WorldWideScience

Sample records for marika mikkor defended

  1. Taas tublisid Melbourne´i noori : Kylie Mikkor / Sirje Jõgi

    Index Scriptorium Estoniae

    Jõgi, Sirje

    2006-01-01

    fotol Melbourne´i Eesti Maja esimehe Arnold ja Asta Mikkori poja Kuno tütar Kylie Mikkor, kes lõpetas edukalt ülikooli ja sai Bachelor of Engineering (Aerospace Engineering) with honours 1st class ja Bachelor of Business (Business Administration) with distinction

  2. TÜ, TPÜ ja EHI uusi magistreid / Eda Tursk, Hille Roots, Heidi Meier

    Index Scriptorium Estoniae

    Tursk, Eda

    2004-01-01

    Tartu ülikooli eesti ja soome-ugri keeleteaduse osakonnas ning kirjanduse ja rahvaluule osakonnas kaitsesid 2003.a. magistritööd Niina Aasmäe, Piret Voll, Larissa Degel, Reet Hendrikson, Tiina Pai, Petar Kehayov, Anna Baidullina, Katrin Ennus, Kristi Jõesaar, Ell Vahtramäe, Lauri Sommer, Andreas Kalkun, Mirjam Hinrikus, Kristel Nõlvak. Tallinna Pedagoogikaülikoolis kaitsesid 2003.a. magistritööd Sirje Nootre, Merike Mägedi, Tiiu Koovit, Heidi Meier, Jaanika Stackhouse, Lilian Ossi, Annika Vamper, Marika Mikkor, Piret Õunapuu, Helin Puksand, Taimi Rosenberg. Eesti Humanitaarinstituudis kaitses 2003.a. magistritööd Merilin Miljan

  3. Nauding kehale ja meelele / Marika Aret ; tekst Inna Inanna

    Index Scriptorium Estoniae

    Aret, Marika

    2014-01-01

    Mustamäel Mustamäe tee 17 avatud Bliss majast, kus muude teenuste kõrval pakutakse buffeeerestoranis ja kohvikus taime- ja toortoitu. Intervjuu Blissi käivitustiimi ja restorani perenaise Marika Aretiga

  4. Sõrve 2008 / Nicholas Wurm, Steven Buchert, Mai Buchert, Sandra Buchert...[jt.

    Index Scriptorium Estoniae

    2008-01-01

    lapsed ja lapsevanemad Austraaliast meenutavad oma viibimist Sõrve lastelaagris: This is a story of a family from Sõrve; Nicholas Wurm - Age 9 (Adelaide); Alan and Debbie Mikkor (Melbourne); Jesse Mikkor's point of view: Age 8; Lauren Mikkor's point of view: Age 13

  5. Defending one's friends, not one's enemies: A social network analysis of children's defending, friendship, and dislike relationships using XPNet.

    Science.gov (United States)

    Oldenburg, Beau; Van Duijn, Marijtje; Veenstra, René

    2018-01-01

    Previous studies investigating to what extent students in elementary schools defend their victimized classmates typically treated defending as an individual characteristic. Defending should, however, be seen as a directed dyadic relationship between a victim and a defender, who are embedded multiple positive and negative relationships with each other and their classmates. Accordingly, in the present study defending was investigated using social network analysis. More specifically, it was investigated to what extent defending relationships co-occurred with friendship and dislike relationships involving not only the victim and the defender but also other classmates. Bivariate Exponential Random Graph Models (ERGMs) were used to analyze the defending-friendship and defending-dislike relationships in seven grade-three classrooms. As hypothesized, the results indicated that victimized students were likely to be defended by students who they perceive as friends or who perceive them as friends. Moreover, defending was likely to occur when the victim and (potential) defender had the same friends. Victimized students were unlikely to be defended by classmates whom they disliked or who had indicated to dislike them. Finally, defending was likely to occur between students who disliked the same classmates.

  6. Defendants' Rights in Criminal Trials.

    Science.gov (United States)

    Martin, Ralph C., II; Keeley, Elizabeth

    1997-01-01

    Reviews the protections afforded by the Constitution for defendants in criminal trials. These include the right to a jury trial (in cases of possible incarceration), an impartial jury, and the requirement of a unanimous verdict. Defends the use of plea bargaining as essential to an efficient criminal justice system. (MJP)

  7. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  8. Motion patterns and phase-transition of a defender-intruder problem and optimal interception strategy of the defender

    Science.gov (United States)

    Wang, Jiangliu; Li, Wei

    2015-10-01

    In this paper, we consider a defense-intrusion interaction, in which an intruder is attracted by a protected stationary target but repulsed by a defender; while the defender tries to move towards an appropriate interception position (IP) between the intruder and the target in order to intercept the intruder and expel the intruder away from the target as maximum as possible. Intuitionally, to keep the intruder further away, one may wonder that: is it a better strategy for the defender trying to approach the intruder as near as possible? Unexpectedly and interestingly enough, this is not always the case. We first introduce the flexibility for IP selection, then investigate the system dynamics and the stable motion patterns, and characterize the phase-transition surface for the motion patterns. We show that, the phase-transition surface just defines the optimal interception strategy of the defender for IP selection; and from the perspective of mobility of agents, the optimal strategy just depends on relative mobility of the two agents.

  9. Defend the Approaches

    National Research Council Canada - National Science Library

    Patterson, Mark A

    2008-01-01

    .... territories to provide for better discrimination by Maritime Interdiction Operations (MIO). This paper argues that given the nature of the WMD threat, the United States will be better defended by forces operating closer to U.S...

  10. 1930. aastad Kaukaasias "Edasi" kolhoosis põllumehe silme läbi ja ajalehe "Edasi" veergudel. IV-V / Marika Mikkor

    Index Scriptorium Estoniae

    Mikkor, Marika, 1963-

    2006-01-01

    Kaukaasias Eesti-Rohuaias elanud August Rootsi päevaraamatust 1929-1942 aastatest ja Leningradis ilmunud ajalehe "Edasi" kirjutistest stalinlike repressioonide, kollektiviseerimise ja eestlaste eluolu kohta Kaukaasias

  11. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  12. Defending dreamer’s rock

    OpenAIRE

    Beck, Günter U.

    2007-01-01

    Defending dreamer’s rock : Geschichte, Geschichtsbewusstsein und Geschichtskultur im Native drama der USA und Kanadas. - Trier : WVT Wiss. Verl. Trier, 2007. - 445 S. - (CDE - Studies ; 14). - Zugl.: Augsburg, Univ., Diss., 2006

  13. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  14. The psychology of defendant plea decision making.

    Science.gov (United States)

    Redlich, Allison D; Bibas, Stephanos; Edkins, Vanessa A; Madon, Stephanie

    2017-01-01

    Every day, thousands of defendants, prosecutors, and defense attorneys must make guilty plea decisions, such as whether to accept a plea offer or proceed to trial. Most defendants opt to plead guilty; approximately 95% of state and federal convictions result from guilty pleas. In light of a newly emerging body of research and recent Supreme Court decisions on guilty pleas, this article asks and answers 2 questions: First, who pleads guilty and why? We describe the characteristics of those who are more or less likely to plead guilty, and examine the reasons why individuals plead guilty instead of proceeding to trial, exploring the cognitive, social influence, and developmental factors that underlie decision making. Second, are defendants' plea decisions valid, in that the decisions are made knowingly, intelligently, voluntarily, and with a factual basis of guilt? That is, do defendants who plead guilty understand and appreciate the conditions and consequences of their pleas, as required by law? Are innocent people induced to plead guilty to crimes they did not commit? We conclude with suggestions to move the field of plea research forward. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Defending against speculative attacks

    NARCIS (Netherlands)

    Daniëls, T.; Jager, H.; Klaassen, F.

    2009-01-01

    While virtually all currency crisismodels recognise that the fate of a currency peg depends on how tenaciously policy makers defend it, they seldom model how this is done. We incorporate themechanics of speculation and the interest rate defence against it in the model of Morris and Shin (American

  16. Defendant Characteristics and Juridic Decisions.

    Science.gov (United States)

    Michelini, Ronald L.; Snodgrass, Stephan R.

    1980-01-01

    Attractiveness of defendant's traits and their relevance to the likelihood of acting criminally were varied. Results supported a causal inference explanation for deciding guilt and a liking-leniency explanation for deciding punishment. (Author/CS)

  17. Factors affecting jail detention of defendants adjudicated incompetent to proceed.

    Science.gov (United States)

    Christy, Annette; Otto, Randy; Finch, Jacquelyn; Ringhoff, Daniel; Kimonis, Eva R

    2010-01-01

    The movement of defendants through the legal process who have been adjudicated incompetent to proceed is little studied, yet it is important. The purpose of this study was to provide empirical data regarding factors that affected the amount of time defendants adjudicated incompetent to proceed and ordered to undergo hospitalization remained in jail while awaiting transfer to a state hospital. Statewide data collected in Florida between July 2005 and June 2008 were used to determine the lengths of time incompetent defendants spent at certain stages in the legal process. The addition of forensic bed capacity following media attention and litigation resulted in a significant decrease in the amount of time defendants adjudicated incompetent to proceed waited in jail for transfer to a state hospital for treatment. The amount of time it took for completed commitment orders to be submitted to the state mental health authority by the Clerks of Court of each county accounted for a meaningful portion of days defendants spent in jail awaiting transfer to a state hospital, with considerable variation across counties with respect to waiting times. These findings reflect how various stakeholders can affect the amount of time defendants spend in jail while awaiting hospitalization. These issues are discussed in the context of controversy related to Florida's forensic mental health system, as well as issues related to the political process and funding of the state's mental health authority. Copyright © 2010 John Wiley & Sons, Ltd.

  18. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  19. The Optimal Employment of a Deep Seaweb Acoustic Network for Submarine Communications at Speed and Depth Using a Defender-Attacker-Defender Model

    Science.gov (United States)

    2013-09-01

    location costs of a LRP. Berger, Coullard, and Daskin (2007) utilized a set-partitioning- based formulation of an uncapacitated location-routing...EMPLOYMENT OF A DEEP SEAWEB ACOUSTIC NETWORK FOR SUBMARINE COMMUNICATIONS AT SPEED AND DEPTH USING A DEFENDER-ATTACKER- DEFENDER MODEL by Andrew D...Hendricksen September 2013 Thesis Advisor: W. Matthew Carlyle Thesis Co-Advisor: Joseph A . Rice Second Reader: Robert E. Burks THIS PAGE

  20. Possibility of death sentence has divergent effect on verdicts for Black and White defendants.

    Science.gov (United States)

    Glaser, Jack; Martin, Karin D; Kahn, Kimberly B

    2015-12-01

    When anticipating the imposition of the death penalty, jurors may be less inclined to convict defendants. On the other hand, minority defendants have been shown to be treated more punitively, particularly in capital cases. Given that the influence of anticipated sentence severity on verdicts may vary as a function of defendant race, the goal of this study was to test the independent and interactive effects of these factors. We conducted a survey-embedded experiment with a nationally representative sample to examine the effect on verdicts of sentence severity as a function of defendant race, presenting respondents with a triple murder trial summary that manipulated the maximum penalty (death vs. life without parole) and the race of the defendant. Respondents who were told life-without-parole was the maximum sentence were not significantly more likely to convict Black (67.7%) than White (66.7%) defendants. However, when death was the maximum sentence, respondents presented with Black defendants were significantly more likely to convict (80.0%) than were those with White defendants (55.1%). The results indicate that the death penalty may be a cause of racial disparities in criminal justice, and implicate threats to civil rights and to effective criminal justice. (c) 2015 APA, all rights reserved).

  1. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2005-01-01

    The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S...

  2. Homeland Security: Defending U.S. Airspace

    National Research Council Canada - National Science Library

    Bolkcom, Christopher

    2006-01-01

    The September 11th attacks drew attention to U.S. air defense, and the 9/11 Commission Report recommended that Congress regularly assess the ability of Northern Command to defend the United States against military threats. Protecting U.S...

  3. Defending victimized peers : Opposing the bully, supporting the victim, or both?

    NARCIS (Netherlands)

    Reijntjes, Albert; Vermande, Marjolijn; Olthof, Tjeert; Goossens, Frits A; Aleva, Liesbeth; van der Meulen, Matty

    2016-01-01

    To reduce bullying, more knowledge on children defending their victimized peers is critical. In previous work, predominantly cross-sectional in nature, defending has typically been operationalized as one single, broad construct. However, there are good reasons to assume that attacking the bully

  4. Jurors' locus of control and defendants' attractiveness in death penalty sentencing.

    Science.gov (United States)

    Beckham, Crystal M; Spray, Beverly J; Pietz, Christina A

    2007-06-01

    The authors examined the relationship between jurors' locus of control and defendants' attractiveness in death penalty sentencing. Ninety-eight participants voluntarily served as mock jurors. The authors administered J. B. Rotter's (1966) Internal-External Locus of Control Scale to participants and then randomly assigned them to a group with either an attractive or an unattractive defendant (represented by photographs). Participants read a murder vignette and selected a punishment--either a lifetime jail sentence or the death penalty-for the defendant. Results indicated that neither jurors' locus of control nor defendants' attractiveness influenced sentencing. However, jurors' age and gender significantly influenced sentencing. Men, with the exception of the youngest men, were more likely than women to choose the death penalty. Additionally, young women were more likely than older women to select the death penalty. The authors discuss the implications of these results for the study of jury behavior and bias.

  5. Competency to stand trial and defendants who lack insight into their mental illness.

    Science.gov (United States)

    Reisner, Andrew D; Piel, Jennifer; Makey, Miller

    2013-01-01

    Forensic evaluators often assess patients who lack insight into their mental illnesses. This lack of insight can have a significant impact on the defendant's ability to make legal strategy decisions that rely on their acceptance of their mental illness. In this article, the relationship between refusing an insanity plea and competency to stand trial will be explored in the context of defendants who lack insight into their mental illness. The authors argue that an adequate competency assessment should take into account the defendant's ability to consider his available pleas rationally. Such evaluations may have the effect of negating the necessity of a Frendak inquiry in those jurisdictions that can impose the insanity defense on defendants.

  6. Judge grants defendant leniency because of risk of rape in prison.

    Science.gov (United States)

    1998-06-26

    A gay man convicted of larceny and having a history of sexual abuse has escaped incarceration and was placed on probation because his appearance and mannerism would make him a target for rape. The argument that the defendant's HIV infection would endanger others if he were released was rejected by the judge because no evidence suggested the defendant exhibited harmful behavior to others.

  7. Does Ability to Defend Moderate the Association between Exposure to Bullying and Symptoms of Anxiety?

    Directory of Open Access Journals (Sweden)

    Morten Birkeland Nielsen

    2017-11-01

    Full Text Available In the context of workplace bullying, the ability to defend refers to whether or not a target feels able to deal with those negative behaviors that typically constitute bullying. The aim of this study was to determine whether the perceived ability to defend oneself moderates the association between exposure to bullying behaviors at work and symptoms of anxiety as predicted by the definition of workplace bullying. It was hypothesized that exposure to bullying behaviors would be more strongly related to symptoms of anxiety among targets feeling unable to defend oneself than among targets who do feel that they are able to defend themselves in the actual situation. This survey study was based on a probability sample of 1,608 Norwegian employees (response rate 32%. Only respondents exposed to at least one bullying behavior were included (N = 739. In contrast to hypothesis, the findings showed that ability to defend only had a protective effect on the relationship between exposure to bullying behaviors and anxiety in cases of low exposure. In cases of high exposure, there was a stronger increase in anxiety among employees able to defend themselves than among those who generally felt unable to defend. Hence, the ability to defend against exposure to bullying behaviors does not seem to protect high-exposed targets against symptoms of anxiety. Organization should therefore intervene against bullying in early stages rather than relying on the individual resilience of those exposed.

  8. Does Ability to Defend Moderate the Association between Exposure to Bullying and Symptoms of Anxiety?

    Science.gov (United States)

    Nielsen, Morten Birkeland; Gjerstad, Johannes; Jacobsen, Daniel Pitz; Einarsen, Ståle Valvatne

    2017-01-01

    In the context of workplace bullying, the ability to defend refers to whether or not a target feels able to deal with those negative behaviors that typically constitute bullying. The aim of this study was to determine whether the perceived ability to defend oneself moderates the association between exposure to bullying behaviors at work and symptoms of anxiety as predicted by the definition of workplace bullying. It was hypothesized that exposure to bullying behaviors would be more strongly related to symptoms of anxiety among targets feeling unable to defend oneself than among targets who do feel that they are able to defend themselves in the actual situation. This survey study was based on a probability sample of 1,608 Norwegian employees (response rate 32%). Only respondents exposed to at least one bullying behavior were included ( N = 739). In contrast to hypothesis, the findings showed that ability to defend only had a protective effect on the relationship between exposure to bullying behaviors and anxiety in cases of low exposure. In cases of high exposure, there was a stronger increase in anxiety among employees able to defend themselves than among those who generally felt unable to defend. Hence, the ability to defend against exposure to bullying behaviors does not seem to protect high-exposed targets against symptoms of anxiety. Organization should therefore intervene against bullying in early stages rather than relying on the individual resilience of those exposed.

  9. The Public Defenders of Indians in Tabasco during the Sixteenth Century

    Directory of Open Access Journals (Sweden)

    Caroline Cunill

    2012-10-01

    Full Text Available During the second half of the sixteenth century, the post of public defender of Indians spread throughout Spanish America, and its missions became more precisely defined, contributing to this effect both the way in which these officers executed their tasks and the publication of legal texts on the matter, conceived by local or metropolitan authorities. By 1591, the protector and defender of Indians or naturales became the essential piece of the recently-created Juzgado General de Indios, an authentic Indian institution that would last until the late colonial period. In order to understand the process, this work analyzes the peculiar evolution of the post of public defender in the Alcaldía Mayor de Tabasco, Gobernación de Yucatán, during the second half of the sixteenth century. Besides revealing the public defenders' identities, status, and wages, the author analyzes their dealings with colonial authorities —the governors of Yucatan, the Royal Audiencias, and the Consejo de Indias–, as well as the Tabaso Indians. All this allows us to understand the central importance this post acquired, not only in the colonial judicial system, but also in the Spanish American government.

  10. Terra Defender Cyber-Physical Wargame

    Science.gov (United States)

    2017-04-01

    time. However, the WHITE team did not offer game-dollar rewards for these actions and this probably caused low motivation for note-taking. In general...helped to achieve a better understanding of how Army supervisory control and data acquisition (SCADA) system and device security can be modeled and...managed. Terra game players obtained first-hand experience in attacking and defending a live (“operational”) SCADA system that was located in a testbed

  11. Defending Our Satellites: The Need for Electronic Warfare Education and Training

    Science.gov (United States)

    2015-12-01

    intercept Allied bombers attacking at night.9 As a result of the electronic warfare advantage that systems like Window and Airborne Cigar be- stowed...74 | Air & Space Power Journal Defending Our Satellites The Need for Electronic Warfare Education and Training Lt Col E. Lincoln Bonner, USAF...expanding education and training in the use of electronic warfare to defend US satellites and improve their survivability. The following discussion

  12. The verdict on jury trials for juveniles: the effects of defendant's age on trial outcomes.

    Science.gov (United States)

    Warling, Diane; Peterson-Badali, Michele

    2003-01-01

    With the progression to more adult-like policies and procedures for youth in the justice system, the right to a jury trial has been extended to young offenders. These youth would not be tried by a jury of their peers, however, but by a jury of adults. The concern is that adult jurors may hold negative attitudes about youth that might influence their decision making in a case involving a young defendant. Two studies examined whether and under what conditions defendant's age affects jurors' decisions about the guilt and sentencing of an accused. In study 1, data were gathered from two samples of jury eligible adults: one university sample and one public sample. Mock jurors read written transcripts of a trial involving a defendant who was presented as either 13, 17, or 25 years of age. Results indicated that the defendant's age had no effect on mock jurors' verdict or their ratings of defendant guilt. However, younger defendants were granted shorter sentences than the adult defendants. In study 2, mock jurors read the same trial presented in study 1 but were asked to deliberate about the case and render group verdicts. These group verdicts did not differ significantly by defendant's age. Age-related themes that emerged from group deliberations were identified, and results indicated that age tended to be used as a mitigating factor in favor of youth rather than against them. These findings are discussed in terms of their implications for youth justice policy and practice. Copyright 2003 John Wiley & Sons, Ltd.

  13. The Relation of Empathy and Defending in Bullying: A Meta-Analytic Investigation

    Science.gov (United States)

    Nickerson, Amanda B.; Aloe, Ariel M.; Werth, Jilynn M.

    2015-01-01

    This meta-analysis synthesized results about the association between empathy and defending in bullying. A total of 20 studies were included, with 22 effect sizes from 6 studies that separated findings by the defender's gender, and 31 effect sizes from 18 studies that provided effects for the total sample were included in the analysis. The weighted…

  14. Friendship selection and influence in bullying and defending: effects of moral disengagement.

    Science.gov (United States)

    Sijtsema, Jelle J; Rambaran, J Ashwin; Caravita, Simona C S; Gini, Gianluca

    2014-08-01

    The current study examined the development of bullying and defending over a 1-year period as related to friends' influence and individual and friends' moral disengagement (i.e., self-justification mechanisms that allow one to avoid moral self-censure of transgressive actions) in children and young adolescents. Via longitudinal social network analysis (RSiena), it was tested whether similarity between friends in bullying and defending developed over time due to friends' influence, while controlling for friendship selection processes, and whether there were differences in these processes between children (age 9-10 years; n = 133; 42.9% girls) and young adolescents (age 11-14 years; n = 236; 40.6% girls). Results showed that individuals selected peers as friends who were similar in bullying and became more similar to friends in bullying over time, but only in early adolescence. Moreover, there was marginal support that friends' influence was stronger in young adolescents with higher moral disengagement. In early adolescence, bullying was also indirectly influenced through friends' moral disengagement, with different effects for boys and girls. With regard to defending, young adolescents maintained friendships with peers who were similar in defending, and became more similar to friends in terms of defending over time. These findings suggest important differences between late childhood and early adolescence in socialization processes and indicate that in early adolescence, friends' influence on the development of bullying is partially affected by moral disengagement. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  15. Efficacy of legal judgments for defendants with traumatic brain injury.

    Science.gov (United States)

    St Pierre, Maria E; Parente, Rick

    2016-06-23

    Literature has compared the frequency of aggressive behaviors of the TBI population and the non-TBI population, suggesting that the TBI population is predisposed to aggressive tendencies because the injury enables impulsivity, loss of self-control, and the inability to modify behaviors. These behavior changes have consequently, been found to lead to criminal involvement. In fact, the majority of the prison population has sustained at least one TBI in their lifetime compared to the prevalence of brain injuries in the general population. However, there is little research investigating the perceptions of criminality and guilt of these individuals. Two experiments were conducted that investigated the perceptions of morality, level of guilt, and appropriate sentencing of crimes committed by defendants with different severities of TBI (i.e., mild, severe, and no TBI). Participants were asked to read scenarios about crimes being committed by the defendant. Experiment 1 used a 1-between (crime), 1-within (TBI) mixed design ANOVA testing three dependent variables (morality, guilt, and sentencing). Using a more in vivo jury approach, Experiment 2 used a 3 (TBI)×2 (crime) independent groups factorial design testing the three dependent measures. Overall, defendants with TBI were found less guilty of their crime, perceived as behaving morally to the crime, and receiving a milder punishment relative to the no-TBI defendants. In the courtroom, the defense attorney should educate the judge and/or the jury on the effects brain injuries have on the cognition, behavior, and emotions of an individual. Thus, this education will ensure the best verdict is being reached.

  16. Kultuuritehas esitleb uusi tooteid / Karina Talts

    Index Scriptorium Estoniae

    Talts, Karina

    2004-01-01

    Tallinna endises Polümeeri kummivabrikus ametlikult uksed avanud Kultuuritehasest Polymer. Avamisüritusest Kultuurinädal. Korraldajaks Madis Mikkor. Toimuvad kunstinäitused, õpitoad, kontserdid, teatrietendused, ISEA 2004 multimeediaprojektid

  17. Kultuuritehas vallutab vana katlamaja / Merit Kask

    Index Scriptorium Estoniae

    Kask, Merit

    2005-01-01

    Kultuuritehase projektijuht Madis Mikkor Tallinna Põhja puiesteel asuva vana elektrijaama tööstusmiljööst ja hoonetest, kuhu kolib kultuuritehas Polymer. Katlamaja plaanitakse avada augustis mitmepäevase festivaliga

  18. Interactive Effects of Guilt and Moral Disengagement on Bullying, Defending and Outsider Behavior

    Science.gov (United States)

    Mazzone, Angela; Camodeca, Marina; Salmivalli, Christina

    2016-01-01

    We examined the moderating effect of guilt on the associations between moral disengagement and bullying, defending and outsider behaviors in a sample of 404 students (203 boys; M[subscript age] = 11.09 years; SD = 1.48). Bullying, defending and outsider behavior were assessed through peer nominations, whereas guilt and moral disengagement were…

  19. Criminal defendants' satisfaction with lawyers : Perceptions of procedural fairness and effort of the lawyer

    NARCIS (Netherlands)

    Raaijmakers, E.; de Keijser, J. W.; Nieuwbeerta, P.; Dirkzwager, A. J E

    2014-01-01

    At present, procedural justice theory has predominantly been used to explain defendants' satisfaction with the police, courts and prisons. It is unclear to what extent this theory is also applicable to lawyers. This study investigates to what extent (1) criminal defendants are satisfied with their

  20. Reaksi Pasar atas Pengukuran Kinerja Akuntansi Perusahaan Prospector dan Defender : Analisis Dengan Pendekatan Life Cycle Theory

    Directory of Open Access Journals (Sweden)

    Tri Jatmiko Wahyu P.

    2015-12-01

    Full Text Available The study is an empirical study that intends to examine the difference accounting performance measures between prospector and defender strategies. The study also has objective to examine market reaction for both organizational strategies. Variables that implicated by organizational strategy are income growth, sales growth, dividend pay out, and return on investment. Life cycle theory approach is used to analyze the difference accounting performance measures. Four variables are used to explain strategies between prospector and defender firms are price to book value (PBV ratio, sales to employee ratio, capital expenditure to market equity value ratio, and capital expenditure to total assets ratio. The sample are 30 to prospector firms, and 30 to defender firms derived from 60 manufacturing public firms at Jakarta Stock Exchange, tested by Principal Component Analysis. The result show that income and sales growth of prospector firms are greater than defender firms (significant at 0,01 level. Dividend pay out and return on investment of prospector firms are smaller than defender firms (significant at 0,01 level. While, the market reaction of prospector firms are greater than defender firms, the difference significantly at 0,01 level. Multivariate analysis is used to determine the difference level between prospector and defender firms and it relationship with stock price. The result show that there are significantly difference between income growth, sales growth, dividend pay out, and return on investment to abnormal return.

  1. Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study.

    Science.gov (United States)

    Wu, Wen-Chi; Luu, Shyuemeng; Luh, Dih-Ling

    2016-10-10

    Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not involved in bullying and have ignored the other players. The aim of this study is to investigate the associations between defending behaviors and mental health among bullies, victims, bully-victims and bystanders. Associations among defending behaviors, mental health (including depressive symptoms and social anxiety), and bullying experiences were cross-sectionally examined in 3441 students (13-15 years old.) from 20 randomly selected junior high schools in Taiwan using a self-report questionnaire. SAS 9.3 Survey Analysis procedures were used to conduct descriptive analysis and multiple regression models. Defending behaviors were associated with bullying roles and were higher in victims than in bullies or bystanders. Defending behaviors were positively associated with social anxiety and depressive symptoms. After stratifying by bullying roles, defending behaviors were positively associated with social anxiety in bystanders, and were positively associated with depressive symptoms in victims and bystanders. However, defending behaviors were not significantly associated with mental health indicators in bullies. The associations between defending behaviors and mental health varied according to bullying roles. The results suggest that bystanders and victims experience more mental health effects than bullies. Intervention programs aimed at preventing bullying should focus on strategies that minimize social anxiety and depression in victims and bystanders, and urge students to help vulnerable peers during bullying events.

  2. Peace with Guarantees of Life and Territory for Colombian Peasants: A Fight That Doesn't Cost Us Our Lives. "Let Us Defend Our Defenders"

    Directory of Open Access Journals (Sweden)

    Julia Lledín Vitos

    2017-09-01

    Full Text Available This article gathers the main findings of a research project the authors conducted as part of the Permanent Committee for the Defense of Human Rights on the situation of human rights defenders (HRDs in Colombia's rural contexts. The research included the following components: interviews with organizations and institutions working on the issue of protection; the implementation of a survey of 174 HRDs from twelve departments of the country; and the implementation of seven regional workshops, with the participation of 150 defenders, where participatory methodologies for risk analysis and research were used. From the analysis of the information, it was concluded that the majority had been victims of some type of aggression by reason of their work. The risks human rights defenders face in Colombia are related with the armed conflict, but also with the struggles for land and territory. The bodies responsible for the assaults were, fundamentally, the paramilitary successors and agents of the State, especially the Army. As a result of the research, it was established that the protection in the rural contexts requires differential responses by the State; these should respond to a combination of individual and collective measures of prevention, protection, and self-protection, which have turned out to be effective from the experience of the people.

  3. Bystander Behavior in Bullying Situations: Basic Moral Sensitivity, Moral Disengagement and Defender Self-Efficacy

    Science.gov (United States)

    Thornberg, Robert; Jungert, Tomas

    2013-01-01

    The aim of the present study was to investigate how basic moral sensitivity in bullying, moral disengagement in bullying and defender self-efficacy were related to different bystander behaviors in bullying. Therefore, we examined pathways that linked students' basic moral sensitivity, moral disengagement, and defender self-efficacy to different…

  4. Predicting delay in residents' decisions on defending v. evacuating through antecedents of decision avoidance

    DEFF Research Database (Denmark)

    McNeill, Ilona M.; Dunlop, Patrick D.; Skinner, Timothy C.

    2015-01-01

    Journal compilation © IAWF 2015. In the event of a wildfire, Australian residents of wildfire-prone areas have a choice to defend their home or evacuate early. However, rather than deciding on and preparing for one of these fire-responses ahead of time, most residents delay deciding on defending ...

  5. Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study

    Directory of Open Access Journals (Sweden)

    Wen-Chi Wu

    2016-10-01

    Full Text Available Abstract Background Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not involved in bullying and have ignored the other players. The aim of this study is to investigate the associations between defending behaviors and mental health among bullies, victims, bully-victims and bystanders. Methods Associations among defending behaviors, mental health (including depressive symptoms and social anxiety, and bullying experiences were cross-sectionally examined in 3441 students (13–15 years old. from 20 randomly selected junior high schools in Taiwan using a self-report questionnaire. SAS 9.3 Survey Analysis procedures were used to conduct descriptive analysis and multiple regression models. Results Defending behaviors were associated with bullying roles and were higher in victims than in bullies or bystanders. Defending behaviors were positively associated with social anxiety and depressive symptoms. After stratifying by bullying roles, defending behaviors were positively associated with social anxiety in bystanders, and were positively associated with depressive symptoms in victims and bystanders. However, defending behaviors were not significantly associated with mental health indicators in bullies. Conclusions The associations between defending behaviors and mental health varied according to bullying roles. The results suggest that bystanders and victims experience more mental health effects than bullies. Intervention programs aimed at preventing bullying should focus on strategies that minimize social anxiety and depression in victims and bystanders, and urge students to help vulnerable peers during bullying events.

  6. Moral motivation in defending classmates victimized by bullying

    Czech Academy of Sciences Publication Activity Database

    Kollerová, Lenka; Janošová, Pavlína; Říčan, Pavel

    2015-01-01

    Roč. 12, č. 3 (2015), s. 297-309 ISSN 1740-5629 R&D Projects: GA ČR(CZ) GAP407/12/2325 Institutional support: RVO:68081740 Keywords : Adolescence * Defending * Moral motivation * Peer relations * Prosocial behaviour Subject RIV: AN - Psychology Impact factor: 0.792, year: 2015

  7. Ot porolona k iskusstvu / Kristiina Verbitskaja

    Index Scriptorium Estoniae

    Verbitskaja, Kristiina

    2004-01-01

    Tallinna endise tehase "Polümeer" ruumides tegutsevad juba kaks aastat muusikud, kunstnikud ja teised kultuuriinimesed. 10. -20. augustini toimuvad kultuuritehase Polymer avamisüritused: teatrietendused, kunstinäitused, kontserdid, filmiseansid. Korraldab Madis Mikkor

  8. Bullying and defending behavior: The role of explicit and implicit moral cognition.

    Science.gov (United States)

    Pozzoli, Tiziana; Gini, Gianluca; Thornberg, Robert

    2016-12-01

    Research on bullying has highlighted the role of morality in explaining the different behavior of students during bullying episodes. However, the research has been limited to the analysis of explicit measures of moral characteristics and moral reasoning, whereas implicit measures have yet to be fully considered. To overcome this limitation, this study investigated the association between bullying and defending, on one hand, and both explicit (moral disengagement, self-importance of moral values) and implicit (immediate affect toward moral stimuli [IAMS]) moral components, on the other hand. Young adolescents (N=279, mean age=11years, 9months, 44.4% girls) completed a series of self-report scales and individually performed a computer task investigating the IAMS. Two hierarchical regressions (bootstrapping method) were performed. Results showed that moral disengagement was associated with bullying and defending behavior at high levels of IAMS, however not when IAMS was low. In contrast, self-importance of moral values was not significantly associated to the two behaviors when IAMS was high whereas both associations were significant at low levels of IAMS. These results significantly expand previous knowledge about the role of morality in bullying and defending behavior. In particular, they highlight the role of the interaction between explicit and implicit moral dimensions in predicting bullying and defending behaviors. Copyright © 2016 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  9. 40 CFR 312.28 - Specialized knowledge or experience on the part of the defendant.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Specialized knowledge or experience on the part of the defendant. 312.28 Section 312.28 Protection of Environment ENVIRONMENTAL PROTECTION... knowledge or experience on the part of the defendant. (a) Persons to whom this part is applicable per § 312...

