of adolescent violent victimization in the United States varies considerably across racial and ethnic populations; it is unknown whether the sources of risk also vary by race and ethnicity. This study examined the correlates of violent victimization for White, Black, and Hispanic youth. Data collected from 11,070 adolescents (51 % female, mean age = 15.04 years) during the first two waves of the National Longitudinal Study of Adolescent to Adult Health were used to estimate group-specific multilevel logistic regression models. The results indicate that male, violent offending, peer deviance, gang membership, and low self-control were significantly associated with increased odds of violent victimization for all groups. Some activities-including getting drunk, sneaking out, and unstructured socializing with peers-were risk factors for Black adolescents only; skipping school was a risk factor only for Hispanic adolescents. Although there are many similarities across groups, the findings suggest that minority adolescents are particularly vulnerable to violent victimization when they engage in some activities and minor forms of delinquency.

  9. The impact of criminal justice involvement on victims' mental health.

    Science.gov (United States)

    Parsons, Jim; Bergin, Tiffany

    2010-04-01

    The aftermath of violent crime can leave victims with persistent emotional and mental health problems. Although research has shown the potential benefits of prosecuting cases through the courts, there is also a substantial literature that suggests that common features of the criminal justice system can exacerbate the impact of the initial crime, leading to a secondary victimization. The authors present a review of the research on the positive and negative impact of criminal justice involvement, and common points of failure in the efforts of justice institutions to meet the needs of victims. They conclude with recommendations for future work, including the need for research on restorative justice, victim impact statements, court notification systems, victim services, and victim advocates.

  10. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  11. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  12. Violent online games exposure and cyberbullying/victimization among adolescents.

    Science.gov (United States)

    Lam, Lawrence T; Cheng, Zaohuo; Liu, Xinmin

    2013-03-01

    This population-based cross-sectional survey examined the association between exposure to violent online games and cyberbullying and victimization in adolescents recruited from two large cities utilizing a stratified two-stage random cluster sampling technique. Cyberbullying and victimization were assessed by the E-victimization and E-bullying scales validated in a previous study. Exposure to violent online games was measured by self-nomination of the degree of violent content in the games played. Results indicated that the majority (74.3 percent) of respondents did not experience any cyberbullying or victimization in the last 7 days before the survey, 14.4 percent reported to be victimized via cyberspace, 2.9 percent admitted that they had bullied others, and 8.4 percent reported to be both perpetrators- and- victims. One hundred and eighty seven (15.3 percent) considered games they were playing were of moderate to severe violence. Students who had been involved in cyberbullying as well as being victimized were two times as likely to have been exposed to violent online games, and nearly four times as likely for those involved in bullying others. Exposure to violent online games was associated with being a perpetrator as well as a perpetrator-and-victim of cyberbullying. Parents and clinicians need to be aware of the potential harm of these exposures. The policy implications of results were also discussed.

  13. The relevance of the social context for media coverage of victims

    Directory of Open Access Journals (Sweden)

    Pavićević Olivera

    2017-01-01

    Full Text Available Media coverage of human suffering caused by trauma, illness, poverty and disasters worldwide takes up a significant part of media coverage and affects the identity of all actors, both active and passive. Media presentation shapes our thinking and reasoning at the group level, and has far reached impact. The social context of media reporting on victims is shaped by the capacity of the social system to recognize, acknowledge, strengthen and protect the victim. As an aspect of this capacity, media coverage of victims is indicator of victimization visibility. This paper discusses nature of media reporting as a phenomenon appearing in various forms as per given sources of victimization, and the ethical aspects of media presentation of victims. The aim of the paper is to contribute to the critical analysis of the media coverage of victims, by reconsidering an increased visibility of victims and their suffering, which is generated by media reporting, and whose dominant characteristic is presenting victims in the interpretative and performing manner.

  14. Professionals' conduct as a condition for minimizing secondary victimization of the victims of spouse abuse

    Directory of Open Access Journals (Sweden)

    Ignjatović Tanja

    2009-01-01

    Full Text Available Through analysis of the 'administrative' aspects of experts' documentation kept by three services in one local community - the police station, the center for social welfare and the primary health care center, the possibility of reducing victimization of victims of partnership violence within the family is the subject of consideration. The results of the analysis point to the necessity of rationalization and standardization of recording and procedures by the professionals.

  15. Cyber Victimization in High School: Measurement, Overlap with Face-to-Face Victimization, and Associations with Social-Emotional Outcomes

    Science.gov (United States)

    Brown, Christina Flynn; Demaray, Michelle Kilpatrick; Tennant, Jaclyn E.; Jenkins, Lyndsay N.

    2017-01-01

    Cyber victimization is a contemporary problem facing youth and adolescents (Diamanduros, Downs, & Jenkins, 2008; Kowalski & Limber, 2007). It is imperative for researchers and school personnel to understand the associations between cyber victimization and student social-emotional outcomes. This article explores (a) gender differences in…

  16. Computational Modeling of Blood Flow in the TrapEase Inferior Vena Cava Filter

    Energy Technology Data Exchange (ETDEWEB)

    Singer, M A; Henshaw, W D; Wang, S L

    2008-02-04

    To evaluate the flow hemodynamics of the TrapEase vena cava filter using three dimensional computational fluid dynamics, including simulated thrombi of multiple shapes, sizes, and trapping positions. The study was performed to identify potential areas of recirculation and stagnation and areas in which trapped thrombi may influence intrafilter thrombosis. Computer models of the TrapEase filter, thrombi (volumes ranging from 0.25mL to 2mL, 3 different shapes), and a 23mm diameter cava were constructed. The hemodynamics of steady-state flow at Reynolds number 600 was examined for the unoccluded and partially occluded filter. Axial velocity contours and wall shear stresses were computed. Flow in the unoccluded TrapEase filter experienced minimal disruption, except near the superior and inferior tips where low velocity flow was observed. For spherical thrombi in the superior trapping position, stagnant and recirculating flow was observed downstream of the thrombus; the volume of stagnant flow and the peak wall shear stress increased monotonically with thrombus volume. For inferiorly trapped spherical thrombi, marked disruption to the flow was observed along the cava wall ipsilateral to the thrombus and in the interior of the filter. Spherically shaped thrombus produced a lower peak wall shear stress than conically shaped thrombus and a larger peak stress than ellipsoidal thrombus. We have designed and constructed a computer model of the flow hemodynamics of the TrapEase IVC filter with varying shapes, sizes, and positions of thrombi. The computer model offers several advantages over in vitro techniques including: improved resolution, ease of evaluating different thrombus sizes and shapes, and easy adaptation for new filter designs and flow parameters. Results from the model also support a previously reported finding from photochromic experiments that suggest the inferior trapping position of the TrapEase IVC filter leads to an intra-filter region of recirculating

  17. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  18. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  19. Victimizations of Mexican youth (12-17 years old): A 2014 national survey.

    Science.gov (United States)

    Frías, Sonia M; Finkelhor, David

    2017-05-01

    Victimization of Mexican youth (aged 12-17) has received little attention compared to that of adults. Using the 2014 Social Survey on Social Cohesion for the Prevention of Violence and Delinquency, we examine prevalence and types of victimization; describe the characteristics of incidents in terms of relationship with perpetrator(s) and places where took place; and study significant correlates of forms of victimization and poly-victimization. During 2014 alone, more than 2.8 million minors were victims of bullying, cyberbullying, theft, sexual abuse, physical assault, threats, robbery, or extortion. About 10% of these were poly-victims-experienced at least four different types of victimization by at least four types of perpetrators. Youth tended to be victimized by people in their inner circle. The factors associated with victimization tended to vary by victimization type, but proximity to crime and peer delinquency increased the risk of experiencing all types of victimization. Implications for future research and practice are discussed. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. The Second Victim Experience and Support Tool: Validation of an Organizational Resource for Assessing Second Victim Effects and the Quality of Support Resources.

    Science.gov (United States)

    Burlison, Jonathan D; Scott, Susan D; Browne, Emily K; Thompson, Sierra G; Hoffman, James M

    2017-06-01

    Medical errors and unanticipated negative patient outcomes can damage the well-being of health care providers. These affected individuals, referred to as "second victims," can experience various psychological and physical symptoms. Support resources provided by health care organizations to prevent and reduce second victim-related harm are often inadequate. In this study, we present the development and psychometric evaluation of the Second Victim Experience and Support Tool (SVEST), a survey instrument that can assist health care organizations to implement and track the performance of second victim support resources. The SVEST (29 items representing 7 dimensions and 2 outcome variables) was completed by 303 health care providers involved in direct patient care. The survey collected responses on second victim-related psychological and physical symptoms and the quality of support resources. Desirability of possible support resources was also measured. The SVEST was assessed for content validity, internal consistency, and construct validity with confirmatory factor analysis. Confirmatory factor analysis results suggested good model fit for the survey. Cronbach α reliability scores for the survey dimensions ranged from 0.61 to 0.89. The most desired second victim support option was "A respected peer to discuss the details of what happened." The SVEST can be used by health care organizations to evaluate second victim experiences of their staff and the quality of existing support resources. It can also provide health care organization leaders with information on second victim-related support resources most preferred by their staff. The SVEST can be administered before and after implementing new second victim resources to measure perceptions of effectiveness.

  1. ASD and PTSD in Rape Victims

    Science.gov (United States)

    Elklit, Ask; Christiansen, Dorte M.

    2010-01-01

    In recent years, a number of studies have investigated the prediction of posttraumatic stress disorder (PTSD) through the presence of acute stress disorder (ASD). The predictive power of ASD on PTSD was examined in a population of 148 female rape victims who visited a center for rape victims shortly after the rape or attempted rape. The PTSD…

  2. Psychological Adjustment in Bullies and Victims of School Violence

    Science.gov (United States)

    Estevez, Estefania; Murgui, Sergio; Musitu, Gonzalo

    2009-01-01

    The present study examined psychosocial adjustment in the following four groups of students: victims, bullies, bully/victims and a control group of adolescents not involved in bullying or victimization problems. Psychosocial adjustment was measured considering as indicators: level of self-esteem, depressive symptomatology, perceived stress,…

  3. Weight perceptions, misperceptions, and dating violence victimization among U.S. adolescents.

    Science.gov (United States)

    Farhat, Tilda; Haynie, Denise; Summersett-Ringgold, Faith; Brooks-Russell, Ashley; Iannotti, Ronald J

    2015-05-01

    Dating violence is a major public health issue among youth. Overweight/obese adolescents experience peer victimization and discrimination and may be at increased risk of dating violence victimization. Furthermore, given the stigma associated with overweight/obesity, perceptions and misperceptions of overweight may be more important than actual weight status for dating violence victimization. This study examines the association of three weight indices (weight status, perceived weight, and weight perception accuracy) with psychological and physical dating violence victimization. The 2010 baseline survey of the 7-year NEXT Generation Health Study used a three-stage stratified clustered sampling design to select a nationally representative sample of U.S. 10th-grade students (n = 1,983). Participants who have had a boyfriend/girlfriend reported dating violence victimization and perceived weight. Weight status was computed from measured height/weight. Weight perception accuracy (accurate/underestimate/overestimate) was calculated by comparing weight status and perceived weight. Gender-stratified regressions examined the association of weight indices and dating violence victimization. Racial/ethnic differences were also examined. The association of weight indices with dating violence victimization significantly differed by gender. Overall, among boys, no associations were observed. Among girls, weight status was not associated with dating violence victimization, nor with number of dating violence victimization acts; however, perceived weight and weight perception accuracy were significantly associated with dating violence victimization, type of victimization, and number of victimization acts. Post hoc analyses revealed significant racial/ethnic differences. White girls who perceive themselves (accurately or not) to be overweight, and Hispanic girls who are overweight, may be at increased risk of dating violence victimization. These findings suggest a targeted approach to

  4. The Voiceless Victim: A critical analysis of the impact of enhanced victim participation in the criminal justice process

    Directory of Open Access Journals (Sweden)

    Sarah Moynihan

    2015-12-01

    Full Text Available In contrast to many European jurisdictions, the victim of an alleged crime in England, Wales and Northern Ireland is denied any form of meaningful participation at the trial stage of the criminal justice process. This is by reason of the unyielding structure of the Anglo-American adversarial system, which facilitates a dispute between two parties only - the prosecution, acting on behalf of the collective public interest and the defence. In recent years, however, the victims’ movement has gained momentum as advocates of victims’ rights have been engaged in an impassioned campaign to enhance the participatory rights of victims in the criminal justice process. Fervent arguments have been articulated pertaining to the value of various forms of victim input. This paper cogitates some of these arguments and critically evaluates how enhanced victim participation in the criminal justice process has the potential to undercut the integrity of the Anglo- American adversarial system; a system with objective adjudication at its core.

  5. Building Store Satisfaction Centred on Customer Retention in Clothing Retailing: Store Design and Ease of Shopping

    Directory of Open Access Journals (Sweden)

    Gulden Turhan

    2016-01-01

    Full Text Available The study’s research model suggests that store design and ease of shopping are associated with customer retention through a mediated pathway in which store design and ease of shopping influence perceived store satisfaction, which in turn, influences customer retention. This survey was administered to two separate clothing stores offered to either females or males (in total, 533 participants. Using structural equation modelling methodology, data was analysed to explain the interrelations among the variables in the model. The results of an empirical study of a sample of store shoppers revealed that store design and ease of shopping influence customer retention in an indirect way through customer perception of satisfaction with the store. In building store satisfaction that is centred on customer retention, store design and shopping ease differ in their relative influences. This difference is high for females, but for men as low as to be considered negligible in males. As a result, improving customers’ perceptions of store design and ease of shopping is a way to ensure store satisfaction support customer retention. The results of the study provide a new insight into the relationships by suggesting indirect effects of shopping ease and store design on consumer retention by their impacts on store satisfaction, rather than direct effects.

  6. Building Store Satisfaction Centred on Customer Retention in Clothing Retailing: Store Design and Ease of Shopping

    Directory of Open Access Journals (Sweden)

    Gulden Turhan

    2014-01-01

    Full Text Available The study’s research model suggests that store design and ease of shopping are associated with customer retention through a mediated pathway in which store design and ease of shopping influence perceived store satisfaction, which in turn, influences customer retention. This survey was administered to two separate clothing stores offered to either females or males (in total, 533 participants. Using structural equation modelling methodology, data was analysed to explain the interrelations among the variables in the model. The results of an empirical study of a sample of store shoppers revealed that store design and ease of shopping influence customer retention in an indirect way through customer perception of satisfaction with the store. In building store satisfaction that is centred on customer retention, store design and shopping ease differ in their relative influences. This difference is high for females, but for men as low as to be considered negligible in males. As a result, improving customers’ perceptions of store design and ease of shopping is a way to ensure store satisfaction support customer retention. The results of the study provide a new insight into the relationships by suggesting indirect effects of shopping ease and store design on consumer retention by their impacts on store satisfaction, rather than direct effects.

  7. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  8. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  9. Emotional Profile of Women Victims of Domestic Violence.

    Science.gov (United States)

    Avdibegovic, Esmina; Brkic, Maja; Sinanovic, Osman

    2017-06-01

    Research indicates that women victims of domestic violence show significant cognitive changes, emotional numbing, and avoidance of interpersonal relationships. The aim of this research was to analyze emotional profile of women victims of domestic violence, and to determine the relationship between dimensions of emotions and frequency of women exposure to domestic violence. The research was conducted on the sample of 169 women, 111 were victims of domestic violence and 58 were women who did not experience domestic violence. Plutchik's Emotions Profile Index (EPI) was used for measuring of the emotion profile, and the Modified Inventory of Domestic Violence for measuring experiences of different types of violence. Basic socio-demographic data were also collected. Significant differences between women victims of domestic violence and women who did not experience domestic violence were found in a few dimensions of emotional profile. Women victims of domestic violence had higher results in the dimensions of deprivation/depression and aggression/destruction, while women who did not experience domestic violence had higher results in dimensions of reproduction and incorporation. Aggression was in significant negative correlation with reproduction, incorporation and self protection, whereas it was significant positive correlation with deprivation and opposition. There were significant and positive correlation between the dimensions of aggression and deprivation and frequency of all three forms of domestic violence and age of women. According to results obtained in this research, it can be concluded that women victims of domestic violence have significantly more intensive negative emotional dimensions in comparison to women who were not abused. Women victims of domestic violence with higher frequency of abuse describe themselves as more sad, apathetic, lonely, angry, quarrelsome and less sociable. Prominence of negative emotions, deprivation and aggression, can be factor of

  10. [A sociography of elderly victims of family violence in Portugal].

    Science.gov (United States)

    Gil, Ana Paula; Santos, Ana João; Kislaya, Irina; Santos, César; Mascoli, Luísa; Ferreira, Alexandra Inácio; Vieira, Duarte Nuno

    2015-06-01

    This article presents data on violence against persons aged 60 years or older and living in Portugal for at least 12 months. The cross-sectional descriptive study collected data with a face-to-face questionnaire applied to victims that had sought assistance at three government institutions and one non-governmental support service for victims. The non-probabilistic sample included 510 victims of violence in family settings. Physical and psychological violence were the most common (87.8% and 69.6%, respectively). Financial violence was reported by 47.5% of the victims, followed by sexual assault (7.5%) and neglect (6.5%). The majority of victims (74.1%) reported more than one type of violence. Victims were mostly women, and mean age was 70.7 years. Most of the perpetrators belonged to the nuclear family, namely spouses or partners, sons/sons-in-law, and daughters/daughters-in-law. However, differences were observed according to victim's gender. The results indicate that violence is not a uniform phenomenon, presenting different configurations.

  11. Simple grain mill boosts production and eases women's workload ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2013-01-11

    Jan 11, 2013 ... Simple grain mill boosts production and eases women's workload ... Farmers also like the design because, unlike other machines, it can be easily adjusted for different millet varieties and sizes. ... Local manufacturing. Discussions have begun with local entrepreneurs to manufacture the grain mill, which ...

  12. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  13. The incongruity of workplace bullying victimization and inclusive excellence.

    Science.gov (United States)

    Dzurec, Laura Cox; Kennison, Monica; Gillen, Patricia

    Bullying occurs frequently-and with significant negative outcomes-in workplace settings. Once established, bullying endures in the workplace, requiring the interaction of a bully perpetrator and an intended target who takes on the role of victim. Not every target becomes a victim, however. The purpose of this study is to investigate the processes by which targets, intended objects of bullies' affronts, become victims, those individuals who experience ongoing emotional injury in response to bullies' affronts, and to clarify how bullying victimization impedes inclusive excellence in the workplace. The design for this study was pragmatic utility, an inductive research approach grounded in assumptions of hermeneutics. The pragmatic utility process involved the investigators' synthesis of descriptions from a broad, interdisciplinary published literature. Integrating knowledge from their previous research and practice experiences with the pragmatic utility process, they derived qualitative features of victims' experiences, differentiating target from victim in bullying encounters. For those targets who ultimately are victimized, response to bullies' affronts extends far beyond the immediate present. Redolence of personal, lived experience revives bygone vulnerabilities, and naïve communication and relationship expectations reinforce a long-standing, impoverished sense. That sense couples with workplace dynamics to augment a context of exclusion. Findings suggest that, as Heidegger contended, we are our histories. Personal history demonstrates a significance influence on the manifestation of bullying victimization, acting to distance them from their workplace peers and to impede inclusive excellence. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. State-space dimensionality in short-memory hidden-variable theories

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    Recently we have presented a hidden-variable model of measurements for a qubit where the hidden-variable state-space dimension is one-half the quantum-state manifold dimension. The absence of a short memory (Markov) dynamics is the price paid for this dimensional reduction. The conflict between having the Markov property and achieving the dimensional reduction was proved by Montina [A. Montina, Phys. Rev. A 77, 022104 (2008)] using an additional hypothesis of trajectory relaxation. Here we analyze in more detail this hypothesis introducing the concept of invertible process and report a proof that makes clearer the role played by the topology of the hidden-variable space. This is accomplished by requiring suitable properties of regularity of the conditional probability governing the dynamics. In the case of minimal dimension the set of continuous hidden variables is identified with an object living an N-dimensional Hilbert space whose dynamics is described by the Schroedinger equation. A method for generating the economical non-Markovian model for the qubit is also presented.