  10. Effect of criminal defendant's history of childhood sexual abuse and personality disorder diagnosis on juror decision making.

    Science.gov (United States)

    Butler, Ebony; Jacquin, Kristine

    2014-08-01

    This study investigated whether a defendant's history of childhood sexual abuse (CSA) and/or personality disorder (PD) diagnosis affected juror decision making in a child sexual abuse trial. The PDs in the study were borderline PD and antisocial PD. Participants were 385 college students, 121 men and 264 women, who read a summary of a mock criminal trial and then made various juror decisions. Trial summaries were prepared by the principal investigator and were all uniform in content, length and detail. For the trial, both the defendant's gender and victim's gender were specified. The defendant was male, and the alleged victim was female. When the verdict was assessed, the results yielded that when the defendant's CSA history was presented, juror guilt ratings were higher than when there was no history of CSA. Similarly, when the defendant had a PD diagnosis, there were higher guilt ratings than when there was no PD diagnosis. CSA history and PD diagnosis were significant predictors of guilt ratings, suggesting that jurors perceive defendants more negatively if they have either been sexually abused as a child or have borderline or antisocial PD. Copyright © 2014 John Wiley & Sons, Ltd.

  11. Juror Decision-making in Death Penalty Sentencing when Presented with Defendant's History of Child Abuse or Neglect.

    Science.gov (United States)

    Bell Holleran, Lisa L; Vaughan, Tyler J; Vandiver, Donna M

    2016-11-01

    Previous studies have found aggravating, mitigating, and null effects of defendant histories of abuse and neglect on punishment preferences in capital sentencing. Perceiving these defendants as more dangerous, jurors may be more likely to favor the death penalty when such evidence is presented. This is counter to the intuition that abuse or neglect reduces culpability, and therefore mitigates the severity of punishment. We investigated the effect of defendant childhood physical abuse, sexual abuse, or neglect on the probability of a prospective juror preferring the death penalty in an between-subject experimental design. Using vignettes and two large samples (students and jurors), defendant histories were found to mitigate the probability that the hypothetical defendant received the death penalty, with sexual abuse having the most salient effect. Further, the effects were conditioned by preference for the death penalty - larger mitigating effects were observed among individuals who favor the death penalty. These findings suggest that initial judgments of abuse and neglect are related to juror leniency, and further research on the interaction of jury instructions and defendant histories is needed. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  12. A Defender-Attacker Optimization of Port Radar Surveillance

    Science.gov (United States)

    2011-01-01

    security; optimization; attacker-defender “And thence discover how with most advantage They may vex us with shot, or with assault.” Shakespeare , KingHenryVI...1. INTRODUCTION We introduce a new planning tool for locating shore radars and mobile picket boats with radar to maximize the probabil- ity that one

  13. Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study

    OpenAIRE

    Wu, Wen-Chi; Luu, Shyuemeng; Luh, Dih-Ling

    2016-01-01

    Abstract Background Students should be encouraged to help prevent or stop bullying. However, defending victims of bullying can impact on mental health. It is not only bystanders who may defend victims, but bullies, victims and bully-victims can also have defending behaviors. Nevertheless, most studies of defending behaviors have been limited to an examination of the reactions of bystanders or those not involved in bullying and have ignored the other players. The aim of this study is to invest...

  14. Charitable collaborations in Bronzeville, 1928-1944: the "Chicago Defender" and the Regal Theater.

    Science.gov (United States)

    Semmes, Clovis E

    2011-01-01

    In the twentieth century, race-based residential and commercial segregation that supported racial oppression and inequality became an elemental characteristic of urban black communities. Conflict-ridden, black-white relationships were common. However, the Chicago Defender Charities, Inc., the entity that sponsors the largest African American parade in the country and that emerged in 1947, embodied a tradition of charitable giving, self-help, and community service initiated in 1921 by Chicago Defender newspaper founder and editor, Robert S. Abbott. The foundation of this charitable tradition matured as a result of an early and sustained collaboration between Chicago’s white-owned Regal Theater and the black-owned Chicago Defender newspaper. Thus, in segregated African American communities, black and white commercial institutions, under certain conditions, were able to find important points of collaboration to uplift the African American communities of which they were a part.

  15. LOWER NORTH BATTERY - DEFENDED PORT OF SIMON'S TOWN

    African Journals Online (AJOL)

    LOWER NORTH BATTERY - DEFENDED. PORT OF SIMON'S TOWN. Lt-Cdr W. M. Bisset*. In 1975 Mr H. C. Willis suggested to the present writer that the SA Navy should mount a bronze plaque similar to those commissioned by the. Simon's Town Historical Society and displayed on certain historical buildings in the town at ...

  16. Classroom relationship qualities and social-cognitive correlates of defending and passive bystanding in school bullying in Sweden: A multilevel analysis.

    Science.gov (United States)

    Thornberg, Robert; Wänström, Linda; Hong, Jun Sung; Espelage, Dorothy L

    2017-08-01

    Using the social-ecological and social cognitive theories as integrated guiding frameworks, the present study examined whether moral disengagement and defender self-efficacy at the individual level, and moral disengagement, quality of teacher-student relationships and quality of student-student relationships at the classroom level were associated with passive bystanding and defending in bullying situations. Participants were 900 Swedish students from 43 classrooms, ranging in age from 9 to 13years. Multilevel regression analyses revealed that passive reactions by bystanders were associated with greater moral disengagement and less defender self-efficacy. Defending, in turn, was associated with less moral disengagement and greater defender self-efficacy and classroom student-student relationship quality. Furthermore, students who scored high in moral disengagement were even less prone to defend victims when the classroom student-student relationship quality was low, but more prone to act as defenders when the classroom student-student relationship quality was high. In addition, the negative association between defender self-efficacy and passive bystanding was stronger both in classrooms with higher student-student relationship quality and in those with lower class moral disengagement. Implications for prevention are discussed. Copyright © 2017 Society for the Study of School Psychology. All rights reserved.

  17. IS MISS SYMPATHY A CREDIBLE DEFENDANT ALLEGING INTIMATE PARTNER VIOLENCE IN A TRIAL FOR MURDER?

    Directory of Open Access Journals (Sweden)

    Francisca Expósito

    2012-07-01

    Full Text Available Current research has postulated that judicial inferencing and judgement-making are subject to biased appraisals. This study assessed the factors reported in the literature associated to the appraisal of criminality in a mock case of a battered woman standing trial for murdering her husband, and who pleaded legitimate self-defence in response to an instance of intimate partner violence. A nationwide sample of 169 police officers from different cities in Spain freely volunteered to participate in the study. Using a mock trial design, the defendant´s prototypicality (prototypical vs. non-prototypical, and physical attractiveness (attractive vs. unattractive were manipulated. Participants were required to assess the criminality (credibility, responsibility, and controllability of a battered woman accused of murdering her husband, and who alleged legitimate self-defence in response to an incident of intimate partner violence. The results showed that a defendant perceived as the prototype of a battered woman was judged as having less or no control of the situation; physical attractiveness increased the perception of the defendant´s responsibility in committing the crime; and an interaction between prototypicality and attractiveness in assigning credibility to the defendant´s testimony. Moreover, hostile sexism mediated the relationship between the defendant´s prototypicality and controllability. The results are discussed in terms of their implications for judicial judgement making in cases of battered women who kill their aggressors.

  18. Abuse Is Abuse: The Influence of Type of Abuse, Victim Age, and Defendant Age on Juror Decision Making.

    Science.gov (United States)

    Sheahan, Chelsea L; Pica, Emily; Pozzulo, Joanna D

    2017-09-01

    The purpose of the current study was to examine the role of victim age, defendant age, and type of abuse on mock juror decision making. Mock jurors ( N = 556) read a trial transcript in which a soccer coach was accused of sexual abuse or physical abuse against a player. The victim's age (child, adolescent, or young adult), the defendant's age (young, middle age, or older adult), and the type of abuse (sexual or physical) were varied. Mock jurors provided a dichotomous and continuous verdict and rated their perceptions of the victim and the defendant. Although no differences on mock jurors' dichotomous verdict were found due to victim age, defendant age, or type of abuse, mock jurors provided higher guilt ratings when the abuse was sexual and both the victim and defendant were described as young adults. Similarly, mock jurors rated the victim more positively when the victim was described as a young adult (vs. child) for both sexual and physical abuse cases, and rated the defendant more positively when the victim was described as a child compared with young adult in sexual abuse cases. These findings suggest that mock jurors were largely influenced by victim age, particularly when the victim was described as an adult compared with a child.

  19. Early adolescents' motivations to defend victims in school bullying and their perceptions of student-teacher relationships: A self-determination theory approach.

    Science.gov (United States)

    Jungert, Tomas; Piroddi, Barbara; Thornberg, Robert

    2016-12-01

    The aim of this study was to investigate whether various dimensions of student-teacher relationships were associated with different types of motivation to defend victims in bullying and to determine the association between these types of motivations and various bystander behaviors in bullying situations among early adolescents in Italy. Data were collected from 405 Italian adolescents who completed a survey in their classroom. Results showed that warm student-teacher relationships were positively associated with defending victims and with autonomous motivation to defend victims. In contrast, conflictual student-teacher relationships were positively associated with passive bystanding and with extrinsic motivation to defend victims. Different forms of motivation to defend were found to be mediators between student-teacher relationship qualities and bystander behaviors in school bullying. Our findings suggest that teachers should build warm and caring student-teacher relationships to enhance students' autonomous motivation to defend victims of bullying as well as their inclination to defend the victims in practice. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  20. Defending or Challenging the Status Quo: Position Effects on Biased Intergroup Perceptions

    Directory of Open Access Journals (Sweden)

    Emma A. Bäck

    2014-05-01

    Full Text Available The default ideological position is status quo maintaining, and challenging the status quo is associated with increased efforts and risks. Nonetheless, some people choose to challenge the status quo. Therefore, to challenge the status quo should imply a strong belief in one’s position as the correct one, and thus efforts may be undertaken to undermine the position of others. Study 1 (N = 311 showed that challengers undermined, by ascribing more externality and less rationality, the position of defenders to a larger extent than defenders did of challengers’ position. Studies 2 (N = 135 and 3 (N = 109 tested if these effects were driven by the implied minority status of the challenging position. Results revealed no effects of experimentally manipulated numerical status, but challengers were again more biased than defenders. Study 3 also revealed that challengers felt more negatively toward their opponents (possibly due to greater social identification with like-minded others, and these negative emotions in turn predicted biased attributions. Results are important as they add to the understanding of how intergroup conflict may arise, providing explanations for why challengers are less tolerant of others’ point of view.

  1. Defending against the Advanced Persistent Threat: An Optimal Control Approach

    Directory of Open Access Journals (Sweden)

    Pengdeng Li

    2018-01-01

    Full Text Available The new cyberattack pattern of advanced persistent threat (APT has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs.

  2. Arbitrariness and the death penalty: how the defendant's appearance during trial influences capital jurors' punishment decision.

    Science.gov (United States)

    Antonio, Michael E

    2006-01-01

    This paper examines the impact of the defendant's appearance during the trial on capital jurors' punishment decision. The data used in this analysis were gathered by the Capital Jury Project (CJP), a national program of research on the decision-making of capital jurors. A series of multivariate logistic regression analyses were conducted using four aggravating circumstances related to the killing and eight defendant appearance variables as predictors of jurors' punishment decision at three points during the capital trial: (1) after the punishment phase ended, but before formal deliberation began; (2) when the first vote was taken on punishment at jury deliberations; and (3) at the final vote on punishment. Results indicated that when the defendant appeared emotionally involved during the trial (i.e. sorry and sincere) jurors either favored a life sentence or were undecided about punishment; however, when the defendant appeared emotionally uninvolved during the trial (i.e. bored) jurors either sought a death sentence or remained undecided. Policy implications will be discussed. Copyright (c) 2006 John Wiley & Sons, Ltd.

  3. A Functional Approach to Televised Political Spots: Acclaiming, Attacking, Defending.

    Science.gov (United States)

    Benoit, William L.; Pier, P. M.; Blaney, Joseph R.

    1997-01-01

    Articulates a theoretical framework for understanding the fundamental functions of political advertising (acclaiming, attacking, defending) which occur on the twin grounds of policy considerations and character. Applies this theory of political discourse to presidential general election television spots from 1980-1996, finding that Democrats and…

  4. Templeton Prize winner defends Christianity's credibility in a scientific age

    CERN Multimedia

    Heffern, Rich

    2002-01-01

    The 2002 Templeton Prize has gone to the Rev. John C. Polkinghome, a British mathematical physicist and Anglican priest, and a key spokesperson for belief in God in an age of science, defending the ideal that faith is not against science but inconcert with it

  5. Kulturu delajut na zavodah / Alina Zelimhanova

    Index Scriptorium Estoniae

    Zelimhanova, Alina

    2005-01-01

    Kultuuritehase projektijuht Madis Mikkor Tallinnas Põhja puiesteel asuvast muinsuskaitse all olevast elektrijaama katlamajast, kuhu peatselt kolib kultuuritehas Polymer. Katlamaja plaanitakse avada augustis. Selleks ajaks seatakse sisse valgustus. Hoonete põhjalikum renoveerimine algab 2007. a., kusjuures säilitatakse vana tööstusmiljöö

  6. Action Foundations! a Comic (Book) Tale of Defending Educational Studies

    Science.gov (United States)

    Nuñez, Isabel; Konkol, Pamela J.

    2013-01-01

    When defending educational foundations, Isabel Nunez and Pamela Konkol sometimes find themselves responding to the question of "why?"-often phrased, "But WHYYYYY do we have to take a class on this stuff??? (We want to take more methods!)." As distressing as this can be for teacher educators whose own work reveals rather a…

  7. Defending the Military Food Supply Acquisition, Preparation, and Protection of Food at U.S. Military Installations

    Science.gov (United States)

    2009-09-01

    former KGB official, with polonium - 210 in 2006.25 However, a number of factors make radiological contamination of food unlikely. First, it is...Defense University September 2009 Defending the Military Food Supply Acquisition, Preparation, and Protection of Food at U.S. Military...DATE SEP 2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defending the Military Food Supply Acquisition

  8. The participation of juvenile defendants in the youth court. A comparative study of juvenile justice procedures in Europe

    NARCIS (Netherlands)

    Rap, S.E.

    2013-01-01

    This study revolves around the issue of the participation of juvenile defendants in the youth court. The European Court of Human Rights has put forward the notion that defendants should be able to participate effectively in a court hearing. Moreover, in international children’s rights law it is

  9. [Publications of medical thesis defended in Lille school of medicine].

    Science.gov (United States)

    Benotmane, Ilies; Glatz, Nicolas; Bihan, Solenn; Legrand, Fanny; Gosset, Didier; Boulanger, Eric

    2012-07-01

    The purpose of this study was to determine the future, in terms of scientific publication, of medical thesis (MT) defended in the Medical School of Lille 2 University (MSL2U) between January 1st, 2001 and December 31st, 2007. The collection of MT published as a corresponding scientific article was realized from PubMed(®). For every corresponding article, we determined the journal Impact Factor (IF), the language of publication and the rank of the student and his MT director in the author list. Analyses were also realized according to the group of speciality of the TM. In all, 11.3% of the 2150 MT defended in the MSL2U were followed up by a scientific publication. The average IF was 2.32 with a median at 1.75 and extreme values from 0 to 14.78. Seventy percent of the articles were published in English. The rank of the student was placed before his MT director (2.06 vs. 3.15). The MT defended by students in the field of medical specialities presented the highest rate of publication (25.1%). The general medicine was the second speciality the most productive in term of number of published articles (n=49) after medical specialities (n=103). The MT director and the PhD students must be more motivated to publish their results. The value of 11.3% could be considered as weak but, because of a huge lack of references, it is impossible to compare our results to those of other French medical schools. It remains important to reform the objectives and the modalities of the writing of a MT: should we not have to turn to thesis called "on article"? Copyright © 2012. Published by Elsevier Masson SAS.

  10. Uusi võimalusi pakkuv kasulik bakter / Villu Päärt, Siim Sepp

    Index Scriptorium Estoniae

    Päärt, Villu, 1972-

    2008-01-01

    Äsja võitis Lactobacillus fermentum ME-3 avastaja Tartu Ülikooli professor Marika Mikelsaar koos kolleegidega Soulis ülemaailmsel naisleiutajate konkursil kuldmedali. Bakterite omaduste uurimine jätkub. Marika Mikelsaare juhtimisel katsetati kõhutüüfusesse nakatatud hiirte peal, millist mõju avaldab see, kui antibiootikumi ravi ajal anda hiirtele ka ME-3 sisaldavat probiootikumi

  11. 47 CFR 1.735 - Copies; service; separate filings against multiple defendants.

    Science.gov (United States)

    2010-10-01

    ... overnight delivery service such as, or comparable to, the US Postal Service Express Mail, United Parcel... 47 Telecommunication 1 2010-10-01 2010-10-01 false Copies; service; separate filings against... Complaints § 1.735 Copies; service; separate filings against multiple defendants. (a) Complaints may...

  12. Defending spaceflight: The echoes of Apollo

    Science.gov (United States)

    Rovetto, R. J.

    2016-12-01

    This paper defends, and emphasizes the importance of, spaceflight, broadly construed to include human and unmanned spaceflight, space science, exploration and development. Within this discourse, I provide counter-replies to remarks by physicist Dr. Steven Weinberg against my previous support of human spaceflight. In this defense of peaceful spaceflight I draw upon a variety of sources. Although a focus is human spaceflight, human and unmanned modes must not be treated as an either-or opposition. Rather, each has a critical role to play in moving humanity forward as a spacefaring species. In the course of this communication, I also stress the perennial role of space agencies as science and technology-drivers, and their function to provide a stable and unified platform for space programs.

  13. Helman defends decision to pull VA sponsorship of Veterans day parade

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2013-04-01

    Full Text Available No abstract available. Article truncated after 150 words. Sharon Helman, Phoenix VA Director, defended her decision to cancel VA sponsorship of the annual Phoenix Veterans Day Parade in a 4/10/13 email to VA employees. Helman said that VA sponsorship was cancelled because of “…priorities in the organization (specifically access, and heightened awareness over liability concerns which VA Legal Counsel brought forward”. She concluded her letter by warning “… that all media inquiries should be forwarded to Paul Coupaud, Acting Public Affairs Officer”. VA officials initially said fear of litigation prompted the review of VA support. Last year, a float carrying wounded Veterans in a Midland, Texas, parade collided with a freight train, killing four and injuring 17. Crash victims and their families filed lawsuits in Texas against Union Pacific Railroad and the float owner. The VA was not a defendant, and the VA has not issued any national directives on liability as a result of the tragedy.In…

  14. Effects of Mental Health and Neuroscience Evidence on Juror Perceptions of a Criminal Defendant: the Moderating Role of Political Orientation.

    Science.gov (United States)

    Mowle, Elyse N; Edens, John F; Clark, John W; Sörman, Karolina

    2016-11-01

    Several recent studies have examined the effects of mental health and neuroscientific evidence on attitudes toward criminal defendants, suggesting that these factors may influence juror decision-making in meaningful ways. Few studies to date have manipulated both of these variables while also considering theoretically important individual difference variables (e.g., political orientation). Using a criminal case simulation, this study manipulated the presence of evidence concerning mental disorders (psychopathy and schizophrenia) and increasing levels of neuroscientific detail regarding a defendant's brain injury, and examined verdicts and sentencing recommendations in over 400 persons attending jury duty. Main effects were detected for mental health testimony and political orientation, although interactions were noted as well. More negative reactions to defendants labeled as psychopaths were relatively consistent, whereas participants who identified as liberal generally were less punitive towards a defendant identified as schizophrenic than were more conservative jurors. Consistent with other recent research, juror perceptions of the defendant's level of psychopathic traits (independent of the effects of the experimental manipulations) predicted guilty verdicts and longer sentencing recommendations. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  15. Abortion, metaphysics and morality: a review of Francis Beckwith's defending life: a moral and legal case against abortion choice.

    Science.gov (United States)

    Nobis, Nathan

    2011-06-01

    In Defending Life: A Moral and Legal Case Against Abortion Choice (2007) and an earlier article in this journal, "Defending Abortion Philosophically"(2006), Francis Beckwith argues that fetuses are, from conception, prima facie wrong to kill. His arguments are based on what he calls a "metaphysics of the human person" known as "The Substance View." I argue that Beckwith's metaphysics does not support his abortion ethic: Moral, not metaphysical, claims that are part of this Substance View are the foundation of the argument, and Beckwith inadequately defends these moral claims. Thus, Beckwith's arguments do not provide strong support for what he calls the "pro-life" view of abortion.

  16. Defending to the Four Directions Evolving Uechi-ryu’s Hojoundo Exercises for Advanced Students

    Directory of Open Access Journals (Sweden)

    Ihor Rymaruk

    2012-07-01

    Full Text Available This article introduces “Defending to the Four Directions,” techniques that add challenge to Uechi-ryu while incorporating and building upon the traditional katas which have formed the basis of the style. Making changes within a style’s training methods just to be different without any other purpose is of little value and actually destructive to the system. This article describes a meaningful and realistic addition to the practice of hojoundo, the formal exercises incorporating basic movements. “Defending to the Four Directions” is intended for advanced students who have mastered Uechi-ryu’s foundamentals. In addition, the practice is well-suited for adaptation and adoption into other martial art styles.

  17. Omamoodi ime - ilmunud on eesti-läti sõnaraamat / Lembit Vaba

    Index Scriptorium Estoniae

    Vaba, Lembit 1945-

    2015-01-01

    Arvustus: Igauņu-latviešu vārdnīca / Latviešu valodas aģentūra ; sastādītāji: Valts Ernštreits, Marika Muzikante, Maima Grīnberga = Eesti-läti sõnaraamat / Läti keele agentuur ; koostajad: Valts Ernštreits, Marika Muzikante, Maima Grīnberga. Rīga ; Tallinn : Eesti Keele Sihtasutus, 2015

  18. Ants defend aphids against lethal disease

    Science.gov (United States)

    Nielsen, Charlotte; Agrawal, Anurag A.; Hajek, Ann E.

    2010-01-01

    Social insects defend their own colonies and some species also protect their mutualist partners. In mutualisms with aphids, ants typically feed on honeydew produced by aphids and, in turn guard and shelter aphid colonies from insect natural enemies. Here we report that Formica podzolica ants tending milkweed aphids, Aphis asclepiadis, protect aphid colonies from lethal fungal infections caused by an obligate aphid pathogen, Pandora neoaphidis. In field experiments, bodies of fungal-killed aphids were quickly removed from ant-tended aphid colonies. Ant workers were also able to detect infective conidia on the cuticle of living aphids and responded by either removing or grooming these aphids. Our results extend the long-standing view of ants as mutualists and protectors of aphids by demonstrating focused sanitizing and quarantining behaviour that may lead to reduced disease transmission in aphid colonies. PMID:19923138

  19. Understanding Cybercrime from Its Stakeholders’ Perspectives: Part 2 - Defenders and Victims

    OpenAIRE

    Arief, Budi; Bin Adzmi, Mohd Azeem

    2015-01-01

    A comprehensive model and taxonomy of cybercrime, including all of its stakeholders, would contribute to better cybersecurity. Part 1 of this two-part series, which appeared in the January/February 2015 issue of IEEE Security & Privacy, explored cyberattackers and their motives in detail. Part 2 focuses on the other key stakeholders: defenders and victims of cybercrime.

  20. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    Science.gov (United States)

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  1. Defending basic research in Europe

    CERN Multimedia

    Staff Association

    2010-01-01

    « Research without a budget means a Europe without a future » On Wednesday 25th August 2010, 871 of you signed the Staff Council petition which carried this message. This is a resounding success for a month of August. Staff members and pensioners, you showed by your presence your mass support for our appeal to defend research budgets in Europe. The participation and messages of support from our colleagues in other European scientific organizations is confirmation that budget cuts in research are common practice far beyond the confines of CERN. If research had benefited from the promises made by the European Union in 2000 to increase investment in research and development (R&D) from 1.8% to 3% of GDP by 2010, the scientific community would more readily accept the current cuts. However, we are now in 2010 and the rate of 1.8% has remained the same. So, we have been hit twice: not only have we not had the good weather we were promised, we now find ourselves in the middl...

  2. 13 CFR 142.41 - How does SBA protect the rights of defendants?

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false How does SBA protect the rights of... CIVIL REMEDIES ACT REGULATIONS Decisions and Appeals § 142.41 How does SBA protect the rights of defendants? These procedures separate the functions of the investigating official, reviewing official, and...

  3. MMPI Profiles and Code Types of Responsible and Non-Responsible Criminal Defendants.

    Science.gov (United States)

    Kurlychek, Robert T.; Jordan, L.

    1980-01-01

    Compared MMPI profiles and two-point code types of criminal defendants (N=50) pleading a defense of "not responsible due to mental disease or defect." A sign test was computed, treating the clinical scales as matched pairs, and a significant difference was found; the nonresponsible group profile was more elevated. (Author)

  4. Protecting the fair trial rights of mentally disordered defendants in criminal proceedings: Exploring the need for further EU action.

    Science.gov (United States)

    Verbeke, Peter; Vermeulen, Gert; Meysman, Michaël; Vander Beken, Tom

    2015-01-01

    Using the new legal basis provided by the Lisbon Treaty, the Council of the European Union has endorsed the 2009 Procedural Roadmap for strengthening the procedural rights of suspected or accused persons in criminal proceedings. This Roadmap has so far resulted in six measures from which specific procedural minimum standards have been and will be adopted or negotiated. So far, only Measure E directly touches on the specific issue of vulnerable persons. This Measure has recently produced a tentative result through a Commission Recommendation on procedural safeguards for vulnerable persons in criminal proceedings. This contribution aims to discuss the need for the introduction of binding minimum standards throughout Europe to provide additional protection for mentally disordered defendants. The paper will examine whether or not the member states adhere to existing fundamental norms and standards in this context, and whether the application of these norms and standards should be made more uniform. For this purpose, the procedural situation of mentally disordered defendants in Belgium and England and Wales will be thoroughly explored. The research establishes that Belgian law is unsatisfactory in the light of the Strasbourg case law, and that the situation in practice in England and Wales indicates not only that there is justifiable doubt about whether fundamental principles are always adhered to, but also that these principles should become more anchored in everyday practice. It will therefore be argued that there is a need for putting Measure E into practice. The Commission Recommendation, though only suggestive, may serve as a necessary and inspirational vehicle to improve the procedural rights of mentally disordered defendants and to ensure that member states are able to cooperate within the mutual recognition framework without being challenged on the grounds that they are collaborating with peers who do not respect defendants' fundamental fair trial rights

  5. Race, law, and health: Examination of 'Stand Your Ground' and defendant convictions in Florida.

    Science.gov (United States)

    Ackermann, Nicole; Goodman, Melody S; Gilbert, Keon; Arroyo-Johnson, Cassandra; Pagano, Marcello

    2015-10-01

    Previous analyses of Stand Your Ground (SYG) cases have been primarily descriptive. We examine the relationship between race of the victim and conviction of the defendant in SYG cases in Florida from 2005 to 2013. Using a regression analytic approach, we allow for simultaneous examination of multiple factors to better understand existing interrelationships. Data was obtained from the Tampa Bay Times SYG database (237 cases) which was supplemented with available online court documents and/or news reports. After excluding cases which were, still pending as of January 2015; had multiple outcomes (because of multiple suspects); and missing information on race of victim and weapon of victim, our final analytic sample has 204 cases. We chose whether the case resulted in a conviction as the outcome. We develop logistic regression models using significant bivariate predictors as candidates. These include race of the victim (White, non-White), whether the defendant could have retreated from the situation, whether the defendant pursued the victim, if the victim was unarmed, and who was the initiator of the confrontation. We find race of the victim to be a significant predictor of case outcome in this data set. After controlling for other variables, the defendant is two times (OR = 2.1, 95% CI [1.07, 4.10]) more likely to be convicted in a case that involves White victims compared to those involving non-White victims. Our results depict a disturbing message: SYG legislation in Florida has a quantifiable racial bias that reveals a leniency in convictions if the victim is non-White, which provides evidence towards unequal treatment under the law. Rather than attempting to hide the outcomes of these laws, as was done in Florida, other states with SYG laws should carry out similar analyses to see if their manifestations are the same as those in Florida, and all should remediate any injustices found. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. ¿POR QUÉ DEFENDER LA CIENCIA EN COLOMBIA?

    OpenAIRE

    Enrique Forero González

    2016-01-01

    Un grupo de nuestros más destacados científicos le cuenta a la sociedad colombiana por qué es necesario defender la ciencia en el país, demuestra con lujo de detalles porqué este tema se considera importante y se refiere a la forma como los países más avanzados del mundo han alcanzado esos niveles de desarrollo gracias a sus inversiones en educación, ciencia y tecnología. También, llama la atención sobre el hecho que la clase política tiene el deber ético de hacer políticas sobre cie...

  7. The relationship between sympatric defended species depends upon predators' discriminatory behaviour.

    Directory of Open Access Journals (Sweden)

    Christina G Halpin

    Full Text Available Toxic prey species living in the same environment have long been thought to mutually benefit from having the same warning signal by sharing the education of naïve predators. In contrast, 'saturation theory' predicts that predators are physiologically limited by the amount of toxin that they can eat in a given time period. Therefore, sympatric species that contain the same toxin should mutually benefit from reduced predation even when they are visually distinct, reducing the benefits to visual mimicry. For the first time, we found that mutualism can occur between unequally defended prey that are visually distinct, although the benefits to each prey type depends on the predators' abilities and/or motivation to visually discriminate between them. Furthermore, we found that this variability in predatory behaviour had a significant impact on the benefits of mimicry for unequally defended prey. Our results demonstrate that variability in the foraging decisions of predators can have a significant effect on the benefits of shared toxicity and visual mimicry between sympatric species, and highlights the need to consider how predators exert selection pressures on models and mimics over their entire lifetimes.

  8. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Directory of Open Access Journals (Sweden)

    Vladislav D. Veksler

    2018-05-01

    Full Text Available Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior via techniques such as model tracing and dynamic parameter fitting.

  9. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    Science.gov (United States)

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  10. Expression of defender against apoptotic death (DAD-1) in iris and dianthus petals

    NARCIS (Netherlands)

    Kop, van der D.A.M.; Ruys, G.; Dees, D.; Schoot, van der C.; Boer, de A.D.; Doorn, van W.G.

    2003-01-01

    The gene defender against apoptotic death (DAD-1) prevents programmed cell death in animal cells. We investigated the expression pattern of DAD-1 in petals of iris (Iris x hollandica cv. Blue Magic) and carnation (Dianthus caryophyllus cv. Etarro). DAD-1 expression in Iris petals was strongly

  11. Compartmentalization: a conceptual framework for understanding how trees grow and defend themselves

    Science.gov (United States)

    Alex L. Shigo

    1984-01-01

    The purpose of this chapter is to describe a conceptual framework for understanding how trees grow and how they and other perennial plants defend themselves. The concept of compartmentalization has developed over many years, a synthesis of ideas from a number of investigators. It is derived from detailed studies of the gross morphology and cellular anatomy of the wood...

  12. Infants' Use of Force to Defend Toys: The Origins of Instrumental Aggression

    Science.gov (United States)

    Hay, Dale F.; Hurst, Sarah-Louise; Waters, Cerith S.; Chadwick, Andrea

    2011-01-01

    The two aims of the study were (a) to determine when infants begin to use force intentionally to defend objects to which they might have a claim and (b) to examine the relationship between toddlers' instrumental use of force and their tendencies to make possession claims. Infants' and toddlers' reactions to peers' attempts to take their toys were…

  13. Defending against speculative attacks: A hybrid model of exchange market pressure and crises

    NARCIS (Netherlands)

    Daniels, T.R.; Jager, H.; Klaassen, F.

    2008-01-01

    While virtually all currency crisis models recognise that the fate of a currency peg depends on how tenaciously policy makers defend it, they seldom model how this is done. We incorporate themechanics of speculation and the interest rate defence against it in the model of Morris and Shin (American

  14. Determining a Criminal Defendant's Competency to Proceed With an Extradition Hearing.

    Science.gov (United States)

    Piel, Jennifer; Finkle, Michael J; Giske, Megan; Leong, Gregory B

    2015-06-01

    When a criminal defendant flees from one state (often referred to as the requesting state) to another (often referred to as the asylum state), the requesting state can demand that the asylum state return the defendant through a process called extradition. Only a handful of states have considered a fugitive's right to be competent to proceed with an extradition hearing. Those states fall into three categories. Some states apply the same standard as in criminal trial competency cases. Others apply a more limited competency standard. Two have found that a fugitive has no right to be competent to proceed in an extradition hearing. The particular legal test adopted affects the nature and scope of the competency evaluation conducted by the psychiatrist or psychologist in the extradition hearing. In addition, we are not aware of any state that has considered what happens to the fugitive if he is ultimately found not competent to proceed. Legislation, either state by state or through amendments to the Uniform Criminal Extradition Act, can provide the legal and psychiatric communities with guidance in assessing competency initially and in taking appropriate steps if the fugitive is ultimately found not competent. © 2015 American Academy of Psychiatry and the Law.

  15. 45 CFR 2554.52 - How does the Corporation protect the rights of defendants?

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false How does the Corporation protect the rights of... Appeals § 2554.52 How does the Corporation protect the rights of defendants? These procedures separate the functions of the investigating official, reviewing official, and the ALJ, each of whom report to a separate...

  16. Evaluation of MR safety of a set of canine ear defenders (MuttMuffs®) at 1 T

    International Nuclear Information System (INIS)

    Baker, Martin A.

    2013-01-01

    Previous studies have indicated that loud noise produced during MR scanning is hazardous for human patients. Although loud noise can also be harmful to canine patients in MRI, ear protection is not routinely provided. The purpose of this study was to test the safety of a set of commercially available canine ear defenders (MuttMuffs ® ) during MRI scanning at 1 T. A metal fastening ring was removed and replaced with a plastic washer prior to testing. Torque, translation, heating and artifact production were tested. No torque, translation, or excessive heating were detected. No artifacts were observed. Clinical use demonstrated additional benefits of improved immobilisation of the dog, with no effect on signal-to-noise ratio. Results from this study indicate that following replacement of the metal ring with one made of plastic, these canine ear defenders are suitable for use at 1 T. The author recommends the use of ear defenders during canine MRI scans in order to reduce the risk of hearing damage, reduce the dose needed for anaesthetic maintenance and reduce the need for repeated MRI sequences due to movement of the dog

  17. Crime and Punishment: the Impact of Skin Color and Socioeconomic Status of Defendants and Victims in Jury Trials in Brazil.

    Science.gov (United States)

    da Silva, Rogério Ferreira; Oliveira Lima, Marcus Eugênio

    2016-11-14

    Social judgments are often influenced by racism. Voluntary crimes against life, and in particular the crime of homicide, may be the most critical situations of the impact of racism in social judgments. We analyzed 114 homicide trials conducted by the 1st Jury Court, in a Brazilian judicial capital, concluded between 2003 and 2007, for the purpose of investigating the effects of skin color and the socioeconomic status of the defendant and the victim of homicides in the jury trial court's decision. The results indicate that the social and economic profile of defendants and victims of homicide is identical. They are almost all poor (more than 70%), with low education (more than 73%) and frequently non-Whites (more than 88%). We found that judges assign longer sentences to black (β = .34, p = .01) and poor defendants (β = .23, p socioeconomic status in social judgments and in discrimination.

  18. The impact of cooperation on the rights of defendants before the International Criminal Court

    NARCIS (Netherlands)

    Ferioli, M.L.

    2016-01-01

    The present study locates the challenges faced by defendants during cooperation proceedings in the context of the unique structural system of the Court, and the inherent tensions and limitations that characterize the ICC’s functioning. The study is divided into two parts. The first part sets out the

  19. Lawyer of defendant and his role in the criminal process from the viewpoint of the European Convention on Human Rights and the Albanian criminal procedural legislation

    Directory of Open Access Journals (Sweden)

    Klodjan Skenderaj

    2014-01-01

    Full Text Available A guarantee for real ensuring of defendant’s rights is the qualified legal assistance by the side of the lawyer, chosen or assigned by the proceeding body. Providing legal protection to defendants was an important achievement in the long and difficult efforts to democratize the criminal proceedings. It was initially achieved in developed countries which promulgated the fundamental rights and freedoms and on this basis the major laws of activity of justice’s bodies were enforced. The role of lawyer in the criminal proceeding gradually increased and became an important factor in the fight against violations of law and injustice. The lawyer became a respected procedural figure, standing in front of prosecution, as the opposing party able to develop a cross-examination and to influence in a fair solution of case. However in practice, it is not rare the violation of rights of defendants by proceeding organs. So, it is right to make this question: What will be done with their rights and how will they be protected? In practice there were different opinions in terms of guaranteeing the rights of these defendants and how far the rights of lawyers of the defendants are extended. This is the reason why this paper will bring in attention the position, procedural guarantees of lawyers, the actions that can take and the exercise of their main rights in defending the interest of defendant, taking into account the main phases of criminal proceedings. Special attention will be devoted to case law of European Court of Human Rights (ECHR in terms of guaranteeing the rights of defendants, the orientations of the Albanian Constitutional Court and that of Supreme Court. At the end, this paper will reach in some conclusions through which proposals and amendments will be made to the code of criminal procedure, starting from the principle that the rights and procedural guarantees of defendants should be guaranteed at the maximum, because it’s the only way to

  20. Gut microbes may facilitate insect herbivory of chemically defended plants.

    Science.gov (United States)

    Hammer, Tobin J; Bowers, M Deane

    2015-09-01

    The majority of insect species consume plants, many of which produce chemical toxins that defend their tissues from attack. How then are herbivorous insects able to develop on a potentially poisonous diet? While numerous studies have focused on the biochemical counter-adaptations to plant toxins rooted in the insect genome, a separate body of research has recently emphasized the role of microbial symbionts, particularly those inhabiting the gut, in plant-insect interactions. Here we outline the "gut microbial facilitation hypothesis," which proposes that variation among herbivores in their ability to consume chemically defended plants can be due, in part, to variation in their associated microbial communities. More specifically, different microbes may be differentially able to detoxify compounds toxic to the insect, or be differentially resistant to the potential antimicrobial effects of some compounds. Studies directly addressing this hypothesis are relatively few, but microbe-plant allelochemical interactions have been frequently documented from non-insect systems-such as soil and the human gut-and thus illustrate their potential importance for insect herbivory. We discuss the implications of this hypothesis for insect diversification and coevolution with plants; for example, evolutionary transitions to host plant groups with novel allelochemicals could be initiated by heritable changes to the insect microbiome. Furthermore, the ecological implications extend beyond the plant and insect herbivore to higher trophic levels. Although the hidden nature of microbes and plant allelochemicals make their interactions difficult to detect, recent molecular and experimental techniques should enable research on this neglected, but likely important, aspect of insect-plant biology.

  1. Defending Against Opposed Patterns of Resistant: Can Past Cultural Lessons in Armed Conflict Help U.S. Identify, Defend, Adapt, or Exploit Notions of Resistant With New Adversaries Like ISIS

    Science.gov (United States)

    2015-05-01

    experienced in Sri Lanka, the “Birds of Paradise ” women combatants and suicide bombers were successfully able to exploit gender bias...research paper are those of the author and do not reflect the official policy or position of the US government or the Department of Defense. In...contact and how might we defend them or exploit them without compromising our own notions? This research paper evaluates current events and identifies

  2. Keep your bias to yourself: How deliberating with differently biased others affects mock-jurors' guilt decisions, perceptions of the defendant, memories, and evidence interpretation.

    Science.gov (United States)

    Ruva, Christine L; Guenther, Christina C

    2017-10-01

    This experiment explored how mock-jurors' (N = 648) guilt decisions, perceptions of the defendant, memories, and evidence interpretation varied as a function of jury type and pretrial publicity (PTP); utilizing a 2 (jury type: pure-PTP vs. mixed-PTP) × 3 (PTP: defendant, victim, and irrelevant) factorial design. Mock-juries (N = 126) were composed of jurors exposed to the same type of PTP (pure-PTP; e.g., defendant-PTP) or different types of PTP (mixed-PTP; e.g., half exposed to defendant-PTP and half to irrelevant-PTP). Before deliberations jurors exposed to defendant-PTP were most likely to vote guilty; while those exposed to victim-PTP were least likely. After deliberations, jury type and PTP affected jurors' guilt decisions. Specifically, jurors deliberating on pure-PTP juries had verdict distributions that closely resembled the predeliberation distributions. The verdict distributions of jurors on mixed-PTP juries suggested that jurors were influenced by those they deliberated with. Jurors not exposed to PTP appeared to incorporate bias from PTP-exposed jurors. Only PTP had significant effects on postdeliberation measures of memory and evidence interpretation. Mediation analyses revealed that evidence interpretation and defendant credibility assessments mediated the effect of PTP on guilt ratings. Taken together these findings suggest that during deliberations PTP bias can spread to jurors not previously exposed to PTP. In addition, juries composed of jurors exposed to different PTP slants, as opposed to a single PTP slant, can result in less biased decisions. Finally, deliberating with others who do not share similar biases may have little, if any, impact on biased evidence interpretation or memory errors. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  4. Securing the virtual environment how to defend the enterprise against attack

    CERN Document Server

    Ottenheimer, Davi

    2012-01-01

    A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models an

  5. How Systems Engineering and Risk Management Defend Against Murphy's Law and Human Error

    Science.gov (United States)

    Bay, Michael; Connley, Warren

    2004-01-01

    Systems Engineering and Risk Management processes can work synergistically to defend against the causes of many mission ending failures. Defending against mission ending failures is facilitated by fostering a team that has a healthy respect for Murphy's Law and a team with a of curiosity for how things work, how they can fail, and what they need to know. This curiosity is channeled into making the unknowns known or what is uncertain more certain. Efforts to assure mission success require the expenditure of energy in the following areas: 1. Understanding what defines Mission Success as guided by the customer's needs, objectives and constraints. 2. Understanding how the system is supposed to work and how the system is to be produced, fueled by the curiosity of how the system should work and how it should be produced. 3. Understanding how the system can fail and how the system might not be produced on time and within cost, fueled by the curiosity of how the system might fail and how production might be difficult. 4. Understanding what we need to know and what we need learn for proper completion of the above three items, fueled by the curiosity of what we might not know in order to make the best decisions.

  6. Victims, bullies, and their defenders : A longitudinal study of the coevolution of positive and negative networks

    NARCIS (Netherlands)

    Huitsing, Gijs; Snijders, Tom A.B.; Van Duijn, Marijtje A. J.; Veenstra, René

    The complex interplay between bullying/victimization and defending was examined using a longitudinal social network approach (stochastic actor-based models). The (co) evolution of these relations within three elementary schools (Grades 2-5 at Time 1, ages 8-11, N = 354 children) was investigated

  7. Environment Canada defends decision to ban PCB waste exports

    International Nuclear Information System (INIS)

    Anon.

    1995-01-01

    The position of Environment Canada in banning the export of PCB waste to the United States was defended as falling within their jurisdiction under provisions of the the Canadian Environmental Protection Act. The United States had previously banned the import of Canadian PCBs, but when it reversed its decision Environment Canada posted an Interim Order, upholding the ban. The decision to do so was based on protection of the large investment that was made to develop the Canadian PCB incineration facility in Swan Lake, Alberta. Canada also had an obligation under the Basel Convention to reduce it cross boundary movement of hazardous waste and provide adequate destruction facilities in Canada. Legal implications of PCB exports and the uncertainty of continuing access to American facilities were also cited as reasons for issuing the Interim Order

  8. The Top Ten Errors of Martial Artists Defending Against a Blade

    Directory of Open Access Journals (Sweden)

    John McCurry

    2012-07-01

    Full Text Available There are ten deadly errors which make most empty-handed martial-arts techniques against a knife ineffective. The principal error stems from the fact that few present-day martial systems teach the blade. The premise of this article is that to effectively defend against a knife, you need to know how to use one. The purpose of this article is to motivate martial arts instructors to analyze more critically their unarmed knife defense techniques based on a clear understanding of the use of the knife, and to reawaken interest in the blade arts in the martial arts community.

  9. The New Product Development Improvement Motives and Practices of Miles and Snow's Prospectors, Analysers and Defenders

    DEFF Research Database (Denmark)

    Laugen, Bjørge Timenes; Boer, Harry; Acur, Nuran

    2006-01-01

    , twenty-seven analysers and seven defenders (Miles and Snow, 1978) suggests that the NPD improvement motives and practices of these three types of strategies are less different than we expected. Our explanation for this finding is that the three strategic types are growing towards each other, forced...

  10. Urgensi Perlindungan Hukum Bagi Pembela Hak Asasi Manusia (Human Rights Defender) Di Indonesia

    OpenAIRE

    Rahayu, Rahayu

    2010-01-01

    Human rights defenders are they working and having activities dealing with any effort to promote human rights. They stand in the front tine of struggle and dignifying human rights to utter the victims of human rights violation (the voice of the voiceless). Their existence is obviously recognized in United Nations' Genera! Assembly Nr. 53/144 on "Declaration on the Right and Responsibility of Individuals, Groups and Organ of Society to Promote and Protect Universally Recognized Human Rights an...

  11. Battling for the household's category buck : Can economy private labels defend supermakets against the hard-discounter threat?

    NARCIS (Netherlands)

    Vroegrijk, M.J.J.; Gijsbrechts, Els; Campo, K.

    Traditional grocery retailers often use price-based strategies to defend against hard-discounters (HDs). One increasingly-popular approach is the introduction of an economy private label (EPL), which provides similar or even larger price advantages over national brands than HD products. However, the

  12. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  13. Defending the Concept of Time in the Hebrew Bible

    DEFF Research Database (Denmark)

    Bundvad, Mette

    2014-01-01

    Due to the scarcity of reflection on time as an independent subject in the Hebrew Bible, there has been a scholarly tendency to consider biblical time conception more limited than our own, perhaps even nonexistent. This article confronts the scholarly skepticism regarding the ability of the bibli......Due to the scarcity of reflection on time as an independent subject in the Hebrew Bible, there has been a scholarly tendency to consider biblical time conception more limited than our own, perhaps even nonexistent. This article confronts the scholarly skepticism regarding the ability...... of the biblical authors to think about time, defending the presence of time conceptualization in the Hebrew Bible. In the article I discuss central research contributions to the subject of biblical time, in particular Sacha Stern’s thesis that the concept of time is entirely absent from the Hebrew Bible and from...

  14. What is Russia trying to defend?

    Directory of Open Access Journals (Sweden)

    Andrei Yakovlev

    2016-06-01

    Full Text Available Contrary to the focus on the events of the last two years (2014–2015 associated with the accession of Crimea to Russia and military conflict in Eastern Ukraine, in this study, I stress that serious changes in Russian domestic policy (with strong pressure on political opposition, state propaganda and sharp anti-Western rhetoric, as well as the fight against “foreign agents’ became visible in 2012. Geopolitical ambitions to revise the “global order” (introduced by the USA after the collapse of the USSR and the increased role of Russia in “global governance” were declared by leaders of the country much earlier, with Vladimir Putin's famous Munich speech in 2007. These ambitions were based on the robust economic growth of the mid-2000s, which encouraged the Russian ruling elite to adopt the view that Russia (with its huge energy resources is a new economic superpower. In this paper, I will show that the concept of “Militant Russia” in a proper sense can be attributed rather to the period of the mid-2000s. After 2008–2009, the global financial crisis and, especially, the Arab Spring and mass political protests against electoral fraud in Moscow in December 2011, the Russian ruling elite made mostly “militant” attempts to defend its power and assets.

  15. "Racial bias in mock juror decision-making: A meta-analytic review of defendant treatment": Correction to Mitchell et al. (2005).

    Science.gov (United States)

    2017-06-01

    Reports an error in "Racial Bias in Mock Juror Decision-Making: A Meta-Analytic Review of Defendant Treatment" by Tara L. Mitchell, Ryann M. Haw, Jeffrey E. Pfeifer and Christian A. Meissner ( Law and Human Behavior , 2005[Dec], Vol 29[6], 621-637). In the article, all of the numbers in Appendix A were correct, but the signs were reversed for z' in a number of studies, which are listed. Also, in Appendix B, some values were incorrect, some signs were reversed, and some values were missing. The corrected appendix is included. (The following abstract of the original article appeared in record 2006-00971-001.) Common wisdom seems to suggest that racial bias, defined as disparate treatment of minority defendants, exists in jury decision-making, with Black defendants being treated more harshly by jurors than White defendants. The empirical research, however, is inconsistent--some studies show racial bias while others do not. Two previous meta-analyses have found conflicting results regarding the existence of racial bias in juror decision-making (Mazzella & Feingold, 1994, Journal of Applied Social Psychology, 24, 1315-1344; Sweeney & Haney, 1992, Behavioral Sciences and the Law, 10, 179-195). This research takes a meta-analytic approach to further investigate the inconsistencies within the empirical literature on racial bias in juror decision-making by defining racial bias as disparate treatment of racial out-groups (rather than focusing upon the minority group alone). Our results suggest that a small, yet significant, effect of racial bias in decision-making is present across studies, but that the effect becomes more pronounced when certain moderators are considered. The state of the research will be discussed in light of these findings. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Behind bullying and defending : Same-sex and other-sex relations and their associations with acceptance and rejection

    NARCIS (Netherlands)

    Veenstra, René; Verlinden, Marina; Huitsing, Gijs; Verhulst, Frank; Tiemeier, Henning

    Relatively little is known about bullying and defending behaviors of children in early elementary school. However, this period is crucial for children's development as at this age they start to participate in a stable peer group, and difficulties in social interactions can be detected early by

  17. Cognitive functioning and adjudicative competence: defendants referred for neuropsychological evaluation in a psychiatric inpatient setting.

    Science.gov (United States)

    Arredondo, Beth C; Marcopulos, Bernice A; Brand, Jesse G; Campbell, Kristen T; Kent, Julie-Ann

    2017-11-01

    A paucity of peer-reviewed research exists regarding the relation between cognitive functioning and adjudicative competence, despite increasing awareness of cognitive deficits associated with serious mental illness. This retrospective study sought to add to and expand upon existing research by considering performance validity and court determinations of competence, when available. We compared demographic and cognitive variables of a group of defendants with presumed valid testing admitted to an inpatient psychiatric facility for evaluation of adjudicative competence and referred for neuropsychological evaluation (n = 45) and compared individuals determined by the evaluator and/or the court to be competent (n = 30) and incompetent (n = 15). Defendants who were incompetent were more likely to be diagnosed with a cognitive disorder, with a medium effect size. There was a difference in tests of immediate and delayed memory as measured by the Repeatable Battery for the Assessment of Neuropsychological Status (RBANS), with medium to large effects, and high delayed memory scores were helpful in ruling out incompetence (Negative predictive power = 85.71%). These results provide support for the relationship between cognitive functioning and trial competence, particularly at high and low levels of performance.

  18. Ilmub raamat viikingiajast Saaremaal / Pamela Talzi

    Index Scriptorium Estoniae

    Talzi, Pamela

    2017-01-01

    Saaremaal viikingiaega uurinud arheoloogi, Tallinna ülikooli humanitaarteaduste instituudi ajaloo, arheoloogia ja kunstiajaloo keskuse vanemteaduri Marika Mägi sulest ilmub raamat "Viikingiaegne Eesti"

  19. When Can Forensic Psychologists Comment on the Credibility of Criminal Defendants?

    Directory of Open Access Journals (Sweden)

    Roberto Flores de Apodaca

    2015-06-01

    Full Text Available Forensic psychological examiners are often confronted with assessments in the guilt phase of criminal cases in which a Defendant denies his/her charged conduct, but the existing evidence clearly contradicts their account. This happens often in cases involving charges of violence, sex offending and or substance abuse (Langton, Barbaree, Harkins, Arenovich, McNamee & Peacock, 2008. What is the proper role of the examiner in such instances?; granting the benefit of the doubt and accepting the Defendant’s account, using the one contained in the differing evidence, or making an independent judgment about which is more likely to be true? Does accepting any version mean the expert is offering an opinion on the Ultimate Issue in the case, and encroaching on the role of the Trier of Fact? The Federal Rules of Evidence (FREE dictate that judgments about Ultimate Issues belong solely to the Trier of Fact, yet the DSM-5 Manual (APA, 2013 instructs us to consider Malingering in every forensic situation; i.e. is the Defendant being honest about his mental state, and by implication, his/her credibility?  Our recommendation is that examiners offer no opinions about which conflicting version in a criminal case is the more credible during the guilt phase, and instead, offer “if, then” assessments about a Defendant’s propensity for violence or sexual offending; i.e. if the charges are true, then s/he poses certain levels of risk going forward, for reasons detailed in the report. Such a stance avoids experts “taking sides” during the guilt phase of a case and allows them to fully inform the adversarial, legal process as it deliberates on possible Plea Bargains or Sentencing decisions. We argue that this impartial approach serves a useful function in legal proceedings while adhering to our Ethical Guidelines (APA, 2010.

  20. Network-Behavior Dynamics in Bullying and Defending : A Multilevel Network Analysis of Single-Grade versus Multi-Grade Classes

    NARCIS (Netherlands)

    Rambaran, Johannes; McFarland, Daniel; Veenstra, David

    2017-01-01

    The social networks in which children participate in are strongly associated with their involvement in bullying and defending (Juvonen & Graham, 2014; Salmivalli, 2010). It is likely that peer effects – referring to selection and influence processes – explain this association. Children seek out

  1. Active Defending and Passive Bystanding Behavior in Bullying: The Role of Personal Characteristics and Perceived Peer Pressure

    Science.gov (United States)

    Pozzoli, Tiziana; Gini, Gianluca

    2010-01-01

    This study examined the role of pro-victim attitudes, personal responsibility, coping responses to observations of bullying, and perceived peer normative pressure in explaining defending the victim and passive bystanding behavior in bullying. A total of 462 Italian early adolescents (mean age = 13.4 years, SD = 9 months) participated in the study.…

  2. Defender of the Faith – hagiography’s topos in the Orthodox Church

    Directory of Open Access Journals (Sweden)

    Michał Dżega

    2014-12-01

    Full Text Available In this article, the author wanted to show the specific for Orthodoxy – topos Her defender. As demonstratedby this topos is universal for any kind of holiness. Starting from the Martyrs ending the Hierarchs and Ascetics, inthe Orthodox Church, there is a never-ending battle for Purity of the Faith in Christ. In this paper author have shown thethree main determinants for the Fight of Faith: 1 Holy Zeal, 2 Holy Pride and 3 Holy Insubordination. To confirm histhesis the author gives some examples from the history of the Eastern Orthodox Church. At the same time author usingthe patristic and liturgical texts.

  3. Unique and Interactive Effects of Moral Emotions and Moral Disengagement on Bullying and Defending among School Children

    Science.gov (United States)

    Thornberg, Robert; Pozzoli, Tiziana; Gianluca, Gini; Jungert, Tomas

    2015-01-01

    The first aim of the present study was to examine in a single model how moral disengagement and moral emotions were related to bullying and defending behavior among schoolchildren. The second aim was to test whether the two moral dimensions interacted with each other to explain behavior in bullying situations. Data were collected from 561 Swedish…

  4. Feigned Symptoms among Defendants Claiming Psychiatric Problems: Survey of 45 Malingerers

    Directory of Open Access Journals (Sweden)

    Seyed Mehdi Saberi

    2013-03-01

    Full Text Available Objective: In many jurisdictions, psychiatric problems are intended for commutation. Therefore, a forensic psychiatrist has an important role in detection of malingering. While several studies evaluate diagnostic tests, it is less known what symptoms are more likely to be imitated by malingerers.Method: In a prospective study [t1] 45 [t2] malingerers, who were diagnosed according to interviews by two forensic psychiatrists, from defendants [t3] with a judicial order for evaluation of mental status and criminal responsibility during a period of eighteen months were examined in legal medicine center of Tehran.[t4] [t5] Participants were assessed in another interview to determine symptoms. Dichotomous symptoms in felony and misdemeanor groups were analyzed using fisher’s exact test. The level of statistical significance was set at P<0.05. [t6] Results: Thirty-eight malingerers were charged with misdemeanors and seven with felonies. Behavioral symptoms were most frequently faked by 35 participants (77.8%. Participants charged with criminal accusation had a significantly lower mean age (P=0.032 and a higher level of education (P=0.008 than other non-criminal defendants. A statistically significant increase in memory function problems was demonstrated in the misdemeanor group (P=0.040. With regard to dual symptom imitation, statistically significant correlations were observed between thought content and perceptual symptoms (P=0.048 for felonies and mood & affect and thought process symptoms (P=0.034, mood & affect and behavioral symptoms (P=0.000 and cognitive function and behavioral symptoms (P=0.039 for misdemeanors. In general, many simulators attempted to mimic simple symptoms of behavioral disorders. Probably felony offenses need less accurate programming; therefore, their rates are higher in older, less educated participants.Conclusion: This study demonstrated that differences between presenting symptoms among different offenses may not be

  5. Cognitive Architecture and the Epistemic Gap: Defending Physicalism without Phenomenal Concepts

    DEFF Research Database (Denmark)

    Fazekas, Peter

    2011-01-01

    The novel approach presented in this paper accounts for the occurrence of the epistemic gap and defends physicalism against anti-physicalist arguments without relying on so-called phenomenal concepts. Instead of concentrating on conceptual features, the focus is shifted to the special...... characteristics of experiences themselves. To this extent, the account provided is an alternative to the Phenomenal Concept Strategy. It is argued that certain sensory representations, as accessed by higher cognition, lack constituent structure. Unstructured representations could freely exchange their causal...... to pose a serious problem for contemporary physicalism. I conclude that if those concepts which are related to the phenomenal character of conscious experience are special in any way, their characteristics are derivative of and can be accounted for in terms of the cognitive and representational features...

  6. Classroom Norms of Bullying Alter the Degree to Which Children Defend in Response to Their Affective Empathy and Power

    Science.gov (United States)

    Peets, Kätlin; Pöyhönen, Virpi; Juvonen, Jaana; Salmivalli, Christina

    2015-01-01

    This study examined whether the degree to which bullying is normative in the classroom would moderate associations between "intra"- (cognitive and affective empathy, self-efficacy beliefs) and "inter"personal (popularity) factors and defending behavior. Participants were 6,708 third- to fifth-grade children (49% boys;…

  7. The New Forekspank ئ Acclaimed Bank Architecture / Triin Ojari

    Index Scriptorium Estoniae

    Ojari, Triin, 1974-

    1998-01-01

    Pangahoonete ehitamisest Eestis: Eesti Pank, Hansapank, Tallinna Pank (praegu Ühispank). Pikemalt Forekspanga (praegune Optivapank) hoone ehitamisest endisesse tehasehoonesse. Arhitektid Jüri Okas ja Marika Lõoke.. Sisekujundus Tõnu Veimer.

  8. 21. X avati Kaunase kunstibiennaal "Textile 2005"

    Index Scriptorium Estoniae

    2005-01-01

    Eestist osalevad Mare Kelpmann, Marika Kööbi, Aet Ollisaar, Kadi Pajupuu, Ludmilla Svarzhevska, Hanna Tiidus, Helen Kauksi, Krista Leesi, Aune Taamal, Erika Tammpere, Milvi Thalheim ja Erle Võsa-Tangsoo

  9. Tunnustame tõenduspõhise õendusabi edendajaid / Ester Öpik, Ilme Aro

    Index Scriptorium Estoniae

    Öpik, Ester

    2014-01-01

    Tunnustati meditsiiniõdesid Tiina Freimanni, Reet Urbanit, Marika Asbergi, Tiina Tõemetsa, Kersti Viitkarit ja Ireen Bruusi Eesti Õdede Liidu poolt 2011. aastani kaitstud õendusteaduslike uurimistööde eest

  10. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  11. Case note: ECHR (Animal Defenders International v UK: App no 48876/08: Political Advertising Bans and Freedom of Expression)

    NARCIS (Netherlands)

    Ó Fathaigh, R.

    2013-01-01

    In Animal Defenders International v UK, the 17-judge Grand Chamber of the European Court of Human Rights ruled that the UK’s ban on political advertising on television, as applied to an animal rights organisation, did not violate freedom of expression. The Court divided nine votes to eight, with the

  12. Tallinnasse Rävala pst. 19 kavandatava Tallinna Muusikakeskkooli, Tallinna Balletikooli ning G. Otsa nimelise muusikakooli ühise õppehoone arhitektuurikonkurss = Architectural Competition for the Joint School Building of Tallinn Music-Specialised

    Index Scriptorium Estoniae

    Puusepp, Raivo

    2003-01-01

    I preemia - Andres Siim, Krister Ausing, II - Marika Lõoke, III - Maia Tüür, Andres Sevtshuk, Gabriel Evangelisti, ostupreemiad: Armin Valter, Vilen Künnapu ning Siiri Vallner, Katrin Koov, Veronika Valk

  13. Vivisecting Major: a Victorian gentleman scientist defends animal experimentation, 1876-1885.

    Science.gov (United States)

    Boddice, Rob

    2011-06-01

    Through an investigation of the public, professional, and private life of the Darwinian disciple George John Romanes, this essay seeks a better understanding of the scientific motivations for defending the practice of vivisection at the height of the controversy in late Victorian Britain. Setting aside a historiography that has tended to focus on the arguments of antivivisectionists, it reconstructs the viewpoint of the scientific community through an examination of Romanes's work to help orchestrate the defense of animal experimentation. By embedding his life in three complicatedly overlapping networks-the world of print, interpersonal communications among an increasingly professionalized body of scientific men, and the intimacies of private life-the essay uses Romanes as a lens with which to focus the physiological apprehension of the antivivisection movement. It is a story of reputation, self-interest, and affection.

  14. Austerity Urbanism and Olympic Counter-legacies: Gendering, Defending and Expanding the Urban Commons in East London

    OpenAIRE

    Gillespie, Tom; Hardy, Kate; Watt, Paul

    2018-01-01

    This article reflects on an occupation led by single mothers to contest the destruction of social housing in post-Olympics East London. In the process, it argues for a more gendered theorisation of the urban commons. Drawing on auto-ethnography, participant observation and qualitative interviews, the article argues three central points: First, that the occupation demonstrates the gendered nature of the urban commons and the leadership of women in defending them from enclosure; second that the...

  15. The Utility of the MMPI-2 Malingering Discriminant Function Index in the Detection of Malingering: A Study of Criminal Defendants

    Science.gov (United States)

    Toomey, Joseph A.; Kucharski, L. Thomas; Duncan, Scott

    2009-01-01

    This study examined the utility of the Minnesota Multiphasic Personality Inventory-2's (MMPI-2) malingering discriminant function index (M-DFI), recently developed by Bacchiochi and Bagby, in the detection of malingering in a forensic sample. Criminal defendants were divided into "malingering" and "not malingering" groups using…

  16. Katrin Kuldma - obladatelnitsa "Zolotoi iglõ" / Olga Grigorjeva

    Index Scriptorium Estoniae

    Grigorjeva, Olga, 1983-

    2007-01-01

    FIBIT-i moepäevadest ja Kuldnõela galast. Kuldnõela nominendid olid Reet Aus, Katrin Kuldma, Marika Siska ja Tiiu Roosma. 2006. a. moepreemia "Kuldnõel" sai kollektsiooni "Chocolat" eest Katrin Kuldma

  17. Trepp = Stair / Eve Arpo

    Index Scriptorium Estoniae

    Arpo, Eve

    2006-01-01

    Rakvere Vallimäe trepist. Laste vestlus trepil. Projekt: Kavakava. Autorid: Heidi Urb, Siiri Vallner. Trepi valem: Taavi Vallner. Insener: Marika Stokkeby. Projekt 2004, valmis 2005. Ill.: joonis, 7 värv. fotot

  18. Defending the indefensible? Psychiatry, assisted suicide and human freedom.

    Science.gov (United States)

    Parker, Malcolm

    2013-01-01

    The siege guns of the forces for change to euthanasia and assisted suicide laws have been pounding for decades, but the longstanding proscription on these practices has held out in all but a few jurisdictions. A few psychiatrists have enlisted with the challengers, but many remain on the battlements, defending the impermissibility of active assistance in dying. Given the long history of the separation of church and state and the significant secularisation of society; the recognition by the law of both acts and omissions as legal causes; lenient sentences for mercy killers; critiques of the "psychiatriatisation" of different aspects of life; and the consistency of public opinion, this recalcitrant stand bespeaks undercurrents and positions that are often by rationalised or camouflaged, and which call for exploration. In this paper, I examine connections between psychiatry and conceptualisations of harm, suffering and natural death; medicalisation, psychiatrisation and medical paternalism; decision-making capacity, rationality and diagnosis; recent legal developments; social pluralism; and religious intuitionism. I conclude that psychiatrists and the psychiatry profession, concerned as they are with enlarging the province of human freedom, should begin a more transparent rapprochement with those they would repel. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Who establishes the presence of a mental disorder in defendants : Medicolegal considerations on a European court of human rights case

    NARCIS (Netherlands)

    Kooijmans, Tijs; Meynen, Gerben

    2017-01-01

    Legal insanity is a peculiar element of criminal law, because it brings together two very different disciplines: psychiatry and psychology on the one hand and the law on the other. One of the basic questions regarding evaluations of defendants concerns the question of who should establish “true

  20. Neuropsychological features of indigent murder defendants and death row inmates in relation to homicidal aspects of their crimes.