  15. Extracorporeal Detoxification in Victims with Severe Concomitant Injury

    Directory of Open Access Journals (Sweden)

    S. Ye. Khoroshilov

    2009-01-01

    Full Text Available Objective: to improve the results of victims with massive crushes of soft tissues in severe concomitant injury (SCI, by applying extracorporeal detoxification techniques as soon as possible. Subjects and methods. The results of examination and treatment were studied in 41 victims with SCI treated at the N. N. Burdenko Main Military Clinical Hospital in 2006 to 2008. In the early posttraumatic period (on days 1—3, all the victims (n=41 were divided into 2 groups. Group 1 victims (n=19 underwent hemodiafiltration (HDF with replacement at 35 ml/kg/hr; Group 2 (n=22 had plasmapheresis. Results. Early HDF applied to Group 1 victims could achieve 32, 44, and 37% reductions in the elevated levels creatine phosphokinase, myoglobin, and middle-sized molecules, respectively. In Group 2, plasmapheresis showed a lower effect (19, 25, and 26% reductions. Furthermore, there was a decrease in total protein in Group 1, which was absent in Group 2. Conclusion. The timely use of extracorporeal detoxification techniques in victims with massive crushes of soft tissues in the early posttraumatic period prevents the development of fatal complications of SCI, at the same time HDF is more effective and safe than plasmapheresis. Key words: severe concomitant injury, rhabdomyolysis, myoglobin, plasmapheresis, hemodiafiltration.

  16. EASE Guidelines for Authors and Translators of Scientific Articles to be Published in English.

    Science.gov (United States)

    2014-06-01

    This concise and readable set of editorial guidelines was first published by the European Association of Science Editors (EASE) in 2010 and is updated annually. It is freely available in more than 20 languages at http://ease.org.uk/publications/author-guidelines. The document is aimed to help scientists worldwide in successful presentation of their research results and in correct translation of manuscripts into English. Moreover, it draws attention to ethical issues, like authorship criteria, plagiarism, conflict of interests, etc. Eight appendices provide examples or more detailed information on selected topics (Abstracts, Ambiguity, Cohesion, Ethics, Plurals, Simplicity, Spelling, and Text-tables). Widespread use of EASE Guidelines should increase the efficiency of international scientific communication.

  17. Gendered violence and restorative justice: the views of victim advocates.

    Science.gov (United States)

    Curtis-Fawley, Sarah; Daly, Kathleen

    2005-05-01

    The use of restorative justice for gendered violence has been debated in the feminist literature for some time. Critics warn that it is inappropriate because the process and outcomes are not sufficiently formal or stringent, and victims may be revictimized. Proponents assert that a restorative justice process may be better for victims than court because it holds offenders accountable and gives victims greater voice. This article presents what victim advocates in two Australian states think about using restorative justice for gendered violence. We find that although victim advocates have concerns and reservations about restorative justice, most saw positive elements.

  18. Do Social Relationships Protect Victimized Children against Internalizing Problems?

    Science.gov (United States)

    Averdijk, Margit; Eisner, Manuel; Ribeaud, Denis

    2014-01-01

    We investigated whether social relationships protect children against the effects of victimization on internalizing problems. We used data from the Zurich Project on the Social Development of Children and Youths. Victimization at age 8 years was associated with internalizing problems at age 9 years. Victims who had siblings, warm parents, and a…

  19. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  20. Higher-dimensional black holes: hidden symmetries and separation of variables

    International Nuclear Information System (INIS)

    Frolov, Valeri P; Kubiznak, David

    2008-01-01

    In this paper, we discuss hidden symmetries in rotating black hole spacetimes. We start with an extended introduction which mainly summarizes results on hidden symmetries in four dimensions and introduces Killing and Killing-Yano tensors, objects responsible for hidden symmetries. We also demonstrate how starting with a principal CKY tensor (that is a closed non-degenerate conformal Killing-Yano 2-form) in 4D flat spacetime one can 'generate' the 4D Kerr-NUT-(A)dS solution and its hidden symmetries. After this we consider higher-dimensional Kerr-NUT-(A)dS metrics and demonstrate that they possess a principal CKY tensor which allows one to generate the whole tower of Killing-Yano and Killing tensors. These symmetries imply complete integrability of geodesic equations and complete separation of variables for the Hamilton-Jacobi, Klein-Gordon and Dirac equations in the general Kerr-NUT-(A)dS metrics

  1. Disability in Relation to Different Peer-Victimization Groups and Psychosomatic Problems

    Science.gov (United States)

    Beckman, Linda; Stenbeck, Magnus; Hagquist, Curt

    2016-01-01

    The purpose of this study was to examine the associations between disability, victims, perpetrators, and so-called "bully-victims" (someone reporting being both a victim and a perpetrator) of traditional, cyber, or combined victimization or perpetration and psychosomatic health among adolescents. Authors analyzed cross-sectional data…

  2. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  3. Global Human Trafficking and Child Victimization.

    Science.gov (United States)

    Greenbaum, Jordan; Bodrick, Nia

    2017-12-01

    Trafficking of children for labor and sexual exploitation violates basic human rights and constitutes a major global public health problem. Pediatricians and other health care professionals may encounter victims who present with infections, injuries, posttraumatic stress disorder, suicidality, or a variety of other physical or behavioral health conditions. Preventing child trafficking, recognizing victimization, and intervening appropriately require a public health approach that incorporates rigorous research on the risk factors, health impact, and effective treatment options for child exploitation as well as implementation and evaluation of primary prevention programs. Health care professionals need training to recognize possible signs of exploitation and to intervene appropriately. They need to adopt a multidisciplinary, outward-focused approach to service provision, working with nonmedical professionals in the community to assist victims. Pediatricians also need to advocate for legislation and policies that promote child rights and victim services as well as those that address the social determinants of health, which influence the vulnerability to human trafficking. This policy statement outlines major issues regarding public policy, medical education, research, and collaboration in the area of child labor and sex trafficking and provides recommendations for future work. Copyright © 2017 by the American Academy of Pediatrics.

  4. Early risk factors for being a bully, victim, or bully/victim in late elementary and early secondary education. The longitudinal TRAILS study

    Directory of Open Access Journals (Sweden)

    Ormel Johan

    2011-06-01

    Full Text Available Abstract Background Data regarding the impact of early risk factors on later involvement in bullying are scarce. We investigated the impact of preschool behaviors, family characteristics (socio-economic status, family breakup and parental mental health on bullying and victimization at age 11 (T1 and age 13.5 (T2. Methods longitudinal data from a subsample of the TRacking Adolescents' Individual Lives Survey (TRAILS (T1: N = 982; T2: N = 977. TRAILS is a prospective study of adolescent mental health in a mixed urban and rural region of the Netherlands. At T1 parents reported on family characteristics, parental mental health and retrospectively on children's preschool behavior at age 4-5. Schoolmates reported involvement of adolescents in bullying or victimization at T1 and T2. Results Children with preschool anxiety were less likely to be bully/victim at T1. Children with preschool aggressiveness were more likely to be bully (T1, bully/victim (T1 and T2 and victim (T2 and children with good preschool motor functioning were more likely to be bully (T1 and less likely to be victim (T1 and T2. Children from low socioeconomic status families were more likely be to be bully, victim, or bully/victim and less likely to be uninvolved both at T1 and T2. Finally, children from intact two parent families were more likely to be uninvolved at T2. Conclusion Preschool behavioral, emotional and motor problems, socioeconomic status, and family breakup are related to involvement in bullying at a later age. Prevention of bullying and its consequences can be enhanced by focusing on risk groups in early life.

  5. Experience in working with volunteers as providers of support to victims and witnesses in victim and witness support departments at the courts

    Directory of Open Access Journals (Sweden)

    Hamer-Vidmar Nikica

    2015-01-01

    Full Text Available The aim of this paper is to present the results of a survey on the experience of engaging volunteers as providers of support for victims and witnesses in Victim and Witness Support Departments at the courts. The Independent Service for Victim and Witness Support in Ministry of Justice is responsible for the development of the victim and witness support system in Croatia. The Independent Service also coordinates the work of Victim and Witness Support Departments and develops and provides training programs and supervision for support officers and volunteers. A survey was conducted in order to determine volunteer motivation, assess the volunteers’ required qualities, their educational needs, the emotional impact arising from the work with victims and witnesses and the volunteers‘ assessment of the level of acceptance by court officials. In order to improve the level of safety of volunteers and the organization itself, the selection and educational processes for volunteers have been improved, according to both the experience achieved by working with volunteers and the results of the aforementioned survey. Engaging volunteers in the judicial system is a large step forward in the field of co-operation between the judiciary and the community.

  6. 78 FR 52877 - VOCA Victim Assistance Program

    Science.gov (United States)

    2013-08-27

    ... these requirements has merely been re-worked for clarity. Under the proposed rule SAAs must identify... victim populations will allow OVC and SAAs to better tailor their training and technical assistance and... SAAs may use for these purposes. Funding victim service programs located in adjacent States. Program...

  7. Relational Aggression and Victimization in College Students

    Science.gov (United States)

    Dahlen, Eric R.; Czar, Katherine A.; Prather, Emily; Dyess, Christy

    2013-01-01

    For this study we explored relational aggression and victimization in a college sample (N = 307), examining potential gender and race differences, correlates, and the link between relational aggression and common emotional and behavioral problems, independent of relational victimization. Gender and race differences were observed on relational…

  8. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  9. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  10. Coping and Sexual Harassment: How Victims Cope across Multiple Settings.

    Science.gov (United States)

    Scarduzio, Jennifer A; Sheff, Sarah E; Smith, Mathew

    2018-02-01

    The ways sexual harassment occurs both online and in face-to-face settings has become more complicated. Sexual harassment that occurs in cyberspace or online sexual harassment adds complexity to the experiences of victims, current research understandings, and the legal dimensions of this phenomenon. Social networking sites (SNS) are a type of social media that offer unique opportunities to users and sometimes the communication that occurs on SNS can cross the line from flirtation into online sexual harassment. Victims of sexual harassment employ communicative strategies such as coping to make sense of their experiences of sexual harassment. The current study qualitatively examined problem-focused, active emotion-focused, and passive emotion-focused coping strategies employed by sexual harassment victims across multiple settings. We conducted 26 in-depth interviews with victims that had experienced sexual harassment across multiple settings (e.g., face-to-face and SNS). The findings present 16 types of coping strategies-five problem-focused, five active emotion-focused, and six passive emotion-focused. The victims used an average of three types of coping strategies during their experiences. Theoretical implications extend research on passive emotion-focused coping strategies by discussing powerlessness and how victims blame other victims. Furthermore, theoretically the findings reveal that coping is a complex, cyclical process and that victims shift among types of coping strategies over the course of their experience. Practical implications are offered for victims and for SNS sites.

  11. Comparing victim attributions and outcomes for workplace aggression and sexual harassment.

    Science.gov (United States)

    Hershcovis, M Sandy; Barling, Julian

    2010-09-01

    In 2 studies, we investigated victim attributions (Study 1) and outcomes (Study 2) for workplace aggression and sexual harassment. Drawing on social categorization theory, we argue that victims of workplace aggression and sexual harassment may make different attributions about their mistreatment. In Study 1, we investigated victim attributions in an experimental study. We hypothesized that victims of sexual harassment are more likely than victims of workplace aggression to depersonalize their mistreatment and attribute blame to the perpetrator or the perpetrator's attitudes toward their gender. In contrast, victims of workplace aggression are more likely than victims of sexual harassment to personalize the mistreatment and make internal attributions. Results supported our hypotheses. On the basis of differential attributions for these 2 types of mistreatment, we argue that victims of workplace aggression may experience stronger adverse outcomes than victims of sexual harassment. In Study 2, we compared meta-analytically the attitudinal, behavioral, and health outcomes of workplace aggression and sexual harassment. Negative outcomes of workplace aggression were stronger in magnitude than those of sexual harassment for 6 of the 8 outcome variables. Implications and future directions are discussed. Copyright 2010 APA, all rights reserved

  12. The interrelation between victimization and bullying inside young offender institutions.

    Science.gov (United States)

    Häufle, Jenny; Wolter, Daniel

    2015-01-01

    Bullying and victimization are serious problems within prisons. Young Offender Institutions (YOIs), in particular, suffer from high rates of inmate-on-inmate violence. More recent theories about the development of bullying in closed custody institutions imply a relationship between the experience of victimization and the usage of bullying. In our study, we test this linkage using longitudinal survey data taken at two time-points from 473 inmates (aged 15-24) inside three YOIs in Germany. We first analyze the extent of bullying and victimization, and then used a longitudinal structural equation model to predict inmate bullying behavior at time 2 based on victimization that occurred at time 1. Age is used as a predictor variable to account for differences in the amount of victimization and bullying. Results suggest that bullying and victimization are high in the YOIs, which were subject to research. Most inmates reported being a bully and a victim at the same time. Younger inmates use more direct physical bullying but not psychological bullying. An increase in psychological bullying over time can significantly be explained by victimization at an earlier measurement time point. Our study therefore supports recent theoretical assumptions about the development of bullying behavior. Possible implications for prevention and intervention are discussed. © 2014 Wiley Periodicals, Inc.

  13. Implicit Social Cognitive Processes Underlying Victim Self and Identity: Evidence With College-Aged Adults.

    Science.gov (United States)

    Sachs, Nicole M; Veysey, Bonita M; Rivera, Luis M

    2017-11-01

    Past research on victimization has relied predominantly on individuals' awareness of and willingness to self-report a victimization experience and its effect on self and identity processes. The present research adopts theoretical and methodological innovations in implicit social cognition research to provide a new perspective on how a violent victimization experience might influence identity processes outside of conscious awareness. Our main goal was to test whether individuals who have victimization experience implicitly associate the self with victims (implicit victim identity) and their stereotypes (implicit victim self-stereotyping), and the relation of these associations to explicit victim identity and self-stereotyping. Two pretests with undergraduate student participants ( Ns = 122 and 72) identified victim-related word stimuli for two Single Category Implicit Association Test (SC-IAT) measures of implicit victim identity and self-stereotyping. In Pretest Study A, participants read crime vignettes and listed words that described a victim, then in Pretest Study B, participants rated these words on victim relatedness and valence. The Main Study recruited undergraduate student participants ( N = 101) who completed the SC-IATs, self-report measures of explicit victim identity and self-stereotyping, and victimization experiences. Three of our five hypotheses were supported. Individuals with past victimization experience exhibited strong explicit victim identity and self-stereotyping, but not implicit victim identity and self-stereotyping, relative to those with no victimization experience. Explicit and implicit victim identity and self-stereotyping were unrelated. Finally, among individuals with victimization experience, a strong implicit victim identity was associated with strong implicit victim self-stereotyping. This research has implications for understanding the processes underlying revictimization and for preventing further victimization.

  14. CRIMINAL LEGAL PROTECTION OF CHILD VICTIMS AND WITNESSES OF CRIMES

    Directory of Open Access Journals (Sweden)

    Monika Mushevska

    2016-01-01

    Full Text Available The term victim indicates a natural person that underwent some kind of crime, including psychological and mental disorder, and emotional suffering or monetary loss, that were caused by accomplishing or not accomplishing a certain kind of activity that violates the law in one state. The term Victim also includes the close members of the victim’s family that depend on the victim. “Kids, victims and witnesses of crimes” indicates kids and adolescents under 18 years of age, which are victims of different kinds of crime or witnesses of different kinds of crime, in spite of the role that they have in the crime act. In all proceedings that directly or indirectly child victims involved it is important to act in a way that is the best and most appropriate for the child.

  15. Effects of peer victimization on psychological and academic adjustment in early adolescence.

    Science.gov (United States)

    Rueger, Sandra Yu; Jenkins, Lyndsay N

    2014-03-01

    The purpose of the current study is to investigate the effects of frequency of peer victimization experiences on psychological and academic adjustment during early adolescence, with a focus on testing psychological adjustment as a mediator, as well as differences based on gender and type of victimization. The sample in this short-term longitudinal design study consists of 7th and 8th graders (n = 670, 50% male) from an ethnically and socioeconomically diverse middle school. Victimization was measured using 10 items that assessed frequency of verbal, physical, and relational victimization experiences, and outcomes were assessed with the Behavior Assessment System for Children (2nd ed.) and school records. There was support for gender differences in frequency of peer victimization experiences based on type of victimization. More specifically, boys reported higher levels of physical and verbal victimization, and girls reported higher levels of relational victimization. In addition, there were statistically significant differences between boys and girls on the relation between victimization and anxiety, attendance, and grades, with girls experiencing more maladjustment than boys in response to peer victimization. Finally, results demonstrated no gender differences in indirect effects of psychological adjustment on the relation between peer victimization and academic outcomes, whether victimization was physical, verbal, and relational. These findings highlight the importance of addressing social-emotional functioning as well as peer victimization in the schools for both boys and girls, as both affect students' academic functioning. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  16. Peer victimization: Intimidation and victmization in Chilean students

    Directory of Open Access Journals (Sweden)

    Verónica López

    2009-12-01

    Full Text Available This paper presents the results of a study about peer intimidation and victimization with 1167 school students from 6th, 7th, and 8th grade from the Valparaiso Region of Valparaíso, Chile. The instrument used was the Insebull Battery (Avilés & Elices, 2007. Results show that approximately 9% of students have been victim of peer victimization many times or almost every day during the school year. Psychological victimization was more frequent thanphysical aggression, particularly through virtual communication such as cell-phone messages and e-mails. Participants tend to be groups of male students. Although male students participate more in physical aggression, they also receive more physical and psychological aggression. The most frequent places were inside the classroom and the school yard, when the teacher is not present. Most students inform not knowing, or vaguely knowing, thereasons underlying these aggressions, and do not do anything to deal with them. These results coincide with international studies and allow a better understanding of the characteristics of peer victimization in specific educational contexts within the Chilean school system.

  17. Do Victimization Experiences Accentuate Reactions to Ostracism? An Experiment Using Cyberball

    Science.gov (United States)

    Ruggieri, Sabrina; Bendixen, Mons; Gabriel, Ute; Alsaker, Françoise

    2013-01-01

    Based on the notion that the history of victimization has an impact on the sensitivity to current victimization situations this study investigated whether victims of bullying show more pronounced responses to single episodes of social exclusion. We examined whether victimization experiences in school are associated with responses to ostracism in a…

  18. Pre-hospital care time intervals among victims of road traffic injuries in Iran. A cross-sectional study.

    Science.gov (United States)

    Bigdeli, Maryam; Khorasani-Zavareh, Davoud; Mohammadi, Reza

    2010-07-09

    Road traffic injuries (RTIs) are a major public health problem, requiring concerted efforts both for their prevention and a reduction of their consequences. Timely arrival of the Emergency Medical Service (EMS) at the crash scene followed by speedy victim transportation by trained personnel may reduce the RTIs' consequences. The first 60 minutes after injury occurrence--referred to as the "golden hour"--are vital for the saving of lives. The present study was designed to estimate the average of various time intervals occurring during the pre-hospital care process and to examine the differences between these time intervals as regards RTIs on urban and interurban roads. A retrospective cross-sectional study was designed and various time intervals in relation to pre-hospital care of RTIs identified in the ambulance dispatch centre in Urmia, Iran from 20 March 2005 to 20 March 2007. All cases which resulted in ambulance dispatches were reviewed and those that had complete data on time intervals were analyzed. In total, the cases of 2027 RTI victims were analysed. Of these, 61.5% of the subjects were injured in city areas. The mean response time for city locations was 5.0 minutes, compared with 10.6 minutes for interurban road locations. The mean on-scene time on the interurban roads was longer than on city roads (9.2 vs. 6.1 minutes, p transport times from the scene to the hospital were also significantly longer for interurban incidents (17.1 vs. 6.3 minutes, p transport and total time intervals among EMS responding to RTI incidents were longer for interurban roads, compared to the city areas. More research should take place on needs-to and access-for EMS on city and interurban roads. The notification interval seems to be a hidden part of the post-crash events and indirectly affects the "golden hour" for victim management and it needs to be measured through the establishment of the surveillance systems.