    Science.gov (United States)

    Hanlon, Robert E; Rubin, Leah H; Jensen, Marie; Daoust, Sarah

    2010-02-01

    Neuropsychological features of 77 indigent murder defendants and death row inmates were examined in relation to criminal variables underlying their homicidal acts. Clinically, the sample was characterized by elevated rates of developmental disorders (49%), personality disorders (54%), Axis I psychiatric disorders (45%), substance abuse (86%), and history of violence (43%). By statute, killing more than one person is an aggravating factor in many jurisdictions that renders a murder defendant eligible for the death penalty. Individuals who committed a single murder were characterized by executive dysfunction, lower intelligence, slower speed of information processing, and a higher frequency of developmental disorders (58%), relative to those charged and/or convicted of killing two or more people, who were characterized by a significantly higher rate of personality disorders (79%) and a lower rate of developmental disorders (34%). Additionally, using the FBI criminal classification system for categorizing homicide by motive, a significant difference in the frequency of psychosis was found among subgroups associated with the following motives: Criminal enterprise; personal cause; and sex. The collective neuropsychological profile of the sample revealed that executive functions were significantly decreased, relative to memory functions, with over half of the sample (55%) demonstrating executive dysfunction.

  1. CSAIO: exchanging experience to better defend the interests of the staff

    CERN Multimedia

    Staff Association

    2014-01-01

    Two representatives of the CERN Staff Association took part in the 15th Annual Conference of Staff Associations of International Organizations (CSAIO), which took place on Thursday 16th and Friday 17th of October in one of the centres of the European Space Agency (ESA) in Frascati (Italy). The CSAIO brings together staff representatives from international organizations based in Europe, as well as institutions of the European Union, in order to promote and defend the interests of their personnel. This allows the CERN Staff Association to follow the evolution of working and social conditions in other organizations. This year, 51 delegates from about 30 organizations travelled to Frascati to attend the conference. Themes addressed at the conference were: Salary adjustment method presentations: European Commission, CERN, European Council, and FICSA (Federation of International Civil Servants’ Association). Performance evaluation presentations: OECD (Organization for Economic Co-operation and...

  2. Kirev moepilt / Britt Rosen

    Index Scriptorium Estoniae

    Rosen, Britt, 1968-

    2007-01-01

    FIBITi moepäevadest Tallinnas Viru keskuses, stilistid Gerli Tinn, Liisi Eesmaa, Kirill Safonov. Kuldnõela auhinna pälvis Katrin Kuldma kollektsiooni Chocolat eest. Oma loomingut esitlesid Reet Aus, Tiiu Roosma, Marika Siska

  3. Raamatututvustus

    Index Scriptorium Estoniae

    2008-01-01

    2007. a. Tallinnas kirjastuselt Varrak ilmunud raamatust "1001 maali, mida elu jooksul peab nägema" (peatoimetaja Stephen Farthing, eessõna Geoff Dyer, tõlkinud Ann Kitsnik, Marika Liivamägi ja Maarja Merivoo)

  4. Alushariduse kvaliteet rahvusvahelises arutelus / Tiia Õun

    Index Scriptorium Estoniae

    Õun, Tiia

    2013-01-01

    Rahvusvahelisest EECERA 23. konverentsist, mis ühendab Euroopa alushariduse uurijaid, juhte, õpetajaid ja üliõpilasi. Konverents toimus 28.-31. aug. Tallinna Ülikoolis, Eesti-poolne peakorraldaja oli Tallinna Ülikooli professor Marika Veisson

  5. Teaduse õpetamine kui missioon

    Index Scriptorium Estoniae

    2010-01-01

    Marika Mikelsaar pälvis teaduse elutöö preemia, millest osa kavatseb kasutada omanimelise fondi loomiseks noorte teadlaste jaoks. Hiljuti valiti ta ülemaailmse ühingu Society for Microbial Ecology and Disease (SOMED) presidendiks

  6. Defending Democracy: Citizen Participation in Election Monitoring in Post-Authoritarian Indonesia

    Directory of Open Access Journals (Sweden)

    Dini Suryani

    2015-02-01

    Full Text Available The collapse of the authoritarian regime in 1998 has made Indonesia as one of the most democratic country in Southeast Asia. To ensure the quality of democracy, in particular electoral democracy, supervision and monitoring of elections has a veryimportant role. Although the Badan Pengawas Pemilu (Bawaslu or Election Supervisory Body of Indonesiahas experienced institutional strengthening, this institution has not yet become effective in supervisingand monitoring the elections. Therefore, electionmonitoring conducted by non-state agencies, particularly the citizens become important to complement the performance of Bawaslu. This article aimsto explore how the election monitoring conducted by citizens in the aftermath of post authoritarian era,affect the quality of Indonesian democracy. This article argues that although the citizen participation in monitoring the elections is likely to decline, but thecrowd sourced method that appeared in the 2014election has succeeded in improving the quality of the electoral process as well as defending the democratic regime in Indonesia.

  7. Frequency and Detection of Malingering in Homicide Defendants Undergoing Criminal Responsibility Evaluations Using the Schedule for Nonadaptive and Adaptive Personality

    Directory of Open Access Journals (Sweden)

    Wade C. Myers

    2016-04-01

    Full Text Available This retrospective study reports on (a the prevalence of malingering in a sample of 20 homicide defendants seen in jail settings for criminal responsibility evaluations, and (b the feasibility of the Schedule for Nonadaptive and Adaptive Personality (SNAP for malingering detection in this sample. Based on previous non-clinical simulation research, it was hypothesized that the SNAP validity scales would predict group membership for homicide defendants malingering psychopathology. Those with intellectual disabilities or psychotic disorders were excluded. Diagnostically, nearly one half of the sample had Diagnostic and Statistical Manual of Mental Disorders (4th ed., text rev.; DSM-IV-TR personality and substance use disorders. Point prevalence of malingering was 30%. Using the criterion of any SNAP validity scale score in the clinical range (T ≥ 65, a reasonable sensitivity was demonstrated in the detection of malingering (83%, yet this outcome was hindered by a high false positive rate (64%. This study suggests further exploration of the SNAP for assessing malingering in forensic populations is warranted.

  8. Eesti Energia : investeerimata oleme varsti hädas / Krista Taim, Allar Viivik

    Index Scriptorium Estoniae

    Taim, Krista

    2004-01-01

    Eesti Energia nõukogu kinnitas ettevõtte investeeringutekava aastani 2018, 15 aasta jooksul tuleb investeerida 46 miljardit krooni, rahastamisallikatena nähakse välislaenu, riigi abi või hinnatõusu. Kommenteerivad Eiki Nestor ja Marika Tuus

  9. Häbi, professor, teil on Gefilus kapis / Eve Kruuse

    Index Scriptorium Estoniae

    Kruuse, Eve,d1959-

    2008-01-01

    Tartu Ülikooli professor Marika Mikelsaar võitis läinud kuul koos kolleegidega (Tiiu Kullisaar, Epp Songisepp, Hedi Annuk ja Mihkel Zilmer) Soulis ülemaailmse naisleiutajate konkursil ME-3 bakteri avastamise ja probiootikuks arendamise eest kuldmedali

  10. Aesthetics of amalgamation / Francisco Martinez

    Index Scriptorium Estoniae

    Martínez, Francisco, 1982-

    2016-01-01

    Parandamise esteetika kontseptsioonist näituste „Ehitamata. Visioonid uuest ühiskonnast 1986–1994“ Eesti Arhitektuurimuuseumis (kuraator Ingrid Ruudi) ja “Parandamise esteetika tänapäeva Gruusias” (kuraator Marika Agu) Tartu Kunstimuuseum valgusel

  11. Formal Criteria for the Concept of Human Flourishing: The First Step in Defending Flourishing as an Ideal Aim of Education

    Science.gov (United States)

    Wolbert, Lynne S.; de Ruyter, Doret J.; Schinkel, Anders

    2015-01-01

    Human flourishing is the topic of an increasing number of books and articles in educational philosophy. Flourishing should be regarded as an ideal aim of education. If this is defended, the first step should be to elucidate what is meant by flourishing, and what exactly the concept entails. Listing formal criteria can facilitate reflection on the…

  12. Inter-unit Doctoral Program in Nursing of the University of São Paulo: characterization of graduates and theses defended in a decade.

    Science.gov (United States)

    Garbin, Livia Maria; de Castro Sajioro Azevedo, Ana Lídia; da Silva, Leandra Terezinha Roncolato; Laus, Ana Maria; Chaves, Lucieli Dias Pedreschi; Gualda, Dulce Maria Rosa; Rossi, Lídia Aparecida

    2010-01-01

    This descriptive study aimed to characterize the graduates of the Inter-unit Doctoral Program in Nursing of the School of Nursing of the University of São Paulo, who defended their theses in the period 1998-2008, in relation to the location they developed their Masters and their pre and post-doctoral employment, also to investigate the theses defended in relation to the thematic areas and methodological approaches used. Data were collected from the Fenix-USP System and the Lattes Curriculum System. Of the 190 graduates, 178 had curricula available online. Of those, 58.4% performed teaching and research activities when they entered the doctoral program, which were activities mainly developed at Federal Universities (34.8%). This predominance was maintained after the conclusion of the doctoral studies. The thematic areas most studied were Women's Health (20.5%) and Adults/Elderly Health (13.2%). Regarding the methodological approach, 68.4% used qualitative methods. The data evidenced the contributions of this Program to research.

  13. Valmib valus lavalugu perest : Athenas jõuab vaatajate ette Mart Kivastiku suhtedraama / Raimu Hanson

    Index Scriptorium Estoniae

    Hanson, Raimu, 1957-

    2008-01-01

    SA Eesti Teatri Festival esietendab 4. mail Athena keskuses Margus Kasterpalu lavastuses Mart Kivastiku näidendit "Meie isa, kes sa oled ..." Mängivad Vanemuise näitlejad Marika Aidla, Hannes Kaljujärv, Tanel Jonas ning Leino Rei

  14. Räägi nii, et pisarad voolaksid! Kuidas saab inimesi oma lugude abil juhtida / Taivo Paju

    Index Scriptorium Estoniae

    Paju, Taivo, 1968-

    2011-01-01

    Kuulajat puudutavate lugude rääkimine. Kuidas toimub lugude loomine inimese ajus. Termin "corporate storytelling". Noppeid Pärnu turunduskonverentsi firmalugude võisturääkimiselt, kus jutustasid Ants Lusti, Marika Pärn, Piret Järvan ja Matts Heijbel

  15. Poolsajandi õnnesoovid Jaak Aaviksoole / Ain Heinaru, Jaak Kangilaski, Tõnu Lehtsaar...[jt.

    Index Scriptorium Estoniae

    2004-01-01

    Mõtteid Tartu Ülikooli rektorist tema 50. sünnipäeva puhul : Ain Heinaru, Jaak Kangilaski, Tõnu Lehtsaar, Indrek Reimand, Toomas Kiho, Leelo Kriisa, Peeter Olesk, Risto Tammelo, Birute Klaas, Peeter Saari, Andrus Ansip, Mait Klaassen, Marika Kullamaa, Kaupo Bend

  16. 8. III esitleti Adamson-Ericu muuseumis ajakirja Muuseum 2005. aasta esimest numbrit

    Index Scriptorium Estoniae

    2005-01-01

    Tomislav Shola kirjutab "Kvaliteedist pärimusinstitutsioonides". Rahvusvaheliste konverentside kogemusi jagavad Toomas Abiline, Aino Lepp, Lea Sillart ja Karin Hallas-Murula. Eesti muuseumide olulistest tähtpäevadest kirjutavad Urmas Dresen, Mari-Ann Aimla, Marika Valk ja Merike Koppel

  17. Kuidas töötab teie kooli tugisüsteem? / Maria Tiro, Siiri Klasberg, Maarika Kongi ... [jt.

    Index Scriptorium Estoniae

    2011-01-01

    Küsimusele vastasid Jüri gümnaasiumi direktor Maria Tiro, Tapa gümnaasiumi sotsiaalpedagoog Siiri Klasberg, Rakvere gümnaasiumi psühholoog Maarika Kongi, Kuressaare gümnaasiumi sotsiaalpedagoog Maret Martinson, Salme põhikooli direktor Marika Pütsep

  18. Riik reklaamib Tallinna napsi ja naistega / Kadri Jakobson

    Index Scriptorium Estoniae

    Jakobson, Kadri, 1970-

    2005-01-01

    Ettevõtluse Arendamise Sihtasutuse makstud reklaamikampaania, mis valmis reklaamifirmas Brilliant Marketing Communication OÜ, kutsus turismiarendajates esile meelepaha. EAS Turismiarenduskeskuse direktori Marika Liivamäe hinnangul olid mõned kaadrid liiga julged ja ekstreemsed. Reklaamikampaania oli mõeldud Eesti tutvustamiseks Põhjamaa noortele

  19. Kuldma, Aus, Roosma ja Siska

    Index Scriptorium Estoniae

    2007-01-01

    2006. aasta Kuldnõela võitja kuulutatakse välja Tallinnas Viru keskuses 9.03.2007. Kandidaadid Katrin Kuldma kollektsiooniga Chocolate, Reet Aus kaubamärgiga Re Use, Tiiu Roosma pesukollektsiooniga BonBon Lingerie ja Marika Siska kaubamärgiga Sangar

  20. Mamma Bakteri musketärid / Kati Murutar

    Index Scriptorium Estoniae

    Murutar, Kati, 1967-

    2006-01-01

    Tartu Ülikooli teadlase, 2004. Aasta Naiseks nimetatud meditsiinilise biotehnoloogia erakorralise professorr Marika Mikelsaare juhitav töörühm avastas ja tõi maailmakaardile probiootilise piimhappebaketri Lactobacillus fermentum ME-3, mis toimib tervistavalt, hävitades kahjulikke mikroobe

  1. Scheteligi büroo- ja laohoone = Schetelig's Office Building and Warehouse / Epp Lankots

    Index Scriptorium Estoniae

    Lankots, Epp, 1976-

    2000-01-01

    Kahekorruseline, minimalistliku kastja mahuga hoone. Peafassaadi kujunduses on kasutatud firma nime. Projekteerija Arhitektibüroo J. Okas & M. Lõoke. Arhitektid Jüri Okas, Marika Lõoke. Sisekujundaja Kristiina Voolaid. Projekt 1998, valmis 2000. 7 ill. Korruste plaanid, lõige, välisvaated

  2. Delta Plaza kohvik = The Delta Plaza Café / Margit Mutso

    Index Scriptorium Estoniae

    Mutso, Margit, 1966-

    2010-01-01

    Tallinnas Pärnu mnt. 141 asuva kohviku Delta Plaza sisekujundusest. Sisearhitektid Tiiu Truus ja Marja Viltrop (Stuudio Truus OÜ). Hoone arhitektid Jüri Okas ja Marika Lõoke (AB J. Okas & M. Lõoke). Žürii liikme Mait Summataveti arvamus kohvikust

  3. Hiigelämblik kanali kohal ehk Kuidas ERMi uus hoone lõi kired lõkkele / Tarmo Michelson

    Index Scriptorium Estoniae

    Michelson, Tarmo, 1975-

    2006-01-01

    Eesti Rahva muuseumi uue hoone arhitektuurikonkursi võidutööst "Memory Field" (autorid itaalia arhitekt Dan Dorell, liibanoni arhitekt Lina Ghotmeh, jaapani arhitekt Tsuyoshi Tane). Kommenteerivad Jaanus Plaat, Tõnis Lukas, Karin Hallas-Murula, Raivo Palmaru, Laine Jänes, Marika Valk

  4. A media discursive genre: The defender of the viewer

    Directory of Open Access Journals (Sweden)

    Víctor Alfonso Barragán Escarpeta

    2016-08-01

    Full Text Available The following article presents the progress of the research called “A media discursive genre: The defender of the viewer” and has the objective to characterize this particular genre. This research is based on the ideas of Bajtin (1982, Carranza (2012 as well as Social-Communicative Perspective of Charaudeau (2012 about genres, in the way that they give theoretical and methodological elements to the establishment of this characterization, and, in the same way, for being perspectives that emphasize on the social component of texts, let us to understand aspects such as relations between participants and the influence of these in discourse. To do this, our methodology analyzes two different programs of public television channels through making transcripts and images, selected from the establishment of the following categories: the field of social practice, the overall situation of communication (SGC and the specific situation of communication (SEC; also discursive properties and the formal properties; flexible frameworks and the subject agent. In this way, this article makes a practical-theoretical exercise of an inductive nature which rescues how categories of the communicative situation and the analysis of elements such as supports allow a greater deepening of different dimensions in the media discursive practices (social relation, themes, etc. as well as observing to what extent we are talking about discursive genders and sub genders in daily life.

  5. Ask the Experts: How Can New Students Defend Behavior Analysis from Misunderstandings?

    Science.gov (United States)

    Becirevic, Amel

    2014-10-01

    The success of behavior analysis as a field depends on the successes of its students, researchers, practitioners, and advocates. A new generation of graduate students will ultimately speak on the behalf of the field. In order to further promote the field, students must not only learn about what behavior analysis is, but also about what behavior analysis is not. We must prepare ourselves to adequately defend behavior analysis from those who disseminate misperceptions and misunderstandings. As such, an electronic survey designed to glean some information on how behavior analysts would respond to various inaccuracies or misunderstandings of behavior analysis was distributed through behavior-analytic listservs and social media websites. Findings show that the majority of respondents indicate that any graduate student ought to correct the misunderstandings about the field. What do seasoned behavior analysts have to say about the majority opinion about the responsibilities of graduate students and what recommendations do they have for new graduate students who come across misunderstandings about behavior analysis?

  6. Teenetemärgid

    Index Scriptorium Estoniae

    2005-01-01

    Tartu Ülikooli kollektiivi liikmetest saavad Eesti vabariigi 87. aastapäeva puhul riikliku autasu külalisprofessorid Stig Erik örjan Ohlsson ja Uno lõhmus, professorid mati Erelt, Volli kalm, kalle merusk, Aadu Must, Paul varul, Jaan Eha, bibliograaf Marika Meltsas

  7. The annotative review of researches for applicants of the Doctor and the Candidate of the history specialities which were defended in the Oles Honchar Dnipropetrovsk National University in 2014

    Directory of Open Access Journals (Sweden)

    Boiko, O. V.

    2016-04-01

    Full Text Available A subject and maintenance of dissertations for the degree of Doctor and the Candidate of historical sciences which were defended in the specialized scientific advice D 08.051.14 in the Oles Honchar Dnipropetrovsk National University in 2014 is considered. For a year 4 dissertations for the degree of Doctor (specialty 07.00.01 – «Нistory of Ukraine» and 3 dissertations for the degree of the Candidate (specialty 07.00.01 – «Нistory of Ukraine» – 1 work, 07.00.06 – «Нistoriography, a source study and special historical disciplines» – 2 works were defended. 6 dissertations (besides thesis defended by A. V. Bortnikova were ratified by the Department of education and science of Ukraine. It is given the following information on every research work: theme, specialty, place (department of work implementation, date of defense of dissertation, scientific consultant (for doctoral thesis or leader (for candidate’s thesis, his scientific degree and rank, place of work, data about official opponents. Considerable attention is spared to the compressed review of the personal achievements of authors especially to scientific novelty of their researches.

  8. Defendant's or convict's competency to stand trial - forensic psychiatric evaluation.

    Science.gov (United States)

    Cynkier, Przemysław N

    2017-01-01

    The purpose of this paper was to draw attention to particularly important aspects of pronouncing forensic psychiatric judgment regarding the accused or convicted individuals' competency to stand trial. The level of a person's mental capacity should be established using a structured psychiatric interview concerning a variety of aspects of a trial. Emphasis should be placed on evaluating the defendant's consciousness of the charges, knowledge of the potential punishment, ability to make significant decisions and be engaged in defense, knowledge about the role that particular people present in the courtroom play, understanding of the meaning of the evidence gathered in the case, the risk of aggression. The analysis should take into account the specificity of the mental disorder, the influence of proceedings on the course of disorder, as well as the presence of reactive disorders. Using testing tools by the expert can facilitate the process of evaluation to a certain degree. Forensic psychiatric evaluations can give rise to difficulties for the experts, what with the changing legal regulations and their interpretations. It would be justified to develop the standards of evaluation in this kind of cases, which would on the one hand apply to experts but which would also be respected by the judicial organ.

  9. Lahkus juhmi Hundi ja kavala Jänese looja / Andri Maimets, Marko Lillemägi

    Index Scriptorium Estoniae

    Maimets, Andri, 1979-

    2006-01-01

    Suri vene animakunstnik, kuulsate tegelaskujude - Hundi ja Jänese looja joonisfilmisarjas (1969-1986) "Oota sa!" ("Nu, pogodi!") Svetozar Russakov (sünd. 3.04.1923). Filmi omaaegset mõju meenutab Rein Raamat. Kommenteerivad Raivo Järvi, Hendrik Normann, Ain Nurmela, Marika Korolev, Evelin Samuel

  10. Naisleiutajad said suure tunnustuse

    Index Scriptorium Estoniae

    2008-01-01

    Ehtekunstnik Kärt Summatavet pälvis Soulis toimunud ülemaailmsel naisleiutajate konkursil hõbemedali metallehete valmistamise uudse meetodi eest. Marika Mikelsaar koos töörühmaga Lactobacillus fermentum ME-3 bakterit sisaldava piimatoodete sarja väljatöötamise eest

  11. Eurohindu tuleb näidata enne kursi selgumist / Väinu Rozental

    Index Scriptorium Estoniae

    Rozental, Väinu, 1957-

    2010-01-01

    1. juulist tuleb avaldada kaupade ja teenuste hinnad nii kroonides kui ka eurodes. Arvamust avaldavad Eesti Kaupmeeste Liidu tegevdirektor Marika Merilai, ASi Rimi Eesti Food turundusjuht Evelin Mägioja ja OÜ Maxima Eesti brändi ja kommunikatsiooni osakonna direktor Ty Lehtmäe

  12. Delta Plaza kohvik = Delta Plaza cafe

    Index Scriptorium Estoniae

    2010-01-01

    Tallinnas Pärnu mnt 141 asuva kohviku Delta Plaza sisekujundusest. Sisearhitektid Tiiu Truus ja Marja Viltrop (Stuudio Truus OÜ). Tiiu Truusi tähtsamate tööde loetelu. Büroohoone Delta Plaza arhitektid Marika Lõoke ja Jüri Okas (AB J. Okas & M. Lõoke)

  13. Public Response to Wildfire: Is the Australian "Stay and Defend or Leave Early" Approach an Option for Wildfire Management in the United States?

    Science.gov (United States)

    Sarah M. McCaffrey; Alan Rhodes

    2009-01-01

    In the United States, the increasing costs and negative impacts of wildfires are causing fire managers and policymakers to reexamine traditional approaches to fire management including whether mass evacuation of populations threatened by wildfire is always the most appropriate option. This article examines the Australian "stay and defend or leave early" (SDLE...

  14. Arhitektuuribüroo Pluss = Pluss Architects

    Index Scriptorium Estoniae

    2009-01-01

    Büroohoones Delta Plaza (Pärnu mnt. 141, Tallinn) asuva AB Pluss ruumide sisekujundusest. Sisearhitektid Argo Vaikla, Katrin Vaikla ja Riin Luuk. Büroohoone arhitektid Jüri Okas ja Marika Lõoke. Kogu mööblikomplekt on erilahendusega. Sisearhitektide tähtsamate tööde loetelu

  15. Estconde büroohoone = Estconde Office Building / Epp Lankots

    Index Scriptorium Estoniae

    Lankots, Epp, 1976-

    2002-01-01

    Tallinnas Toompuiestee 33 asuva hoone rekonstrueerimine. Projekteerija: büroo J. Okas & M. Lõoke. Arhitektid Jüri Okas ja Marika Lõoke. Konstruktiivne osa: Neoprojekt. Ehituse peatöövõtt: Estconde-E. Projekt ja hoone valmisid 2001. 7 ill.: välis- ja sisevaated, II korruse plaan

  16. Projektiivne arhitektuur / Leonhard Lapin

    Index Scriptorium Estoniae

    Lapin, Leonhard, 1947-

    2003-01-01

    Arhitekti loomeprotsess. Arhitekti ja helilooja loomemeetodi sarnasus. Omaruumi mõiste. Projektiivne arhitektuur. Jüri Okase ja Marika Lõokese projektiivne arhitektuur, nende 1996-2002. aastate 22 projekti 40 perspektiivvaadet esikaanel, lk. 1, 11-48. J. Okasele ja M. Lõokesele anti 2002. a. arhitektuuriloomingu eest Eesti Kultuurkapitali aastapreemia

  17. Turistid-sõjaõhutajad : dessant Iisraeli / Karin Hallas

    Index Scriptorium Estoniae

    Hallas, Karin, 1957-

    1999-01-01

    Kultuuridessandist Marika Valgu ja Helle Puusepaga Iisraeli. Jeruusalemma Yad Vashemist ئ Holocausti muuseumist. Arhitekt Moshe Safdie Laste Memoriaali ja Yad Vashemi memoriaali uue hoone lahendusest. Tel Avivi ja Jeruusalemma arhitektuurist ئ funktsionalismist, praegusest arhitektuurist, arhitekte. James Turrelli kunstiteosest "Ruum, mis näeb" Jeruusalemma muuseumi pargis

  18. Männikusse kasvatatud Rannametsa / Risto Kozer

    Index Scriptorium Estoniae

    Kozer, Risto

    2009-01-01

    Rannametsa elamukompleks (2 kortermaja, 4 ridaelamut, 3 eramut) Vääna-Jõesuus endise pioneerilaagri "Energia" alal. Arhitektid: Jüri Okas, Marika Lõoke, AB J. Okas & M. Lõoke. Ehitaja: AS YIT Ehitus. Projekt: 2005, valmis: 2007. Kompleks on valatud betoonist, mille juures on kasutatud puitlaudiseid ja alumiiniumviimistlust

  19. How do defendants choose their trial court? Evidence for a heuristic processing account

    Directory of Open Access Journals (Sweden)

    Mandeep K. Dhami

    2013-09-01

    Full Text Available In jurisdictions with two or more tiers of criminal courts, some defendants can choose the type of trial court to be tried in. This may involve a trade-off between the probability of acquittal/conviction and the estimated severity of sentence if convicted. For instance, in England and Wales, the lower courts have a higher conviction rate but limited sentencing powers, whereas the higher courts have a higher acquittal rate but greater sentencing powers. We examined 255 offenders' choice of trial court type using a hypothetical scenario where innocence and guilt was manipulated. Participants' choices were better predicted by a lexicographic than utility maximization model. A greater proportion of ``guilty'' participants chose the lower court compared to their ``innocent'' counterparts, and estimated sentence length was more important to the former than latter group. The present findings provide further support for heuristic decision-making in the criminal justice domain, and have implications for legal policy-making.

  20. A novel fiber-optical vibration defending system with on-line intelligent identification function

    Science.gov (United States)

    Wu, Huijuan; Xie, Xin; Li, Hanyu; Li, Xiaoyu; Wu, Yu; Gong, Yuan; Rao, Yunjiang

    2013-09-01

    Capacity of the sensor network is always a bottleneck problem for the novel FBG-based quasi-distributed fiberoptical defending system. In this paper, a highly sensitive sensing network with FBG vibration sensors is presented to relieve stress of the capacity and the system cost. However, higher sensitivity may cause higher Nuisance Alarm Rates (NARs) in practical uses. It is necessary to further classify the intrusion pattern or threat level and determine the validity of an unexpected event. Then an intelligent identification method is proposed by extracting the statistical features of the vibration signals in the time domain, and inputting them into a 3-layer Back-Propagation(BP) Artificial Neural Network to classify the events of interest. Experiments of both simulation and field tests are carried out to validate its effectiveness. The results show the recognition rate can be achieved up to 100% for the simulation signals and as high as 96.03% in the real tests.

  1. Innovatsioon = Innovation

    Index Scriptorium Estoniae

    2008-01-01

    TÜ teadlased töötavad välja Philipsi tellimusel uut tomograafi; prof. Marika Mikelsaar pälvis bakteri ME-3 kasutamise eest Euroopa Liidu innovaatori auhinna; toruluude murdude fragmentide ühendamiseks koostatud leiutisele said patendi Aleks Lenzner ja Tiit Haviko TÜ-st ning Vladimir Andrianov EMÜ-st

  2. Salme Reegi nimelise auhinna nominendid

    Index Scriptorium Estoniae

    2006-01-01

    Valiti järgmised nominendid : Taago Tubin - lavastus "Suur kuri hunt" Vanemuises, Marika Vaarik - õpetaja Klamm VAT Teatri lavastuses "Klammi sõda", Finn Poulsen - "Trollpoiss" Eesti Nukuteatris, Leino Rei - lavastused "Kuusepuu", "Karjatüdruk ja korstnapühkija", Taavi Tõnisson - Papageno "Võluflöödis" Eesti Nukuteatri lavastuses

  3. Autotranspordi TOP aastal 2007

    Index Scriptorium Estoniae

    2008-01-01

    TOP 50. Vt. samas: Käibe TOP 10; Käibe kasvu TOP 10; Kasumi TOP 10; Kasumi kasvu TOP 10; Rentaabluse TOP 10; Omakapitali tootlikkuse TOP 10; Marika Roomere. Täisteenuse pakkumine kergitas tulemusi; Jupiter Plus otsib järjest uusi kasvuvõimalusi; EST-Trans Kaubaveod teenib kasumit toiduvedamisega

  4. Annid merest / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2011-01-01

    Toiduks tarvitatavatest koorikloomadest ja molluskitest: krabi, krevett, garneel, homaar e merivähk, jõe- e väärisvähk, signaal- e tähnikvähk, langust e ogajas merivähk, auster, kammkarp, rannakarp, kaheksajalg, kalmaar, seepia e tindikala, meritigu e tõrikodalane, viinamäe- e burgundia tigu, merisiilik ning kalatootest surimi e makra

  5. Imekliinik Brasiilias / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2010-01-01

    Brasiilia Abadiania väikelinnas asuvast Casa de Dom Inacio tervendamiskeskusest, kus meediumi vahendusel toimuvad meditatsioonid ja "operatsioonid" ning inimesed paranevad lühikese ajaga rasketest haigustest. Seal ravil käinud Eesti naise kogetust

  6. U.S. Policy Towards Cuba as a Two Level Game or: Defending Executive Policy Discretion in the Face of Domestic Pressure

    Science.gov (United States)

    2008-03-01

    Foreign Policy Agenda,” International Security 8:1 (1983): 113-128. Dominguez, Jorge I. “ Taming the Cuban Shrew ,” Foreign Policy 10 (1973): 94-116...CUBA AS A TWO LEVEL GAME OR: DEFENDING EXECUTIVE POLICY DISCRETION IN THE FACE OF DOMESTIC PRESSURE by Kevin G. Werry, JR. March 2008...No. 0704-0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for

  7. State-Propagated Narratives about a National Defender in Central Asian States

    Directory of Open Access Journals (Sweden)

    Erica Marat

    2007-03-01

    Full Text Available This article examines the relationship between narratives propagated by the state about a historical national hero and a contemporary soldier's professional ideology in the post-Soviet Central Asian countries (Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, Uzbekistan. It argues that while elite-maintained mass publishing of cohesive narratives about a vividly drawn historical persona, male and warrior, trigger at raising a loyal soldier unified with his compatriots on the basis of cultural values and objects of loyalty, state elites seek to link a contemporary army recruit with his historical predecessors who fought for unity, integrity, and  dominance of the nation. But the link inevitably merges with ethno-centric ideas of protecting the cultural community identified with the narrative, as opposed to a physical entity within the state borders. State elites  reinforce the significance of military experience of the titular ethnic entity in accordance with their own political interests. Narratives about a national defender articulate what the political elites expect from the military service but are restrained from depicting in official policy documents. In order to reach effective results, the Central Asian states retained the same Soviet tools of cultivating patriotism as the basis for the army's internal discipline, but primordial characters have also been incorporated into the indoctrination.

  8. Ülikool valis viis professorit ja nimetas emeriitprofessori (TPM)

    Index Scriptorium Estoniae

    2004-01-01

    Tartu Ülikooli nõukogu nimetas professoriteks tagasi Eesti ajaloo professori Tiit Rosenbergi, eesti keele kui võõrkeele professori Birute Klaasi, rakendusökoloogia professori Olevi Kulli ja majanduspoliitika professori Jüri Sepa. Balti poliitika professoriks sai Andres Kasekamp. Ülikooli mikrobioloogia instituudi juhatajale professor Marika Mikelsaarele anti emeriitprofessori nimetus

  9. Vanemuise teatri juurdeehituse kutsutud arhitektuurikonkurss = Invitational architecture competition for the addition to the Vanemuine theatre / Peeter Pere

    Index Scriptorium Estoniae

    Pere, Peeter, 1957-

    2009-01-01

    Arhitektuurikonkursi žürii liige Peeter Pere võistluse eesmärgist, konkursil 1. preemia pälvinud Jüri Okase ja Marika Lõokese (Okas & Lõoke) võistlustööst ja konkursil osalenud arhitektuuribüroode Kolm Pluss Üks, Kavakava ja Lunge & Ko võistlustöödest

  10. DEFENDER: Detecting and Forecasting Epidemics Using Novel Data-Analytics for Enhanced Response.

    Directory of Open Access Journals (Sweden)

    Nicholas Thapen

    Full Text Available In recent years social and news media have increasingly been used to explain patterns in disease activity and progression. Social media data, principally from the Twitter network, has been shown to correlate well with official disease case counts. This fact has been exploited to provide advance warning of outbreak detection, forecasting of disease levels and the ability to predict the likelihood of individuals developing symptoms. In this paper we introduce DEFENDER, a software system that integrates data from social and news media and incorporates algorithms for outbreak detection, situational awareness and forecasting. As part of this system we have developed a technique for creating a location network for any country or region based purely on Twitter data. We also present a disease nowcasting (forecasting the current but still unknown level approach which leverages counts from multiple symptoms, which was found to improve the nowcasting accuracy by 37 percent over a model that used only previous case data. Finally we attempt to forecast future levels of symptom activity based on observed user movement on Twitter, finding a moderate gain of 5 percent over a time series forecasting model.

  11. Defending psychiatry or defending the trivial effects of therapeutic interventions? A citation content analysis of an influential paper.

    Science.gov (United States)

    Cristea, I A; Naudet, F

    2017-11-29

    about antidepressants, 18 (15%) about antipsychotics. Forty (33%) of the citing papers included data. COIs were reported in 55 papers (46%). Univariate and multivariate regressions showed an association between a quote justifying small or modest effects and the point that treatment effectiveness in psychiatry closely resembles that in general medicine. Our evaluation revealed an overwhelmingly uncritical reception and seemed to indicate that beyond defending psychiatry as a discipline, the paper by Leucht et al. served to lend support and credibility to a therapeutic myth: trivial effects of mental health interventions, most often drugs, are to be expected and therefore accepted. Protocol registration: https://osf.io/9dqat/.

  12. 'Case reporting of rare adverse events in otolaryngology': can we defend the case report?

    LENUS (Irish Health Repository)

    Dias, Andrew

    2012-01-31

    The study of errors in medicine has proliferated since the publication of The Institute of Medicine Report \\'TO ERR IS HUMAN\\' in 2000. Case nuances and process of care issues are valuable areas to explore if the goal is to provide the health care worker with the knowledge to avoid future errors. Meta-analysis and randomized controlled trials provide a large data base of evidence towards improvement and opportunities, but it is suggested that case reports can still provide valuable clinical information. The aim is to use the published literature to produce a series of rare harm case reports in E.N.T. The methods include systematic literature review. Journals searched in PUBMED were 60. Rare harm case obtained from the search were 5,322. Rare harm case reports not reported in any other form of evidence-based medicine were 40. Yes, the case report can be defended as it is an important pillar of evidence-based medicine.

  13. Juustutööstur Muraka südamevalu / Heidit Kaio

    Index Scriptorium Estoniae

    Kaio, Heidit, 1971-

    2011-01-01

    Euroopa Toiduohutusamet (EFSA) ei tunnustanud Südamejuustu vererõhku langetavat toimet. Nii Südamejuustu tootva E-Piima juht Margus Murakas kui ka teadlane Marika Mikelsaar on otsusest nördinud. M. Mikelsaar räägib Tensia bakteri uuringutest. EFSA pole tunnustanud 99% talle esitatud väidetest mõne toiduaine kasulikkuse kohta

  14. Local government under the defenders of the constitution

    Directory of Open Access Journals (Sweden)

    Svirčević Miroslav

    2004-01-01

    Full Text Available The paper explains the development of local government under the rule of the constitution defenders 1842-1858. The author describes the historical facts that led to the abdication of Prince Miloš and the establishment of an oligarchic government of chieftains assembled in a council (Toma Vučić Perišić, Avram Petronijević, Hadji Milutin Garašanin and his son Ilija Stojan and Aleksa Simić, as well as the process of building a modern state administration and cultural identity, an integral part of which was a narrower process of constituting local government. A distinct role in the latter process was played by the Austrian-born Serbs, the only intelligentsia in the Principality of Serbia which was still under Turkish suzerainty. Special attention is given to the analysis of two local government acts instituting centralized local authorities with an enhanced law enforcement role in the districts, counties and communes. Those are District Prefectural System and of County Prefect Office Act of 12 May 1839 and Communal System Act of 13 July the same year. Of great importance was the former law, one of the longest-lived in the history of nineteenth-century Serbian constitutionalism. It was in force in 1839-88 and 1894-1903. Every autocratic regime in Serbia was to rely on it. Its distinctive feature is that it subordinated district and county prefects to the central authority and to the minister of internal affairs. They were reduced to mere police agents deprived of any freedom of action. Thus the local officials assumed the character of rigid administrators looking down on the common people. A natural continuation of this law was the other law of communal organization which turned the lowest local units into mere executive agencies of counties. Thus local government took on the form of a mere transmission of the central government, functioning according to a principle similar to the medieval lord-vassal system: my vassal's vassal is not my

  15. Theses in Archaeology for the Degrees of Doctor and Candidate of Historical Sciences Defended at the Sh. Marjani Institute of History, Tatarstan Academy of Sciences, in 2013

    Directory of Open Access Journals (Sweden)

    Khuzin Fayaz Sh.

    2013-12-01

    Full Text Available An overview of the theses in Archaeology defended in 2013 at the Institute of History named after Sh. Marjani, Tatarstan Academy of Sciences, is presented in the article. Three theses were submitted for the conferment of Doctor’s Degree (I.L. Izmailov, Yu.A. Zeleneyev, A.G. Sitdikov, and seven – for the conferment of Candidate’s Degree (M.L. Pereskokov, M.M. Zubareva, I.V. Molchanov, R.V. Matveyev, M.D. Kalmenov, K.M. Kireeyva, A.V. Lyganov. One thesis was defended specialized in Russian History, which is undoubtedly of interest to archaeologists engaged in Bulgar studies (Sh. R. Mingazov. A brief outline of the content of the submitted theses is offered; basic problems tackled in them are characterized. The latter are predominantly concentrated around issues of ethnogenesis, history and culture of the population of the Volga river region and adjacent territories during the Middle Ages and preceding periods: the Bonze Age and the Early Iron Age.

  16. Power, Process, and Protection: Juveniles as Defendants in the Justice System.

    Science.gov (United States)

    Woolard, Jennifer L; Henning, Kristin; Fountain, Erika

    The juvenile court was created in 1899 in part to remedy the unfairness of trying youth in the adult criminal justice system, but its success at rectifying those problems is unclear. One concern is that the vast majority of youth who are adjudicated delinquent are adjudicated after waiving their right to trial and entering a guilty plea. Fairness and equity in the plea bargaining process are premised on the assumption that youth have the capacity to understand and elect between available options and will be given a meaningful opportunity to choose without coercion and deception. In legal terms, the Constitution will only sanction a plea when the defendant makes a knowing, voluntary, and intelligent waiver of her right to trial. In this chapter, we briefly describe the juvenile court process and explain the circumstances of a plea bargain, which constitutes both a waiver of Constitutional rights and an agreement to certain conditions. Then we evaluate the research and practice knowledge regarding the legal components of a valid waiver-that it must be knowing and voluntary. We consider how information, capacity, and circumstance contribute to a knowing waiver. Then we examine how procedural justice, paternalism, and coercion may affect a voluntary waiver. Throughout, we consider whether the people, policies, and practices meant to assess and safeguard that waiver decision fulfill their intended purpose. © 2016 Elsevier Inc. All rights reserved.

  17. A Dutch Confederate: Charles Liernur Defends Slavery in America

    Directory of Open Access Journals (Sweden)

    Michael J. Douma

    2017-06-01

    Full Text Available In the 1850s and 1860s, Dutch immigrants in America struggled to square their racial views with the politics of slavery in their new country. The historiography of the Dutch world would benefit from incorporating this story, because it is often in moments of conflict when the most explicit expressions of ideology present themselves. The letters of Charles Liernur, a Dutch-born Confederate, provide a unique insight into the mind of an explicit supporter of slavery in an American context. How and why a Dutchman could defend slavery is the primary question this article addresses. Building on Liernur’s story, this article also challenges the standard view that Dutch Americans were natural opponents of slavery. Instead, they held diverse and ambiguous views, shaped in part by the circumstances of their settlement.Een Nederlandse Confederate: Charles Liernur verdedigt slavernij in AmerikaIn de jaren vijftig en zestig van de negentiende eeuw hadden Nederlandse immigranten in Amerika grote moeite een standpunt in te nemen met betrekking tot de slavernij. Een analyse daarvan lijkt van belang voor de Nederlandse geschiedschrijving, omdat ideologische overtuigingen vaak tijdens conflicten op scherpe wijze uitgedragen worden. De brieven van Charles Liernur, een Nederlandse ‘Confederate’, bieden een unieke blik op de denkwereld van eenuitgesproken voorstander van de slavernij. Hoe en waarom kon een Nederlander zo fel de slavernij verdedigen? Dat is de centrale vraag waarop dit artikel een antwoord probeert te geven. Het verhaal van Liernur laat zien dat de gangbare visie, dat Nederlandse Amerikanen van nature tegenstanders van de slavernij waren, niet klopt. Immigranten hadden veeleer uiteenlopende en ambigue meningen over slavernij, bepaald door de omstandigheden waarmee ze in hun nieuwe vaderland te maken kregen.

  18. 19.-25. IX toimub Rüütelkonna hoones Kumu pärlite nädal...

    Index Scriptorium Estoniae

    2005-01-01

    23. IX kõneleb Anu Allikvee teemal "Eestlane baltisaksa kunstnike vaatepiiris"; 24. IX tutvustab Mai Levin Eugen Dückeri maale, 25. IX Ene Lamp Konrad Mäge. Vt. ka lk. 24 Tähtede nädal 26. IX-2. X - kohtumisõhtutel esinevad Marika ja Heinz Valk, Jüri Kuuskemaa, Sirje Helme, Pekka Vapaavuori, Inge Teder, Rain Lõhmus

  19. Mis on elus olulisim / Aita Kivi

    Index Scriptorium Estoniae

    Kivi, Aita, 1954-

    2002-01-01

    Sisu : Mitch Albom. Teisipäevad Morrie'ga; Santa Montefiore. Oota mind ombupuu all; Ridley Pearson. Tont teab kus; Sebastian Faulks. Linnulaul; Kerttu Rakke. Iluasjake; Merike Hanni. Kooliraha; Viivi Luik. Ajaloo ilu; Hermann Hesse. Stepihunt; Eesti luulet läbi aegade / [koostanud Marika Vingissar; Philip K. Dick. Ubik; Marion Zimmer Bradley. Avaloni udud; Kuus eesti luuletajat / koostanud Anne Lange

  20. Pansionaat Pärnus : Seedri 4 = Pension in Pärnu : Seedri 4 / Liina Jänes

    Index Scriptorium Estoniae

    Jänes, Liina, 1977-

    2008-01-01

    Arhitekt Kalle Vellevoog, kaasa töötas Margus Tamm. Sisearhitekt Tiiu Truus. Maastikuarhitekt Vaike Parker. Konstruktor Ahti Lääne. Peatöövõtja: YIT Ehitus AS. Eesti Kultuurkapitali arhitektuuri sihtkapitali 2007. a. arhitektuuripreemia. Žürii liikme Marika Lõokese arvamus. Asendi- ja II korruse plaan, lõige, 3 värv. välisvaadet, sisevaade

  1. Nuclear Medical Science Officers: Army Health Physicists Serving and Defending Their Country Around the Globe

    Science.gov (United States)

    Melanson, Mark; Bosley, William; Santiago, Jodi; Hamilton, Daniel

    2010-02-01

    Tracing their distinguished history back to the Manhattan Project that developed the world's first atomic bomb, the Nuclear Medical Science Officers are the Army's experts on radiation and its health effects. Serving around the globe, these commissioned Army officers serve as military health physicists that ensure the protection of Soldiers and those they defend against all sources of radiation, military and civilian. This poster will highlight the various roles and responsibilities that Nuclear Medical Science Officers fill in defense of the Nation. Areas where these officers serve include medical health physics, deployment health physics, homeland defense, emergency response, radiation dosimetry, radiation research and training, along with support to the Army's corporate radiation safety program and international collaborations. The poster will also share some of the unique military sources of radiation such as depleted uranium, which is used as an anti-armor munition and in armor plating because of its unique metallurgic properties. )

  2. Insane defendants and forensic convicts: before and after the onset of the new forensic psychiatry network and the criminal justice system reform in Chile.

    Science.gov (United States)

    Cid, Rodrigo D

    2010-09-01

    Like other Latin American democratic societies, Chile is supposed to respect legal rights of mentally ill people who are in trouble with the law, and provide them protection, treatment and welfare. Therefore, in this decade, the Chilean Criminal Justice and Mental Health System has undergone significant changes. Because this article is related to the recent social features that involve different areas such as justice, mental health assistance and forensic psychiatry systems, and thereby the nonexistence of current literature that reviews this matter from a global perspective and its implications for the mental health population involved in the justice system, its review and analysis seems to be interesting. The 'New Forensic Psychiatry Network' (NFPN) has been putting in relevant efforts to offer proper treatment and forensic assessment taking into account the civil rights of mentally insane people, and the 'Criminal Justice System Reform' (CJSR) is making possible legal conditions for better justice ensuring a more just resolution of insane defendants' and mentally ill convicts' lawsuits. From the author's viewpoint, all these changes are leading to a deep cultural impact on a Chilean's mind, changing their vision of justice and how society should respect insane defendants' and mentally ill convicts' legal rights.

  3. Defending Oneself From Tourists: The Counter-Environmental Bubble.

    Science.gov (United States)

    Cortini, Michela; Converso, Daniela

    2018-01-01

    According to the Environmental Bubble Theory, tourists perform a series of strategies in order to remain anchored to their residential spots. The environmental bubble is constituted by a sort of social pellicule able to immunize tourists from the identity/cultural attacks which the visit to a foreign country implies. Such a pellicule is activated by the tourists themselves as they decide to travel in group or, for example, to eat only at the restaurants proposing their own national cuisine, and so on. Generally the potential cultural shock of residents is not taken into consideration in literature, even if it is plausibile to make the hypothesis of a counter-environmental bubble performed by the residents in order to defend their own culture and their identity from the attacks of mass tourism, especially for cities that live on tourism, as, for example, Florence or Siena do. Our study aims at testing the access to local tradition made available in promotional material. The hypothesis we propose is that there should exist a difference in promoting cultural heritage and intimate culture. The intimate culture refers to the living culture, the way of living, comprehending cuisine, education, religion, the way by which the role of females and males are performed, and so on. On the other hand, the cultural heritage, or historical culture, makes reference to a culture meant as belonging to the whole mankind, as it happens, for example, for archeological sites or museums. In more detail, we propose the hypothesis that the intimate culture is maintained unaccessible for tourists' gaze, or at least accessible only in the shape of a spectacularized event, the so called pseudo-event of Boorstin. Using the software NUD * IST we analyzed the promotional material of the city of Siena. Our results confirm Boorstin's theory about pseudo-events realized for tourists. The difference between cultural heritage and intimate culture promotion we have revealed shows an additional lecture

  4. Defending Oneself From Tourists: The Counter-Environmental Bubble

    Directory of Open Access Journals (Sweden)

    Michela Cortini

    2018-03-01

    Full Text Available According to the Environmental Bubble Theory, tourists perform a series of strategies in order to remain anchored to their residential spots. The environmental bubble is constituted by a sort of social pellicule able to immunize tourists from the identity/cultural attacks which the visit to a foreign country implies. Such a pellicule is activated by the tourists themselves as they decide to travel in group or, for example, to eat only at the restaurants proposing their own national cuisine, and so on. Generally the potential cultural shock of residents is not taken into consideration in literature, even if it is plausibile to make the hypothesis of a counter-environmental bubble performed by the residents in order to defend their own culture and their identity from the attacks of mass tourism, especially for cities that live on tourism, as, for example, Florence or Siena do. Our study aims at testing the access to local tradition made available in promotional material. The hypothesis we propose is that there should exist a difference in promoting cultural heritage and intimate culture. The intimate culture refers to the living culture, the way of living, comprehending cuisine, education, religion, the way by which the role of females and males are performed, and so on. On the other hand, the cultural heritage, or historical culture, makes reference to a culture meant as belonging to the whole mankind, as it happens, for example, for archeological sites or museums. In more detail, we propose the hypothesis that the intimate culture is maintained unaccessible for tourists' gaze, or at least accessible only in the shape of a spectacularized event, the so called pseudo-event of Boorstin. Using the software NUD*IST we analyzed the promotional material of the city of Siena. Our results confirm Boorstin's theory about pseudo-events realized for tourists. The difference between cultural heritage and intimate culture promotion we have revealed shows an

  5. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1990 to 31 December 1990 (NODC Accession 0000386)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1990 to December 31, 1990. Data were submitted by Institut Francais De Recherche...

  6. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1991 to 31 December 1991 (NODC Accession 0000387)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1991 to December 31, 1991. Data were submitted by the Institut Francais De...

  7. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1998 to 31 December 1998 (NODC Accession 0000394)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1998 to December 31, 1998. Data were submitted by the Institut Francais De...

  8. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1997 to 31 December 1997 (NODC Accession 0000393)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1997 to December 31, 1997. Data were submitted by the Institut Francais De...

  9. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1994 to 31 December 1994 (NODC Accession 0000390)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1994 to December 31, 1994. Data were submitted by Institut Francais De Recherche...

  10. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1993 to 31 December 1993 (NODC Accession 0000389)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1993 to December 31, 1993. Data were submitted by Institut Francais De Recherche...

  11. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1999 to 31 December 1999 (NODC Accession 0000395)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1999 to December 31, 1999. Data were submitted by the Institut Francais De...

  12. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1992 to 31 December 1992 (NODC Accession 0000388)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1992 to December 31, 1992. Data were submitted by Institut Francais De Recherche...

  13. Temperature profile data from the SEA-LAND DEFENDER using bottle, CTD, profiling floats, and XBT casts in a world-wide distribution from 01 January 1995 to 31 December 1995 (NODC Accession 0000391)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profile data were collected from the SEA-LAND DEFENDER from January 1, 1995 to December 31, 1995. Data were submitted by Institut Francais De Recherche...

  14. Defending the social value of knowledge as a safeguard for public trust.

    Science.gov (United States)

    Holzer, Felicitas S

    2017-09-01

    The 'socially valuable knowledge' (SVK) principle has been widely acknowledged as one of the most important guiding principles for biomedical research involving human subjects. The principle states that the potential of producing socially valuable knowledge is a necessary requirement, although not sufficient, for the ethical conduct of research projects. This is due to the assumption that the social value of knowledge avoids exploitation of research subjects and justifies the use of health resources. However, more recently, several authors have started interrogating the validity of SVK in research and offered various lines of argument against the SVK principle as a necessary constraint to research. In this article, I will reconstruct the main arguments of this discussion between defenders and debunkers of the SVK principle and offer a third way to consider the social value of knowledge in research studies. I will argue that the social value of knowledge can be supported by an independent justification. This justification of the SVK principle addresses the rationality and common interest of researchers. Thus, I will introduce the SVK principle as a safeguarding principle for public trust based on a conceptual framework by Alex John London. My approach justifies keeping the principle as a precautionary and rational requirement for human health research that all rational stakeholders can agree upon. © 2017 John Wiley & Sons Ltd.

  15. "Habitarel" valitses kerge minimalism

    Index Scriptorium Estoniae

    2003-01-01

    17. mööbli- ja sisustusmess "Habitare" Helsingi Messikeskuses. Noorte sisekujundajate projektikonkursil "TILA+" parim Soome Kunstikõrgkooli õpilaste Marika Aro ja Nana Turuneni töö "Tulemüür". Eesti tootjate esindatus (TVMK kasevineerist tooli ja lauad, Toom Tekstiili villatekid ja padjad). Muljeid disainiüliõpilaselt Anni Kalmuselt, sisearhitekt Aili Aasojalt, TVMK reklaamijuhilt Viivi Rooselt. 4 ill

  16. Äripäev maakonnas : Pärnumaa / Jaana Pikalev

    Index Scriptorium Estoniae

    Pikalev, Jaana

    2007-01-01

    Pärnumaa edukamad firmad 2006. aastal. Vt. samas: Puuduvad töökäed tulevad kutsehariduskeskusest. Kommenteerivad Veljo Truudel, Marika Tettermann ja Tarmo Vanamõisa; Müügitulu headest kaubamärkidest; Menukuses kajastub emafirma edu; 2005. aasta edetabel; Tugeva meeskonnaga töörindel; Pärnumaa Gaselli TOPi juhib kinnisvarafirma. Küsimustele vastab Puls Brewery AS-i juht Aivo Varem

  17. The plea bargain as a criminal policy instrument: the tension about the fundamental guarantees of the defendant

    Directory of Open Access Journals (Sweden)

    Murilo Thomas Aires

    2017-03-01

    Full Text Available The present research intends to analyze the plea bargaining based on its political-criminal foundation, in order to achieve the tension it maintains in relation to certain fundamental guarantees of the defendant, especially the one who signs the agreement. On this occasion, there will be substantially a contraposition between the legal procedure of collaboration and the principles of the adversary, ample defense, presumption of innocence, and non-self-incrimination. The application of the plea bargain proves extremely controversial not only in the common sense, often conveyed by the media, but mainly in the technical perspective, especially in relation to the scientific debate, which reflects the complexity of the proposed theme. For an effective approach to the theme, the work uses the deductive, historical-evolutionary and dialectical methods, being the bibliographical research the technique fundamentally used.

  18. Kasvukeskkond ja andekus / Marika Veisson

    Index Scriptorium Estoniae

    Veisson, Marika, 1949-

    2001-01-01

    Imikute ja väikelastega läbi viidud longituuduuringu eesmärgiks oli välja selgitada kasvukeskkonna faktorite mõju väikelapse intellekti arengule. Töös osalesid professorid M. Vikat, V. Kolga, teadur A. Vikat, doktor E. Tomberg, magistrandid M. Laane, K. Nugin ja I. Tuisk ning V. Vallner ja A. Veber

  19. Innovatsiooniosak tuleb appi / Marika Popp

    Index Scriptorium Estoniae

    Popp, Marika

    2008-01-01

    Innovatsiooniosak ( innovation vouchers) kujutab endast kinkekaarti ettevõtjale, selle alusel avaneb eriti väike- ja keskmise suurusega ning seni vähe või üldse mitte teadus- ja arendustööga kokku puutunud ettevõtteil saada esimene kogemus ning tekitada juurdepääs teadmiste allikale

  20. Vananemise vastu toiduga / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2012-01-01

    Toitumisteaduste magistri David Wolfe poolt soovitatud vananemise märke aeglustavatest ning pidurdavatest supertoitudest ja toidulisanditest: kasekäsn e must pässik, reishi-seen,kakao, assai, avokaado, brokoli, sidrun, õun, õunamahl, õunasiider, õunaäärikas, maka e mugulkress, goji ja mooruspuu marjad; vetikad klorella ja spirulina; toidulisandid EDTA – etüleendiamiin-tetraäädikhape (Ethylenediaminetetraacetic acid), humiin- või fulvohape, MSM – metüülsulfonüülmetaan

  1. Kergitajad, paksendajad, tarretajad / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2012-01-01

    Nii looduslikest (alginiinhape, guarkummi e guarjahu, jaanileivapuujahu, karrageen, ksantaankummi, kummiaraabik, pektiin) kui tööstuslikult toodetud paksendajatest, tarretajatest ja kergitusainetest

  2. Arenguindeks = Development index / Marika Kivilaid

    Index Scriptorium Estoniae

    Kivilaid, Marika

    2005-01-01

    Kokkuvõte kohalike omavalitsusüksuste arenguindeksi, mis on kolme näitaja (ettevõtete realiseerimise netokäive elaniku kohta, üksikisiku tulumaksu laekumine elaniku kohta, registreeritud töötuse määr) pingeridade kohapunktide summa, arvutamise tulemustest

  3. Sukeldumisharjutused prantslaste fotopeol / Marika Alver

    Index Scriptorium Estoniae

    Alver, Marika

    2006-01-01

    37. fotofestivalist Arles'is Prantsusmaal, mille peakuraatoriks oli fotograaf ja kineast Raymond Depardon. Näitusel on esitatud tema vanade sõprade David Angeli, Guy Le Querrec'i, Jean Gaumy ja David Burnetti töid, aga ka kaasaegset ühiskonda peegeldavate fotograafide Gilles Leimdorferi, Philippe Chanceli, Olivier Jobardi jt töid

  4. Kivid sinu sees / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2011-01-01

    Sapi- ja neerukivide tekke põhjustest, ravist nii tavameditsiini kui ka Steineri poolt loodud antroposoofilise meditsiini vahenditega ning mida saab teha, et kividest hoiduda. Nõuannavad Ida-Tallinna Keskhaigla kirurgid Rein Lumiste ja Toomas Tamm ning perearstikeskuse Medicum perearst Pille Soone

  5. [The analysis of the theses for the scientific degree in "forensic medicine" and related medical disciplines defended during the period from 2010 till 2014].

    Science.gov (United States)

    Fetisov, V A; Gusarov, A A; Kuprina, T A

    2016-01-01

    The objective of the present study was to analyze the results of research reported in the theses for the degree in "forensic medicine" defended in different dissertation committees during the 5 year period (from 2010 till 2014) and to summarize and compartmentalize the main research areas in which the authors carried out their study and thereby make the data obtained more readily available for the wide circles of readers. A total of 55 theses for the scientific degree in "forensic medicine" (14.03.05) were defended during the period from 2010 till 2014 including 18 (32.7%) ones for the degree in two disciplines, the second being either "pathological anatomy" (n=6) or "stomatology" (n=4). Despite the great variety of the problems resolved in the studies conducted during the five year period, the subject matter of most research was on the whole consistent with the main lines of activities of the institutions with which the degree-seeking workers were affiliated. The same refers to the choice of the tutors and scientific advisers. the authors emphasize the necessity of centralized planning of research in compliance with the list of priority investigations having practical significance and coordination of cooperative studies carried out based on the state bureau of forensic medical expertise (SBFME) and departments of forensic medical expertise of medical universities.

  6. Thinking aloud during idea generating and planning before written translation: Developmental changes from ages 10 to 12 in expressing and defending opinions.

    Science.gov (United States)

    Davidson, Matt; Berninger, Virginia

    2016-01-01

    This interdisciplinary research, drawing on cognitive psychology and linguistics, extended to middle childhood past research during early childhood or adulthood on thinking aloud prior to written composing. In year 5 of a longitudinal study of typical writing, when cohort 1 was in grade 5 ( n = 110 ten year-olds) and cohort 2 in grade 7 ( n = 97 twelve year-olds), a cross-sectional study was conducted. Children were first asked to think aloud while they generated ideas and second while they planned their essays to express and defend their opinions on a controversial topic in the region of the United States where they lived. Third, they wrote their essays. Their think-aloud protocols were audio-recorded and later transcribed into writing for analysis. The authors developed and applied rating scales for quality of idea generating and planning in the written transcriptions and quality of opinion expression, opinion defense, organization, and content in the essays children wrote after thinking aloud; total number of words in essays was also counted. Seventh graders scored significantly higher than fifth graders on quality of idea generation but not planning, and higher on all variables rated for quality in the written essays including length. Quality of expressing opinions and defending opinions were uncorrelated in grade 5, but moderately correlated in grade 7. Whether idea generating or planning quality explained unique variance in essays varied with coded written essay variables and grade. Educational applications of results for assessment, assessment-instruction links, instruction in social studies, and theory of mind in persuasive essay writing are discussed.

  7. The annotative review of researches for applicants of the Doctor and the Candidate of the history specialities which were defended in the Oles Honchar Dnipropetrovsk National University in 2015

    Directory of Open Access Journals (Sweden)

    Boyko, O. V.

    2017-09-01

    Full Text Available A subject and maintenance of dissertations for the degree of Doctor and the Candidate of historical sciences which were defended in the specialized scientific advice D 08.051.14 in the Oles Honchar Dnipropetrovsk National University in 2015 is considered. For a year 2 dissertations for the degree of Doctor (specialty 07.00.01 "Нistory of Ukraine" and 4 dissertations for the degree of the Candidate (specialty 07.00.01 "Нistory of Ukraine" – 1 work, 07.00.06 "Нistoriography, a source study and special historical disciplines" – 3 works were defended. All dissertations were ratified by the Department of education and science of Ukraine. It is given the following information on every research work: theme, specialty, place (department of work implementation, date of defense of dissertation, scientific consultant (for doctoral thesis or leader (for candidate's thesis, his scientific degree and rank, place of work, data about official opponents. Considerable attention is spared to the compressed review of the personal achievements of authors especially to scientific novelty of their researches.

  8. Mida ootab lapsevanem? / Raivo Juurak

    Index Scriptorium Estoniae

    Juurak, Raivo, 1949-

    2009-01-01

    Eesti koostöö kogu programmijuht Mati Salundi ja Tallinna Ülikooli sotsiaaltöö instituudi dotsent Anne Tiko viisid möödunud kevadel läbi uuringu, kus selgitasid, mida ootavad 1. klassi astuvate laste vanemad lasteaialt, koolilt, õpetajalt, kohalikult omavalitsuselt. Uuringu tulemusi kommenteerisid vestlusringis Mati Salundi, Lastevanemate Liidu koolitusjuht Kristiine Vahtramäe ja uuringu retsensent, Tallinna Ülikooli kasvatusteaduse instituudi professor Marika Veisson

  9. Defending a single object against an attacker trying to detect a subset of false targets

    International Nuclear Information System (INIS)

    Peng, R.; Zhai, Q.Q.; Levitin, G.

    2016-01-01

    Deployment of false targets can be a very important and effective measure for enhancing the survivability of an object subjected to intentional attacks. Existing papers have assumed that false targets are either perfect or can be detected with a constant probability. In practice, the attacker may allocate part of its budget into intelligence actions trying to detect a subset of false targets. Analogously, the defender can allocate part of its budget into disinformation actions to prevent the false targets from being detected. In this paper, the detection probability of each false target is assumed to be a function of the intelligence and disinformation efforts allocated on the false target. The optimal resource distribution between target identification/disinformation and attack/protection efforts is studied as solutions of a non-cooperative two period min–max game between the two competitors for the case of constrained defense and attack resources. - Highlights: • A defense-attack problem is studied as a two-period min–max game. • Both intelligence contest over false targets and impact contest are considered. • Optimal defense and attack strategies are investigated with different parameters.

  10. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.

    Science.gov (United States)

    Wang, Tian; Wu, Qun; Wen, Sheng; Cai, Yiqiao; Tian, Hui; Chen, Yonghong; Wang, Baowei

    2017-01-13

    WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless sensor networks by introducing mobile actuator elements. Previous studies indicated that mobile actuators can improve network performance in terms of data collection, energy supplementation, etc. However, according to our experimental simulations, the actuator's mobility also causes the sensor worm to spread faster if an attacker launches worm attacks on an actuator and compromises it successfully. Traditional worm propagation models and defense strategies did not consider the diffusion with a mobile worm carrier. To address this new problem, we first propose a microscopic mathematical model to describe the propagation dynamics of the sensor worm. Then, a two-step local defending strategy (LDS) with a mobile patcher (a mobile element which can distribute patches) is designed to recover the network. In LDS, all recovering operations are only taken in a restricted region to minimize the cost. Extensive experimental results demonstrate that our model estimations are rather accurate and consistent with the actual spreading scenario of the mobile sensor worm. Moreover, on average, the LDS outperforms other algorithms by approximately 50% in terms of the cost.