  19. Victims of cybercrime in Europe : a review of victim surveys

    NARCIS (Netherlands)

    Reep-van den Bergh, Carin M.M.; Junger, Marianne

    2018-01-01

    Objectives: Review the evidence provided by victim surveys in order to provide a rough estimate of the personal crime prevalence of the main types of cybercrime. Methods: We performed a search in databases, searched online, and contacted several Offices for National Statistics in Europe and selected

  20. The Performance of Indian Equity Funds in the Era of Quantitative Easing

    Directory of Open Access Journals (Sweden)

    Ömer Faruk Tan

    2015-10-01

    Full Text Available This study aims to evaluate the performance of Indian equity funds between January 2009 and October 2014. This study period coincides with the period of quantitative easing during which the developing economies in financial markets have been influenced. After the global financial crisis of 2008 came a period of quantitative easing (QE, creating an increase in the money supply and leading to a capital flow from developed countries to developing countries. During this 5-year 10-month period, in which the relevant quantitative easing continued, Indian CNX500 price index yielded approximately 21% compounded on average, per annum. In this study, Indian equity funds are examined in order to compare these funds’ performance within this period. Within this scope, 12 Indian equity funds are chosen. In order to measure these funds’ performances, the Sharpe ratio (1966, Treynor ratio (1965, Jensen’s alpha (1968 methods are used. Jensen’s alpha is also used in identifying selectivity skills of fund managers. Additionally, the Treynor & Mazuy (1966 regression analysis method is applied to show the market timing ability of fund managers.

  1. Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization

    OpenAIRE

    Erdinc Ozturk; Gizem Akcan

    2016-01-01

    Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students w...

  2. Victims and Heroes

    DEFF Research Database (Denmark)

    Højbjerg, Christian K.

    2010-01-01

    Victimization, autochthony and citizenship, power and nation-building constitute recurrent, interrelated themes in post-war Manding historical memory in the border area between Liberia and Guinea. While the perceived history of the Manding diverges from academic, historical knowledge as well...

  3. Life imitating art: depictions of the hidden curriculum in medical television programs.

    Science.gov (United States)

    Stanek, Agatha; Clarkin, Chantalle; Bould, M Dylan; Writer, Hilary; Doja, Asif

    2015-09-26

    The hidden curriculum represents influences occurring within the culture of medicine that indirectly alter medical professionals' interactions, beliefs and clinical practices throughout their training. One approach to increase medical student awareness of the hidden curriculum is to provide them with readily available examples of how it is enacted in medicine; as such the purpose of this study was to examine depictions of the hidden curriculum in popular medical television programs. One full season of ER, Grey's Anatomy and Scrubs were selected for review. A summative content analysis was performed to ascertain the presence of depictions of the hidden curriculum, as well as to record the type, frequency and quality of examples. A second reviewer also viewed a random selection of episodes from each series to establish coding reliability. The most prevalent themes across all television programs were: the hierarchical nature of medicine; challenges during transitional stages in medicine; the importance of role modeling; patient dehumanization; faking or overstating one's capabilities; unprofessionalism; the loss of idealism; and difficulties with work-life balance. The hidden curriculum is frequently depicted in popular medical television shows. These examples of the hidden curriculum could serve as a valuable teaching resource in undergraduate medical programs.

  4. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  5. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing...... the probability of generating a given string, or computing the most likely path generating a given string. In this paper we consider the problem of computing the most likely string, or consensus string, generated by a given model, and its implications on the complexity of comparing hidden Markov models. We show...... that computing the consensus string, and approximating its probability within any constant factor, is NP-hard, and that the same holds for the closely related labeling problem for class hidden Markov models. Furthermore, we establish the NP-hardness of comparing two hidden Markov models under the L∞- and L1...

  6. Developing the Cyber Victimization Experiences and Cyberbullying Behaviors Scales.

    Science.gov (United States)

    Betts, Lucy R; Spenser, Karin A

    2017-01-01

    The reported prevalence rates of cyber victimization experiences and cyberbullying behaviors vary. Part of this variation is likely due to the diverse definitions and operationalizations of the constructs adopted in previous research and the lack of psychometrically robust measures. Through 2 studies, the authors developed (Study 1) and evaluated (Study 2) the cyber victimization experiences and cyberbullying behaviors scales. Participants in Study 1 were 393 (122 boys, 171 girls) and in Study 2 were 345 (153 boys, 192 girls) 11-15-year-olds who completed measures of cyber victimization experiences, cyberbullying behaviors, face-to-face victimization experiences, face-to-face bullying behaviors, and social desirability. The 3-factor cyber victimization experiences scale comprised threat, shared images, and personal attack. The 3-factor cyberbullying behaviors scale comprised sharing images, gossip, and personal attack. Both scales demonstrated acceptable internal consistency and convergent validity.

  7. Measuring adolescents’ exposure to victimization: The Environmental Risk (E-Risk) Longitudinal Twin Study

    Science.gov (United States)

    Fisher, Helen L.; Caspi, Avshalom; Moffitt, Terrie E.; Wertz, Jasmin; Gray, Rebecca; Newbury, Joanne; Ambler, Antony; Zavos, Helena; Danese, Andrea; Mill, Jonathan; Odgers, Candice L.; Pariante, Carmine; Wong, Chloe C.; Arseneault, Louise

    2016-01-01

    This paper presents mutlilevel findings on adolescents’ victimization exposure from a large longitudinal cohort of twins. Data were obtained from the Environmental Risk (E-Risk) Longitudinal Twin Study, an epidemiological study of 2,232 children (1,116 twin pairs) followed to 18 years of age (with 93% retention). To assess adolescent victimization we combined best practices in survey research on victimization with optimal approaches to measuring life stress and traumatic experiences, and introduce a reliable system for coding severe victimization. One in three children experienced at least one type of severe victimization during adolescence (crime victimization, peer/sibling victimization, internet/mobile phone victimization, sexual victimization, family violence, maltreatment, or neglect), and most types of victimization were more prevalent amongst children from low socioeconomic backgrounds. Exposure to multiple victimization types was common, as was re-victimization; over half of those physically maltreated in childhood were also exposed to severe physical violence in adolescence. Biometric twin analyses revealed that environmental factors had the greatest influence on most types of victimization, while severe physical maltreatment from caregivers during adolescence was predominantly influenced by heritable factors. The findings from this study showcase how distinct levels of victimization measurement can be harmonized in large-scale studies of health and development. PMID:26535933

  8. Nuclear tests: the late indemnification of victims; Essais nucleaire: l'indemnisation tardive des victimes

    Energy Technology Data Exchange (ETDEWEB)

    Charbonneau, S. [Bordeaux-1 Univ., 33 (France)

    2010-04-15

    The author briefly recalls the historical context of the creation of the CEA and outlines the silence and denial about the radioactive contamination of military personnel during the nuclear tests performed in the Algerian Sahara and in Polynesia. He also outlines the continuous action of the association of veterans and victims of these nuclear tests which gathered proofs of health consequences. He comments the content and scope of application of laws which have been lately adopted (in 2010) to acknowledge these facts and indemnify the victims

  9. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  10. Domestic violence and the impact on its victims

    OpenAIRE

    Kirejevová, Iva

    2010-01-01

    Domestic violence is one of the essential problems of our society. Domestic violence is determined by high prevalence, enormous latency and great victimization impact. The aim of my thesis is to describe the psychological aspects of the victims of domestic violence. I presume that long-term psychological and physical violence has a crucial influence on the psycho-somatic health of the victim. I am aware of the fact that this problem does not concern only battered women. Nevertheless I want to...

  11. The linkage between secondary victimization by law enforcement and rape case outcomes.

    Science.gov (United States)

    Patterson, Debra

    2011-01-01

    Prior research has suggested that almost half of rape victims are treated by law enforcement in ways that they experience as upsetting (termed secondary victimization). However, it remains unknown why some victims have negative experiences with law enforcement and others do not. The purpose of this study is to explore victims' experiences with secondary victimization by detectives, comparing how these experiences vary in cases that were ultimately prosecuted by the criminal justice system to those that were not prosecuted. A total of 20 rape victims are interviewed within one county. The study uses grounded theory qualitative analysis, which showed that participants whose cases were eventually prosecuted described the detectives' treatment toward them considerably different than participants with nonprosecuted cases. The study findings further show that victims with cases that were not prosecuted primarily described their detectives as engaging in secondary victimization behaviors and that victims with cases that were ultimately prosecuted primarily described their detectives as responding compassionately toward them.

  12. Obese and Overweight Youth: Risk for Experiencing Bullying Victimization and Internalizing Symptoms.

    Science.gov (United States)

    Waasdorp, Tracy Evian; Mehari, Krista; Bradshaw, Catherine P

    2018-01-22

    Obese and overweight youth are at an increased risk for poor peer relations and psychosocial adjustment. Of particular concern is the high rate of bullying victimization experienced by obese and overweight youth. While it is known that victimized youth are at an increased risk for internalizing symptoms, few studies have examined if weight status exacerbates the association between victimization and internalizing symptoms. The current study drew upon data from over 43,000 youth attending 107 middle and high schools. Multilevel results suggested that compared with normal weight youth, both overweight and obese youth were at an increased risk for experiencing relational, verbal, and cyber victimization, with only obese youth being at an increased risk for experiencing physical victimization. Notably, the odds for experiencing cyber victimization were higher than the odds for experiencing other forms of victimization. Frequently victimized obese youth, but not frequently victimized overweight youth, had significantly higher levels of internalizing symptoms compared to their frequently victimized, normal-weight peers. Together, these findings highlight the increased risk for psychosocial adjustment problems among frequently victimized overweight and obese youth, suggesting these youth may require preventive interventions tailored to meet their unique needs. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  13. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  14. [The profile of female victims of conjugal violence].

    Science.gov (United States)

    Vasseur, Philippe

    2004-12-18

    To define the profile of female victims of conjugal violence examined in the Legal Medicine emergency unit of the Hotel-Dieu hospital in Paris. A self-administered questionnaire with 15 questions was distributed to 100 victims. The 100 victims replied: 86 cases of violence took place usually in the home, 78 episodes of violence were multiple and complaints were rarely lodged after the first episodes. Mental and sexual violence were severe and unrecognized. Eighty women interviewed suffered from mental violence. In 43 cases, alcohol played a determining role in the onset of such violence. Female victims of conjugal violence do not have a specific profile. The law of silence persists, but the increase in the number of complaints from North African and African women is encouraging for the future.

  15. Familial Influences on Dating Violence Victimization Among Latino Youth.

    Science.gov (United States)

    Reyes, H Luz McNaughton; Foshee, Vangie A; Klevens, Joanne; Tharp, Andra Teten; Chapman, Mimi V; Chen, May S; Ennett, Susan T

    2016-01-01

    Despite theoretical and empirical evidence suggesting that the family environment plays a central role in Latino youth development, relatively little is known about how family processes influence dating violence victimization among Latino adolescents. To address this gap in the literature, we used data from 210 Latino parents and their 13- to 15-year-old adolescents to examine associations between several different family processes, including both parenting practices (parent monitoring, parent-adolescent communication) and aspects of the family relational climate (family cohesion, family conflict, acculturation conflict) and psychological, physical, and sexual dating violence victimization. Consistent with expectations, lower levels of family cohesion and higher levels of family and acculturation conflict were associated with risk for dating violence victimization, although associations varied depending on victimization type. In contrast, neither parental monitoring nor parent-adolescent communication was significantly associated with any type of dating violence victimization. In addition, we found that parent, but not teen, Anglo-American acculturation was associated with higher dating violence victimization risk. Findings suggest that family-based dating abuse prevention programs for Latino youth should seek to increase family cohesion and decrease family conflict, including acculturation-based conflict.

  16. The Victim Handling Model of Human Trafficking Through Economic Independence

    OpenAIRE

    Nuraeny, Henny; Utami, Tanti Kirana

    2016-01-01

    Human Trafficking is a modern trading of human slavery. Human Trafficking is also one of the worst forms of violation of human dignity that results in trauma to the victims. To that end, there should be a comprehensive treatment for victims. The problems that can be studied is whether a model that can be applied in the treatment of victims of trafficking in Cianjur and disseminating technical how models Handling of Victims of Human Trafficking in Cianjur. This study used normative juridical a...

  17. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  18. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  19. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  20. Short-term Lost Productivity per Victim: Intimate Partner Violence, Sexual Violence, or Stalking.

    Science.gov (United States)

    Peterson, Cora; Liu, Yang; Kresnow, Marcie-Jo; Florence, Curtis; Merrick, Melissa T; DeGue, Sarah; Lokey, Colby N

    2018-05-15

    The purpose of this study is to estimate victims' lifetime short-term lost productivity because of intimate partner violence, sexual violence, or stalking. U.S. nationally representative data from the 2012 National Intimate Partner and Sexual Violence Survey were used to estimate a regression-adjusted average per victim (female and male) and total population number of cumulative short-term lost work and school days (or lost productivity) because of victimizations over victims' lifetimes. Victims' lost productivity was valued using a U.S. daily production estimate. Analysis was conducted in 2017. Non-institutionalized adults with some lifetime exposure to intimate partner violence, sexual violence, or stalking (n=6,718 respondents; survey-weighted n=130,795,789) reported nearly 741 million lost productive days because of victimizations by an average of 2.5 perpetrators per victim. The adjusted per victim average was 4.9 (95% CI=3.9, 5.9) days, controlling for victim, perpetrator, and violence type factors. The estimated societal cost of this short-term lost productivity was $730 per victim, or $110 billion across the lifetimes of all victims (2016 USD). Factors associated with victims having a higher number of lost days included a higher number of perpetrators and being female, as well as sexual violence, physical violence, or stalking victimization by an intimate partner perpetrator, stalking victimization by an acquaintance perpetrator, and sexual violence or stalking victimization by a family member perpetrator. Short-term lost productivity represents a minimum economic valuation of the immediate negative effects of intimate partner violence, sexual violence, and stalking. Victims' lost productivity affects family members, colleagues, and employers. Published by Elsevier Inc.

  1. Sexually assaulted victims are getting younger

    DEFF Research Database (Denmark)

    Scherer, Susanne; Hansen, Steen Holger; Lynnerup, Niels

    2014-01-01

    INTRODUCTION: From the clinical forensic examination reports produced by the Department of Forensic Medicine, Department of Forensic Medicine, Faculty of Health Sciences, University of Copenhagen, Denmark, in 2007 concerning rape, attempted rape and sexual assault (RAS), circumstances were...... extracted and analysed focussing on age, relationship, lesions, violence, location and alcohol intoxication. MATERIAL AND METHODS: A total of 184 girls and women over the age of 12 years were included in this retrospective study. RESULTS: The median age of the victims was 20 years (range 12-89 years). 75.......5% were under 30 years of age. 53% knew the perpetrator. More than one perpetrator was reported in 11%. 46% of the assaulted victims had a total number of 1-5 observed lesions and these were observed in all types of perpetrator relationship. Eight victims with more than 20 lesions were assaulted...

  2. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  3. Children’s Attribution of Emotions in Victimization Situations: Examination of the Happy Victimizer Task and its Relation to Children’s Moral Behavior

    OpenAIRE

    Cabral Menéres, Maria Sofia

    2014-01-01

    Tese de Doutoramento em Psicologia, apresentada a Departament of Psychology, Faculty of Arts and Social Sciences, Simon Fraser University Children’s understanding of emotions in victimization situations has been investigated as a way to study children’s moral motivation. To assess this understanding, researchers have used a procedure known as the happy victimizer task in which children are asked to attribute emotions to victimizers who have performed an immoral action. In the present study...

  4. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully

  5. Victimization and its associations with peer rejection and fear of victimization: Moderating effects of individual-level and classroom-level characteristics

    Czech Academy of Sciences Publication Activity Database

    Kollerová, Lenka; Smolík, Filip

    2016-01-01

    Roč. 86, č. 4 (2016), s. 640-656 ISSN 0007-0998 R&D Projects: GA ČR(CZ) GA15-00682S Institutional support: RVO:68081740 Keywords : fear of victimization * peer rejection * victimization Subject RIV: AN - Psychology Impact factor: 2.403, year: 2016

  6. How older persons explain why they became victims of abuse

    DEFF Research Database (Denmark)

    Mysyuk, Yuliya; Westendorp, Rudi Gerardus Johannes; Lindenberg, Jolanda

    2016-01-01

    independently, in residential care facilities and nursing homes. SUBJECTS: six males and 11 females aged 63-90 years. RESULTS: the main causes of abuse identified by older victims themselves were mutual dependency between victim and perpetrator, power and control imbalances, loneliness and a marginalised social...... with the perpetrator. Coping strategies mentioned by victims were seeking informal or professional help and using self-help strategies. CONCLUSION: older victims perceive abuse differently depending on the expected acceptability of the type(s) of abuse experienced and the anticipated stigma associated...

  7. Invisible victims. Analysis of a case of abuse from the perspective of the victim with intellectual disability

    Directory of Open Access Journals (Sweden)

    Belén GUTIÉRREZ-BERMEJO

    2017-09-01

    Full Text Available This article aims to analyze the experience of abuse by a person with intellectual disability. For this purpose, a semi-structured interview was recorded, transcribed and analyzed according to the existing scientific literature. The results show the emotional impact of the abuse experience on the victim. It also identifies false myths in relation to the emotional experience of people with intellectual disabilities and provides psychological explanations for the actions of the different people involved in the aggressions. The plurality of abuse situations which the victim may face, as well as the permanence of abuse over the years, define a common characteristic in the maltreatment of individuals with intellectual disabilities. Understanding all the dynamics that can lead to abuse in people with intellectual disabilities provides a new perspective in the assessment and intervention with these victims.

  8. Bullying Victimization Type and Feeling Unsafe in Middle School.

    Science.gov (United States)

    Bowser, John; Larson, James D; Bellmore, Amy; Olson, Chelsea; Resnik, Felice

    2018-01-01

    Given their significance to school violence, this study quantifies the association between bullying victimization and perceptions of safety separately for victimization where the type is not specified versus victimization that is physical in nature. Generalized liner mixed modeling was employed with 5,138 sixth- to eighth-grade students in 24 schools who self-reported on their bullying victimization and perceptions of school safety on an anonymous survey in fall 2015. Results indicate a multiplicative interaction exists with regard to the odds of feeling unsafe at school among those who were bullied at all (odds ratio [ OR] = 3.1) compared to those who were bullied physically ( OR = 9.12). For school nurses who work with students with a variety of concerns and health issues, this research indicates that the use of bullying victimization as an outcome, proxy and/or predictor, requires inquiry into the type of bullying experienced to aid in the care and support received.

  9. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  10. Victim empathy, social self-esteem, and psychopathy in rapists.

    Science.gov (United States)

    Fernandez, Yolanda M; Marshall, W L

    2003-01-01

    The purpose of the present study was to compare the responses of 27 incarcerated rapists and 27 incarcerated nonsexual offenders using the Rapist Empathy Measure (targeting victim specific empathy deficits) and to examine the relationship between empathy with self-esteem and psychopathy for both groups. The Social Self-Esteem Inventory was used as a measure of perceived social competence and the Psychopathy Checklist-Revised (PCL-R; Hare, 1991) was used as a measure of psychopathy. All participants completed the two self-report questionnaires on empathy and self-esteem; in addition, the rapists were required to complete an extra section of the empathy measure that assessed their empathic responses to their own victims. Demographic information and psychopathy scores were obtained by reviewing institutional files. When psychopathy scores were not available, subjects participated in a semi-structured interview and were scored on the Psychopathy Checklist-Revised by the researcher. Rapists demonstrated more empathy than the nonsexual offenders toward women in general and the same degree of empathy as the nonsexual offenders toward a woman who had been a victim of a sexual assault by another male. Of particular importance were the within-group comparisons across victim type for the rapists which revealed significant empathy deficits toward their own victim(s). Interestingly, no differences were found between the rapists and nonsexual offenders in terms of self-esteem and psychopathy, and neither self-esteem nor psychopathy significantly predicted empathy for either group. It was concluded from the present study that rapists may suppress empathy primarily toward their own victim rather than suffer from a generalized empathy deficit. It is suggested that empathy deficits in rapists might better be construed as cognitive distortions specific to their victims and should be addressed in that manner in treatment.

  11. Physical examination of sexual assault victims in Belgrade area

    Directory of Open Access Journals (Sweden)

    Alempijević Đorđe

    2006-01-01

    Full Text Available Introduction: Sexual crimes represent various forms of contact of perpetrator’s genitals, lips, tongue, and fingers with genitals, lips and/or anus of the victim, in order to achieve sexual satisfaction, without victim’s consent. Objective: The aim of this work was to analyze the type of medical institution in which victims of sexual assaults are being examined in Belgrade area, to assess the quality of these examinations and medical records, as well as to control whether standardized protocols are followed. Method: Data were obtained through analysis of 113 cases of sexual assaults prosecuted in the District Court of Belgrade. Results: All victims were females with mean age of 24.1 years. The majority of victims (85% were examined in one medical institution, most often in the Institute of Gynecology and Obstetrics, Clinical Center of Serbia, and only by one medical doctor (81.4%. Gynecologists were most frequently included in examination, while specialists of forensic medicine were engaged in only 9 cases (7.9%. In 84% of victims, the examination was performed during the first three days after the assault, and in 52% of cases on the first day. Standard techniques of clinical and gynecological examinations were applied only, without following any protocols, so the reports were made exclusively on individual basis. In no case an informed consent by victim was obtained before examination. Anamnestic data were collected in only 15.9% of cases, and they were generally incomplete. Conclusion: The results of investigation show that the quality of examination of sexual assault victims in Belgrade area is not adequate. Therefore, such negative practice should be changed in future through introduction of standardized protocols for examination of victims, as well as development of clinical forensic medicine.