  11. Tudengite küsitlus: kas Aruküla säilitab identiteedi või muutub Tallinna magalaks / Ere Uibo

    Index Scriptorium Estoniae

    Uibo, Ere

    2017-01-01

    Aruküla elaniku Cristina Kaska eestvedamisel tegid Tallinna Ülikooli tudengid Aruküla elukeskkonna teemal küsitluse ja uurimistöö. Cristina Kaska õpib Tallinna Ülikoolis magistriõppes haridustehnoloogiat, uurimisgrupis osalesid ka Marika Kundla, Elle Altmets, Kadi Kasepõld ja Heret Annus. Uuringuga selgitati välja elanike rahulolu Aruküla heakorra, korteriühistute ja vallavalitsuse tööga ning nende endi valmisolek panustada heakorra parandamisse

  12. Song sparrows Melospiza melodia have a home-field advantage in defending against sympatric malarial parasites

    Science.gov (United States)

    Sarquis-Adamson, Yanina

    2016-01-01

    Hosts and parasites interact on both evolutionary and ecological timescales. The outcome of these interactions, specifically whether hosts are more resistant to their local parasites (sympatric) than to parasites from another location (allopatric), is likely to affect the spread of infectious disease and the fitness consequences of host dispersal. We conducted a cross-infection experiment to determine whether song sparrows (Melospiza melodia) have an advantage in dealing with sympatric parasites. We captured birds from two breeding sites 437 km apart, and inoculated them with avian malaria (Plasmodium spp.) cultured either from their capture site or from the other site. Infection risk was lower for birds exposed to sympatric than to allopatric Plasmodium lineages, suggesting that song sparrows may have a home-field advantage in defending against local parasite strains. This pattern was more pronounced at one capture site than at the other, consistent with mosaic models of host–parasite interactions. Home-field advantage may arise from evolutionary processes, whereby host populations become adapted to their local parasites, and/or from ecological interactions, whereby host individuals develop resistance to the local parasites through previous immune exposure. Our findings suggest that greater susceptibility to novel parasites may represent a fitness consequence of natal dispersal. PMID:27853596

  13. The annotative review of researches for applicants of the Doctor and the Candidate of the history specialities which were defended in the Oles Honchar Dnipropetrovsk National University in 2013

    Directory of Open Access Journals (Sweden)

    Boyko, O. V.

    2015-05-01

    Full Text Available A subject and maintenance of dissertations for the degree of Doctor and the Candidate of historical sciences which were defended in the specialized scientific advice D 08.051.14 in the Oles Honchar Dnipropetrovsk National University in 2013 is considered. Only for a year 6 dissertations for the degree of Doctor (specialty 07.00.01 – «Нistory of Ukraine» – 5 works; 07.00.02 – «World history» – 1 work and 16 dissertations for the degree of the Candidate (specialty 07.00.01 – «Нistory of Ukraine» – 10 works, 07.00.02 – «world history» – 4 works, 07.00.06 – «Нistoriography, a source study and special historical disciplines» – 2 works were defended. All dissertations were ratified by the Department of education and science of Ukraine. It is given the following information on every research work: theme, specialty, place (department of work implementation, date of defense of dissertation, scientific consultant (for doctoral thesis or leader (for candidate’s thesis, his scientific degree and rank, place of work, data about official opponents. Considerable attention is spared to the compressed review of the personal achievements of authors especially to scientific novelty of their researches.

  14. Pensionitõus ja pangad / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2006-01-01

    Ilmunud ka: Videvik 16. märts lk. 3, Vali Uudised 17. märts lk. 2, Meie Maa 18. märts lk. 2, Virumaa Teataja, Pärnu Postimees, Harjumaa, Põhjarannik, Severnoje Poberezhje 21. märts lk. 11,19,7,2,5, Nädaline 28. märts lk. 3. 1. apr. viiakse läbi teine uue valitsuse erakonnaline pensionitõus. Pangad on laenuandmise vanusepiirangut kergitanud 10 aasta võrra

  15. Appi, pea lõhub / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2010-01-01

    Vestlusest Ida-Tallinna Keskhaigla neuroloogiaosakonna juhataja ja peavalukeskuse rajaja dr Toomas Toomsooga ning Aurea ajurveeda- ja massaažikeskuse ajurveedaarsti Aleksandr Dreljoviga peavalust: peavalu ravi india ajurveeda seisukohalt, läänemeditsiini peavalu tüübid ning nende ravi jne

  16. Siledaks ja saledaks skalpellita / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2013-01-01

    Eestis enamlevinud protsetuuridest kortsude silumiseks, naha noorendamiseks, keha salendamiseks ja juuste kohendamiseks: botox-süstid, hüaloroonhappesüstid, fotonoorendus, lasernoorendus, velashape tselluliidihooldus, kavitatsioon, tahe magic botox vananemisvastane juuksehooldus

  17. Reis kosmosesse : [Floating-kambrist] / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2011-01-01

    Ameerika psühholoogi John C. Lilly poolt kasutusele võetud Floating-kambrist ehk hõljumisvannist, mis aeglustab ajulaineid ning seeläbi aitab vähendada lihaspinget, stressi, ärevust, peavalusid, vererõhku ning parandada und, selgroo- ja kaelavigastusi, suurendada loovust ja heaolu jne

  18. Liival etenduvad vangide elulood / Marika Raiski

    Index Scriptorium Estoniae

    Raiski, Marika

    2000-01-01

    Merle Karusoo 12 vangi elulugu käsitlevast dokumentaallavastusest "Save Our Souls", mis tuleb ettekandele 31. mail Tallinnas Liiva keskuses. Etenduses osalevad Vene Draamateatri ja Narva Teatri Ilmarine näitlejad. Eestvedajaks on VAT Teater

  19. "Ravimiohutus - rahva tervise kaitseks" / Marika Gordon

    Index Scriptorium Estoniae

    Gordon, Marika

    2010-01-01

    Ajakirja “Apteeker” ja Eesti Akadeemilise Farmaatsia Seltsi kevadkonverentsi ettekandeid kommenteerivad MEDA Pharma SIA Eesti juhataja Anu Adermann, Apteekide infotehnoloogia OÜ juhataja Siim Uibokand, Pärnu Lõvi apteegi juhataja Kärt Kambla ja Eesti Haigekassa ravimiosakonna peaspetsialist Erki Laidmäe

  20. Alaealise õigus abordile / Marika Žmenja

    Index Scriptorium Estoniae

    Žmenja, Marika

    2014-01-01

    1. jaanuaril 2009 jõustusid raseduse katkestamise ja steriliseerimise seaduse muudatused, mille järgi alaealise raseduse katkestamiseks on vaja lisaks tema enda sooviavaldusele saada ka eestkostja nõusolek või kohtu luba. Alaealise õigusest eraelu kaitsele inimõiguste ja põhivabaduste kaitse konventsiooni ja Euroopa Kohtu praktika alusel

  1. Tõde pensionide kojukande kohta / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2008-01-01

    Pensionide kojukande muudatustest ning vastuseks 28. oktoobri ajalehes ilmunud Heljo Pikhofi artiklile "Pensioniraha jõuab igaüheni". Ilmunud ka Harju Ekspress 7. nov. 2008, lk. 9 ; Põhjarannik 6. nov. 2008, lk. 2 ; Võrumaa Teataja 8. nov. 2008, lk. 2 ; Pärnu Postimees 6. nov. 2008, lk. 11 ; Vooremaa 13. nov. 2008, lk. 2 ; Virumaa Teataja 21. nov. 2008, lk. 11, pealkiri kujul: veel pensionide kojukandest ; Sõnumitooja 12. nov. 2008, lk. 2

  2. Education to defend professional values in the new corporate age.

    Science.gov (United States)

    Relman, A S

    1998-12-01

    The corporate transformation of medicine raises questions about the basic purposes and values of the profession and the physician's social role that have not been adequately considered in medical school and residency curricula. Medical schools and graduate programs need to make students and trainees more aware of the conflict between traditional professional values and the imperatives of the market, so they will be better prepared to defend these values in the new business climate. Otherwise, medical schools and teaching hospitals could simply become trade schools, turning out sophisticated technicians, future entrepreneurs, and managers. As a starting point for educational reform, the author suggests that students (1) learn the social and political history of the medical profession of the United States over the past 200 years; (2) be introduced to the economic dimensions of health care--where the money comes from and how it is spent; (3) learn the history of health maintenance organizations, and understand the different forms of managed care and how they work; (4) become familiar with the health care reforms proposed by the Clinton Administration in the early 1990s, and understand why they were defeated and what has happened to health care reform since then; (5) examine the conflict between the culture of business managers and that of practicing physicians, and consider the recent efforts to achieve "quality control" as a balance to the emphasis on price; (6) be challenged to think about the important ethical, legal, and professional issues raised by the industrialization of health care; and (7) consider the political and professional options that might preserve the most important principles of medical professionalism while still addressing the social objectives of cost control, community service, and universal access. The author concludes that to prevent medicine from becoming merely a technologic business, the medical profession will have to become more actively

  3. Tubin: The Parson of Reigi / Robert Layton

    Index Scriptorium Estoniae

    Layton, Robert

    1993-01-01

    Uuest heliplaadist "Tubin: The Parson of Reigi. Teo Maiste, Marika Eensalu, Ivo Kuusk, Annika Tõnuri, Urve Tauts, Leili Tammel, Tiit Tralla, Arvo Laid. Estonia Opera Company / Paul Mägi; Requiem for Fallen Soldiers. Urve Tauts, Talevaldis Deksnis, Urmas Leiten, Rein Tiido, Rein Roos. Estonian National Male Choir / Eri Klas. Ondine CD ODE 783-2 (2 discs: 116 min.). Recorded in association with the Estonian Cultural Foundation. Requiem - comparative version: Lund. Choral Soc., Järvi (9/88) CD 297

  4. Kolmene ülikool esitles professoreid ja kirjanduspreemia laureaate

    Index Scriptorium Estoniae

    2008-01-01

    Tallinna Ülikool esitles 3. aastapäeva aktusel aasta jooksul professoreiks valituid: Lorenzo Cañás Bottos, Jyrki Käkönen, Aaro Toomela, Airi Värnik, Marika Mägi, Priit Reiska, Eve Kikas ja Karsten Brüggemann. Selgusid ka tänavused Tallinna Ülikooli kirjanduspreemia laureaadid. Algupärase ilukirjanduse vallas pälvis auhinna romanist, luuletaja ja tõlkija, doktorant Maarja Kangro, tõlkepreemia sai kirjanik ja tõlkija Arvo Valton

  5. Critical review of the equipment hatch of a large dry steel containment. The DEFENDER IMPROVEMENT

    International Nuclear Information System (INIS)

    Mantega, F.; Penno, E.; Vanini, P.

    1994-01-01

    Performances of the Containment System under Severe Accident conditions depend on a number of different features and components. The equipment hatch may be considered a critical component because it is a potential main contributor to the total Containment leak rate during a Severe accident and a potential (depending on the design) direct leak path between the containment atmosphere and the environment. The analytical study performed to anticipate the response of the equipment hatch of a large dry steel containment under Severe Accident condition has pointed out some questions of concern. The possible leak tightness failure mechanism are related to: the gaskets elastic characteristics degradation due to thermal and radiological aging; the deformation of the hatch sleeve induced by the containment wall; and the differential expansion between gasket material and steel. Beside, the equipment hatch may be considered a single barrier and although it is equipped with two gaskets, it is not difficult to demonstrate that a backup function cannot be assigned to the external gasket. For these reason it seems to be necessary to realize a wider application of the 'Defence in Depth' criteria in the design of this component. The DEFENDER (DEFENce in Depth Equipment hatch Requalification) might be a solution to increase the margin of safety of the equipment hatch under the Severe Accident condition. (author)

  6. Vanemuise "Suur kuri hunt" valiti parimaks lastelavastuseks / Brigitta Davidjants

    Index Scriptorium Estoniae

    Davidjants, Brigitta, 1983-

    2006-01-01

    27. mail lõppenud laste- ja noorteteatrite festivalist "Draamake 2006". Lastelavastuse auhinna sai Vanemuise "Suur kuri hunt" (lavastaja Taago Tubin), noorsooteatri auhind määrati Vene Teatri lavastusele "Veerevad kivid ei sammaldu" (lavastaja Nikita Grinshpun), näitlejaauhinnaga pärjati Marika Vaarikut osatäitmise eest VAT Teatri lavastuses "Klammi sõda", publikupuudutuse auhinna sai ZUGA ühendatud tantsijate "ZUGA lastekas" ja sõnajõuauhind läks NO99 teatri lavastusele "Kaks päikest"( lavastaja Andres Noormets)

  7. 4 maja lugu / Tiina Kolk

    Index Scriptorium Estoniae

    Kolk, Tiina

    2006-01-01

    Keskaegses kaupmeheelamus Lai tänav 23 paikneb Tallinna Linnateater (taastamistööde juht Teddy Böckler). Endisesse raadiotehasesse Punane RET Tallinnas on ehitatud Sampo panga peakontor (arhitektid Jüri Okas ja Marika Lõoke). Tartus Munga tänaval Eesti Panga Tartu majas (arhitektid Arnold Matteus ja Karl Burman, uue ruumiprogrammi kavandajad Uko Künnap ja Aivar Roosaar) asub Eesti Vabariigi Haridusministeerium. Pärnus endises Herman Leopold Ammende eramus (Peterburi arhitektuuribüroo Mieritz & Gerassimov, renoveeris Aivar Roosaar) asub hotell

  8. Mental illness and legal fitness (competence) to stand trial in New York State: expert opinion and criminal defendants' psychiatric symptoms.

    Science.gov (United States)

    Lee, Eugene; Rosner, Richard; Harmon, Ronnie

    2014-07-01

    Fitness to Stand Trial is a critical concept in the adjudication of justice-involved persons. A retrospective study was conducted to examine criminal defendants' specific psychiatric symptoms and those symptoms' associations with expert opinions on Competence to Stand Trial. One hundred charts were reviewed: 50 Cases (opined as Not Fit) were compared against 50 Controls (opined as Fit) with respect to ratings on the Brief Psychiatric Rating Scale (BPRS). A significance level of 0.001 was selected a priori. Statistically significant differences were found in seven of the eighteen BPRS symptom constructs (with the highest differences in Conceptual Disorganization and Unusual Thought Content) and two of the four BPRS higher-order syndrome factors (Thinking Disorder and Hostile-Suspiciousness). Consistent with previous reports, psychotic symptoms are found in this study to be inversely associated with Fitness. Validity, reliability, and limitations of this study, as well as directions for future research, are discussed herein. © 2014 American Academy of Forensic Sciences.

  9. The annotative review of researches for applicants of the Doctor and the Candidate of the history specialities which were defended in the Oles Honchar Dnipropetrovsk National University in 2015

    OpenAIRE

    Boyko, O. V.

    2017-01-01

    A subject and maintenance of dissertations for the degree of Doctor and the Candidate of historical sciences which were defended in the specialized scientific advice D 08.051.14 in the Oles Honchar Dnipropetrovsk National University in 2015 is considered. For a year 2 dissertations for the degree of Doctor (specialty 07.00.01 "Нistory of Ukraine") and 4 dissertations for the degree of the Candidate (specialty 07.00.01 "Нistory of Ukraine" – 1 work, 07.00.06 "Нistoriography, a source study and...

  10. “The same love, the same faith, the same tears”: ecclesial initiatives about the cult of Our Lady of El Quinche to defend the Republic of the Sacred Heart, Ecuador (1883-1889

    Directory of Open Access Journals (Sweden)

    Luis Esteban Vizuete Marcillo

    2017-07-01

    Full Text Available Within the conflict between church and state in the 19th century, the clergy and laymen tried to defend the establishment where the church had hegemony over the state and society. Between 1883 and 1889, Ecuador experienced some ecclesial initiatives to defend which stood for the idea of a Republic of the Sacred Heart. This article studies the case of Our Lady of El Quiche, a colonial massive cult, which was part of a process of re-appropriation and reinterpretation of its history. It also suffered a process of spreading and strengthening of its cult, linking with the image of the Republic, political conflicts and the power of the church. Between politics and religion, the discourses and practices of the clergy and the faithful show the intention of the church to shore up its own idea of a catholic Republic and an organized society. In this article, the use of manuscripts and printed sources give information to contrast multiple voices and multiple religious acts which performed a new local Mariology about El Quinche and a reaction to a context in which the religious hegemony and the participation of the clergy in politics were questioned; meanwhile the relations inside the church were recomposing.

  11. Plants attract parasitic wasps to defend themselves against insect pests by releasing hexenol.

    Directory of Open Access Journals (Sweden)

    Jianing Wei

    2007-09-01

    Full Text Available Plant volatiles play an important role in defending plants against insect attacks by attracting their natural enemies. For example, green leaf volatiles (GLVs and terpenoids emitted from herbivore-damaged plants were found to be important in the host location of parasitic wasps. However, evidence of the functional roles and mechanisms of these semio-chemicals from a system of multiple plants in prey location by the parasitoid is limited. Little is known about the potential evolutionary trends between herbivore-induced host plant volatiles and the host location of their parasitoids.The present study includes hierarchical cluster analyses of plant volatile profiles from seven families of host and non-host plants of pea leafminer, Liriomyza huidobrensis, and behavioral responses of a naive parasitic wasp, Opius dissitus, to some principal volatile compounds. Here we show that plants can effectively pull wasps, O. dissitus, towards them by releasing a universally induced compound, (Z-3-hexenol, and potentially keep these plants safe from parasitic assaults by leafminer pests, L. huidobrensis. Specifically, we found that volatile profiles from healthy plants revealed a partly phylogenetic signal, while the inducible compounds of the infested-plants did not result from the fact that the induced plant volatiles dominate most of the volatile blends of the host and non-host plants of the leafminer pests. We further show that the parasitoids are capable of distinguishing the damaged host plant from the non-host plant of the leafminers.Our results suggest that, as the most passive scenario of plant involvement, leafminers and mechanical damages evoke similar semio-chemicals. Using ubiquitous compounds, such as hexenol, for host location by general parasitoids could be an adaptation of the most conservative evolution of tritrophic interaction. Although for this, other compounds may be used to improve the precision of the host location by the parasitoids.

  12. The annotative review of researches for applicants of the Doctor and the Candidate of the history specialities which were defended in the Oles Honchar Dnipropetrovsk National University in 2014

    OpenAIRE

    Boiko, O. V.

    2016-01-01

    A subject and maintenance of dissertations for the degree of Doctor and the Candidate of historical sciences which were defended in the specialized scientific advice D 08.051.14 in the Oles Honchar Dnipropetrovsk National University in 2014 is considered. For a year 4 dissertations for the degree of Doctor (specialty 07.00.01 – «Нistory of Ukraine») and 3 dissertations for the degree of the Candidate (specialty 07.00.01 – «Нistory of Ukraine» – 1 work, 07.00.06 – «Нistoriography, a source stu...

  13. Ethical Frameworks in Public Health Decision-Making: Defending a Value-Based and Pluralist Approach.

    Science.gov (United States)

    Grill, Kalle; Dawson, Angus

    2017-12-01

    A number of ethical frameworks have been proposed to support decision-making in public health and the evaluation of public health policy and practice. This is encouraging, since ethical considerations are of paramount importance in health policy. However, these frameworks have various deficiencies, in part because they incorporate substantial ethical positions. In this article, we discuss and criticise a framework developed by James Childress and Ruth Bernheim, which we consider to be the state of the art in the field. Their framework distinguishes aims, such as the promotion of public health, from constraints on the pursuit of those aims, such as the requirement to avoid limitations to liberty, or the requirement to be impartial. We show how this structure creates both theoretical and practical problems. We then go on to present and defend a more practical framework, one that is neutral in avoiding precommitment to particular values and how they ought to be weighted. We believe ethics is at the very heart of such weightings and our framework is developed to reflect this belief. It is therefore both pluralist and value-based. We compare our new framework to Childress and Bernheim's and outline its advantages. It is justified by its impetus to consider a wide range of alternatives and its tendency to direct decisions towards the best alternatives, as well as by the information provided by the ranking of alternatives and transparent explication of the judgements that motivate this ranking. The new framework presented should be useful to decision-makers in public health, as well as being a means to stimulate further reflection on the role of ethics in public health.

  14. Teatri aastaauhindade nominendid

    Index Scriptorium Estoniae

    2006-01-01

    Lavastajaauhind : Merle Karusoo, Elmo Nüganen, Tiit Ojasoo, Ene-Liis Semper, Kristian Smeds, Hendrik Toompere jun, Ingomar Vihmar ; kunstnikuauhind : Iir Hermeliin, Liina Keevallik, Ene-Liis Semper, Aime Unt, Ervin Õunapuu ; naisnäitleja auhind : Ülle Kaljuste, Kaie Mihkelson, Harriet Toompere, Marika Vaarik, Liina Vahtrik ; meesnäitleja auhind : Ain Lutsepp, Rein Oja, Rain Simmul, Tarvo Sõmer, Tambet Tuisk, Aarne Üksküla ; Balleti- ja tantsuteater : Marina Tshirkova, Seki Hirotaka, Mari Savitski, Oksana Titova, Taavet Jansen, Sasha Pepeljajev, Katrin Essenson ja Tantsuteater Fine 5

  15. Teatri aastaauhindadele kandideerijad selgunud

    Index Scriptorium Estoniae

    2006-01-01

    Lavastajaauhind : Merle Karusoo, Elmo Nüganen, Tiit Ojasoo, Ene-Liis Semper, Kristian Smeds, Hendrik Toompere jun, Ingomar Vihmar ; kunstnikuauhind : Iir Hermeliin, Liina Keevallik, Ene-Liis Semper, Aime Unt, Ervin Õunapuu ; naisnäitleja auhind : Ülle Kaljuste, Kaie Mihkelson, Harriet Toompere, Marika Vaarik, Liina Vahtrik ; meesnäitleja auhind : Ain Lutsepp, Rein Oja, Rain Simmul, Tarvo Sõmer, Tambet Tuisk, Aarne Üksküla ; Balleti- ja tantsuteater : Marina Tshirkova, Seki Hirotaka, Mari Savitski, Oksana Titova, Taavet Jansen, Sasha Pepeljajev, Katrin Essenson ja Tantsuteater Fine 5

  16. EBSCO infopäev Tallinnas / Marika Meltsas

    Index Scriptorium Estoniae

    Meltsas, Marika

    2008-01-01

    16. aprillil 2008 toimus Tallinnas EBSCO (Elton B. Stephens Company) infopäev, kus maailma suurim elektrooniliste ja trükiajakirjade vahendaja tutvustas oma tooteid ja teenuseid Eesti raamatukogudele. Kommentaar korraldajalt Tiina Nurmilt

  17. Eesti tervishoid - Euroopa punane latern / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2005-01-01

    Ilmunud ka: Nädaline 3. märts lk. 4, Elva Postipoiss 5. märts lk. 4, Valgamaalane 12. märts lk. 2, Hiiu Leht 8. apr. lk. 2. Autori sõnul on Eesti tervishoiu rahastamise poolest Euroopas viimasel kohal, kulutades selleks alla 5% SKP-st

  18. Eesti seadused kolivad igaveseks internetti / Marika Seppius

    Index Scriptorium Estoniae

    Seppius, Marika, 1959-

    2005-01-01

    1. jaanuarist 2007 on elektrooniline Riigi Teataja ainus ametlik väljaanne. Sama ka: Põhjarannik 26. juuli 2005, lk. 2 ; Virumaa Teataja 28. juuli 2005, lk. 7 ; Võrumaa Teataja 30. juuli 2005, lk. 2 ; Sakala 4. aug. 2005, lk. 2 ; Pärnu Postimees 4. aug. 2005, lk. 15 ; Vooremaa 4. aug. 2005, lk. 2 ; Valgamaalane 11. aug. 2005, lk. 2 ; Koit 13. aug. 2005, lk. 6

  19. Minnesota Multiphasic Personality Inventory-2-Restructured Form (MMPI-2-RF) scores generated from the MMPI-2 and MMPI-2-RF test booklets: internal structure comparability in a sample of criminal defendants.

    Science.gov (United States)

    Tarescavage, Anthony M; Alosco, Michael L; Ben-Porath, Yossef S; Wood, Arcangela; Luna-Jones, Lynn

    2015-04-01

    We investigated the internal structure comparability of Minnesota Multiphasic Personality Inventory-2-Restructured Form (MMPI-2-RF) scores derived from the MMPI-2 and MMPI-2-RF booklets in a sample of 320 criminal defendants (229 males and 54 females). After exclusion of invalid protocols, the final sample consisted of 96 defendants who were administered the MMPI-2-RF booklet and 83 who completed the MMPI-2. No statistically significant differences in MMPI-2-RF invalidity rates were observed between the two forms. Individuals in the final sample who completed the MMPI-2-RF did not statistically differ on demographics or referral question from those who were administered the MMPI-2 booklet. Independent t tests showed no statistically significant differences between MMPI-2-RF scores generated with the MMPI-2 and MMPI-2-RF booklets on the test's substantive scales. Statistically significant small differences were observed on the revised Variable Response Inconsistency (VRIN-r) and True Response Inconsistency (TRIN-r) scales. Cronbach's alpha and standard errors of measurement were approximately equal between the booklets for all MMPI-2-RF scales. Finally, MMPI-2-RF intercorrelations produced from the two forms yielded mostly small and a few medium differences, indicating that discriminant validity and test structure are maintained. Overall, our findings reflect the internal structure comparability of MMPI-2-RF scale scores generated from MMPI-2 and MMPI-2-RF booklets. Implications of these results and limitations of these findings are discussed. © The Author(s) 2014.

  20. 1970. aastatel alustas arhitektidest sõprade ja kolleegide rühm... / Mari Laanemets

    Index Scriptorium Estoniae

    Laanemets, Mari, 1975-

    2008-01-01

    27.VI avatakse Eesti Arhitektuurimuuseumis Rotermanni soolalaos 1970. ja 1980. alguse eksperimentaalset arhitektuuripraktikat käsitlev näitus "Keskkond, objektid, kontseptsioonid. Tallinna kooli arhitektid 1972-1985". Näha saab Ülevi Eljandi, Ignar Fjuki, Veljo Kaasiku, Tiit Kaljundi, Vilen Künnapu, Leonhard Lapini, Avo-Himm Looveere, Kristin-Mari Looveere, Marika Lõokese, Jüri Okase, Jaan Olliku, Ain Padriku, Toomas Reinu, Andres Ringo, Sirje Runge, Harry Sheini, Tõnis Vindi ja Matti Õunapuu töid. Näituse kuraatorid Andres Kurg ja Mari Laanemets. Samas: "Uue arhitektuuri näituse programm" (1972)

  1. Hea teater lastele ja noortele / Katrin Ruus

    Index Scriptorium Estoniae

    Ruus, Katrin

    2006-01-01

    22.-27. maini Tallinnas, Tartus, Pärnus, Narvas toimunud laste- ja noortetatrite festivalist "Draamake 2006". Nimetatud auhinnasaajad : lastelavastuse auhinna sai Vanemuise "Suur kuri hunt" (lavastaja Taago Tubin), noorsooteatri auhind määrati Vene Teatri lavastusele "Veerevad kivid ei sammaldu" (lavastaja Nikita Grinshpun), näitlejaauhinnaga pärjati Marika Vaarikut osatäitmise eest VAT Teatri lavastuses "Klammi sõda", publikupuudutuse auhinna sai ZUGA ühendatud tantsijate "ZUGA lastekas" ja sõnajõuauhind läks NO99 teatri lavastusele "Kaks päikest" (lavastaja Andres Noormets)

  2. Solving Defender-Attacker-Defender Models for Infrastructure Defense

    Science.gov (United States)

    2011-01-01

    persons]; bpp is the total supply of travelers originating at p; cdij length of arc (i, j)∈A under defense option d [kilometers]; qdij “equivalent travel...ensure that all bpp travelers originating at each p∈N arrive at appropriate destinations. The second set of constraints in Y (w) requires that all...1. Node data for DAD modeling of the Königsberg transportation network. Nodes p∈N Supply bpp (persons) Demand −bpi (persons) Aa, Ab, Ac, Ae, 200

  3. Lugemis- ja kuulamissoovitusi lapsemeelsetele : [heliraamatud ja -plaadid lastele] / Esme Kassak

    Index Scriptorium Estoniae

    Kassak, Esme

    2010-01-01

    Arvustus: Jancis, Kaspar. Seiklus Salamandril, ehk, Morten Viksi uskumatud juhtumised lollide laevas. Tallinn : Menu Kirjastus, 2010 ; Kivirähk, Andrus. Kaka ja kevad [Helisalvestis] / loeb Ülle Kaljuste. Tallinn ; Varrak, 2010 ; Kivirähk, Andrus. Kaelkirjak [Helisalvestis] / loeb Harriet Toompere. Tallinn : Varrak, 2010 ; Tungal, Leelo. Hea lapse laulud [Helisalvestis]. Tallinn : Nõmmelill, 2010 ; Pajusaar, Priit. Lapsed, liblikad ja teised mutukad [Helisalvestis]. Tallinn : Varrak, 2010 ; Toman, Eduard. Gena ja teised : [Helisalvestis]. Tallinn : Greenroom Studio, 2010 ; Vilmusenaho, Marika. Tuulejutu viisid [Helisalvestis] / esitavad Meero Muusiku laululapsed. I.k. : Tempo Rubato, 2009 ; Raud, Eno. Sipsik : laste unejutud / loeb Salme Reek. Tallinn : Eesti Rahvusringhääling, 2010

  4. Maksude äkktõus ja hinnaralli / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2007-01-01

    Ilmunud ka: Vali Uudised, 13. juuni 2007, lk. 2; Meie Maa, 20. juuni 2007, lk. 2; Severnoje Poberezhje, 20. juuni 2007, lk. 2; Virumaa Teataja, 21. juuni 2007, lk. 11; Põhjarannik, 21. juuni 2007, lk. 2; Sõnumitooja, 22. juuni 2007, lk. 2; Harjumaa, 26. juuni 2007, lk. 2; Hiiu Leht, 26. juuni 2007, lk. 2; Pärnu Postimees, 27. juuni 2007, lk. 15; Vooremaa : Kallaste Linna Leht, 21. juuli 2007, lk. 2. Autor kritiseerib valitsuskoalitsiooni maksupoliitikat

  5. Valitsus hämab liikluskindlustuse seadusega / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2004-01-01

    Ilmunud ka: Vooremaa, 12. veebr. 2004, lk. 2; Elva Postipoiss, 14. veebr. 2004, lk. 4; Meie Maa, 20. veebr. 2004, lk. 2; Vali Uudised, 20. veebr. 2004, lk. 2; Põhjarannik, 21. veebr. 2004, lk. 2; Severnoje Poberezhje, 21. veebr. 2004, lk. 2; Kesknädal, 25. veebr. 2004, lk. 2; Valgamaalane, 16. märts 2004, lk. 6. Kriitiliselt liikluskindlustuse seaduse eelnõust. Liikluskindlustuse seaduse eelnõu arutelust Riigikogus

  6. HIV-infektsioon on seotud nakkuslike haigustega / Marika Kusnets

    Index Scriptorium Estoniae

    Kusnets, Marika

    2004-01-01

    TÜ arstiteaduskonna täienduskeskuse kolmepäevasel kursusel Tallinnas olid kõneks HIV-nakkuse seosed bakteriaalsete ja viiruslike nahahaigustega, parasitaarsete ja seenhaigustega, samuti nakkushaiguste ja seksuaalsel teel edasiantavate haigustega

  7. Aino Ugaste doktoritööst / Marika Veisson

    Index Scriptorium Estoniae

    Veisson, Marika

    2005-01-01

    12. veebruaril 2005. aastal kaitses TPÜ dotsent Aino Ugaste Soomes Jyväskylä Ülikoolis kasvatusteaduste doktori kraadi teemal "The Childs' play world at home and the mothers' role in the play - Laste mängumaailm kodus ja ema roll mängus"

  8. Korruptsioon mittetulundusliikumises / Marika K Arendi Elita von Wolsky

    Index Scriptorium Estoniae

    Arendi Elita von Wolsky, Marika K.

    2001-01-01

    Eesti Mittetulundusühingute ja Sihtasutuste Liidus toimunud erakorralisest koosolekust, kus arutati artikli autori avaldusi, mis olid ajendatud tema avalikus kirjas esitatud küsimustest Mall Hellamile. Vt. samas: Kesknädal, 5. dets. 2001, lk. 9

  9. Lionsi asepresident kiitis Eesti "lõvisid" / Marika Milve

    Index Scriptorium Estoniae

    Milve, Marika, 1968-

    1995-01-01

    Lions klubi Eestis. Vt. ka Meie Maa "Lionsite maailma-assotsiatsiooni teine asepresident Augustino Solivo külastas Saaremaad" 8- juuni, lk. 1, Oma Saar "Augustino Soliva: tavaliselt oskavad inimesed võtta, kuid ei oska anda" 7. juuni, lk. 3

  10. Siddhameditsiin : hästi hoitud saladus / Marika Makarova

    Index Scriptorium Estoniae

    Makarova, Marika

    2013-01-01

    Vestlusest Šveitsis elava siddhatohtri Gitanjali Azariah-Theleniga Indias elavate tamilite filosoofiast kui ka loodusmeditsiinist, mille õpetused on kirja pandud Tamil Nadu osariigi templites asuvates iidsetes tamilikeelsetes ürikutes

  11. Tähelepanu keskmes on viiruslik hepatiit / Marika Kusnets

    Index Scriptorium Estoniae

    Kusnets, Marika

    2008-01-01

    Ülemaailmsel hepatiidipäeval 19. mail korraldasid Eesti Gastroenteroloogide Selts (EGS) ja Roche Eesti OÜ meediakanalite esindajatele ümarlaua, et aidata teadvustada C-hepatiidi ohtu, testimis- ja ravivõimalusi Eestis

  12. TEH võrgustik - viis aastat Eestis / Marika Kusnets

    Index Scriptorium Estoniae

    Kusnets, Marika

    2005-01-01

    Eestis on tervist edendavate haiglate (TEH) võrgustik tegutsenud juba viis aastat, sellega on liitunud 22 haiglat. Tänavust konverentsi peeti teemal "Tervise edendamine ja kvaliteedi tagamine haiglas: standardid ja praktika"

  13. Kaubakategooriate juhtimine annab konkurentide ees eelise / Marika Merilai

    Index Scriptorium Estoniae

    Merilai, Marika

    2008-01-01

    Tootekategooriate või ka kaubakategooriate juhtimine on ettevõtte äristrateegia, mis võimaldab jaekaubandusettevõttel saavutada konkurentidest paremaid tulemusi. Kanada turundusprofessori Brent McKenzie sõnul on kaubakategooriate juhtimine keeruline, kuna pole olemas ühte standardset lahendust, kuidas ettevõttes kategooriate juhtimist teostada. Skeem: Kaubakategooriate juhtimise eesmärgid. Kommenteerib ASi A-Selver sortimendijuht Agi Metsandi

  14. Data defenders

    CERN Multimedia

    Katarina Anthony

    2014-01-01

    Uniting High-Energy Physics institutes, experimental collaborations and funding agencies, the HEP Data Preservation Initiative (DPHEP) has set out to change the way we save “information”.   When we talk about preserving physics results, our minds first turn to preserving raw data. But data preservation is much more than just the keeping of bits; it also involves saving the software used. Data needs to be available once experiments end, and it needs to be interpretable. Suppose a new theory or discovery arises and we need to revisit previous data sets with our new understanding. This could occur five, ten, fifty years from now... how can we ensure that the full potential of our data will be accessible then? Back in 2009, collaborations at CERN, DESY, SLAC and FNAL had a similar revelation. Colliders were coming to the end of their life and, if no action was taken, the data would effectively be lost forever. To tackle this issue, laboratories and experiments worldwide establish...

  15. "Too stubborn to ever be governed by enforced insanity": Some therapeutic jurisprudence dilemmas in the representation of criminal defendants in incompetency and insanity cases.

    Science.gov (United States)

    Perlin, Michael L

    2010-01-01

    Little attention has been paid to the importance of the relationship between therapeutic jurisprudence (TJ) and the role of criminal defense lawyers in insanity and incompetency-to-stand-trial (IST) cases. That inattention is especially noteworthy in light of the dismal track record of counsel providing services to defendants who are part of this cohort of incompetency-status-raisers and insanity-defense-pleaders. On one hand, this lack of attention is a surprise as TJ scholars have, in recent years, turned their attention to virtually every other aspect of the legal system. On the other hand, it is not a surprise, given the omnipresence of sanism, an irrational prejudice of the same quality and character of other irrational prejudices that cause (and are reflected in) prevailing social attitudes of racism, sexism, homophobia, and ethnic bigotry, that infects both our jurisprudence and our lawyering practices. Sanism is largely invisible and largely socially acceptable, and is based predominantly upon stereotype, myth, superstition, and deindividualization. It is sustained and perpetuated by our use of alleged "ordinary common sense" (OCS) and heuristic reasoning in an unconscious response to events both in everyday life and in the legal process. This paper examines the literature that seeks to apply TJ principles to the criminal law process in general, drawing mostly on the work of Professor David Wexler. It considers why the lack of attention that I have referred to already is surprising (given TJ's mandate and the fact that many TJ issues are inevitably raised in any insanity or IST case). The paper then considers why this lack of attention is not surprising, given the omnipresence of sanism. It will consider some of the actual counseling issues that might arise in these contexts, and offer some suggestions to lawyers representing clients in cases in which mental status issues may be raised. The paper concludes that we must rigorously apply therapeutic

  16. ¿POR QUÉ DEFENDER LA CIENCIA EN COLOMBIA?

    Directory of Open Access Journals (Sweden)

    Enrique Forero González

    2016-12-01

    Full Text Available

    Un grupo de nuestros más destacados científicos le cuenta a la sociedad colombiana por qué es necesario defender la ciencia en el país, demuestra con lujo de detalles porqué este tema se considera importante y se refiere a la forma como los países más avanzados del mundo han alcanzado esos niveles de desarrollo gracias a sus inversiones en educación, ciencia y tecnología. También, llama la atención sobre el hecho que la clase política tiene el deber ético de hacer políticas sobre ciencia, tecnología e innovación fundamentándose en los planteamientos de los académicos. En efecto, cuando se definen políticas como las contenidas en el documento Conpes de Competitividad, Ciencia, Tecnología e Innovación sin la participación de la comunidad académica, el resultado siempre es deficiente. Adicionalmente, así como el documento Conpes no deja tranquila a la comunidad científica, el Sistema Nacional de Regalías también produce muchas dudas y preocupaciones, por lo cual se sugiere que se piense desde el Senado en una reforma a ese sistema para que, por ejemplo, la evaluación y posterior aprobación de los proyectos de ciencia, tecnología e innovación sean definidas sobre una base académica, no política.

    Para comenzar, da la impresión que, en general, las políticas gubernamentales ignoran por completo a la comunidad académica. En días recientes recibí una invitación por parte del Departamento Nacional de Planeación para el lanzamiento del Plan Maestro de la Orinoquia, ‘una estrategia integral con proyección para el año 2030, para el desarrollo regional, con un enfoque diferenciado que involucra la articulación Nación-Territorio’, pero entre los conferencistas invitados no había ni un sólo representante de la comunidad científica o académica. Sin embargo, cabe señalar que no hay área de importancia para el país que no sea impactada por las contribuciones de las ciencias básicas: la salud, el

  17. Rahvusvaheline üldmeditsiini kongress oli Eestis esmakordselt / Marika Kusnets

    Index Scriptorium Estoniae

    Kusnets, Marika

    2007-01-01

    8. detsembril peeti Tallinnas rahvusvahelist üldmeditsiini kongressi, kus osalesid mitmete erialade arstid. Kongressil käsitletud teemad - südame-veresoonkonnahaiguste varajane diagnostika, söömisharjumused, metabolism, hüpertoonia, erektsioonihäired, depressioon, 2. tüüpi diabeet ja oftalmoloogia

  18. Tammsaare-aastat ilmestavad ka raamatud / Marika Rajamäe

    Index Scriptorium Estoniae

    Rajamäe, Marika, 1952-

    2008-01-01

    Tammsaare muuseumis esitleti kahte raamatut: Tammsaare, Anton Hansen. Siin mägi, seal mägi... Anton Hansen Tammsaare oma koduloodusest : fotoalbum (koostanud Ann Marvet. Tallinn : Huma, 2008) ja Liivak, Age-Li. Tammsaare kirjanduspreemia laureaadid Hugo Hiibuse sulega. (Türi : Saarakiri, 2008)

  19. Ulila perearst jääb alles / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2006-01-01

    Riigikogu sotsiaalkomisjoni liige juhtumist, kus Puhja vallavalitsus kavatses Ulilas perearsti koha kaotada, aga parlamendiliikme ja sotsiaalministeeriumi sekkumisel saab Ulila perearst oma tööd jätkata. Sotsiaalministeeriumis valminud seaduseelnõust, mis ei kohusta perearsti olema ettevõtja

  20. Vest-Wood pürgib Balti turule / Marika Tomberg

    Index Scriptorium Estoniae

    Tomberg, Marika

    2004-01-01

    Ilmunud ka: Äripäev : Eesti Edukamad Ettevõtted : Maakondlikud edetabelid Top 100, 26. nov. 2004, lk. 15. TOP-i 1. koht. Uksetootja Vest-Woodi konkurentsieeliseks on väga hea töökorraldus. Diagramm

  1. Richard Avedon ja Annie Leibovitz laulsid kaanonit / Marika Alver

    Index Scriptorium Estoniae

    Alver, Marika

    2008-01-01

    Richard Avedoni (1923-2004) retrospektiivnäitusest (fotod aastatest 1946-2004) kuraator Helle Crenzien (Lousiana Kaasaegse Kunsti muuseum Taanis), millega kaasnes ka Helen Whitney film "Richard Avedon : darkness and light" ja Annie Leibovitzi (1949) suurprojektist "A photographer's life 1990-2005" Pariisis

  2. Eesti teatri aastaauhinnad 2006. aasta loomingu eest

    Index Scriptorium Estoniae

    2007-01-01

    Elmo Nüganen - lavastajaauhind, Ene-Liis Semper - kunstniku auhind, Hele Kõre - naisnäitleja auhind, Lembit Ulfsak - meesnäitleja auhind, Evelin Pang - naiskõrvalosa auhind, Margus Prangel - meeskõrvalosa auhind, Oleg Titov - draamalavastuse eriauhind, Helen Lokuta ja Lauri Sirp - muusikalavastuse auhind, Michiel Dijkema - muusikalavastuse eriauhind, Mare Tommingas - balletilavastuse auhind, ZUGA ühendatud tantsijad - tantsulavastuse auhind, Margus Mikomägi - kriitikaauhind, Tiit Sukk - Ants Lauteri näitlejaauhind, Ingomar Vihmar - Ants Lauteri lavastajaauhind, Rauno Elp - Georg Otsa auhind, Aare Toikka - Salme Reegi auhind, Reet Aus - Natalie Mei auhind, Anu Lamp - Priit Põldroosi auhind, Peeter Sauter - Aleksander Kurtna auhind, Artjom Maksakov ja Natalja Popenko - Kristallkingakese auhind, Enar Tarmo, Hendrik Kiisler ja Marika Tint - tehnilise töötaja auhind

  3. Eesti teatri aastaauhinnad 2006

    Index Scriptorium Estoniae

    2007-01-01

    Elmo Nüganen - lavastajaauhind, Ene-Liis Semper - kunstniku auhind, Hele Kõre - naisnäitleja auhind, Lembit Ulfsak - meesnäitleja auhind, Evelin Pang - naiskõrvalosa auhind, Margus Prangel - meeskõrvalosa auhind, Oleg Titov - draamalavastuse eriauhind, Helen Lokuta ja Lauri Sirp - muusikalavastuse auhind, Michiel Dijkema - muusikalavastuse eriauhind, Mare Tommingas - balletilavastuse auhind, ZUGA ühendatud tantsijad - tantsulavastuse auhind, Margus Mikomägi - kriitikaauhind, Tiit Sukk - Ants Lauteri näitlejaauhind, Ingomar Vihmar - Ants Lauteri lavastajaauhind, Rauno Elp - Georg Otsa auhind, Aare Toikka - Salme Reegi auhind, Reet Aus - Natalie Mei auhind, Anu Lamp - Priit Põldroosi auhind, Peeter Sauter - Aleksander Kurtna auhind, Artjom Maksakov ja Natalja Popenko - Kristallkingakese auhind, Enar Tarmo, Hendrik Kiisler ja Marika Tint - tehnilise töötaja auhind

  4. Abortion: Defending Life

    Directory of Open Access Journals (Sweden)

    Myriam Aldana

    2008-05-01

    Full Text Available This essay will analyze some of the debates around abortion in the National Congress due to the Constitutional Amendment Bill – PEC25/95, by Deputy Severino Cavalcanti (PPB/PE, where the main issue was precisely life defense. The discursive blocks that present the debate in relation to pregnancy interruption, the religious principles or biological determinism on which those debates are based, and the ways in which such discourses are maintained will be identified. Distinct understandings of life, as a result of the points used in such discourses, which are aligned with the position of the Catholic Church and the Feminist Movement - the social actors of this debate- are also discussed here.

  5. The impact of brief messages on HSV-2 screening uptake among female defendants in a court setting: a randomized controlled trial utilizing prospect theory.

    Science.gov (United States)

    Roth, Alexis M; Van Der Pol, Barbara; Fortenberry, J Dennis; Dodge, Brian; Reece, Michael; Certo, David; Zimet, Gregory D

    2015-01-01

    Epidemiologic data demonstrate that women involved with the criminal justice system in the United States are at high risk for sexually transmitted infections, including herpes simplex virus type 2 (HSV-2). Female defendants were recruited from a misdemeanor court to assess whether brief framed messages utilizing prospect theory could encourage testing for HSV-2. Participants were randomly assigned to a message condition (gain, loss, or control), completed an interviewer-administered survey assessing factors associated with antibody test uptake/refusal and were offered free point-of-care HSV-2 serologic testing. Although individuals in the loss-frame group accepted testing at the highest rate, an overall statistical difference in HSV-2 testing behavior by group (p ≤ .43) was not detected. The majority of the sample (74.6%) characterized receiving a serological test for HSV-2 as health affirming. However, this did not moderate the effect of the intervention nor was it significantly associated with test acceptance (p ≤ .82). Although the effects of message framing are subtle, the findings have important theoretical implications given the participants' characterization of HSV-2 screening as health affirming despite being a detection behavior. Implications of study results for health care providers interested in brief, low cost interventions are also explored.

  6. Tri-Level Optimization Algorithms for Solving Defender-Attacker-Defender Network Models

    Science.gov (United States)

    2016-06-01

    not improved over three iterations of relaxation. In the heuristic , the current upper bound represents the best found feasible solution that does not...nested loops in the 167 algorithm which represent the outer and inner decompositions of the DAD CSP problem instance. Since our heuristic ...path problem. We merge the attacker model with Lagrangian relaxation of the operator model into a single formulation that can obtain fast heuristic

  7. Teatri aastaauhindade laureaadid 2007

    Index Scriptorium Estoniae

    2007-01-01

    Elmo Nüganen - lavastajaauhind, Ene-Liis Semper - kunstniku auhind, Hele Kõre - naisnäitleja auhind, Lembit Ulfsak - meesnäitleja auhind, Evelin Pang - naiskõrvalosa auhind, Margus Prangel - meeskõrvalosa auhind, Oleg Titov - draamalavastuse eriauhind, Helen Lokuta ja Lauri Sirp - muusikalavastuse auhind, Michiel Dijkema - muusikalavastuse eriauhind, Mare Tommingas - balletilavastuse auhind, ZUGA ühendatud tantsijad - tantsulavastuse auhind, Margus Mikomägi - kriitikaauhind, Tiit Sukk - Ants Lauteri näitlejaauhind, Ingomar Vihmar - Ants Lauteri lavastajaauhind, Rauno Elp - Georg Otsa auhind, Aare Toikka - Salme Reegi auhind, Reet Aus - Natalie Mei auhind, Anu Lamp - Priit Põldroosi auhind, Peeter Sauter - Aleksander Kurtna auhind, Artjom Maksakov ja Natalja Popenko - Kristallkingakese auhind, Enar Tarmo, Hendrik Kiisler ja Marika Tint - tehnilise töötaja auhind. Ka Kuressaares toimunud teatripeost

  8. Attributions of guilt and punishment as functions of physical attractiveness and smiling.

    Science.gov (United States)

    Abel, Millicent H; Watters, Heather

    2005-12-01

    The authors found an interaction between sex of participant and sex of defendant in the leniency bias toward a smiling defendant. Differences occurred for male participants when levying punishment for a smiling male defendant vs. a smiling female defendant and for a smiling male defendant vs. a nonsmiling male defendant, whereas differences did not occur for female participants. The authors found moderating effects of physical attractiveness and smiling between guilt and punishment. The only significant positive relationship between guilt and punishment occurred for the defendant whom participants rated low in physical attractiveness and who was not smiling. When guilty, the smiling and unattractive defendant received less punishment than did the smiling and attractive defendant. The authors discussed complex relationships between physical attractiveness, smiling, guilt, and punishment.

  9. Maagiline Matrix - muutuste võti / Marika Makarova ; kommenteerinud Ainar Leppik

    Index Scriptorium Estoniae

    Makarova, Marika

    2010-01-01

    USA kiropraktiku Richard Bartletti loodud Matrix Energetics tehnikate alusl Ainar Leppiku poolt loodud Maagilise Maatriksi meetodist, mis õpetab muutuste toomist oma ellu. Vestlustest Maagilise Maatriksi õpetajatega

  10. Naistearstide ja neuroloogide kokkusaamine pakkus osapooltele suurt huvi / Marika Gordon

    Index Scriptorium Estoniae

    Gordon, Marika

    2010-01-01

    Eesti Naistearstide Seltsi ja L. Puusepa nimelise Eesti Neuroloogide ja Neurokirurgide Seltsi ühiskoosolekul kõneldi naiste ja meeste neurobioloogilistest iseärasustest, seksuaaleluhäiretest, rasedusaegsetest peavaludest, epilepsia ravist naistel ja sünnitusabist

  11. 400 miljoni eurone programm toetab innovaatilisi ettevõtteid / Marika Roomere

    Index Scriptorium Estoniae

    Roomere, Marika

    2007-01-01

    2007. aasta sügisel ellu kutsutud Euroopa ettevõtluse toetusprogrammist Eurostars, mille raames toetatakse keskmise suurusega ja väikeettevõtteid 400 miljoni euroga rahvusvahelise teadus- ja arendustegevusega tegelemiseks. Lisa: Mis on Eurostarsi programm?

  12. Leedu ettevõtteid ahvatleb Eesti turg / Gerli Ramler, Marika Roomere

    Index Scriptorium Estoniae

    Ramler, Gerli

    2007-01-01

    Mitmed Leedu ettevõtted on juba edukalt Eesti turule sisenenud ning oodata on uusi tegijaid. Leedu pitsarestoranide keti Cili ja Double Coffee Estonia plaanidest. Vt. samas: Toiduliidu juhataja Sirje Potisepp. Turg on avatud kõigile; Intervjuu Raimondas Useckasega

  13. Loodusesõber / Maria Martinez Ros ; küsis Marika Makarova

    Index Scriptorium Estoniae

    Martinez Ros, Maria

    2012-01-01

    Intervjuu Tallinnas ja Lilleorus tantsuteraapia kursusi andva mehhiklanna Maria Martinez Rosiga, kes on õppinud permakultuuri disaini, humanistliku psühholoogiat, tanatoloogiat, Feldenkraisi meetodit, tema vaadetest jätkusuutlikule elamise viisile

  14. Audentese koolid kolivad väärikatesse majadesse / Marika Karo

    Index Scriptorium Estoniae

    Karo, Marika

    2002-01-01

    Tartu linnavalitsus otsustas 9. mail 2002.a. müüa Tartus Puiestee tänaval asuva ajaloolise koolikompleksi ASile Audentes, kes kavatseb kinnistul olevatest kahest muinsuskaitse alla kuuluvast koolimajast, tööõpetuse majast, abihoonetest ja spordiplatsist välja arendada campus-tüüpi tänapäevase koolide kompleksi. Hooneid hakkavad kasutama Audentes Mainor Ülikooli Tartu filiaal ja alg- ja põhiharidust pakkuv Audentese Erakool. Koolihoonete kompleksi ajaloost

  15. Molecular cloning and responsive expression to injury stimulus of a defender against cell death 1 (DAD1) gene from bay scallops Argopecten irradians.

    Science.gov (United States)

    Zhu, Ling; Song, Linsheng; Zhang, Huan; Zhao, Jianmin; Li, Chenghua; Xu, Wei

    2008-06-01

    Apoptosis is an active process of cell death, which is an integral part of growth and development in multicellular organisms. The defender against cell death 1 (DAD1), the regulatory protein to inhibit the apoptosis process, was first cloned from the bay scallop Argopecten irradians by randomly sequencing a whole tissue cDNA library and rapid amplification of cDNA end (RACE). The full-length cDNA of the A. irradians DAD1 was 607 bp, consist of a 5'-terminal untranslated region (UTR) of 63 bp, a 3'-terminal UTR of 205 bp with a canonical polyadenylation signal sequence AATAAA and a poly (A) tail, and an open reading frame of 339 bp. The deduced amino acid sequence of the A. irradians DAD1 showed 75.5% identity to Araneus ventricosus, 74.5% to Drosophila melanogaster, and 73.6% to Homo sapiens, Sus scrofa, Mesocricetus auratus, Rattus norvegicus and Mus musculus. Excluding the Saccharomyces cerevisiae DAD1 homologue, all animal DAD1 including A. irradians DAD1 homologue formed a subgroup and all plant DAD1 proteins formed another subgroup in the phylogenetic analysis. The A. irradians DAD1 was expressed in all examined tissues including adductor muscle, mantle, gills, digestive gland, gonad and hemolymph, suggesting that A. irradians DAD1 is expressed in most body tissues. Furthermore, the mRNA expression levels of A. irradians DAD1 gene of hemolymph were particularly high after injury, suggesting that the gene is responsive to injury stimuli.

  16. Designing Interference-Robust Wireless Mesh Networks Using a Defender-Attacker-Defender Model

    Science.gov (United States)

    2015-02-01

    solution does not provide more network flow than the undefended attacker’s solution. (However, our tool stores alternate, runner -up solutions that often...approximate real WMNs. 51 LIST OF REFERENCES Alderson, D.L., Brown, G.G., & Carlyle, W.M. (2014). Assessing and improving operational resilience

  17. The Impact of Gender Stereotypes on Legal Perceptions of Lesbian Intimate Partner Violence.

    Science.gov (United States)

    Wasarhaley, Nesa E; Lynch, Kellie R; Golding, Jonathan M; Renzetti, Claire M

    2015-05-19

    The present study examined legal perceptions of lesbian intimate partner violence (IPV) in an experimental context. Undergraduate women and men from the Southeastern United States (N = 217) read a trial summary in which the defendant was charged with physically assaulting her same-sex partner. The trial varied as to whether the victim and defendant were depicted via images as either feminine or masculine. Participants rendered verdicts and made judgments about the victim and defendant (e.g., credibility). Results indicated that the victim's and defendant's masculine or feminine appearance affected these judgments. Female participants viewed a masculine victim as more credible than a feminine victim when the defendant was masculine. When the victim was masculine, they viewed a masculine defendant as more responsible for the victim's injuries than a feminine defendant. Male participants had higher sympathy for a masculine versus feminine victim overall, but had more anger toward a masculine defendant versus a feminine defendant accused of assaulting a feminine victim. Finally, fewer participants mentioned the defendant's history of violence as a reason for a guilty of felony verdict for a feminine victim with a feminine defendant versus all other combinations of victim and defendant masculine/feminine appearance. Results are discussed in terms of gender stereotypes influencing legal decision-making in IPV cases among lesbian couples. © The Author(s) 2015.

  18. Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme

    Directory of Open Access Journals (Sweden)

    Tsung-Chih Hsiao

    2017-01-01

    Full Text Available Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders. With the rapid development of technologies and network applications, electronization has been actively promoted globally during the social transformation period that the concept of electronic voting is further derived. The major advantages of electronic voting, comparing with traditional voting, lie in the mobility strength of electronic voting, reducing a large amount of election costs and enhancing the convenience for the public. Electronic voting allows voters completing voting on the Internet that not only are climate and location restrictions overcome, but the voter turnout is also increased and the voting time is reduced for the public. With the development in the past three decades, electronic voting presents outstanding performance theoretically and practically. Nevertheless, it is regrettable that electronic voting schemes still cannot be completely open because of lures by money and threats. People to lure by money and threats would confirm the voters following their instructions through various methods that more factors would appear on election results, affecting the quality and fairness of the election. In this study, this project aims to design an electronic voting scheme which could actually defend voters’ free will so that lure of money and threats would fail. Furthermore, an electronic voting system based on Elliptic Curve Cryptography is proposed to ensure the efficiency and security, and Ring Signature and Signcryption are applied to reducing the computing costs. Moreover, this project also focuses on applying voting system to mobile devices. As the system efficiency and security are emphasized, voters do not need to participate in the election, but simply complete voting with smart phones, i

  19. A Virtual Environment for Resilient Infrastructure Modeling and Design

    Science.gov (United States)

    2015-09-01

    Security CI Critical Infrastructure CID Center for Infrastructure Defense CSV Comma Separated Value DAD Defender-Attacker-Defender DHS Department...responses to disruptive events (e.g., cascading failure behavior) in a context- rich , controlled environment for exercises, education, and training...The general attacker-defender (AD) and defender-attacker-defender ( DAD ) models for CI are defined in Brown et al. (2006). These models help

  20. Defending definitions of life.

    Science.gov (United States)

    Mix, Lucas John

    2015-01-01

    Over the past 10 years, it has become unpopular to talk about definitions of life, under the assumption that attempts at a precise definition are counterproductive. Recent attempts have failed to meet strict philosophical criteria for definitions and have failed to reach consensus. I argue that provisional definitions are necessary for clear communications. Our current knowledge of biology justifies a number of universal claims about the category of life. Whether or not "life" represents a natural category, it maps to a number of important, observable processes. Given the importance of those processes and the extent of our knowledge, plural explicit definitions of life (and related categories) will be necessary for progress in astrobiology and origin-of-life studies as well as biology in general. I propose concrete categories related to, but not necessarily coextensive with, life for clear communication and hypothesis formation: Woese life, Darwin life, Haldane life.

  1. The radiologist as defendant

    International Nuclear Information System (INIS)

    Bundy, A.L.; James, A.E. Jr.

    1988-01-01

    As the diagnostic radiologist has evolved through medical history, his role has changed from one of a technical expert to that of a respected part of the medical team, possessing extraordinary knowledge and skills in use of the most expensive and complex instrumentation in the health care delivery system. The rapid advances in radiological technology and instrumentation have enabled radiologists to assume a more primary role in medical care. Subspecialties such as ultrasound, computed tomography, digital radiography, and magnetic resonance imaging have emerged over the past decade as invaluable resources in medical diagnosis, and the radiologist, as the expert in these fields, has moved into view. As he assumes his rapidly evolving role, so too must he be prepared to bear the legal pressures that will most likely increase in proportion to the technical advances, as well as his changing role

  2. Defending the F-22

    National Research Council Canada - National Science Library

    Day, John

    1998-01-01

    The purpose of this paper is to establish the critical need for the continued development and introduction of the F-22 Raptor as the air superiority fighter for the joint forces of the United States...

  3. Defending "Am I Blue."

    Science.gov (United States)

    Broz, William J.

    2002-01-01

    Presents a case study about how one Midwestern United States community dealt with a censorship challenge. Discusses how the author recognizes his professional responsibility. Discusses the school district's "materials selection and review policy." Contains a lengthy letter the author sent to school board members, and several epilogues. (SG)

  4. The mortuary house at Lepna on southern Saaremaa / Marika Mägi

    Index Scriptorium Estoniae

    Mägi, Marika

    2004-01-01

    Kaevamistest Lepna Katkuauguks nimetatud matusekohal. Surnumaja ümbritsenud kultuurmaastikust, surnumaja jäänustest, matustest. Lepna surnumaja markeerib silmnähtavaid muudatusi Saaremaa matmiskombestikus 5. - 6. sajandil

  5. Intellekt ja selle areng imiku- ja väikelapseeas / Marika Veisson

    Index Scriptorium Estoniae

    Veisson, Marika, 1949-

    1998-01-01

    Kolm ajaloolist lähenemist intellekti uurimisele. Nancy Bayley poolt 1969.a. välja töötatud esimene põhjalikum väikelaste ja imikute intellekti uurimismetoodika - Bayley Imikute Arengu Skaala; psühhomeetriline lähenemine, J. Piaget kognitiivse arengu teooria

  6. Noor näitleja otsib rollides ennast / Marika Rajamäe

    Index Scriptorium Estoniae

    Rajamäe, Marika

    2006-01-01

    Tantsuõpetaja Helmi Tohvelmani nimelise liikuvaima näitleja preemia võttis vastu näitleja Tambet Tuisk, Järvamaa maakooli edukaima õpilase preemia aga Annely Tank, kes õpib Koigi Põhikooli 9. klassis

  7. Rahvakunst Marika ja Heinz Valgu kollektsioonist : Heie Treier soovitab / Heie Treier

    Index Scriptorium Estoniae

    Treier, Heie, 1963-

    2000-01-01

    12. märtsini Tarbekunstimuuseumis avatud näitusest, mille on kujundanud Heinz Valk. Soovitatakse külastada Kunstihoones Anu Juuraku näitust 'Tsoon 2', kus tegeldakse identiteedi probleemidega kõrgtehnoloogilisel tasandil.

  8. Tööandjate unistuste seaduse autorid olid tegelikult sotsid / Marika Tuus

    Index Scriptorium Estoniae

    Tuus, Marika, 1951-

    2008-01-01

    Uue töölepingu seaduse eelnõust. Ilmunud ka Virumaa Teataja 29. jaan. 2008, lk. 11 ; Hiiu Leht 29. jaan. 2008, lk. 2 ; Pärnu Postimees 29. jaan. 2008, lk. 15 ; Vali Uudised 30. jaan. 2008, lk. 2, pealkiri kujul: uus orjaaeg ; Meie Maa 29. jaan. 2008, lk. 2 ; Põhjarannik 30. jaan. 2008, lk. 2 ; Lääne Elu 29. jaan. 2008, lk. 2 ; Elva Postipoiss 2. veeb. 2008, lk. 4, pealkiri kujul: Kas uus orjaaeg? ; Kesknädal 6. veeb. 2008, lk. 2 ; Vooremaa 14. veeb. 2008, lk. 2

  9. The influence of mitigation evidence, ethnicity, and SES on death penalty decisions by European American and Latino venire persons.

    Science.gov (United States)

    Espinoza, Russ K E; Willis-Esqueda, Cynthia

    2015-04-01

    The purpose of the research was to determine whether European American and Latino mock jurors would demonstrate bias in death penalty decision making when mitigation evidence and defendant ethnicity and socioeconomic status (SES) were varied. A total of 561 actual venire persons acted as mock jurors and read a trial transcript that varied a defendant's case information (mitigating circumstances: strong/weak, defendant ethnicity: European American/Latino, and defendant SES: low/high). European American jurors recommended the death penalty significantly more often for the low SES Latino defendant when strength of mitigation evidence was weak. In addition, they also assigned this defendant higher culpability ratings and lower ratings on positive personality trait measures compared with all other conditions. Strong mitigation evidence contributed to lower guilt ratings by European American jurors for the high SES European American defendant. Latino jurors did not differ in their death penalty sentencing across defendant mitigation, ethnicity, or SES conditions. Discussion of in-group favoritism and out-group derogation, as well as suggestions for procedures to diminish juror bias in death penalty cases, is provided. (c) 2015 APA, all rights reserved).

  10. TATA CARA PELAKSANAAN PENANGGUHAN PENAHANAN TERHADAP TERSANGKA DI LEMBAGA KEPOLISIAN BERDASARKAN KUHAP DAN PERATURAN PELAKSANAANNYA

    Directory of Open Access Journals (Sweden)

    Umi Enggarsasi

    2005-10-01

    Full Text Available Detention pursuant to KUHAP is location or certain defendant in place by Investigator or public prosecutor or Judge with its stipulating, while reason to source the detention as arranged in Section 21 KUHAP mentioned that detention can be with the consideration for example, defendant felt concerned about to break away defendant felt concerned about will destroy eliminating evidence goods, and, defendant felt concerned about will again doing an injustice. Defendant can ask the detention deferment based on Section 31 KUHAP to police detention with the guarantee of money or people or on trust pursuant to condition determined, while such condition determined that is obliged to report, do not go out the house or town, and a period to detention deferment from defendant do not the inclusive of a period to prisoner status as arranged in KUHAP.

  11. Probiotics: defenders of gastrointestinal habitats

    Directory of Open Access Journals (Sweden)

    Desh D. Singh

    2012-11-01

    Full Text Available Intestinal microbiota play an important role in maintaining normal gastrointestinal (GI function and ensuring that changes in the composition of the intestinal microbiota can promote GI function. The digestive tract is full of bacteria and many of these, including probiotics, are necessary for optimal digestive function. During bacterial gastroenteritis, harmful bacteria invade the digestive tract causing unpleasant symptoms and upsetting the balance between good and bad bacteria. Supplemental probiotics can help restore this balance. Studies have demonstrated that probiotics can often help reduce the severity of symptoms such as diarrhea and may help accelerate recovery. Probiotics are therapeutic preparations of live microorganisms administered in sufficient dosage to be beneficial to health. The therapeutic effects of these microorganisms appear to be strain specific. Primal Defense®, a unique, probiotic, bacterial compound, contains probiotics that support gut flora balance, promote consistent bowel function, control stomach acid levels to quickly eliminate burning sensation in the stomach and maintain immune system response. The probiotics in Primal Defense® maximize the benefits of a healthy diet by supporting normal absorption and assimilation of nutrients in the gut. Nearly 75% of our immune defenses are located in the digestive tract, so maintaining a favorable bacterial balance in the intestines (ideally 80% good or neutral bacteria to 20% bad or harmful bacteria is crucial to achieving and maintaining optimum health.

  12. Neymar, defender of brazilian tradition

    Directory of Open Access Journals (Sweden)

    Francisca Islandia Cardoso da Silva

    2016-09-01

    Full Text Available The purpose of this article is to analyze how university students of Teresina-PI appropriate of the message of a report of the television show Esporte Espetacular. There was use of the technique of focus groups and analytical-descriptive method for collecting and analyzing data. The sample consisted of 24 university students, aged between 18 and 24 years. The report features Neymar as responsible to follow the "tradition" of Brazilians and to be crowned as the best player in the world. The subjects of research said that the speech conveyed by the report can reproduce and create a reality sometimes dreamlike, because objective to confer to Neymar great importance with regard to national identity.