  12. Bully Victimization: Selection and Influence Within Adolescent Friendship Networks and Cliques.

    Science.gov (United States)

    Lodder, Gerine M A; Scholte, Ron H J; Cillessen, Antonius H N; Giletta, Matteo

    2016-01-01

    Adolescents tend to form friendships with similar peers and, in turn, their friends further influence adolescents' behaviors and attitudes. Emerging work has shown that these selection and influence processes also might extend to bully victimization. However, no prior work has examined selection and influence effects involved in bully victimization within cliques, despite theoretical account emphasizing the importance of cliques in this regard. This study examined selection and influence processes in adolescence regarding bully victimization both at the level of the entire friendship network and the level of cliques. We used a two-wave design (5-month interval). Participants were 543 adolescents (50.1% male, Mage = 15.8) in secondary education. Stochastic actor-based models indicated that at the level of the larger friendship network, adolescents tended to select friends with similar levels of bully victimization as they themselves. In addition, adolescent friends influenced each other in terms of bully victimization over time. Actor Parter Interdependence models showed that similarities in bully victimization between clique members were not due to selection of clique members. For boys, average clique bully victimization predicted individual bully victimization over time (influence), but not vice versa. No influence was found for girls, indicating that different mechanisms may underlie friend influence on bully victimization for girls and boys. The differences in results at the level of the larger friendship network versus the clique emphasize the importance of taking the type of friendship ties into account in research on selection and influence processes involved in bully victimization.

  13. Farm Mapping to Assist, Protect, and Prepare Emergency Responders: Farm MAPPER.

    Science.gov (United States)

    Reyes, Iris; Rollins, Tami; Mahnke, Andrea; Kadolph, Christopher; Minor, Gerald; Keifer, Matthew

    2014-01-01

    Responders such as firefighters and emergency medical technicians who respond to farm emergencies often face complex and unknown environments. They may encounter hazards such as fuels, solvents, pesticides, caustics, and exploding gas storage cylinders. Responders may be unaware of dirt roads within the farm that can expedite their arrival at critical sites or snow-covered manure pits that act as hidden hazards. A response to a farm, unless guided by someone familiar with the operation, may present a risk to responders and post a challenge in locating the victim. This project explored the use of a Web-based farm-mapping application optimized for tablets and accessible via easily accessible on-site matrix barcodes, or quick response codes (QR codes), to provide emergency responders with hazard and resource information to agricultural operations. Secured portals were developed for both farmers and responders, allowing both parties to populate and customize farm maps with icons. Data were stored online and linked to QR codes attached to mailbox posts where emergency responders may read them with a mobile device. Mock responses were conducted on dairy farms to test QR code linking efficacy, Web site security, and field usability. Findings from farmer usability tests showed willingness to enter data as well as ease of Web site navigation and data entry even with farmers who had limited computer knowledge. Usability tests with emergency responders showed ease of QR code connectivity to the farm maps and ease of Web site navigation. Further research is needed to improve data security as well as assess the program's applicability to nonfarm environments and integration with existing emergency response systems. The next phases of this project will expand the program for regional and national use, develop QR code-linked, Web-based extrication guidance for farm machinery for victim entrapment rescue, and create QR code-linked online training videos and materials for limited

  14. Mediators and Moderators of the Association Between Stalking Victimization and Psychological Distress.

    Science.gov (United States)

    Fais, Connor R; Lutz-Zois, Catherine J; Goodnight, Jackson A

    2017-03-01

    The current study aims to understand mediators and moderators of the relationship between stalking victimization and depression. Based on the reformulated learned helplessness theory, which emphasizes the role of internal, global, and stable attributions for negative events in the development of depression, we predicted that the association between stalking victimization and depression would be mediated by attributions for the stalking and characterological self-blame. We predicted that the association between stalking victimization and helplessness attributions or characterological self-blame, in turn, would be moderated by gender, sex-role identity, and length of stalking. Specifically, we hypothesized that female victims, victims possessing a feminine sex-role identity, and victims experiencing longer stalking episodes would be more likely to experience depression in comparison with male victims, victims possessing a masculine sex-role identity, and victims experiencing shorter stalking episodes. The results indicated that global attributions for the cause of stalking significantly mediated the relationship between stalking victimization and depression. The results for stable attributions, internal attributions, and characterological self-blame were nonsignificant. Furthermore, gender, sex-role identity, and length of stalking did not moderate the association between stalking and attributional style or characterological self-blame. The implications of these findings and directions for future research are discussed.

  15. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  16. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  17. Hidden School Dropout among Immigrant Students: A Cross-Sectional Study

    Science.gov (United States)

    Makarova, Elena; Herzog, Walter

    2013-01-01

    Actual school dropout among immigrant youth has been addressed in a number of studies, but research on hidden school dropout among immigrant students is rare. Thus, the objective of this paper is to analyze hidden school dropout among primary school students with an immigrant background. The analyses were performed using survey data of 1186…

  18. Elderly victims of gender violence in Portugal: Invisible and not heard?

    Science.gov (United States)

    Magalhães, Maria José; Rodríguez Castro, Yolanda; Ruido, Patricia Alonso; Braga Lopez, Rita DeOliveira

    2016-12-01

    In this article, we explore professionals' representations of elderly female victims of gender violence. Semi-structured interviews were used to explore seven professionals' work philosophies and intervention methodologies in their work with elderly female victims of violence, their main problems and difficulties, and their perspectives regarding shelters for elderly women. Results show that there are no specific philosophies and methodologies to intervene with these victims. There is a tendency to homogenize all the victims of gender violence, regardless of their age and specific needs. The professionals also tended to trivialize gender violence against elderly female victims, considering that these women tolerate violence.

  19. Investigating the Self-Protective Potential of Immobility in Victims of Rape.

    Science.gov (United States)

    de Heer, Brooke A; Jones, Lynn C

    2017-04-01

    Using a nationwide sample of reported rape cases collected by the Federal Bureau of Investigation (FBI; 389 victims; 89% stranger rapes), this study investigates assumptions about self-protective behaviors for rape victims. Past research on victim resistance strategies often specifies active resistance as self-protective, inadvertently underestimating the potential for biologically based reactions, such as tonic immobility, to be self-protective as well. Results confirm that rape victims who were verbally and physically immobile during the attack were less likely to be injured and have force used against them. In addition, victims who were verbally immobile suffered a less severe attack. The results indicate that immobility may protect the victim from increased injury, force, and severity of the attack. Implications for the legal and public definition of consent are discussed.

  20. When the Cop Is the Victim: A Test of Target Congruence Theory on Intimate Partner Violence Victimization Experienced by Police Officers.

    Science.gov (United States)

    Zavala, Egbert

    2017-05-01

    This study analyzed data from the Police Stress and Domestic Violence in Police Families in Baltimore, Maryland, 1997-1999 ( N = 753) to examine propositions derived from target congruence theory in the context of intimate partner violence (IPV) victimization experienced by police officers. Specifically, this study tested the influence of target vulnerability, target gratifiability, and target antagonism on IPV victimization. Results from logistic regression models showed that all three theoretical constructs positively and significantly predicted IPV victimization. Results, as well as the study's limitations and directions for future research, are discussed.

  1. Characteristic of psychological particularities of «victim» phenomenon

    Directory of Open Access Journals (Sweden)

    Skitnevskaya L.V.

    2017-04-01

    Full Text Available the article is devoted to analysis of the main psychological characteristics of the phenomenon of victims in the schools. The researchers discuss the types of victims: passive and aggressive. Passive victims have a negative attitude towards violence and prevent the use of aggressive means. The aggressive behavior of the victims is an attack on the tortfeasor. The study was conducted in the framework of the project RHSF №15–06–10575 «The study of environmental and personal factors of adolescent bullying».

  2. Characterising smoking cessation smartphone applications in terms of behaviour change techniques, engagement and ease-of-use features.

    Science.gov (United States)

    Ubhi, Harveen Kaur; Michie, Susan; Kotz, Daniel; van Schayck, Onno C P; Selladurai, Abiram; West, Robert

    2016-09-01

    The aim of this study was to assess whether or not behaviour change techniques (BCTs) as well as engagement and ease-of-use features used in smartphone applications (apps) to aid smoking cessation can be identified reliably. Apps were coded for presence of potentially effective BCTs, and engagement and ease-of-use features. Inter-rater reliability for this coding was assessed. Inter-rater agreement for identifying presence of potentially effective BCTs ranged from 66.8 to 95.1 % with 'prevalence and bias adjusted kappas' (PABAK) ranging from 0.35 to 0.90 (p features and (b) a set of ease-of-use features, which were included, were 0.77 and 0.75, respectively (p 50 % for rewarding abstinence. The average proportions of specified engagement and ease-of-use features included in the apps were 69 and 83 %, respectively. The study found that it is possible to identify potentially effective BCTs, and engagement and ease-of-use features in smoking cessation apps with fair to high inter-rater reliability.

  3. WIMPless dark matter from non-Abelian hidden sectors with anomaly-mediated supersymmetry breaking

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Shadmi, Yael

    2011-01-01

    In anomaly-mediated supersymmetry breaking models, superpartner masses are proportional to couplings squared. Their hidden sectors therefore naturally contain WIMPless dark matter, particles whose thermal relic abundance is guaranteed to be of the correct size, even though they are not weakly interacting massive particles. We study viable dark matter candidates in WIMPless anomaly-mediated supersymmetry breaking models with non-Abelian hidden sectors and highlight unusual possibilities that emerge in even the simplest models. In one example with a pure SU(N) hidden sector, stable hidden gluinos freeze out with the correct relic density, but have an extremely low, but natural, confinement scale, providing a framework for self-interacting dark matter. In another simple scenario, hidden gluinos freeze out and decay to visible Winos with the correct relic density, and hidden glueballs may either be stable, providing a natural framework for mixed cold-hot dark matter, or may decay, yielding astrophysical signals. Last, we present a model with light hidden pions that may be tested with improved constraints on the number of nonrelativistic degrees of freedom. All of these scenarios are defined by a small number of parameters, are consistent with gauge coupling unification, preserve the beautiful connection between the weak scale and the observed dark matter relic density, and are natural, with relatively light visible superpartners. We conclude with comments on interesting future directions.

  4. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems.

    Science.gov (United States)

    Park, Subin; Lee, Yeeun; Jang, Hyesue; Jo, Minkyung

    2017-05-19

    We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES), exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  5. Relations among School Connectedness, Hope, Life Satisfaction, and Bully Victimization

    Science.gov (United States)

    You, Sukkyung; Furlong, Michael J.; Felix, Erika; Sharkey, Jill D.; Tanigawa, Diane; Green, Jennifer Greif

    2008-01-01

    This study investigates the role of school connectedness in mediating the relation between students' sense of hope and life satisfaction for three groups: Bullied Victims, Peer Victims, and Nonvictims. Students in grades 5 to 12 (N = 866) completed the California Bully/Victim Scale, School Connectedness Scale, Children's Hope Scale, and Students'…

  6. Pupils as Victims of Peer Violence

    Directory of Open Access Journals (Sweden)

    Cvek Mihaela

    2013-11-01

    Full Text Available The school is an educational institution that has to provide appropriate control of adults over pupils, which they do. Nevertheless, violence cannot be avoided. Pupils encounter peer violence in different roles, as observers, victims, perpetrators, or both. The objective of our research was to examine how often pupils are victims of peer violence, and to what extent the latter depends on pupils’ gender and age. The results of the research made among pupils in the fifth, seventh, and eighth grades of various primary schools across Slovenia showed that 24.1 per cent of pupils had already been victims of peer violence. The ones that they tend to tell about such episodes are their parents. The results have also shown that school is really a place where violence is very common, and that psychological and verbal abuse are the most common types of violence used.

  7. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  8. Development and validation of the multidimensional offline and online peer victimization scale

    NARCIS (Netherlands)

    Sumter, S.R.; Valkenburg, P.M.; Baumgartner, S.E.; Peter, J.; van der Hof, S.

    2015-01-01

    Peer victimization can seriously impair one’s well-being. As youth spend more time on the Internet, a new form of peer victimization has emerged, namely, online peer victimization. To fully comprehend peer victimization among today’s youth, there is a need for a psychometrically sound measure that

  9. An efficient algorithm for the detection of exposed and hidden wormhole attack

    International Nuclear Information System (INIS)

    Khan, Z.A.; Rehman, S.U.; Islam, M.H.

    2016-01-01

    MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead. (author)

  10. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  11. Dating violence and interpersonal victimization among a national sample of Latino youth.

    Science.gov (United States)

    Cuevas, Carlos A; Sabina, Chiara; Bell, Kristin A

    2014-10-01

    The purpose of this analysis was (1) to provide the rates of dating violence victimization among a national sample of Latino adolescents, (2) to determine the degree to which different forms of dating violence victimization co-occurred for this sample, and (3) to determine how much dating violence victimization overlapped with other forms of non-partner-perpetrated victimization. This analysis used data from the Dating Violence Among Latinos Study, which surveyed 1,525 Latino adolescents between the ages of 12 and 18 years about past-year dating violence and non-partner-perpetrated victimization. We calculated victimization rates and relative risk ratios to evaluate the co-occurrence among different forms of dating violence victimization as well as the co-occurrence of dating violence and other forms of victimization. Results show elevated rates of dating violence victimization compared with previous studies, which is primarily accounted for by psychological dating violence. The rate of dating violence appears to precipitously increase starting around ages 13 and 14 years and is consistently higher for boys. Each type of dating violence was significantly associated with other forms of dating violence (e.g., physical and psychological). Dating violence was significantly associated with experiencing conventional crime, peer or sibling victimization, and nonpartner sexual victimization as well as being a polyvictim. The results support the importance of early prevention efforts with Latino youth and addressing dating violence with both sexes. Furthermore, dating violence should be seen as a potential risk marker for youth who are experiencing multiple forms of victimization. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  12. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  13. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  14. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  15. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  16. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  17. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  18. Consequences of Selection for Yield Traits on Calving Ease Performance

    NARCIS (Netherlands)

    Lopez de Maturana, E.; Ugarte, E.; Komen, J.; Arendonk, van J.A.M.

    2007-01-01

    The impact of different breeding goals on the genetic response for calving ease (CE) and yield traits was studied in the Basque Holstein cattle population. The economic value for CE was estimated with a bioeconomic model, using Basque production and market circumstances and taking into account the

  19. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  20. Electroweak-charged bound states as LHC probes of hidden forces

    Science.gov (United States)

    Li, Lingfeng; Salvioni, Ennio; Tsai, Yuhsin; Zheng, Rui

    2018-01-01

    We explore the LHC reach on beyond-the-standard model (BSM) particles X associated with a new strong force in a hidden sector. We focus on the motivated scenario where the SM and hidden sectors are connected by fermionic mediators ψ+,0 that carry SM electroweak charges. The most promising signal is the Drell-Yan production of a ψ±ψ¯ 0 pair, which forms an electrically charged vector bound state ϒ± due to the hidden force and later undergoes resonant annihilation into W±X . We analyze this final state in detail in the cases where X is a real scalar ϕ that decays to b b ¯, or a dark photon γd that decays to dileptons. For prompt X decays, we show that the corresponding signatures can be efficiently probed by extending the existing ATLAS and CMS diboson searches to include heavy resonance decays into BSM particles. For long-lived X , we propose new searches where the requirement of a prompt hard lepton originating from the W boson ensures triggering and essentially removes any SM backgrounds. To illustrate the potential of our results, we interpret them within two explicit models that contain strong hidden forces and electroweak-charged mediators, namely λ -supersymmetry (SUSY) and non-SUSY ultraviolet extensions of the twin Higgs model. The resonant nature of the signals allows for the reconstruction of the mass of both ϒ± and X , thus providing a wealth of information about the hidden sector.

  1. Of virtual victims and victimized virtues: differential effects of experienced aggression in video games on social cooperation.

    Science.gov (United States)

    Rothmund, Tobias; Gollwitzer, Mario; Klimmt, Christoph

    2011-01-01

    Two experimental studies were used to investigate how interacting with aggressive virtual characters in video games affects trust and cooperation of players. Study 1 demonstrates that experiencing virtual aggression from a victim's perspective can impair players' investments in a subsequent common goods dilemma situation. This effect is mediated by reduced expectations of trust in the cooperativeness of interaction partners. In Study 2 the same effect was replicated by using a different cooperation task and by investigating the moderating role of justice sensitivity from a victim's perspective as a dispositional factor. Participants transferred less money to an unknown partner in a trust game after exposure to aggressive nonplayer characters in a video game. This effect was stronger for people high in victim sensitivity. Results of both studies can be interpreted in line with the sensitivity to mean intentions model and add to the body of research on violent media effects.

  2. Longitudinal Associations in Youth Involvement as Victimized, Bullying, or Witnessing Cyberbullying.

    Science.gov (United States)

    Holfeld, Brett; Mishna, Faye

    2018-04-01

    Although cyberbullying has been linked to cyber victimization, it is unknown whether witnessing cyberbullying impacts and is impacted by experiences of cyberbullying and victimization. In the current study, we examine the frequency of youth involved as victimized, bullying, and witnessing cyberbullying and how these experiences are associated across three academic years. Participants comprised 670 Canadian students who began the longitudinal study in grades 4, 7, or 10 at Time 1 (T1). Cyber witnessing represented the largest role of youth involvement in cyberbullying. Cyber witnessing was positively associated with both cyberbullying and victimization. Cyber victimization at T1 was positively associated with cyber witnessing at T2, which was positively related to both cyberbullying and victimization at T3. Findings highlight the significance of addressing the role of cyber witnesses in cyberbullying prevention and intervention efforts.

  3. Application of ANNS in tube CHF prediction: effect on neuron number in hidden layer

    International Nuclear Information System (INIS)

    Han, L.; Shan, J.; Zhang, B.

    2004-01-01

    Prediction of the Critical Heat Flux (CHF) for upward flow of water in uniformly heated vertical round tube is studied with Artificial Neuron Networks (ANNs) method utilizing different neuron number in hidden layers. This study is based on thermal equilibrium conditions. The neuron number in hidden layers is chosen to vary from 5 to 30 with the step of 5. The effect due to the variety of the neuron number in hidden layers is analyzed. The analysis shows that the neuron number in hidden layers should be appropriate, too less will affect the prediction accuracy and too much may result in abnormal parametric trends. It is concluded that the appropriate neuron number in two hidden layers should be [15 15]. (authors)

  4. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  5. Domestic Violence and the Victim/Offender Overlap Across the Life Course.

    Science.gov (United States)

    Iratzoqui, Amaia

    2018-07-01

    The current article examined the overlap of domestic violence across the life course, connecting childhood abuse and adolescent dating victimization to adult intimate partner victimization, and the connection between these behaviors and adult domestic violence perpetration against partners and children. Using three waves of Add Health data, the study found that childhood and adolescent domestic victimization were directly and indirectly linked to adult intimate partner victimization and that domestic violence perpetration also played a role. These findings indicate that offending must be accounted for in tracking patterns of victimization over the life course and that the overlap must more directly be reconciled in current criminal justice policy.

  6. “Stripped”: an analysis of revenge porn victims’ lives after victimization

    OpenAIRE

    Bates, Samantha Lynn

    2015-01-01

    This study examines the experiences of female revenge porn victims. To date, no other academic studies have exclusively focused on experiences of victimization in revenge porn cases. Researchers have focused on legal and moral aspects of revenge porn rather than on victims’ experiences. In-depth qualitative interviews were conducted between February 2014 and January 2015 with 18 revenge porn victims to understand how they experienced victimization and its effects on their lives. Inductive ana...

  7. Family victim advocates: the importance of critical job duties

    Directory of Open Access Journals (Sweden)

    Teresa H. Young

    Full Text Available Child advocacy centers across the United States intervened in more than 250,000 child abuse cases in 2011(National Children's Alliance, 2012. Understanding the work of family victim advocates is imperative to helping children and families in child abuse cases. In this exploratory study, we surveyed advocates and program directors from child advocacy centers (CACs across the United States to compare their perceptions of the critical job duties of family victim advocates. Data analysis revealed that CAC directors rated the importance of these duties significantly higher than family victim advocates. Results suggest the need for additional training to ensure that family victim advocates understand the importance of critical job duties to meet the needs of children and families in child abuse cases.

  8. The management of victims of collective accidents. Methodological guide

    International Nuclear Information System (INIS)

    Meadel, Juliette; Marie, Eugenie; Badorc, Yves; Riviere, Anne; Chalaux, Marion; Heisserer, Julie; Tosello-Orsola, Romain; Gelli, Robert; Boura, Florent; Sookahet, Stephanie; Deparis, Benjamin; Tarabeux, Xavier; Besson, Jean-Paul; Porterie, Frederique; Paris-Muller, Gaelle; Marchelli, Sylvie; Gesret, Samuel; Guthleben, Sandra; Sauvee, Marie-Line; Percie Du Sert, Xavier; Bossuyt, Yves; Viteau, Thierry; Etienne-Diener, Annick; Le Caro, Sylvie; Taffin, Monique; Deluz, Damien; Cremniter, Didier; Philippe, Jean-Marc; Ouvrard, Anne-Emmanuelle; Andre, Jean-Marc; Lansman, Patrick; Jouty, Remi; Delbono, Martine; Cebe, Philippe; Le Divenah, Jean-Paul; Vandoorne, Pierre-Jean; Bertin, Jerome; Sadowski, Isabelle; Bovis, Marcel; Gicquel, Stephane; Seco, Sophia; Ieche, Clara; Bertrand, Paul; Tricot, Sandrine; Gomes, Thierry; Marissal, Jean-Luc; Voss, Beatrice; Mescam, Marie; Le Chevalier, Elisabeth; Bouchet, Loic; Lienhard, Claude; Dantchev, Nicolas; Delval, Christophe; Naudascher, Michel; Sublet, Xavier; Cutajar, Chantal; Trestard, Jean-Francois; Quentin, Cecile

    2017-11-01

    This publication proposes several sets of sheets. A first set concerns the crisis phase itself and sheets present or describe the coordination during an emergency phase, the role of the public prosecutor, the role of the prefect, the crisis and support Centre of the Ministry for Foreign Affairs, the health management of victims, the mobilisation of association for the support to victims, the role of associations of victims, crisis information telephone numbers, the family welcome centre, information meetings for victims and families, relationships with media. The second set concerns the post-crisis phase: coordination during the follow-up phase, the intervention of insurance providers, and the intervention of lawyers. A last sheet concerns the legal phase with a presentation of the legal procedure

  9. Identification of human trafficking victims in health care settings.

    Science.gov (United States)

    Baldwin, Susie B; Eisenman, David P; Sayles, Jennifer N; Ryan, Gery; Chuang, Kenneth S

    2011-07-14

    An estimated 18,000 individuals are trafficked into the United States each year from all over the world, and are forced into hard labor or commercial sex work. Despite their invisibility, some victims are known to have received medical care while under traffickers' control. Our project aimed to characterize trafficking victims' encounters in US health care settings. The study consisted of semi-structured interviews with six Key Informants who work closely with trafficking victims (Phase I) and 12 female trafficking survivors (Phase II). All survivors were recruited through the Coalition to Abolish Slavery and Trafficking, an NGO in Los Angeles, and all were trafficked into Los Angeles. Interviews were conducted in English and six other languages, with the assistance of professional interpreters. Using a framework analysis approach that focused on victims' encounters in health care settings, we assessed interview transcript content and coded for themes. We used an exploratory pile-sorting technique to aggregate similar ideas and identify overarching domains. The survivors came from 10 countries. Eight had experienced domestic servitude, three had survived sex trafficking, and one had experienced both. Half the survivors reported that they had visited a physician while in their traffickers' control, and another worked in a health care facility. All Key Informants described other victims who had received medical care. For domestic servants, medical visits were triggered by injury and respiratory or systemic illness, while sex trafficking victims were seen by health professionals for sexually transmitted infections and abortion. Trafficking victims were prevented from disclosing their status to health care providers by fear, shame, language barriers, and limited interaction with medical personnel, among other obstacles. This exploration of survivors' experiences in health care settings supports anecdotal reports that US health care providers may unwittingly encounter

  10. Family and school socioeconomic disadvantage: interactive influences on adolescent dating violence victimization.

    Science.gov (United States)

    Spriggs, Aubrey L; Halpern, Carolyn Tucker; Herring, Amy H; Schoenbach, Victor J

    2009-06-01

    Although low socioeconomic status has been positively associated with adult partner violence, its relationship to adolescent dating violence remains unclear. Further, few studies have examined the relationship between contextual disadvantage and adolescent dating violence, or the interactive influences of family and contextual disadvantage. Guided by social disorganization theory, relative deprivation theory, and gendered resource theory, we analyzed data from the U.S. National Longitudinal Study of Adolescent Health (1994-1996) to explore how family and school disadvantage relate to dating violence victimization. Psychological and minor physical victimization were self-reported by adolescents in up to six heterosexual romantic or sexual relationships. Family and school disadvantage were based on a principal component analysis of socioeconomic indicators reported by adolescents and parents. In weighted multilevel random effects models, between-school variability in dating violence victimization was proportionately small but substantive: 10% for male victimization and 5% for female victimization. In bivariate analyses, family disadvantage was positively related to victimization for both males and females; however, school disadvantage was only related to males' physical victimization. In models adjusted for race/ethnicity, relative age within the school, and mean school age, neither family nor school disadvantage remained related to males' victimization. For females, family disadvantage remained significantly positively associated with victimization, but was modified by school disadvantage: family disadvantage was more strongly associated with dating violence victimization in more advantaged schools. Findings support gendered resource theory, and suggest that status differentials between females and their school context may increase their vulnerability to dating violence victimization.

  11. Anomalies of hidden local chiral symmetries in sigma-models and extended supergravities

    International Nuclear Information System (INIS)

    Vecchia, P. di; Ferrara, S.; Girardello, L.

    1985-01-01

    Non-linear sigma-models with hidden gauge symmetries are anomalous, at the quantum level, when coupled to chiral fermions in not anomaly free representations of the hidden chiral symmetry. These considerations generally apply to supersymmetric kaehlerian sigma-models on coset spaces with hidden chiral symmetries as well as to extended supergravities in four dimensions with local SU(N) symmetry. The presence of the anomaly implies that the scenario of dynamical generation of gauge vector bosons has to be reconsidered in these theories. (orig.)

  12. Victim countries of transnational terrorism: an empirical characteristics analysis.

    Science.gov (United States)

    Elbakidze, Levan; Jin, Yanhong

    2012-12-01

    This study empirically investigates the association between country-level socioeconomic characteristics and risk of being victimized in transnational terrorism events. We find that a country's annual financial contribution to the U.N. general operating budget has a positive association with the frequency of being victimized in transnational terrorism events. In addition, per capita GDP, political freedom, and openness to trade are nonlinearly related to the frequency of being victimized in transnational terrorism events. © 2012 Society for Risk Analysis.

  13. Pathways From Bullying Perpetration, Victimization, and Bully Victimization to Suicidality Among School-Aged Youth: A Review of the Potential Mediators and a Call for Further Investigation.

    Science.gov (United States)

    Hong, Jun Sung; Kral, Michael J; Sterzing, Paul R

    2015-10-01

    In the wake of several highly publicized adolescent suicides attributed to bullying victimization, national attention has been brought to bear on the profound public health problem of bullying. This article reviews the extant literature on the associations between bullying perpetration, victimization, and thoughts of or attempts at suicide and proposes five potential mediators, namely depression, anxiety, low self-esteem, loneliness, and hopelessness, that may explain this relationship. Numerous studies have found empirical support for the interrelations between internalizing behaviors and both bullying perpetration and victimization and suicide. We find that further longitudinal research needs to be conducted to more conclusively determine the role and causal ordering these various psychosocial factors may play in bullying perpetration, victimization, and suicide. Although the research literature implies causal directions among all these potential mediators, untangling the unique influence of bullying perpetration, victimization, and bully victimization on suicide and its mechanisms of action has major research and practice implications. © The Author(s) 2014.

  14. Victim Simulator for Victim Detection Radar

    Science.gov (United States)

    Lux, James P.; Haque, Salman

    2013-01-01

    Testing of victim detection radars has traditionally used human subjects who volunteer to be buried in, or climb into a space within, a rubble pile. This is not only uncomfortable, but can be hazardous or impractical when typical disaster scenarios are considered, including fire, mud, or liquid waste. Human subjects are also inconsistent from day to day (i.e., they do not have the same radar properties), so quantitative performance testing is difficult. Finally, testing a multiple-victim scenario is difficult and expensive because of the need for multiple human subjects who must all be coordinated. The solution is an anthropomorphic dummy with dielectric properties that replicate those of a human, and that has motions comparable to human motions for breathing and heartbeat. Two airfilled bladders filled and drained by solenoid valves provide the underlying motion for vinyl bags filled with a dielectric gel with realistic properties. The entire assembly is contained within a neoprene wetsuit serving as a "skin." The solenoids are controlled by a microcontroller, which can generate a variety of heart and breathing patterns, as well as being reprogrammable for more complex activities. Previous electromagnetic simulators or RF phantoms have been oriented towards assessing RF safety, e.g., the measurement of specific absorption rate (SAR) from a cell phone signal, or to provide a calibration target for diagnostic techniques (e.g., MRI). They are optimized for precise dielectric performance, and are typically rigid and immovable. This device is movable and "positionable," and has motion that replicates the small-scale motion of humans. It is soft (much as human tissue is) and has programmable motions.

  15. Child human trafficking victims: challenges for the child welfare system.

    Science.gov (United States)

    Fong, Rowena; Berger Cardoso, Jodi

    2010-08-01

    Since the passing of the Victims of Trafficking and Violence Protection Act in 2000 and its reauthorization by President George Bush in 2008, federal, state and community efforts in identifying and providing services for victims of human trafficking have significantly improved. However, most of the research and resources for trafficking victims have been directed towards adults rather than children. Researchers agree that there is a growing number of sexually exploited and trafficked children in the United States yet few programs emphasize the unique experiences and special needs of this population. This article examines commercial sexual exploitation of children; differentiates the needs and problems between child prostitution and victims of human trafficking; reviews and critiques current treatment practices; and summarizes challenges and successes in working with child victims of human trafficking, offering practice and policy recommendations. Published by Elsevier Ltd.

  16. Sexual Harassment Victims: Psycholegal and Family Therapy Considerations.

    Science.gov (United States)

    Woody, Robert Henley; Perry, Nancy Walker

    1993-01-01

    Examines legal proscriptions and practical definitions of sexual harassment, describes psychological effects of sexual harassment (Sexual Harassment Trauma Syndrome) for victim-client and impact on family system, and offers guidance for family therapy. Focuses on vulnerability of victim-client, reconstruction of self-concept as primary goal of…

  17. Perceptions and Correlates of Peer-Victimization and Bullying

    Science.gov (United States)

    Hunter, Simon C.; Boyle, James M. E.; Warden, David

    2007-01-01

    Background: The experiences of peer-victimization and bullying are often treated empirically as though they are conceptually indistinct. Both involve repeated aggression, but definitions of bullying additionally emphasize the importance of aggressor intent and imbalance of power between the aggressor and the victim (Olweus, 1978; Whitney &…

  18. Radiological emergency: road map for radiation accident victim transport

    International Nuclear Information System (INIS)

    Costa, V.S.G.; Alcantara, Y.P.; Lima, C.M.A.; Silva, F. C. A. da

    2017-01-01

    During a radiological or nuclear emergency, a number of necessary actions are taken, both within the radiation protection of individuals and the environment, involving many institutions and highly specialized personnel. Among them it is possible to emphasize the air transportation of radiation accident victims.The procedures and measures for the safe transport of these radiation accident victims are generally the responsibility of the armed forces, specifically the Aeronautics, with the action denominated 'Aeromedical Military Evacuation of Radiation Accident Victims'. The experience with the Radiological Accident of Goiânia demonstrated the importance of adequate preparation and response during a radiological emergency and the need for procedures and measures with regard to the transport of radiation victims are clearly defined and clearly presented for the effectiveness of the actions. This work presents the necessary actions for the transport of radiation accident victim during a radiological emergency, through the road map technique, which has been widely used in scientific technical area to facilitate understanding and show the way to be followed to reach the proposed objectives

  19. Violent victimization of adult patients with severe mental illness: a systematic review.

    Science.gov (United States)

    Latalova, Klara; Kamaradova, Dana; Prasko, Jan

    2014-01-01

    The aims of this paper are to review data on the prevalence and correlates of violent victimization of persons with severe mental illness, to critically evaluate the literature, and to explore possible approaches for future research. PubMed/MEDLINE and PsycINFO databases were searched using several terms related to severe mental illness in successive combinations with terms describing victimization. The searches identified 34 studies. Nine epidemiological studies indicate that patients with severe mental illness are more likely to be violently victimized than other community members. Young age, comorbid substance use, and homelessness are risk factors for victimization. Victimized patients are more likely to engage in violent behavior than other members of the community. Violent victimization of persons with severe mental illness has long-term adverse consequences for the course of their illness, and further impairs the quality of lives of patients and their families. Victimization of persons with severe mental illness is a serious medical and social problem. Prevention and management of victimization should become a part of routine clinical care for patients with severe mental illness.

  20. Review of hidden carbon emissions, trade, and labor income share in China, 2001–2011

    International Nuclear Information System (INIS)

    Wang, Shu-Hong; Song, Ma-Lin

    2014-01-01

    Coordinated development between the economy and the environment is currently one of the most important issues in China. By establishing models concerning labor income share and hidden carbon emissions, and taking trade as the link in their relationship, this study puts forward the scale effects, technological effects, and structural effects that relate to labor income share under the function of trade. We then establish multi-index and multi-indicator constitutive (MIMIC) equation to measure the ratio of hidden carbon emissions to total emissions, which is further considered the basis of the measurement model. Results of regression analysis carried out on labor income share show that hidden carbon emissions do have a positive effect on labor income share. In the meantime, we also prove that under scale effects, technological effects, and the structural effects of trade, hidden carbon emissions affect labor income shares in different directions. Our conclusions and policy implications are obtained from the calculated results. - Highlights: • This study establishes models concerning labor income share and hidden carbon emissions. • MIMIC is established to measure the ratio of hidden carbon emissions to total discharge. • Hidden carbon emissions have a positive effect on labor income share. • Hidden carbon emissions have various effects on the labor income share

  1. Effect of InspirEase on the deposition of metered-dose aerosols in the human respiratory tract

    International Nuclear Information System (INIS)

    Newman, S.P.; Woodman, G.; Clarke, S.W.; Sackner, M.A.

    1986-01-01

    A radiotracer technique has been used to assess the effects of a 700-ml collapsible holding chamber (InspirEase, Key Pharmaceuticals Inc.) on the deposition of metered-dose aerosols in ten patients with obstructive airways disease (mean forced expiratory volume in one second [FEV1], 64.5 percent of predicted). Patterns of deposition obtained by patients' usual techniques with the metered-dose inhaler (MDI) were compared with those by correct MDI technique (actuation coordinated with slow deep inhalation and followed by ten seconds of breath-holding) and with those by InspirEase. Deposition of aerosol was assessed by placing Teflon particles labelled with 99mTc inside placebo canisters, and inhaling maneuvers were monitored by respiratory inductive plethysmography (Respitrace). Nine of the ten patients had imperfect technique with the MDI, the most prevalent errors being rapid inhalation and failure to hold their breath adequately. With patients' usual MDI techniques, 6.5 +/- 1.2 percent (mean +/- SE) of the dose reached the lungs. This was increased to 11.2 +/- 1.3 percent (p less than 0.02) with correct technique and increased further to 14.8 +/- 1.4 percent (p less than 0.05) with InspirEase. Oropharyngeal deposition exceeded 80 percent of the dose for the MDI alone but was only 9.5 +/- 0.9 percent with InspirEase (p less than 0.01); 59.2 +/- 2.1 percent of the dose was retained within InspirEase itself. It is concluded that InspirEase gives whole lung deposition of metered-dose aerosols greater than that from a correctly used MDI, while oropharyngeal deposition is reduced approximately nine times

  2. Childhood victimization and inflammation in young adulthood: A genetically sensitive cohort study.

    Science.gov (United States)

    Baldwin, Jessie R; Arseneault, Louise; Caspi, Avshalom; Fisher, Helen L; Moffitt, Terrie E; Odgers, Candice L; Pariante, Carmine; Ambler, Antony; Dove, Rosamund; Kepa, Agnieszka; Matthews, Timothy; Menard, Anne; Sugden, Karen; Williams, Benjamin; Danese, Andrea

    2018-01-01

    Childhood victimization is an important risk factor for later immune-related disorders. Previous evidence has demonstrated that childhood victimization is associated with elevated levels of inflammation biomarkers measured decades after exposure. However, it is unclear whether this association is (1) already detectable in young people, (2) different in males and females, and (3) confounded by genetic liability to inflammation. Here we sought to address these questions. Participants were 2232 children followed from birth to age 18years as part of the Environmental Risk (E-Risk) Longitudinal Twin Study. Childhood victimization was measured prospectively from birth to age 12years. Inflammation was measured through C-reactive protein (CRP) levels in dried blood spots at age 18years. Latent genetic liability for high inflammation levels was assessed through a twin-based method. Greater exposure to childhood victimization was associated with higher CRP levels at age 18 (serum-equivalent means were 0.65 in non-victimized Study members, 0.74 in those exposed to one victimization type, and 0.81 in those exposed to poly-victimization; p=0.018). However, this association was driven by a significant association in females (serum-equivalent means were 0.75 in non-victimized females, 0.87 in those exposed to one type of victimization, and 1.19 in those exposed to poly-victimization; p=0.010), while no significant association was observed in males (p=0.19). Victimized females showed elevated CRP levels independent of latent genetic influence, as well as childhood socioeconomic status, and waist-hip ratio and body temperature at the time of CRP assessment. Childhood victimization is associated with elevated CRP levels in young women, independent of latent genetic influences and other key risk factors. These results strengthen causal inference about the effects of childhood victimization on inflammation levels in females by accounting for potential genetic confounding. Copyright

  3. The selection and implementation of hidden line algorithms

    International Nuclear Information System (INIS)

    Schneider, A.

    1983-06-01

    One of the most challenging problems in the field of computer graphics is the elimination of hidden lines in images of nontransparent bodies. In the real world the nontransparent material hinders the light ray coming from hidden regions to the observer. In the computer based image formation process there is no automatic visibility regulation of this kind. So many lines are created which result in a poor quality of the spacial representation. Therefore a three-dimensional representation on the screen is only meaningfull if the hidden lines are eliminated. For this process many algorithms have been developed in the past. A common feature of these codes is the large amount of computer time needed. In the first generation of algorithms, which are commonly used today, the bodies are modeled by plane polygons. More recently, however, also algorithms are in use, which are able to treat curved surfaces without discretisation by plane surfaces. In this paper the first group of algorithms is reviewed, and the most important codes are described. The experience obtained during the implementation of two algorithms is presented. (orig.) [de

  4. Violence Victimization in Korean Adolescents: Risk Factors and Psychological Problems

    Directory of Open Access Journals (Sweden)

    Subin Park

    2017-05-01

    Full Text Available We examined the risk factors for and psychological problems associated with violence victimization in a nationwide representative sample of Korean adolescents. Data from the 2016 Korean Youth Risk Behavior Web-based Survey was used. Participants were asked about their experience of being a victim of violence that required medical treatment during the past 12 months, as well as their perceived health, happiness, sleep satisfaction, stress, depressed mood, and suicidality. The 12-month prevalence of violence victimization requiring medical treatment was 2.4%. The results indicated that adolescents were at an increased risk for violence victimization if they were male, older, had parents of a foreign nationality, did not reside with their family, worked part time, resided in small cities or rural areas, were high or low in socioeconomic status (SES, exhibited high or low levels of academic performance, used alcohol or tobacco, and were sexually active. In addition, while violence victimization was negatively associated with perceived health and happiness, it was positively associated with perceived stress, depressed mood, and suicidality. The results indicate that a social disadvantage, involvement in risky behavior, and psychological problems are associated with violence victimization. Effective violence prevention efforts should thus target high-risk groups, and clinical attention is needed to address the psychological costs associated with violence victimization.

  5. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  6. Perceived ease of access to alcohol, tobacco and other substances in rural and urban US students.

    Science.gov (United States)

    Warren, Jacob C; Smalley, K Bryant; Barefoot, K Nikki

    2015-01-01

    Ease of access to substances has been shown to have a direct and significant relationship with substance use for school-aged children. Previous research involving rural samples of middle and high school students reveals that perceived ease of access to substances is a significant predictor of recent use among rural adolescents; however, it is unclear if perceived access to substances varies between rural and urban areas. The purpose of the present study was to examine rural-urban differences in perceived ease of access to alcohol, smoking and chewing tobacco, marijuana, and seven other substances in the US state of Georgia in order to better inform and promote future substance use prevention and programming efforts in rural areas. Data were analyzed from the 2013 Georgia Student Health Survey II, administered in all public and interested private/charter schools in the state of Georgia. A total of 513 909 students (18.2% rural) indicated their perceived ease of access to 11 substances on a four-point Likert-type scale. Rural-urban differences were investigated using χ2 analysis. In general, it appeared the rural-urban differences fell along legal/illicit lines. For middle school students, a significant difference in perceived ease of access was found for each substance, with rural students reporting greater access to smoking tobacco, chewing tobacco, and steroids, and urban students reporting greater access to alcohol, marijuana, cocaine, inhalants, ecstasy, methamphetamine, hallucinogens, and prescription drugs. Rural high school students reported higher access to alcohol, smoking tobacco, chewing tobacco, and steroids, with urban students reporting higher access to marijuana, cocaine, inhalants, ecstasy, and hallucinogens. Perceptions of ease of access more than doubled for each substance in both geographies between middle and high school. The present study found multiple and fairly consistent differences between rural and urban students' perceived ease of access

  7. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  8. Characterizing Sexual Violence Victimization in Youth: 2012 National Intimate Partner and Sexual Violence Survey.

    Science.gov (United States)

    Merrick, Melissa T; Basile, Kathleen C; Zhang, Xinjian; Smith, Sharon G; Kresnow, Marcie-Jo

    2018-04-01

    Youth sexual violence victimization is an urgent public health concern that can lead to a variety of health problems and increased risk for victimization during adulthood. Examining the characteristics of early victimization and their association with subsequent victimization during adulthood may help strengthen primary prevention efforts. Data are from the 2012 National Intimate Partner and Sexual Violence Survey. Prevalence estimates were computed in 2017 for rape and made to sexually penetrate, their subtypes, as well as proportions among victims by type of perpetrator. Chi-square tests of association were conducted between youth sexual violence victimization and the same experiences in adulthood. Approximately 10 million U.S. females (8.4%) experienced completed or attempted rape and 1.9 million U.S. males (1.6%) were made to penetrate someone during youth. Most victims knew their perpetrators. Being raped or made to penetrate during youth was associated with increased likelihood of such victimization in adulthood. Females and males experience youth sexual violence victimization at alarming rates. Primary prevention efforts with youth are critical to prevent early victimization, subsequent victimization in adulthood, and the mental and physical health consequences associated with sexual violence victimization. Published by Elsevier Inc.

  9. Cross-National Prevalence of Traditional Bullying, Traditional Victimization, Cyberbullying and Cyber-Victimization: Comparing Single-Item and Multiple-Item Approaches of Measurement

    Science.gov (United States)

    Yanagida, Takuya; Gradinger, Petra; Strohmeier, Dagmar; Solomontos-Kountouri, Olga; Trip, Simona; Bora, Carmen

    2016-01-01

    Many large-scale cross-national studies rely on a single-item measurement when comparing prevalence rates of traditional bullying, traditional victimization, cyberbullying, and cyber-victimization between countries. However, the reliability and validity of single-item measurement approaches are highly problematic and might be biased. Data from…

  10. Relationship between income and repeat criminal victimization in Brazil

    Directory of Open Access Journals (Sweden)

    Marcelo Justus

    2015-09-01

    Full Text Available This study analyzes the effect of income on repeat criminal victimization in Brazil using data from the 2009 National Household Sample Survey and its special supplement on victimization and access to justice. Two count-data models were estimated for four types of crime: theft, robbery, attempted theft/robbery, and physical assault. A positive nonlinear effect of income on repeat victimization for the three types of property crimes and a negative nonlinear effect of income on physical assault were observed.

  11. Peer Victimization and Academic Performance in Primary School Children.

    Science.gov (United States)

    Mundy, Lisa K; Canterford, Louise; Kosola, Silja; Degenhardt, Louisa; Allen, Nicholas B; Patton, George C

    Peer victimization is a common antecedent of poor social and emotional adjustment. Its relationship with objectively measured academic performance is unclear. In this study we aimed to quantify the cross-sectional associations between peer victimization and academic performance in a large population sample of children. Eight- to 9-year-old children were recruited from a stratified random sample of primary schools in Australia. Academic performance was measured on a national achievement test (1 year of learning equals 40 points). Physical and verbal victimization were measured according to child self-report. Multilevel mixed-effects linear regression analyses were conducted. For female children, verbal victimization was associated with poorer academic performance on writing (β = 17.2; 95% confidence interval [CI], -28.2 to -6.2) and grammar/punctuation (β = -20.8; 95% CI, -40.1 to -1.6). Physical victimization was associated with poorer performance on numeracy (male children: β = -29.0; 95% CI, -53.8 to -4.1; female children: β = -30.1; 95% CI, -56.6 to -3.5), and writing (female children: β = -21.5; 95% CI, -40.4 to -2.7). Verbal and physical victimization were associated with poorer performance on reading (male children: β = -31.5; 95% CI, -59.9 to -3.1; female children: β = -30.2; 95% CI, -58.6 to -1.8), writing (female children: β = -25.5; 95% CI, -42.8 to -8.2), spelling (female children: β = -32.3; 95% CI, -59.6 to -4.9), and grammar/punctuation (female children: β = -32.2; 95% CI, -62.4 to -2.0). Children who were physically victimized were 6 to 9 months behind their non-victimized peers on measures of academic performance. There are growing reasons for education systems to invest in the prevention of bullying and promotion of positive peer relationships from the earliest years of school. Copyright © 2017 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  12. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics

    Science.gov (United States)

    Sontag, Lisa M.; Clemans, Katherine H.; Graber, Julia A.; Lyndon, Sarah T.

    2011-01-01

    To date, relatively little is known about differences between perpetrators and victims of cyber and traditional forms of aggression. Hence, this study investigated differences among traditional and cyber aggressors and victims on psychosocial characteristics typically examined in research on traditional aggression and victimization, specifically…

  13. Teenage intimate partner violence: Factors associated with victimization among Norwegian youths.

    Science.gov (United States)

    Hellevik, Per; Øverlien, Carolina

    2016-07-06

    The aim of the present study was threefold: (1) learn more about factors associated with teenage intimate partner violence (IPV) victimization; (2) explore aspects of digital media use in connection with teenage IPV; (3) and compare the impact IPV victimization has on boys and girls. Survey data from 549 Norwegian students, mean age 15.2 years, who had experience(s) with being in intimate relationship(s), were examined. Experiences with psychological, physical, digital, and sexual violence were analyzed. In total, 42.9% of the participants had experienced some form of IPV: 29.1% had experienced digital violence; 25.9% had experienced psychological violence; 18.8% had experienced sexual violence; and 12.8% had experienced physical violence. Factors significantly associated with teenage IPV victimization were female gender, older partners, domestic violence, bullying victimization, low academic achievements, and sending sexual messages via digital media. Girls reported to be significantly more negatively impacted by the victimization than boys. CONCLUSIONS SOME TEENAGERS EXPERIENCE VICTIMIZATION IN THEIR INTIMATE RELATIONSHIPS, AND FOR MANY DIGITAL MEDIA SEEMS TO PLAY A CENTRAL ROLE IN THIS VIOLENCE TEENAGERS WHO EXPERIENCE VICTIMIZATION OUTSIDE THEIR RELATIONSHIPS OR HAVE RISKY LIFESTYLES HAVE A HIGHER RISK OF EXPERIENCING IPV VICTIMIZATION A FOCUS ON TEENAGE IPV, AND ESPECIALLY DIGITAL MEDIA'S ROLE IN THIS VIOLENCE, IS NEEDED IF THIS PUBLIC HEALTH ISSUE IS TO BE COMBATED. © 2016 the Nordic Societies of Public Health.

  14. Childhood clumsiness and peer victimization: a case–control study of psychiatric patients

    Science.gov (United States)

    2013-01-01

    Background Poor motor and social skills as well as peer victimization are commonly reported in both ADHD and autism spectrum disorder. Positive relationships between poor motor and poor social skills, and between poor social skills and peer victimization, are well documented, but the relationship between poor motor skills and peer victimization has not been studied in psychiatric populations. Method 277 patients (133 males, 144 females), mean age 31 years, investigated for ADHD or autism spectrum disorder in adulthood and with normal intelligence, were interviewed about childhood peer victimization and examined for gross motor skills. The parents completed a comprehensive questionnaire on childhood problems, the Five to Fifteen. The Five to Fifteen is a validated questionnaire with 181 statements that covers various symptoms in childhood across eight different domains, one of them targeting motor skills. Regression models were used to evaluate the relationship between motor skills and the risk and duration of peer victimization, adjusted for sex and diagnosis. Results Victims were described as more clumsy in childhood than their non-victimized counterparts. A significant independent association was found between reportedly poor childhood gross motor skills and peer victimization (adjusted odds ratio: 2.97 [95% confidence interval: 1.46-6.07], n = 235, p = 0.003). In adulthood, the victimized group performed worse on vertical jumps, a gross motor task, and were lonelier. Other factors that were expected to be associated with peer victimization were not found in this highly selected group. Conclusion Poor gross motor skills constitute a strong and independent risk factor for peer victimization in childhood, regardless of sex, childhood psychiatric care and diagnosis. PMID:23442984

  15. A Latent Class Analysis of Victimization among Middle and High School Students in California

    Science.gov (United States)

    Berkowitz, Ruth; De Pedro, Kris Tunac; Gilreath, Tamika D.

    2015-01-01

    School victimization is associated with negative social-emotional outcomes and risky behaviors. Most studies have provided definitions and measures of victimization, depicting a limited characterization of victimization in schools. More nuanced analyses of school victimization are needed to assess the heterogeneous pattern of victimization in…

  16. Multiple victimization experiences of urban elementary school students: associations with psychosocial functioning and academic performance.

    Science.gov (United States)

    Holt, Melissa K; Finkelhor, David; Kantor, Glenda Kaufman

    2007-05-01

    This study explored the victimization experiences of urban elementary school students to determine whether subsets of youth emerged with similar victimization profiles (e.g., no victimization, multiple types of victimization). It also evaluated whether multiple victimization was associated with greater psychological distress and lower academic performance. Participants were 689 fifth grade students from an urban, ethnically diverse school district in the Northeast. Youth completed self-report measures in school about bullying victimization, victimization in the home and community, and psychosocial functioning. Cluster analysis suggested the existence of three distinct youth profiles: those with minimal victimization, those victimized primarily by their peers, and those with multiple types of victimizations. As hypothesized, youth with multiple victimizations experienced more psychological distress and earned lower grades than their peers. Findings highlight the heterogeneity of youth victimization experiences and their relations to functioning, and have implications for treatment planning among practitioners working with youth.

  17. Depression as a mediator between family factors and peer-bullying victimization in Latino adolescents.

    Science.gov (United States)

    Yabko, Brandon A; Hokoda, Audrey; Ulloa, Emilio C

    2008-01-01

    The purpose of this study was to assess the mediating role of depression in three different relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Results from 242 Latino middle school adolescents from a large southwestern city bordering Mexico revealed that both boys' and girls' peer victimization were related to familial factors and depression. Regression analyses for boys revealed that depression mediated three relationships: (a) sibling bullying and peer victimization, (b) mothers' power-assertive parenting and peer victimization, and (c) fathers' power-assertive parenting and peer victimization. Depression also mediated the relationship between fathers' power-assertive parenting and girls' victimization by peers. The findings support the development of family-based interventions for peer victimization that include curriculum addressing depression.

  18. Online frauds:learning from victims why they fall for these scams

    OpenAIRE

    Button, Mark; McNaughton Nicholls, Carol; Kerr, Jane; Owen, Rachael

    2014-01-01

    Online frauds have become a major problem in many countries with millions of victims from a wide diversity of scams committed in full or part online. This paper explores the extent and nature of this problem. Using data from depth interviews with 15 online fraud victims, 6 focus groups with a further 48 online fraud victims and interviews with 9 professional stakeholders involved in combating this problem. The paper explores why victims fall for online scams. It identifies a range of reasons ...

  19. "She deserved it": Effects of sexism norms, type of violence, and victim's pre-assault behavior on blame attributions toward female victims and approval of the aggressor's behavior.

    Science.gov (United States)

    Koepke, Sabrina; Eyssel, Friederike; Bohner, Gerd

    2014-04-01

    Effects of ambivalent sexism, sexism norms, victim behavior, and type of violence on male students' reactions to male violence against women in intimate relationships were examined. Participants judged a scenario depicting an act of sexual or non-sexual violence against a female partner who had either shown overtly sexual or non-sexual behavior toward another man. Generally, high (vs. low) hostile sexism, high (vs. low) hostile sexism norm feedback, and victim's overtly sexual (vs. non-sexual) behavior led to stronger victim blame and perceived approval of the aggressor's behavior. The victim of non-sexual violence was blamed more than the rape victim, particularly if she had behaved in an overtly sexual manner.

  20. 438 Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to .... emit either discrete information or a continuous data derived from a Probability .... For each hidden state in the test set, the probability = ... by applying the Kullback-Leibler distance (Juang & Rabiner, 1985) which ..... One Size Does Not Fit.

  1. Effects of poly-victimization on self-esteem and post-traumatic stress symptoms in Spanish adolescents.

    Science.gov (United States)

    Soler, Laia; Paretilla, Clàudia; Kirchner, Teresa; Forns, Maria

    2012-11-01

    This study aims to provide evidence concerning the effects of experiencing multiple forms of victimization (poly-victimization) on self-esteem and post-traumatic stress symptoms in Spanish adolescents. A total of 722 adolescents were recruited from seven secondary schools in Catalonia, Spain. The Rosenberg Self-Esteem Scale, the Youth Self Report and the Juvenile Victimization Questionnaire were employed to assess self-esteem, post-traumatic stress symptoms and victimization, respectively. Participants were divided into three groups (non-victim, victim and poly-victim groups) according to the total number of different kinds of victimization experienced. Results showed that 88.4 % of adolescents had been exposed to at least one kind of victimization. Poly-victimization was associated with a higher number of post-traumatic stress symptoms in both boys and girls. Also, self-liking was significantly lower in the poly-victim group, whereas self-competence was equivalent across the three victimization groups. Girls were approximately twice as likely to report child maltreatment (OR = 1.92) and sexual victimization (OR = 2.41) as boys. In conclusion, the present study adds evidence on the importance of taking account of the full burden of victimizations suffered when studying victimization correlates. Also, it highlights the importance of prevention policies to focus particularly on preserving adolescents' sense of social worth.

  2. Muslim women and foreign prostitutes: victim discourse, subjectivity, and governance.

    Science.gov (United States)

    Jacobsen, Christine M; Stenvoll, Dag

    2010-01-01

    In this article, we juxtapose the ways “Muslim women” and “foreign prostitutes” are commonly constituted as victims in media and politics. We analyze the functions of these two prototypical female victims in terms of the role they play in epitomizing “the problems of globalization” and in reinforcing the existing social and political structures. Victim discourse, when tied to the transnational proliferation of the sex industry and of (radical) Islam, has depoliticizing effects because it places nonindividual causes of victimization outside of “our” polity and society and casts the state as protector and neutral arbiter of national and global inequalities, marginalization, and social conflict.

  3. Attachment Styles among Bullies, Victims and Uninvolved Adolescents

    Science.gov (United States)

    Koiv, Kristi

    2012-01-01

    Attachment theory provides a frame for understanding the role of attachment styles in the development of bullying behaviour in adolescence. The present study examined attachment styles (secure, avoidant and anxious/ambivalent) that differentiated bullies, victims, bully/victims and uninvolved adolescents. A total of 1,921 students (1,006 girls and…

  4. Relational caring: the use of the victim impact statement by sexually assaulted women.

    Science.gov (United States)

    Miller, Karen-Lee

    2014-01-01

    The victim impact statement (VIS) is a written account of harms experienced as a result of crime. This study investigates VIS use by sexually assaulted women through interviews with Canadian victims, victim services workers, and feminist advocates (N = 35). Findings suggest that victims use the VIS to express relational caring. Relational caring is an ethic of care that prioritizes others through privileging the harms experienced by others because of witnessing the sexual assault or coping with the victim's postassault sequelae, protecting future or hypothetical victims, and promoting the interests of intimate partner offenders. Relational caring challenges traditional conceptions of victim agency and VIS use for instrumental purposes, as well as the targets and temporalities of sexual assault harms that are detailed in the statement. Relational caring has unique implications for victims who are mothers, especially those abused as minors, and for intimate partners. Legal, therapeutic, and social service consequences are discussed.

  5. Bullying in schools: the power of bullies and the plight of victims.

    Science.gov (United States)

    Juvonen, Jaana; Graham, Sandra

    2014-01-01

    Bullying is a pervasive problem affecting school-age children. Reviewing the latest findings on bullying perpetration and victimization, we highlight the social dominance function of bullying, the inflated self-views of bullies, and the effects of their behaviors on victims. Illuminating the plight of the victim, we review evidence on the cyclical processes between the risk factors and consequences of victimization and the mechanisms that can account for elevated emotional distress and health problems. Placing bullying in context, we consider the unique features of electronic communication that give rise to cyberbullying and the specific characteristics of schools that affect the rates and consequences of victimization. We then offer a critique of the main intervention approaches designed to reduce school bullying and its harmful effects. Finally, we discuss future directions that underscore the need to consider victimization a social stigma, conduct longitudinal research on protective factors, identify school context factors that shape the experience of victimization, and take a more nuanced approach to school-based interventions.

  6. Victimization and psychopathic features in a population-based sample of Finnish adolescents.

    Science.gov (United States)

    Saukkonen, Suvi; Aronen, Eeva T; Laajasalo, Taina; Salmi, Venla; Kivivuori, Janne; Jokela, Markus

    2016-10-01

    We examined different forms of victimization experiences in relation to psychopathic features and whether these associations differed in boys and girls among 4855 Finnish school adolescents aged 15-16 years. Psychopathic features were measured with the Antisocial Process Screening Device- Self Report (APSD-SR). Victimization was assessed with questions about violent and abusive experiences across lifetime and within the last 12 months. Results from linear regression analysis showed that victimization was significantly associated with higher APSD-SR total scores, more strongly in girls than boys. Recent (12-month) victimization showed significance in the relationship between victimization and psychopathic features; especially recent sexual abuse and parental corporal punishment were strong determinants of higher APSD-SR total scores. The present study demonstrates novel findings on how severe victimization experiences relate to psychopathic features in community youth, especially in girls. The findings underscore the need for comprehensive evaluation of victimization experiences when psychopathic features are present in youth. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Developmental cascade models linking peer victimization, depression, and academic achievement in Chinese children.

    Science.gov (United States)

    Liu, Junsheng; Bullock, Amanda; Coplan, Robert J; Chen, Xinyin; Li, Dan; Zhou, Ying

    2018-03-01

    This study explored the longitudinal relations among peer victimization, depression, and academic achievement in Chinese primary school students. Participants were N = 945 fourth-grade students (485 boys, 460 girls; M age  = 10.16 years, SD = 2 months) attending elementary schools in Shanghai, People's Republic of China. Three waves of data on peer victimization, depression, and academic achievement were collected from peer nominations, self-reports, and school records, respectively. The results indicated that peer victimization had both direct and indirect effects on later depression and academic achievement. Depression also had both direct and indirect negative effects on later academic achievement, but demonstrated only an indirect effect on later peer victimization. Finally, academic achievement had both direct and indirect negative effects on later peer victimization and depression. The findings show that there are cross-cultural similarities and differences in the various transactions that exist among peer victimization, depression, and academic achievement. Statement of contribution What is already known on this subject? Peer victimization directly and indirectly relates to depression and academic achievement. Depression directly and indirectly relates to academic achievement. Academic achievement directly and indirectly relates to depression. What the present study adds? A developmental cascade approach was used to assess the interrelations among peer victimization, depression, and academic achievement. Academic achievement mediates the relation between peer victimization and depression. Depression is related to peer victimization through academic achievement. Academic achievement directly and indirectly relates to peer victimization. Academic achievement is related to depression through peer victimization. © 2017 The British Psychological Society.

  8. Fear of Violent Victimization among the Foreign-Born

    Directory of Open Access Journals (Sweden)

    Viviana ANDREESCU

    2013-05-01

    Full Text Available In general, most studies that examined the relationship immigrants – criminal behavior focused on the immigrants’ involvement in criminal activities as offenders and/or the effects of immigration on crime rates. Only limited research looked at the levels of victimization and perceived safety experienced by immigrants in their receiving countries. Using the most recent available data from the European Social Survey (Round 5/2010, the present quantitative analysis conducted on a representative sample of residents in United Kingdom (N=2422 tries to determine the levels of criminal victimization and fear of violent crime associated with foreign nationals living in a European country, where immigration is generally unpopular. Although foreign-born persons living in United Kingdom appear to have a higher degree of victimization (vicarious and direct than natives, the inter-group difference is not sufficiently large to be significant at p< .05.Nevertheless, compared to natives, first-generation immigrants manifest a significantly higher level of fear of violent victimization. Results also show that in addition to inter-group differences in the levels of perceived unsafety and experiences with victimization, the effects of fear-of-crime correlates vary in intensity among respondents differentiated by their country of birth. In addition, one’s level of acculturation contributes to differences in fear of crime among immigrants.

  9. Victims of Domestic Violence and Front-Line Workers: A Helping Paradigm

    Science.gov (United States)

    Peters, Scott W.; Trepal, Heather C.; de Vries, Sabina M.; Day, Sally W.; Leeth, Christopher

    2009-01-01

    Victims of domestic violence present a challenge to law enforcement and emergency room personnel. The authors propose a helping approach to assist these professionals. This paradigm is composed of: active and empathetic listening, acceptance without judgment, identifying victims' strengths, honoring victims as experts, and the process of leaving…

  10. Comparing Victim Attributions and Outcomes for Workplace Aggression and Sexual Harassment

    Science.gov (United States)

    Hershcovis, M. Sandy; Barling, Julian

    2010-01-01

    In 2 studies, we investigated victim attributions (Study 1) and outcomes (Study 2) for workplace aggression and sexual harassment. Drawing on social categorization theory, we argue that victims of workplace aggression and sexual harassment may make different attributions about their mistreatment. In Study 1, we investigated victim attributions in…

  11. Violent victimization of adult patients with severe mental illness: a systematic review

    Directory of Open Access Journals (Sweden)

    Latalova K

    2014-10-01

    Full Text Available Klara Latalova,1,2 Dana Kamaradova,1,2 Jan Prasko1,2 1Faculty of Medicine and Dentistry, Palacky University Olomouc, Olomouc, Czech Republic; 2Department of Psychiatry, University Hospital Olomouc, Olomouc, Czech Republic Abstract: The aims of this paper are to review data on the prevalence and correlates of violent victimization of persons with severe mental illness, to critically evaluate the literature, and to explore possible approaches for future research. PubMed/MEDLINE and PsycINFO databases were searched using several terms related to severe mental illness in successive combinations with terms describing victimization. The searches identified 34 studies. Nine epidemiological studies indicate that patients with severe mental illness are more likely to be violently victimized than other community members. Young age, comorbid substance use, and homelessness are risk factors for victimization. Victimized patients are more likely to engage in violent behavior than other members of the community. Violent victimization of persons with severe mental illness has long-term adverse consequences for the course of their illness, and further impairs the quality of lives of patients and their families. Victimization of persons with severe mental illness is a serious medical and social problem. Prevention and management of victimization should become a part of routine clinical care for patients with severe mental illness. Keywords: victimization, violence, severe mental illness, schizophrenia, bipolar disorder

  12. The hidden and informal curriculum across the continuum of training: A cross-sectional qualitative study.

    Science.gov (United States)

    Doja, Asif; Bould, M Dylan; Clarkin, Chantalle; Eady, Kaylee; Sutherland, Stephanie; Writer, Hilary

    2016-04-01

    The hidden and informal curricula refer to learning in response to unarticulated processes and constraints, falling outside the formal medical curriculum. The hidden curriculum has been identified as requiring attention across all levels of learning. We sought to assess the knowledge and perceptions of the hidden and informal curricula across the continuum of learning at a single institution. Focus groups were held with undergraduate and postgraduate learners and faculty to explore knowledge and perceptions relating to the hidden and informal curricula. Thematic analysis was conducted both inductively by research team members and deductively using questions structured by the existing literature. Participants highlighted several themes related to the presence of the hidden and informal curricula in medical training and practice, including: the privileging of some specialties over others; the reinforcement of hierarchies within medicine; and a culture of tolerance towards unprofessional behaviors. Participants acknowledged the importance of role modeling in the development of professional identities and discussed the deterioration in idealism that occurs. Common issues pertaining to the hidden curriculum exist across all levels of learners, including faculty. Increased awareness of these issues could allow for the further development of methods to address learning within the hidden curriculum.

  13. Low scale gravity mediation with warped extra dimension and collider phenomenology on the hidden sector

    International Nuclear Information System (INIS)

    Itoh, Hideo; Okada, Nobuchika; Yamashita, Toshifumi

    2006-01-01

    We propose a scenario of gravity mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model. In our setup, both the visible sector and the hidden sector coexist on the infrared (IR) brane. We introduce the Polonyi model as a simple hidden sector. Because of the warped metric, the effective cutoff scale on the IR brane is 'warped down', so that the gravity mediation occurs at a low scale. As a result, the gravitino is naturally the lightest superpartner (LSP) and contact interactions between the hidden and the visible sector fields become stronger. We address phenomenologies for various IR cutoff scales. In particular, we investigate collider phenomenology involving a scalar field (Polonyi field) in the hidden sector for the case with the IR cutoff around 10 TeV. We find a possibility that the hidden sector scalar can be produced at the LHC and the international linear collider (ILC). Interestingly, the scalar behaves like the Higgs boson of the standard model in the production process, while its decay process is quite different and, once produced, it will provide us with a very clean signature. The hidden sector may be no longer hidden

  14. Attitudes of Future Human Service Professionals: The Effects of Victim and Helper Qualities.

    Science.gov (United States)

    Liebkind, Karmela; Eranen, Liisa

    2001-01-01

    Investigates the attitudes of future members in human service professions toward victims, based on the qualities effected by trauma victims and their helpers. Reports that the high-trauma and poorly adapted victims elicited more negative attitudes than did the low-trauma and well-adapted victims. (CMK)

  15. In Brief: Hidden environment and health costs of energy

    Science.gov (United States)

    Showstack, Randy

    2009-10-01

    The hidden costs of energy production and use in the United States amounted to an estimated $120 billion in 2005, according to a 19 October report by the U.S. National Research Council. The report, “Hidden Costs of Energy: Unpriced Consequences of Energy Production and Use,” examines hidden costs, including the cost of air pollution damage to human health, which are not reflected in market prices of energy sources, electricity, or gasoline. The report found that in 2005, the total annual external damages from sulfur dioxide, nitrogen oxides, and particulate matter created by coal-burning power plants that produced 95% of the nation's coal-generated electricity were about $62 billion, with nonclimate damages averaging about 3.2 cents for every kilowatt-hour of energy produced. It is estimated that by 2030, nonclimate damages will fall to 1.7 cents per kilowatt-hour. The 2030 figure assumes that new policies already slated for implementation are put in place.

  16. Behavioral and Mental Health Correlates of Youth Stalking Victimization: A Latent Class Approach.

    Science.gov (United States)

    Reidy, Dennis E; Smith-Darden, Joanne P; Kernsmith, Poco D

    2016-12-01

    Although recognized as a public health problem, little attention has been paid to the problem of stalking among youth. Latent profile analysis was used to identify latent groups of adolescent stalking victims and their behavioral and mental health correlates. A cross-sectional sample of 1,236 youths were randomly selected from 13 schools stratified by community risk level (i.e., low, moderate, and high risk) and gender. Students completed surveys assessing behavioral indicators of stalking victimization, as well as substance use, sexual behavior, dating violence, and psychiatric symptoms. Data were collected in 2013 and data analyses were performed in 2015. Analysis indicated the presence of a non-victim class, a minimal exposure class, and a victim class for boys and girls alike. Approximately 14% of girls and 13% of boys were in the stalking victim class. Adolescents in the victim class reported more symptoms of post-traumatic stress, mood disorder, and hopelessness, as well as more instances of alcohol use, binge drinking, and physical dating violence victimization. Girls in the victim class also reported engaging in sexting behaviors and oral sex with significantly more partners than their non-victim peers. These findings provide valuable knowledge of the prevalence and pertinent health correlates of stalking victimization in adolescence. The data suggest a substantial proportion of adolescents are victims of stalking and are likewise at risk for a number of deleterious health outcomes. As such, this population merits further attention by prevention researchers and practitioners. Published by Elsevier Inc.

  17. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  18. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  19. Police officers' collaboration with rape victim advocates: barriers and facilitators.

    Science.gov (United States)

    Rich, Karen; Seffrin, Patrick

    2013-01-01

    Secondary victimization may occur when rape victims make police reports. This can compromise the quality of official statements and jeopardize criminal cases. Rape reporters receive better treatment by police officers when advocates are involved and best practice police work includes such collaboration. Studies of advocates have described tension, role confusion, and poor communication with police officers. Many variables, including rape myth acceptance (RMA) and training on sexual assault dynamics, may affect officers' collaboration with advocates. There were 429 police officers who responded to a survey measuring their victim interviewing skill, formal training about rape, years on the job, number of victims known personally, number of recent rape cases, RMA, and collaboration with advocates. Results suggest that officers' interviewing skill, years on the job, and specific training are related to collaboration with victim advocates on rape cases. Professional, rather than personal, variables were most predictive of collaboration. Implications for officer selection and training are explored.

  20. Prosocial behavior as a protective factor for children's peer victimization.

    Science.gov (United States)

    Griese, Emily R; Buhs, Eric S

    2014-07-01

    A majority of peer victimization research focuses on its associations with negative outcomes, yet efforts to understand possible protective factors that may mitigate these negative outcomes also require attention. The present study was an investigation of the potential moderating effect of prosocial behaviors on loneliness for youth who are peer victimized. Participants were fourth and fifth grade students (511 total; 49 % boys) who were primarily European American (43.4 %) and Hispanic (48.2 %). Structural Equation Modeling was used to test the interaction of prosocial behavior and peer victimization (relational and overt forms) on loneliness 1 year later. The results indicated that prosocial behavior significantly moderated the relationship between peer victimization (for the relational form only) and loneliness while controlling for levels of perceived peer support. A multi-group comparison by gender further indicated the moderation was significant for boys only. Potential implications for intervention/prevention efforts focused on developing children's prosocial skills as a possible protective factor for relationally victimized youth are discussed.

  1. Psychological distress among adolescents victims of cyberbullying

    Directory of Open Access Journals (Sweden)

    Jessica Ortega-Barón

    2017-07-01

    Full Text Available The information and communication technologies have rapidly been incorporated and expanded in our society. The age in which children and adolescents get access to electronic devices is decreasing. These devices have big advantages, but they can also be inappropriately used to molest and intimidate other children and, as a result, to cause severe psychological problems to other children. Taking this into consideration, the main objective of this study has been to describe the psychological distress shown by adolescents suffering from cyberbullying. In order to do this, the following variables were registered: depressive symptomatology, perceived stressed, isolation and life satisfaction. The initial sample was formed by 1360 adolescents. From these, 194 from 11 to 18 years old (M = 14.22, SD = 1.81 were selected according to their scores in cybervictimization (43.8 % boys. Participants were divided into three groups according to how intense their cyberbullying victimization was. These were: mild, moderated and severe. Our findings show that there were statistically significant differences between mild and severe victims. Adolescents who were severe cyberbullying victims scored higher in depressive symptomatology and perceived stress, and lower in life satisfaction compared to mild cyberbullying victims. These results and their implications are discussed in order to propose future strategies to prevent cyberbullying.

  2. Bronchoscopic lung-volume reduction with Exhale airway stents for emphysema (EASE trial) : randomised, sham-controlled, multicentre trial

    NARCIS (Netherlands)

    Shah, P. L.; Slebos, D-J; Cardoso, P. F. G.; Cetti, E.; Voelker, K.; Levine, B.; Russell, M. E.; Goldin, J.; Brown, M.; Cooper, J. D.; Sybrecht, G. W.

    2011-01-01

    Background Airway bypass is a bronchoscopic lung-volume reduction procedure for emphysema whereby transbronchial passages into the lung are created to release trapped air, supported with paclitaxel-coated stents to ease the mechanics of breathing. The aim of the EASE (Exhale airway stents for

  3. Demirjian approach of dental age estimation: Abridged for operator ease.

    Science.gov (United States)

    Jain, Vanshika; Kapoor, Priyanka; Miglani, Ragini

    2016-01-01

    Present times have seen an alarming increase in incidence of crimes by juveniles and of mass destruction that Highlight the preponderance of individual age estimation. Of the numerous techniques employed for age assessment, dental age estimation (DAE) and its correlation with chronological age (CA) have been of great significance in the recent past. Demirjian system, considered as gold standard in DAE is a simple and convenient method for DAE, though,, although, referring to multiple tables make it cumbersome and less eco friendly due to excessive paper load. The present study was aimed to develop a comprehensive chart (DAEcc) inclusive of all Demirjian tables and developmental stages of teeth and also to as well as to test the operator ease of 50 undergraduate dental students in performing DAE using this chart. The study was performed in two stages, wherein the first stage was aimed at formulation of the comprehensive chart (DAE CC ) which included pictorial representation of calcification stages, the Federation Dentaire Internationale notation of the teeth, and the corresponding scores for each stage with a concluding column at the end to enter the total score. The second stage assessed the applicability of the ease of DAE by DAE CC , whereby fifty 2 nd year BDS students were asked to trace the calcification stages of the seven permanent left mandibular teeth on a panorex, identify the correct stage, assign the corresponding score, and to calculate the total score for subsequent dental age assessment. showed that average time taken by the students for tracing seven mandibular teeth was 5 min and for assessment of dental age was 7 min. The total time taken for DAE was approximately 12 min, thus making the procedure less time consuming. Hence, this study proposes the use of DAEcc for age estimation due to ease in comprehension and execution of Demirjian system.

  4. Co-existing hidden attractors in a radio-physical oscillator system

    DEFF Research Database (Denmark)

    Kuznetsov, A. P.; Kuznetsov, S. P.; Mosekilde, Erik

    2015-01-01

    The term `hidden attractor' relates to a stable periodic, quasiperiodic or chaotic state whose basin of attraction does not overlap with the neighborhood of an unstable equilibrium point. Considering a three-dimensional oscillator system that does not allow for the existence of an equilibrium point...... frequency, describe the bifurcations through which hidden attractors of different type arise and disappear, and illustrate the form of the basins of attraction....

  5. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  6. Personality characteristics of victims of illegal attacks on the Internet

    Directory of Open Access Journals (Sweden)

    Safuanov F.S.

    2016-01-01

    Full Text Available The article examines the personality characteristics of victims of illegal attacks on the Internet. We used methods as follow: 16 factors Cattell personality questionnaire, subjective control level, life-style index, Buss-Perry questionnaire, Spielberger State-Trait Anxiety Inventory, a COPE inventory. 78 internet users were divided into two groups of 38 persons: the main group included people falling victim to illegal attacks on the Internet, the control group participants were not attacked on the internet. We identified specific aggregated symptoms of individual psychological characteristics of internet attack victims and show that victims of "non-forced" and "forced" offenses have different levels of situational and personal anxiety, aggression and locus of control.

  7. Recognizing victims of human trafficking in the pediatric emergency department.

    Science.gov (United States)

    Becker, Heather J; Bechtel, Kirsten

    2015-02-01

    Human trafficking is a form of modern-day slavery that is rapidly expanding in the United States and throughout the world. It is a crime under both the United States and international law. The child and adult victims of human trafficking are denied their basic human rights and subjected to unspeakable physical and emotional harm. Traffickers exert complete control over their victims and are proficient at hiding their condition from authorities. Healthcare practitioners may be the only professionals who come into contact with victims if they present for medical care. This article will describe human trafficking and its potential victims, as well as guide medical management and access to services that will ensure their safety and restore their freedom.

  8. Relational aggression, victimization, and adjustment during middle childhood.

    Science.gov (United States)

    Ostrov, Jamie M; Godleski, Stephanie A

    2013-08-01

    A secondary analysis of the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development was conducted to test the mechanisms by which relational aggression in third grade was associated both directly and indirectly with relational victimization in sixth grade. A large sample (N = 1,035; 522 girls; M = 8.3 years old; SD = 0.23) and multiple informants (teacher, child, and parent report) and methods were used to test several theoretically driven hypotheses. Our path analysis model suggested evidence for both direct and indirect pathways consistent with the sequential social process model of peer harassment. Relational aggression was significantly associated with future relational victimization even after controlling for physical aggression and gender. Loneliness mediated the direct association between relational aggression and peer victimization. A second model testing the reverse direction of effect revealed that relational victimization in third grade predicted relational aggression in sixth grade and was associated with loneliness and depressive symptoms in fifth grade, but there was no evidence for any of the indirect pathways.

  9. Rape Myth Consistency and Gender Differences in Perceiving Rape Victims: A Meta-Analysis.

    Science.gov (United States)

    Hockett, Jericho M; Smith, Sara J; Klausing, Cathleen D; Saucier, Donald A

    2016-02-01

    An overview discusses feminist analyses of oppression, attitudes toward rape victims, and previously studied predictors of individuals' attitudes toward rape victims. To better understand such attitudes, this meta-analysis examines the moderating influences of various rape victim, perpetrator, and crime characteristics' rape myth consistency on gender differences in individuals' perceptions of rape victims (i.e., victim responsibility and blame attributions and rape minimizing attitudes). Consistent with feminist theoretical predictions, results indicated that, overall, men perceived rape victims more negatively than women did. However, this sex difference was moderated by the rape myth consistency within the rape vignettes. Implications for research are discussed. © The Author(s) 2015.

  10. Peer Rejection and Internalizing Behavior: The Mediating Role of Peer Victimization in Preschool.

    Science.gov (United States)

    Metin Aslan, Özge

    2018-05-23

    The author examined the relationship among peer rejection, peer victimization, and internalizing behaviors. The author hypothesized that physical and relational victimization would have a different indirect effect on the relationship between peer rejection and internalizing behaviors. Participants were 94 preschool children (37 girls; average age 49.97 months) from two university preschools located in the northern part of the United States. The results indicated that internalizing behaviors predicted the mediating variables only regarding relational victimization. Relational victimization indirectly affected the association between peer rejection and internalizing behaviors. The study provides evidence of the mediating effect of victimization behaviors on the relationship among peer rejection, victimization, and internalizing behaviors.

  11. Relational Aggression, Victimization, and Language Development: Implications for Practice

    Science.gov (United States)

    Ostrov, Jamie M.; Godleski, Stephanie A.

    2007-01-01

    This review explores the development of relational aggression and relational victimization among peers, with specific emphasis on clinical implications for speech-language pathologists. Developmental manifestations of relational aggression and victimization are reviewed from early childhood through emerging adulthood. The concurrent and…

  12. 76 FR 19909 - International Terrorism Victim Expense Reimbursement Program

    Science.gov (United States)

    2011-04-11

    ... 1121-AA78 International Terrorism Victim Expense Reimbursement Program AGENCY: Office of Justice... promulgating this interim-final rule for its International Terrorism Victim Expense Reimbursement Program... international terrorism. DATES: Effective date: This interim-final rule is effective April 11, 2011. Comment...

  13. Optimal no-go theorem on hidden-variable predictions of effect expectations

    Science.gov (United States)

    Blass, Andreas; Gurevich, Yuri

    2018-03-01

    No-go theorems prove that, under reasonable assumptions, classical hidden-variable theories cannot reproduce the predictions of quantum mechanics. Traditional no-go theorems proved that hidden-variable theories cannot predict correctly the values of observables. Recent expectation no-go theorems prove that hidden-variable theories cannot predict the expectations of observables. We prove the strongest expectation-focused no-go theorem to date. It is optimal in the sense that the natural weakenings of the assumptions and the natural strengthenings of the conclusion make the theorem fail. The literature on expectation no-go theorems strongly suggests that the expectation-focused approach is more general than the value-focused one. We establish that the expectation approach is not more general.

  14. The Code of the Street and Violent Versus Property Crime Victimization.

    Science.gov (United States)

    McNeeley, Susan; Wilcox, Pamela

    2015-01-01

    Previous research has shown that individuals who adopt values in line with the code of the street are more likely to experience violent victimization (e.g., Stewart, Schreck, & Simons, 2006). This study extends this literature by examining the relationship between the street code and multiple types of violent and property victimization. This research investigates the relationship between street code-related values and 4 types of victimization (assault, breaking and entering, theft, and vandalism) using Poisson-based multilevel regression models. Belief in the street code was associated with higher risk of experiencing assault, breaking and entering, and vandalism, whereas theft victimization was not related to the street code. The results suggest that the code of the street influences victimization broadly--beyond violence--by increasing behavior that provokes retaliation from others in various forms.

  15. Enhancing the safety of elderly victims after the close of an APS investigation.

    Science.gov (United States)

    Jackson, Shelly L; Hafemeister, Thomas L

    2013-04-01

    The purpose of this study was to test whether particular actions on the part of adult protective services (APS), the elderly victim, and/or society's response to abusive individuals, are associated with the continuation of abuse after the close of an APS investigation and thereby compromise victim safety. Interviews were conducted with 71 APS caseworkers, 55 of the elderly victims of substantiated abuse, and 35 third-party persons. A small proportion of elderly victims continue to experience abuse after the close of an APS investigation. Elderly victims were more likely to experience continued abuse when they chose to have ongoing contact with their abusers, vis-à-vis cohabitation or otherwise, and when their abusers experienced no consequences. Although continuation of abuse did not differ by the type of maltreatment involved, reasons for the cessation of abuse, and other safety indicators, did. To enhance victim safety, greater monitoring may be warranted in cases wherein elderly victims continue to have contact with their abuser and when abusive individuals experience no consequences. To further enhance victim safety, abusive individuals must be incorporated into an overall strategic response to elder abuse. A potential avenue for facilitating victim safety while maintaining victim autonomy is to understand their motivations for desiring continued contact with their abuser and developing interventions based upon such knowledge.

  16. Family poly-victimization and cyberbullying among adolescents in a Chinese school sample.

    Science.gov (United States)

    Chen, QiQi; Lo, Camilla K M; Zhu, Yuhong; Cheung, Anne; Chan, Ko Ling; Ip, Patrick

    2018-03-01

    The sustained increase in their use of social networking facilitates the development of adolescents but comes with the risk of cyberbullying, which creates new challenges in regard to adolescent protection. Past evidence shows that family victimization may play an essential role in the way adolescents learn cyberbullying behaviors. Yet, research on the co-occurrence of family victimization and cyberbullying is limited. This study aims to investigate the associations between cyberbullying and family victimization among adolescents, and to examine the health correlates of cyberbullying and family poly-victimization. A large sample of 18,341 students, aged 15-17, from six cities in China, collected between 2009 and 2010 is employed in the present study, which investigated the association between various kinds of family victimization and adolescent cyberbullying. Data analysis was conducted in 2017. In-law conflict, intimate partner violence, elder abuse and neglect, and child maltreatment were associated with a higher possibility of children becoming internet victims. Parents' divorce and separation, low family income, mother's low level of education, and father's unemployment were all associated with cyberbullying victimization. Cyber victimization was positively correlated to symptoms of PTSD and depression, self-harm, and other physical and mental health variables. Possible explanations for the relationships found in this study are discussed and implications for future research and services are provided. Proactive screening for family poly-victimization and cyberbullying is suggested. Schools are highly recommended to cooperate with parents to promote cyber safety. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Physiological correlates of peer victimization and aggression in African American urban adolescents

    Science.gov (United States)

    KLIEWER, WENDY; DIBBLE, ASHLEY E.; GOODMAN, KIMBERLY L.; SULLIVAN, TERRI N.

    2018-01-01

    This study examined physiological correlates (cortisol and α-amylase [AA]) of peer victimization and aggression in a sample of 228 adolescents (45% male, 55% female; 90% African American; M age = 14 years, SD = 1.6 years) who participated in a longitudinal study of stress, physiology, and adjustment. Adolescents were classified into victimization/aggression groups based on patterns with three waves of data. At Wave 3, youth completed the Social Competence Interview (SCI), and four saliva samples were collected prior to, during, and following the SCI. Repeated-measures analyses of variance with victimization/aggression group as the predictor, and physiological measures as outcomes, controlling for time of day, pubertal status, and medication use revealed significant Group×SCI Phase interactions for salivary AA (sAA), but not for cortisol. The results did not differ by sex. For analyses with physical victimization/aggression, aggressive and nonaggressive victims showed increases in sAA during the SCI, nonvictimized aggressors showed a decrease, and the normative contrast group did not show any change. For analyses with relational victimization/aggression, nonaggressive victims were the only group who demonstrated sAA reactivity. Incorporating physiological measures into peer victimization studies may give researchers and clinicians insight into youth’s behavior regulation, and help shape prevention or intervention efforts. PMID:22559136

  18. The insured victim effect: When and why compensating harm decreases punishment recommendations

    Directory of Open Access Journals (Sweden)

    Philippe P. F. M. van de Calseyde

    2013-03-01

    Full Text Available An insurance policy may not only affect the consequences for victims but also for perpetrators. In six experiments we find that people recommend milder punishments for perpetrators when the victim was insured, although people believe that a sentence should not depend on the victim's insurance status. The robustness of this effect is demonstrated by showing that recommendations can even be more lenient for crimes that are in fact more serious but in which the victim was insured. Moreover, even when harm was possible but did not materialize, people still prefer to punish crimes less severely when the (potential victim was insured. The final two experiments suggest that the effect is associated with a change in (1 compassion for the victim and (2 perceived severity of the transgression. Implications of this phenomenon are briefly discussed.

  19. Compensating Victims of Violent Crime: Potential Costs and Coverage of a National Program.

    Science.gov (United States)

    Garofalo, James; Sutton, L. Paul

    Data generated from an ongoing national crime victimization survey and details about the circumstances and consequences of personal crimes form the basis for estimating the cost of a national program to compensate victims of violent crime. Victim compensation programs represent an attempt to rectify the neglect of the victim. Uncertainty about the…

  20. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  1. Nonparametric model validations for hidden Markov models with applications in financial econometrics.

    Science.gov (United States)

    Zhao, Zhibiao

    2011-06-01

    We address the nonparametric model validation problem for hidden Markov models with partially observable variables and hidden states. We achieve this goal by constructing a nonparametric simultaneous confidence envelope for transition density function of the observable variables and checking whether the parametric density estimate is contained within such an envelope. Our specification test procedure is motivated by a functional connection between the transition density of the observable variables and the Markov transition kernel of the hidden states. Our approach is applicable for continuous time diffusion models, stochastic volatility models, nonlinear time series models, and models with market microstructure noise.

  2. The Consensus String Problem and the Complexity of Comparing Hidden Markov Models

    DEFF Research Database (Denmark)

    Lyngsø, Rune Bang; Pedersen, Christian Nørgaard Storm

    2002-01-01

    The basic theory of hidden Markov models was developed and applied to problems in speech recognition in the late 1960s, and has since then been applied to numerous problems, e.g. biological sequence analysis. Most applications of hidden Markov models are based on efficient algorithms for computing......-norms. We discuss the applicability of the technique used for proving the hardness of comparing two hidden Markov models under the L1-norm to other measures of distance between probability distributions. In particular, we show that it cannot be used for proving NP-hardness of determining the Kullback...

  3. Inference with constrained hidden Markov models in PRISM

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2010-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference. De......_different are integrated. We experimentally validate our approach on the biologically motivated problem of global pairwise alignment.......A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we show how HMMs can be extended with side-constraints and present constraint solving techniques for efficient inference...

  4. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  5. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  6. Hidden solution to the μ/Bμ problem in gauge mediation

    International Nuclear Information System (INIS)

    Roy, Tuhin S.; Schmaltz, Martin

    2008-01-01

    We propose a solution to the μ/B μ problem in gauge mediation. The novel feature of our solution is that it uses dynamics of the hidden sector, which is often present in models with dynamical supersymmetry breaking. We give an explicit example model of gauge mediation where a very simple messenger sector generates both μ and B μ at one loop. The usual problem, that B μ is then too large, is solved by strong renormalization effects from the hidden sector which suppress B μ relative to μ. Our mechanism relies on an assumption about the signs of certain incalculable anomalous dimensions in the hidden sector. Making these assumptions not only allows us to solve the μ/B μ problem but also leads to a characteristic superpartner spectrum which would be a smoking gun signal for our mechanism.

  7. Multitask TSK fuzzy system modeling by mining intertask common hidden structure.

    Science.gov (United States)

    Jiang, Yizhang; Chung, Fu-Lai; Ishibuchi, Hisao; Deng, Zhaohong; Wang, Shitong

    2015-03-01

    The classical fuzzy system modeling methods implicitly assume data generated from a single task, which is essentially not in accordance with many practical scenarios where data can be acquired from the perspective of multiple tasks. Although one can build an individual fuzzy system model for each task, the result indeed tells us that the individual modeling approach will get poor generalization ability due to ignoring the intertask hidden correlation. In order to circumvent this shortcoming, we consider a general framework for preserving the independent information among different tasks and mining hidden correlation information among all tasks in multitask fuzzy modeling. In this framework, a low-dimensional subspace (structure) is assumed to be shared among all tasks and hence be the hidden correlation information among all tasks. Under this framework, a multitask Takagi-Sugeno-Kang (TSK) fuzzy system model called MTCS-TSK-FS (TSK-FS for multiple tasks with common hidden structure), based on the classical L2-norm TSK fuzzy system, is proposed in this paper. The proposed model can not only take advantage of independent sample information from the original space for each task, but also effectively use the intertask common hidden structure among multiple tasks to enhance the generalization performance of the built fuzzy systems. Experiments on synthetic and real-world datasets demonstrate the applicability and distinctive performance of the proposed multitask fuzzy system model in multitask regression learning scenarios.

  8. Initial medical management of criticality accident victim; Conduite a tenir aux victimes d'un accident de criticite

    Energy Technology Data Exchange (ETDEWEB)

    Miele, A; Bebaron-Jacobs, L

    2005-07-01

    The extremely severe criticality accidents known to this day, and the subsequent deaths recorded (Sarov 1997 and Tokai Mura 1999), demonstrate the need for sustained surveillance and constant adapted training for the teams in charge of irradiated and/or contaminated victims. The aim of this work group, composed of occupational health services and associated medical biology laboratories, is to present, in leaflet format, the essential data on the documentation and the conduct to be held when facing the victims of a criticality accident. The studies of this work group confirm the difficulties involved in managing this type of accident, both from the dosimetric evaluation point of view and from the therapeutic management point of view. That is why several research themes and perspectives are developed. During the different phases of victim triage, the recommendations given on these leaflets describe the operational conducts to be held. This work will have to be updated according to the evolution in knowledge and means: short and long term effects of exposure to neutrons, multi-competence hospital cooperation, expertise networks related to dosimetric reconstitution. (authors)

  9. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal.

    Directory of Open Access Journals (Sweden)

    Jeevan Acharya

    Full Text Available Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs.A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Western Regional Hospital, Pokhara, Nepal. A face to face interview with each respondent was conducted using a structured questionnaire. Hidden costs were calculated based on the price rate of the market during the time of the study.The total hidden costs for normal delivery and C-section delivery were 243.4 USD (US Dollar and 321.6 USD respectively. Of the total maternity care expenditures; higher mean expenditures were found for food & drinking (53.07%, clothes (9.8% and transport (7.3%. For postpartum women with their husband or house head, the total mean opportunity cost of "days of work loss" were 84.1 USD and 81.9 USD for normal delivery and C-section respectively. Factors such as literate mother (p = 0.007, employed house head (p = 0.011, monthly family income more than 25,000 NRs (Nepalese Rupees (p = 0.014, private hospital as a place of delivery (p = 0.0001, C-section as a mode of delivery (p = 0.0001, longer duration (>5days of stay in hospital (p = 0.0001, longer distance (>15km from house to hospital (p = 0.0001 and longer travel time (>240 minutes from house to hospital (p = 0.007 showed a significant association with the higher hidden costs (>25000 NRs.Experiences of hidden costs on hospital based delivery and opportunity costs of days of work loss were found high. Several socio-demographic factors, delivery related factors (place and mode of delivery, length of stay, distance from hospital and travel time were associated with hidden costs. Hidden costs can be a

  10. Hidden Costs of Hospital Based Delivery from Two Tertiary Hospitals in Western Nepal.

    Science.gov (United States)

    Acharya, Jeevan; Kaehler, Nils; Marahatta, Sujan Babu; Mishra, Shiva Raj; Subedi, Sudarshan; Adhikari, Bipin

    2016-01-01

    Hospital based delivery has been an expensive experience for poor households because of hidden costs which are usually unaccounted in hospital costs. The main aim of this study was to estimate the hidden costs of hospital based delivery and determine the factors associated with the hidden costs. A hospital based cross-sectional study was conducted among 384 post-partum mothers with their husbands/house heads during the discharge time in Manipal Teaching Hospital and Western Regional Hospital, Pokhara, Nepal. A face to face interview with each respondent was conducted using a structured questionnaire. Hidden costs were calculated based on the price rate of the market during the time of the study. The total hidden costs for normal delivery and C-section delivery were 243.4 USD (US Dollar) and 321.6 USD respectively. Of the total maternity care expenditures; higher mean expenditures were found for food & drinking (53.07%), clothes (9.8%) and transport (7.3%). For postpartum women with their husband or house head, the total mean opportunity cost of "days of work loss" were 84.1 USD and 81.9 USD for normal delivery and C-section respectively. Factors such as literate mother (p = 0.007), employed house head (p = 0.011), monthly family income more than 25,000 NRs (Nepalese Rupees) (p = 0.014), private hospital as a place of delivery (p = 0.0001), C-section as a mode of delivery (p = 0.0001), longer duration (>5days) of stay in hospital (p = 0.0001), longer distance (>15km) from house to hospital (p = 0.0001) and longer travel time (>240 minutes) from house to hospital (p = 0.007) showed a significant association with the higher hidden costs (>25000 NRs). Experiences of hidden costs on hospital based delivery and opportunity costs of days of work loss were found high. Several socio-demographic factors, delivery related factors (place and mode of delivery, length of stay, distance from hospital and travel time) were associated with hidden costs. Hidden costs can be a

  11. Assessment of Electronic Absentee System for Elections (EASE) Grants

    Science.gov (United States)

    2015-06-30

    No. DODIG-2015-135 J U N E 3 0 , 2 0 1 5 Assessment of Electronic Absentee System for Elections (EASE) Grants Mission Our mission is to provide...efficiency; advises the Secretary of Defense and Congress; and informs the public. Vision Our vision is to be a model oversight organization in the Federal...Government by leading change, speaking truth, and promoting excellence—a diverse organization , working together as one professional team, recognized

  12. Hidden-sector Spectroscopy with Gravitational Waves from Binary Neutron Stars

    Science.gov (United States)

    Croon, Djuna; Nelson, Ann E.; Sun, Chen; Walker, Devin G. E.; Xianyu, Zhong-Zhi

    2018-05-01

    We show that neutron star (NS) binaries can be ideal laboratories to probe hidden sectors with a long-range force. In particular, it is possible for gravitational wave (GW) detectors such as LIGO and Virgo to resolve the correction of waveforms from ultralight dark gauge bosons coupled to NSs. We observe that the interaction of the hidden sector affects both the GW frequency and amplitude in a way that cannot be fitted by pure gravity.

  13. A Hidden Twelve-Dimensional SuperPoincare Symmetry In Eleven Dimensions

    Energy Technology Data Exchange (ETDEWEB)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2003-12-13

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional superPoincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven dimensional superparticle, taken off-shell, we discover a hidden twelve dimensional superPoincare symmetry that governs the theory.

  14. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  15. Self- and Peer-Identified Victims in Late Childhood: Differences in Perceptions of the School Ecology.

    Science.gov (United States)

    Dawes, Molly; Chen, Chin-Chih; Farmer, Thomas W; Hamm, Jill V

    2017-11-01

    Patterns of adjustment for youth victimized by peers vary depending on whether youth are identified as victims through self-reports, peer-reports, or both. In order to provide more targeted strategies that may help mitigate negative consequences associated with specific victimization groups, more information is needed about how these youth perceive their school ecology (bullying and academic ecology), their feelings of school belonging, and their valuing of school. Based on the convergence of self- and peer-reports of victimization, we identified four victim groups from a sample of students in 5th grade classrooms (N = 1360; 52.8% girls, 53.1% White, 34.6% Black or Hispanic, 12.2% Native American, Asian, or other) using Latent Profile Analysis (LPA): convergent victims (high self- and peer-reports), self-identified victims (high self-, low peer-reports), peer-identified victims (low self-, high peer-reports), and nonvictims (low self- and peer-reports). Convergent victims' perceptions were similar to nonvictims with key differences being convergent victims' greater willingness to protect peers being bullied but lower feelings of school belonging compared to nonvictims. Peer-identified and self-identified victims perceived differences in the bullying and academic ecology including peer-identified victims' greater willingness to protect peers and expectations for more peers to encourage bulling against them compared to self-identified victims. However, both peer- and self-identified victims perceived greater emotional risk of participating in class and had lower feelings of school belonging compared to nonvictims. Implications for supporting youth with divergent self- and peer-reported victimization status as they transition to middle school are discussed.

  16. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  17. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  18. 78 FR 24319 - National Crime Victims' Rights Week, 2013

    Science.gov (United States)

    2013-04-24

    ... we know: families trying to rebuild after financial fraud or identity theft, grandparents spending... victims of abuse. We have continued to crack down on financial crimes that leave too many families..., and by volunteering to serve victims in their time of need. [[Page 24320

  19. Victimization and Human Immunodeficiency Virus-Related Risk Among Transgender Women in India: A Latent Profile Analysis.

    Science.gov (United States)

    Willie, Tiara C; Chakrapani, Venkatesan; White Hughto, Jaclyn M; Kershaw, Trace S

    2017-12-01

    Globally, transgender women (TGW) experience multiple forms of victimization such as violence and discrimination that can place them at risk for poor sexual health. To date, research overlooks the heterogeneity in experiences of victimization among TGW. Furthermore, few studies have examined the association between victimization and sexual risk among TGW in India, despite the high burden of HIV and victimization in this community. Latent profile analysis was performed to identify patterns of victimization in a convenience sample of 299 TGW recruited from nongovernmental organizations across four states in India. Analysis of covariance was performed to examine differences in sexual risk (i.e., alcohol use before sex; inconsistent condom use with a male regular partner, a male causal partner, and a male paying partner; and having multiple sexual partners) between latent profiles. Five distinct profiles of Indian TGW were identified based on the type and severity of victimization: (1) Low victimization, (2) High verbal police victimization, (3) High verbal and physical police victimization, (4) Moderate victimization, and (5) High victimization. While controlling for age, education, income, HIV status, and marital status, results revealed that TGW in the moderate victimization and high victimization profiles had higher sexual risk than TGW in the low victimization and high verbal police victimization profiles. In addition, TGW in high verbal and physical police victimization profile had higher sexual risk than TGW in low victimization profile. These findings underscore the importance of tailoring sexual risk reduction interventions to the specific needs of TGW based on patterns of victimization.

  20. The hidden costs of self-management services in the accounting activity of a company

    Directory of Open Access Journals (Sweden)

    Dan Ioan TOPOR

    2017-05-01

    Full Text Available This article addresses relevant aspects regarding the hidden costs of self-management services in the accounting area, within the accounting department of a company. With this aim, the authors conducted a study using a questionnaire, whose results were analyzed and interpreted. The hidden costs of the self-management of business accounting services observed in the accounting department of the company have been assessed and the causes of their generating sources were identified and analyzed. The debate of these hidden costs involved the treating of notions that exist in the accounting language, but are still not sufficiently explored by the specialists in the area. We also presented and analyzed the causes of the hidden costs of self-management in the accounting activity, as well as a reporting document for failures, arising from the case study. The article ends with the authors' conclusions regarding the hidden costs of self-management services in the accounting area.