  13. Do the Physcians Defend Euthanasia

    Directory of Open Access Journals (Sweden)

    Tarık Gündüz

    1996-07-01

    Full Text Available In this study, after the definition and short historical development of Euthanasia, a questionnaire was given to 510 medical staff; 208 of whom are medical students who are in the 5th form and 302 of whom are physcians. In this questionnaire 6 multiple choice questions were asked about the knowledge level, social groups to comment and argue on the subject, the right of person to decide about his/her own life, opinions about current applications of euthanasia, whether he/she would agree on the application of the process and whether he would accept to get a responsibility in it or not. It was determined that among the people who attended the questionnaire, one third didn't have enough knowledge about the subject while 325 (63.72 % of them supported the application, still 351 (68.82 % of them refused to get a responsibility in the application of euthanasia, even if the process becomes legal. Opinions of the people who are with and against the idea were collected and summarized, it was determined that although passive euthanasia is not legal it is currently being applied when it is necessary and that physcians are biased to the legalization of the subject while they refuse to take a role in the application. Keywords : Euthanasia, Self Deliverance, Right to Life, Mercy Killing, Informed Consent

  14. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  15. Lithuania defends currency / Adam Mullett

    Index Scriptorium Estoniae

    Mullett, Adam

    2009-01-01

    Leedulased kiirustavad oma pangasäästusid vahetama eurode vastu, kuna kardetakse raha devalveerimist. Valitsus aga kinnitab, et vaatamata Leedu pangandussektoris esinevatele probleemidele pole lähiajal devalveerimist kavas

  16. Foucault Must Not be Defended

    DEFF Research Database (Denmark)

    Dean, Mitchell

    2015-01-01

    This paper responds to and comments on many of the themes of the book under consideration concerning Foucault and neoliberalism. In doing so, it offers reflections on the relation between the habitus of the intellectual and the political contexts of action and engagement in the case of Foucault, ...

  17. Excavations on the Coasts of Prehistoric and Medieval Saaremaa / Marika Mägi

    Index Scriptorium Estoniae

    Mägi, Marika, 1968-

    2006-01-01

    Viltina võimaliku sadamakoha kaevamistest. Leiti järjekordne 11. sajandi leiukompleks, seekord tüüpilistest Saaremaa naise ehetest. Pällamõisas on inimtegevus saanud alguse ilmselt I aastatuhande keskel, mil see paiknes otse mererannal. Inimtegevus Pällamõisas lakkas ilmselt keskaja alguses. 16. sajandi algul rajati sellele kohale hoonekompleks, mis juba 17. sajandil hüjati. Proovikaevamistest Tammese asulakohal

  18. Inimese papilloomiviiruse vastane vaktsiin imet ei tee, aga kaitseb siiski / Marika Kusnets

    Index Scriptorium Estoniae

    Kusnets, Marika

    2006-01-01

    5. oktoobril korraldas ravimifirma Merck Sharp & Dohme koostöös erialaarstide, Eesti Vähiliidu ja Quattromediga ajakirjanikele ümarlaua, kus räägiti emakakaelavähi põhjustest ja ravist, HPV tüüpidest, nakatumis- ja kaitsemehhanismidest ning uuest Eesti turule jõudvast vaktsiinist

  19. Rain Jõgi : Kehtivat trendi on keeruline murda / Rain Jõgi ; interv. Marika Kusnets

    Index Scriptorium Estoniae

    Jõgi, Rain

    2006-01-01

    TÜ kliinikumi kopsukliiniku juhataja kommenteerib European Community Respiratory Health Survey rahvusvahelist uuringut ja eestlaste suitsetamisharjumusi hingamisteede haiguste riskiteguritena üldisemas plaanis

  20. Parim proosalugeja köitis küpsusega / Marika Rajamäe

    Index Scriptorium Estoniae

    Rajamäe, Marika, 1952-

    2008-01-01

    Toimus viies üle-eestiline proosalugemine "Hansenist Tammsaareni". Mõtteid võistulugemise kohta avaldavad konkursi algataja Enda Trubok, Järva maavalitsuse haridus- ja kultuuriosakonna peainspektor Anne Viljat, Eesti emakeeleõpetajate seltsi esimees Piret Järvela, žürii esimees Iivi Lepik, konkursil võistelnud Merilin Kulpsoo. Peavõidu sai Sabine Liias, V-VII klasside arvestuses läks I koht Sabine Liiasele, II koht Kristian Käreskile, III koht Kristiina Orasele. VIII-IX arvestuses läks I koht Katriin Altementile, II koht Indrek Jõele, III koht Linda Randojale. X-XII klasside arvestuses võitis Kaire Olesk, II koha saii Sten-Robert Pullerits ning III koha Katrin Ojalill

  1. Establishing Mental Retardation in Capital Cases: A Potential Matter of Life and Death.

    Science.gov (United States)

    Baroff, George S.

    1991-01-01

    This paper discusses psychological test obstacles to gaining the acceptance of a diagnosis of mental retardation in criminal defendants, use of the Revised Beta intelligence test with defendants who may be retarded, possible modification of the adaptive behavior criterion for criminal defendants, and appropriateness of the death penalty for…

  2. Kasvatusteaduslike tööde konkursi tulemused / Ulve Kala

    Index Scriptorium Estoniae

    Kala, Ulve, 1947-

    2002-01-01

    Eesti keeles publitseeritud teadustöö preemia anti Aleksander Elangole, Inger Kraavile ja Kristi Kõivule, diplom Ühiskondlikule Pedagoogika Uurimise Instituudile, Viivi Ekstale, Inger Kraavile, Inge Undile, Viivi Maansole. Võõrkeeles publitseeritud teadustöö preemia monograafiale "Integration als Problem in der Erziehungswissenschaft" (koostaja Airi Liimets, autorid Airi Liimets, Saila Anttonen, Gunnar Bergendal, Gerd-Bodo Reinert von Carlsburg, Helmut Wehr, Tiiu Kuurme, Pauli Siljander, Jüri Kruusvall, Sirje Priimägi, Ene-Silvia Sarv, Kristi Kõiv, Meri-Liis Laherand, Jaan Mikk, Hannele Niemi, Marika Veisson, Irina Würscher, Susanne Jena, Tiina Aunin, Reet Liimets, Heli Mattisen, Aivo Saar, Maie Vikat), diplom Aino Saarele ja Katrin Niglasele. Didaktilis-rakenduslike tööde preemia Eda Heinlale, Estelle Laanele ja Kalle Laanele, Tiiu Kadajasele. Populaarteadusliku töö preemia Maie Tuulikule, diplom Kristi Kõivule. H. Liimetsa nim magistritööde preemia Rain Mikserile, Margus Pedastele, Ülle Rannutile, Inger Kraavile, Tago Sarapuule, Martin Ehalale

  3. The Influence of Biomedical Information and Childhood History on Sentencing.

    Science.gov (United States)

    Kim, JongHan; Boytos, Abby; Seong, Yoori; Park, Kwangbai

    2015-01-01

    A recent trend in court is for defense attorneys to introduce brain scans and other forms of biomedical information (BI) into criminal trials as mitigating evidence. The present study investigates how BI, when considered in combination with a defendant's childhood information (CI), can influence the length of a defendant's sentence. We hypothesized that certain combinations of BI and CI result in shorter sentences because they suggest that the defendant poses less of a threat to society. Participants were asked to read accounts of the trial of a murder suspect and, based on the information therein, recommend a sentence as if they were the judge. The defendant was diagnosed with psychopathy, but biomedical information regarding that diagnosis was included or excluded depending on the BI condition. The defendant was further described as growing up in either a loving or abusive family. The results showed that, if BI was present in the trial account, the defendant from an abusive family was perceived as less of a threat to society and received a shorter recommended sentence than if the defendant had been from a loving family. If BI was absent from the account, the pattern was reversed: the defendant from a loving family was perceived as less of a threat to society and received a shorter recommended sentence than if he had been from an abusive family. Implications for the use of BI and CI in court trials are discussed, as well as their relationship to free will and the function of punishment as retribution and utility. Copyright © 2015 John Wiley & Sons, Ltd.

  4. [PhD theses on gerontological topics in Russia 1995-2012: scientometric analysis].

    Science.gov (United States)

    Smol'kin, A A; Makarova, E A

    2014-01-01

    The paper presents a scientometric analysis of PhD theses on gerontological topics in Russian humanities (excluding economics) for the period from 1995 to 2012. During this period, 253 PhD theses (238 of "candidate dissertations," and 15 of "doctoral dissertations") were defended in Russia. Almost half of them were defended during the boom years (2005-2006; 2009-2010). The number of theses defended in the 2000-s has increased significantly compared to the second half of 1990-s. However for gerontological PhD-s overall as a percentage of all theses defended in Russian humanities, the number hardly changed and remained small (less than 0.3%). The leading discipline in the study of aging (within the humanities) is sociology accounting for more than a third of all defended theses. Though the theses were defended in 48 cities, more than half of them were defended in 3 cities, which are Moscow, St. Petersburg and Saratov. Thematic analysis showed that the leading position was occupied by two topics: "the elderly and the state" (42%) and "(re)socialization/adaptation of the elderly" (25%). 14% of the works are devoted to intergenerational relations and social status of the elderly. Other topics (old man/woman's personality, self-perceptions of aging, violence and crime against the elderly, loneliness, discrimination, etc.) are presented by very few studies.

  5. When emotionality trumps reason: a study of individual processing style and juror bias.

    Science.gov (United States)

    Gunnell, Justin J; Ceci, Stephen J

    2010-01-01

    "Cognitive Experiential Self Theory" (CEST) postulates that information-processing proceeds through two pathways, a rational one and an experiential one. The former is characterized by an emphasis on analysis, fact, and logical argument, whereas the latter is characterized by emotional and personal experience. We examined whether individuals influenced by the experiential system (E-processors) are more susceptible to extralegal biases (e.g. defendant attractiveness) than those influenced by the rational system (R-processors). Participants reviewed a criminal trial transcript and defendant profile and determined verdict, sentencing, and extralegal susceptibility. Although E-processors and R-processors convicted attractive defendants at similar rates, E-processors were more likely to convict less attractive defendants. Whereas R-processors did not sentence attractive and less attractive defendants differently, E-processors gave more lenient sentences to attractive defendants and harsher sentences to less attractive defendants. E-processors were also more likely to report that extralegal factors would change their verdicts. Further, the degree to which emotionality trumped rationality within an individual, as measured by a novel scoring method, linearly correlated with harsher sentences and extralegal influence. In sum, the results support an "unattractive harshness" effect during guilt determination, an attraction leniency effect during sentencing and increased susceptibility to extralegal factors within E-processors. Copyright © 2010 John Wiley & Sons, Ltd. Copyright © 2010 John Wiley & Sons, Ltd.

  6. The influence of sex on mock jurors' verdicts across type of child abuse cases.

    Science.gov (United States)

    Pettalia, Jennifer; Pozzulo, Joanna D; Reed, Jennifer

    2017-07-01

    This study examined the influence of victim sex, mock juror sex, and type of child abuse (physical, sexual, emotional, and neglect) on mock jurors' assessments of eyewitness and defendant integrity, continuous guilt ratings, dichotomous verdicts, and sentencing recommendations. Participants read one of eight versions of a trial transcript and then answered a self-report questionnaire. Female mock jurors were significantly more likely to find the defendant guilty overall. Moreover, female mock jurors recommended significantly longer sentences for defendants in sexual abuse cases; whereas, male mock jurors recommended significantly longer sentences for defendants in sexual and physical abuse cases. Male mock jurors perceived the defendant more favorably than female mock jurors; whereas, female mock jurors perceived the alleged victim more favorable than male mock jurors. These results suggest that juror sex may be an influential factor in child abuse cases overall. Copyright © 2017 Elsevier Ltd. All rights reserved.

  7. The Right to Health of Persons with Disabilities and the Promotional Role of The Healths Protection Center of the Public Defender's Office in the State of Ceará

    Directory of Open Access Journals (Sweden)

    Cecilia Barroso de Oliveira

    2015-12-01

    Full Text Available The article aims to analysis the performance of Healths Protection Center of the Public Defender's Office in the State of Ceará in the years 2013 and 2014, notably with regard to the protection of rights of persons with disabilities. This is a specialized service in the demands of health, whose performance has been excelling in the protection of the right to health of the hypossufficient. Judicialization of public policy as an instrument of implementation of the fundamental  right  to  health  is  a  topic  widely  discussed  at  the  Academy  who  makes increasingly practical importance, due to its impact on reality and the involvement of various social actors, with different ideas and interests. This article intended to talk regarding the right to health of persons with disabilities, approaching the challenges to be overcome for their effectiveness and evoking questions about social inclusion. For the understanding of the object, the study used bibliographical research and documentary, with use of theoretical references of documents kept in files of public institution and statistical data elaborated by specialized institutes. In order to obtain detailed information and reports from experience, the study used too an interview with interactive and unstructured nature and exploratory bias. In the end, it was concluded that the performance of the Healths Protection Center has excelled in the awareness of the rights and in the solution of the request by means of health benefits, judicial or outside a court. However, it is necessary that there should be greater dialogue between public authorities, institutions and society, to empower the citizenship of persons with disabilities.

  8. Game Theory and Uncertainty Quantification for Cyber Defense Applications

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.

    2016-07-21

    Cyber-system defenders face the challenging task of protecting critical assets and information continually against multiple types of malicious attackers. Defenders typically operate within resource constraints while attackers operate at relatively low costs. As a result, design and development of resilient cyber-systems that can support mission goals under attack while accounting for the dynamics between attackers and defenders is an important research problem.

  9. Bakterite Miss Marple = The Miss Marple of bacteria / Marika Mikelsaar ; interv. Evelin Kivilo

    Index Scriptorium Estoniae

    Mikelsaar, Marika, 1938-

    2008-01-01

    Intervjuu Tartu Ülikooli professori, probiootilise piimhappebakteri ME-3 avastajaga, kes pälvis president Toomas Hendrik Ilveselt Eesti Vabariigi 90. aastapäeva puhul Valgetähe III klassi teenetemärgi

  10. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  11. "But He's a Star Football Player!": How Social Status Influences Mock Jurors' Perceptions in a Sexual Assault Case.

    Science.gov (United States)

    Pica, Emily; Sheahan, Chelsea; Pozzulo, Joanna

    2017-06-01

    There have been several recent, high-profile cases in the media that have shed light on the perceived leniency in sentencing defendants in sexual assault cases. In a number of these cases, the defendant was well known within their community (e.g., Brock Turner; People v. Turner) or nationally (e.g., Ghomeshi; R v. Ghomeshi). The purpose of this study was to examine how the social status of the defendant (low vs. high), victim social status (low vs. high), victim gender (male vs. female), and the reason the victim was unconscious during the assault (consuming alcohol vs. consuming cold medicine) influenced mock jurors' decisions in a sexual assault case. Mock jurors ( N = 489) read a mock trial transcript depicting an alleged sexual assault. Mock jurors were asked to render a dichotomous verdict, continuous guilt rating, and rate their perceptions of the victim and defendant. There was no influence of the variables on mock jurors' dichotomous verdicts; however, social status influenced guilt ratings. There also was a combined influence of the defendant's social status and the reason the victim was unconscious such that when the defendant was described as low status, and the victim was unconscious due to alcohol consumption, the defendant received higher guilt ratings compared with when the victim was unconscious due to cold medicine. Moreover, the victim was perceived as having more control over the situation when the defendant was the star quarterback (i.e., high status), the victim was female, and she was unconscious due to alcohol consumption compared with cold medicine. These results suggest that victims may be blamed based on their perceived social status and other factors that may have influenced their control over the sexual assault, such as alcohol consumption.

  12. Commentary: Pursuing justice in death penalty trials.

    Science.gov (United States)

    Watson, Clarence; Eth, Spencer; Leong, Gregory B

    2012-01-01

    The capital trial, by its nature, is fraught with emotionally disturbing elements that jurors must face when deciding the ultimate fate of a guilty defendant. A confluence of mitigating and aggravating factors influences a capital jury's decision to impose a sentence of death. The presence or absence of defendant remorse in these cases may make all the difference in whether a capital defendant's life is spared. This commentary examines the onerous emotional toll encountered by capital jurors in light of the findings of Corwin and colleagues regarding defendant remorse and juror's need for affect. The commentary also presents practical and ethics-related considerations that should be kept in mind when reflecting on their study.

  13. A game theoretic investigation of deception in network security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Grosu, Daniel

    2010-12-03

    We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. Finally, we discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network.

  14. What do territory owners defend against?

    NARCIS (Netherlands)

    Hinsch, Martin; Komdeur, Jan

    2017-01-01

    Theoretical research on evolutionary aspects of territoriality has a long history. Existing studies, however, differ widely in modelling approach and research question. A generalized view on the evolution of territoriality is accordingly still missing. In this review, we show that territorial

  15. Defending the unabomber: anosognosia in schizophrenia.

    Science.gov (United States)

    Amador, X F; Paul-Odouard, R

    2000-01-01

    The use of recent psychiatric research in the defense of the 'Unabomber' (United States vs. Theodore Kaczynski) is a compelling example of how the gap between research and practice can have profound consequences on the practice of forensic psychiatry, psychology and the judicial process. In this case, educating the lawyers and the court about the research on poor insight in schizophrenia changed the defense strategy and ultimately the course of the trial.

  16. Markets China Defends its Index Future

    Institute of Scientific and Technical Information of China (English)

    JESSY ZHANG

    2006-01-01

    @@ On September 5th, the Singapore Exchange(SGX) launched the world's first index futures based on stocks listed in the Chinese mainland, despite the fact that index compiler FTSE/Xinhua was in the process of being sued by two Chinese companies that manage data for the Chinese stock exchanges.

  17. Who Defends the Stem Cell's Citadel?

    Science.gov (United States)

    Strick-Marchand, Hélène; Durantel, David

    2018-03-01

    Recently in Cell, Wu et al. (2018) demonstrated that intrinsic expression of a subset of interferon stimulated genes confers resistance to viral infections in stem cells both in vitro and in vivo, while differentiated cells lose this intrinsic gatekeeper expression pattern in favor of inducible interferon responses. Copyright © 2018 Elsevier Inc. All rights reserved.

  18. Coral skeletons defend against ultraviolet radiation.

    Directory of Open Access Journals (Sweden)

    Ruth Reef

    Full Text Available BACKGROUND: Many coral reef organisms are photosynthetic or have evolved in tight symbiosis with photosynthetic symbionts. As such, the tissues of reef organisms are often exposed to intense solar radiation in clear tropical waters and have adapted to trap and harness photosynthetically active radiation (PAR. High levels of ultraviolet radiation (UVR associated with sunlight, however, represent a potential problem in terms of tissue damage. METHODOLOGY/PRINCIPAL FINDINGS: By measuring UVR and PAR reflectance from intact and ground bare coral skeletons we show that the property of calcium carbonate skeletons to absorb downwelling UVR to a significant extent, while reflecting PAR back to the overlying tissue, has biological advantages. We placed cnidarians on top of bare skeletons and a UVR reflective substrate and showed that under ambient UVR levels, UVR transmitted through the tissues of cnidarians placed on top of bare skeletons were four times lower compared to their counterparts placed on a UVR reflective white substrate. In accordance with the lower levels of UVR measured in cnidarians on top of coral skeletons, a similar drop in UVR damage to their DNA was detected. The skeletons emitted absorbed UVR as yellow fluorescence, which allows for safe dissipation of the otherwise harmful radiation. CONCLUSIONS/SIGNIFICANCE: Our study presents a novel defensive role for coral skeletons and reveals that the strong UVR absorbance by the skeleton can contribute to the ability of corals, and potentially other calcifiers, to thrive under UVR levels that are detrimental to most marine life.

  19. Trafkintu: seed curators defending food sovereignty

    Directory of Open Access Journals (Sweden)

    Nastassja Nicole Mancilla Ivaca

    2014-10-01

    Full Text Available This paper examines the resurgence of Trafkintu, an ancient Mapuche ritual of seed trade; now as a folk-communication practice of resistance, against neoliberal transformations in farming that threaten food sovereignty of rural communities in southern Chile. Drawing onparticipant observation and semi-structured interviews with peasant and Mapuche women involved in these practices, we show that seed curators women act as agents that revalue the localness [lo local] through a process of resignification of Trafkintu, this time linking it tofood self-sufficiency. In addition, they build networks between indigenous and peasant communities as a resistance strategy. However, this resurgence of Trafkintu becomes ambivalent as its new symbolic expression is being appropriated by local mainstreampoliticians, for electoral purposes, to promote an image of 'concern about popular culture'. That is, a tool of resistance, on the one hand, and a kind of political folk-marketing, on the other.

  20. Queller's separation condition explained and defended.

    Science.gov (United States)

    Birch, Jonathan; Marshall, James A R

    2014-10-01

    The theories of inclusive fitness and multilevel selection provide alternative perspectives on social evolution. The question of whether these perspectives are of equal generality remains a divisive issue. In an analysis based on the Price equation, Queller argued (by means of a principle he called the separation condition) that the two approaches are subject to the same limitations, arising from their fundamentally quantitative-genetical character. Recently, van Veelen et al. have challenged Queller's results, using this as the basis for a broader critique of the Price equation, the separation condition, and the very notion of inclusive fitness. Here we show that the van Veelen et al. model, when analyzed in the way Queller intended, confirms rather than refutes his original conclusions. We thereby confirm (i) that Queller's separation condition remains a legitimate theoretical principle and (ii) that the standard inclusive fitness and multilevel approaches are indeed subject to the same limitations.

  1. [Elective abortions, a right to defend].

    Science.gov (United States)

    Zaccabri, Annie

    2015-12-01

    Every year in France, almost 210 000 women request a termination of an unwanted pregnancy. Two thirds of them were however using a form of contraception, hence the importance, for caregivers, of encouraging women to find the method which works best for them. The right to abortion is the fruit of a long fight for a woman's right to control her own body. It is a right which must be protected. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  2. Diplomats defend Snaige in duty row

    Index Scriptorium Estoniae

    2005-01-01

    Leedu soovib, et Ukraina tühistaks uued tollimaksud Euroopa Liidus valmistatud kodukaupadele. Leedu kodumasinate tootja Snaige kavatseb hakata eksportima oma tooteid just Ukrainasse ja suurendada müüki Venemaale ja Valgevenesse

  3. Coordinated Displays to Assist Cyber Defenders

    Science.gov (United States)

    2016-09-23

    expected to affect performance efficacy (i.e., accuracy in identifying threats and non- threats ) because all alert-related information was present...For the first alert, the researcher demonstrated how to collect evidence to make a threat judgement while talking aloud. In completing the second...analysts must gather evidence from multiple sources and ultimately decide whether or not suspicious activity represents a threat to network security

  4. Defending Against Biological and Chemical Attacks

    Science.gov (United States)

    2010-08-01

    addition, we field integrated installation consequence management response capabilities to select installations both at home and abroad. Just as...decon- tamination, like self-decontaminating or strippable coat- ings for vehicles; we are developing technologies to focus decontamination on the

  5. Play the Immune System Defender Game

    Science.gov (United States)

    ... Questionnaire The Immune System Play the Immune System Game About the game Granulocytes, macrophages and dendritic cells are immune cells ... last will in Paris. Play the Blood Typing Game Try to save some patients and learn about ...

  6. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    Science.gov (United States)

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  7. Discrimination and instructional comprehension: guided discretion, racial bias, and the death penalty.

    Science.gov (United States)

    Lynch, M; Haney, C

    2000-06-01

    This study links two previously unrelated lines of research: the lack of comprehension of capital penalty-phase jury instructions and discriminatory death sentencing. Jury-eligible subjects were randomly assigned to view one of four versions of a simulated capital penalty trial in which the race of defendant (Black or White) and the race of victim (Black or White) were varied orthogonally. Dependent measures included a sentencing verdict (life without the possibility of parole or the death penalty), ratings of penalty phase evidence, and a test of instructional comprehension. Results indicated that instructional comprehension was poor overall and that, although Black defendants were treated only slightly more punitively than White defendants in general, discriminatory effects were concentrated among participants whose comprehension was poorest. In addition, the use of penalty phase evidence differed as a function of race of defendant and whether the participant sentenced the defendant to life or death. The study suggest that racially biased and capricious death sentencing may be in part caused or exacerbated by the inability to comprehend penalty phase instructions.

  8. Field reliability of competence to stand trial opinions: How often do evaluators agree, and what do judges decide when evaluators disagree?

    Science.gov (United States)

    Gowensmith, W Neil; Murrie, Daniel C; Boccaccini, Marcus T

    2012-04-01

    Despite many studies that examine the reliability of competence to stand trial (CST) evaluations, few shed light on "field reliability," or agreement among forensic evaluators in routine practice. We reviewed 216 cases from Hawaii, which requires three separate evaluations from independent clinicians for each felony defendant referred for CST evaluation. Results revealed moderate agreement. In 71% of initial CST evaluations, all evaluators agreed about a defendant's competence or incompetence (kappa = .65). Agreement was somewhat lower (61%, kappa = .57) in re-evaluations of defendants who were originally found incompetent and sent for restoration services. We also examined the decisions judges made about a defendant's CST. When evaluators disagreed, judges tended to make decisions consistent with the majority opinion. But when judges disagreed with the majority opinion, they more often did so to find a defendant incompetent than competent, suggesting a generally conservative approach. Overall, results reveal moderate agreement among independent evaluators in routine practice. But we discuss the potential for standardized training and methodology to further improve the field reliability of CST evaluations.

  9. The Church, too, is to pay for 'nuclear electricity'

    International Nuclear Information System (INIS)

    Anon.

    1982-01-01

    The Regional Court (LG) of Essen in an appeal lodged by the plaintiff (electric utility company) against a protestant parish for payment of electricity rates retained (10 per cent) and for further declaration of the defendant's obligation to pay, by ruling dated September 30, 1981 - 15 S 136/81 - has modified the decree issued at first instance by the District Court (AG) of Gelsenkirchen on March 30, 81, to the effect that the defendant has the obligation to pay also in future to the plaintiff without curtailment such electricity rates and advance payments as will be invoiced by the latter in accordance with the power supply contracts concluded between plaintiff and defendant in writing in connection with the general conditions governing the supply of electric power from the low-voltage power supply systems, and also if the plaintiff should continue to provide the defendant with electric power generated by nuclear power plants'. The defendant was not adjudged the right to refuse payment on grounds of conscience. (orig./HP) [de

  10. Optimizing the Long-Term Capacity Expansion and Protection of Iraqi Oil Infrastructure

    National Research Council Canada - National Science Library

    Brown, Patrick S

    2005-01-01

    This thesis introduces a tri-level defender-attacker-defender optimization model that prescribes how Iraq's oil infrastructure can, over time, be expanded, protected, and operated, even in the face of insurgent attacks...

  11. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  12. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  13. How reliable are forensic evaluations of legal sanity?

    Science.gov (United States)

    Gowensmith, W Neil; Murrie, Daniel C; Boccaccini, Marcus T

    2013-04-01

    When different clinicians evaluate the same criminal defendant's legal sanity, do they reach the same conclusion? Because Hawaii law requires multiple, independent evaluations when questions about legal sanity arise, Hawaii allows for the first contemporary study of the reliability of legal sanity opinions in routine practice in the United States. We examined 483 evaluation reports, addressing 165 criminal defendants, in which up to three forensic psychiatrists or psychologists offered independent opinions on a defendant's legal sanity. Evaluators reached unanimous agreement regarding legal sanity in only 55.1% of cases. Evaluators tended to disagree more often when a defendant was under the influence of drugs or alcohol at the time of the offense. But evaluators tended to agree more often when they agreed about diagnosing a psychotic disorder, or when the defendant had been psychiatrically hospitalized shortly before the offense. In court, judges followed the majority opinion among evaluators in 91% of cases. But when judges disagreed with the majority opinion, they usually did so to find defendants legally sane, rather than insane. Overall, this study indicates that reliability among practicing forensic evaluators addressing legal sanity may be poorer than the field has tended to assume. Although agreement appears more likely in some cases than others, the frequent disagreements suggest a need for improved training and practice.

  14. Blinded by the White: A Comparative Analysis of Jury Challenges on Racial Grounds

    Directory of Open Access Journals (Sweden)

    Thalia Anthony

    2017-08-01

    Full Text Available Indigenous peoples in Australia, the United States and Canada are significantly overrepresented as defendants in criminal trials and yet vastly underrepresented on juries in criminal trials. This means that all-white juries mostly determine the guilt of Indigenous defendants or white defendants responsible for harming Indigenous victims. In this article, we explore cases in which Indigenous defendants have perceived that an all-white jury’s prejudice against Indigenous people would prevent them receiving a fair trial. It focuses on Indigenous defendants (often facing charges in relation to protesting against white racism challenging the array of all-white juries. Across these cases, Australian courts rely on formal notions of fairness in jury selection to dismiss the Indigenous defendant’s perception of bias and foreclose an inquiry into the potential prejudices of white jurors. We compare the Australian judicial ‘colour-blindness’ towards all-white juries with that of the United States and Canada. We argue that the tendency for courts in the United States and Canada to question jurors on their biases provides useful lessons for Australian judiciaries, including in relation to the impending trials of Indigenous defendants in Kalgoorlie, Western Australia, accused of committing crimes in response to white racist violence. Nonetheless, across all jurisdictions where there is a challenge to the array based on racial composition, courts consistently uphold all-white juries. We suggest that the judicial view of the racial neutrality of white jury selection misapprehends the substantive biases in jury selection and the injustice perceived by defendants in having a white jury adjudicate an alleged crime that is committed in circumstances involving protest against white prejudice.

  15. Long-term competence restoration.

    Science.gov (United States)

    Morris, Douglas R; DeYoung, Nathaniel J

    2014-01-01

    While the United States Supreme Court's Jackson v. Indiana decision and most state statutes mandate determinations of incompetent defendants' restoration probabilities, courts and forensic clinicians continue to lack empirical evidence to guide these determinations and do not yet have a consensus regarding whether and under what circumstances incompetent defendants are restorable. The evidence base concerning the restoration likelihood of those defendants who fail initial restoration efforts is even further diminished and has largely gone unstudied. In this study, we examined the disposition of a cohort of defendants who underwent long-term competence restoration efforts (greater than six months) and identified factors related to whether these defendants were able to attain restoration and adjudicative success. Approximately two-thirds (n = 52) of the 81 individuals undergoing extended restoration efforts were eventually deemed restored to competence. Lengths of hospitalization until successful restoration are presented with implications for the reasonable length of time that restoration efforts should persist. Older individuals were less likely to be restored and successfully adjudicated, and individuals with more severe charges and greater factual legal understanding were more likely to be restored and adjudicated. The significance of these findings for courts and forensic clinicians is discussed.

  16. Assessing the impact of Melendez-Diaz on the investigation and prosecution of biological weapons incidents.

    Science.gov (United States)

    Bahr, Elizabeth L; Katz, Rebecca

    2009-12-01

    In June 2009, the U.S. Supreme Court asserted in Melendez-Diaz v Massachusetts that the admission of a laboratory analyst's certificate to validate forensic evidence against a defendant violated the defendant's Sixth Amendment Confrontation Clause rights. The Court stated that if a prosecution wished to use forensic science evidence against a defendant, the plaintiff must ensure that an actual lab analyst could testify live before the court as to the nature of the laboratory certificate being presented against the defendant, in order to uphold a defendant's constitutional right to confront the adverse witnesses against him or her. The opinion itself, as well as dicta in both the majority and the dissenting opinions, has potential implications for the success of any future prosecutions of alleged biological weapons use involving microbial forensics. Not only does the Melendez-Diaz opinion create an added burden on laboratory investigators, but the case called into question the reliability of the use of forensic science in the courtroom. Analysts and policymakers should be aware of this ruling and any potential impact the Court may have on the ability to successfully prosecute a biological weapons use event.

  17. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  18. HIV-i võib nakatunud olla iga sajas täiskasvanud eestlane / Marika Raiski

    Index Scriptorium Estoniae

    Raiski, Marika

    2005-01-01

    Vt. ka Nädaline 27. sept., lk. 7. Vastavalt Maailma Terviseorganisatsiooni (WHO) ja UNAIDS-i hinnangule on Eestis hulgaliselt registreerimata HIV-juhte ning tegelikult võib HIV-nakatunuid olla juba iga sajas täiskasvanud Eesti elanik

  19. Download this PDF file

    African Journals Online (AJOL)

    countries legal aid at public expense is restricted to capital cases, given the scarcity of public defenders, as borne out .... paralegal to speak for an indigent defendant on matters of bail.18 ..... See: The socioeconomic impact of pretrial detention,.

  20. Children's intervention strategies in situations of victimization by bullying: Social cognitions of outsiders versus defenderd.

    NARCIS (Netherlands)

    Pronk, J.; Goossens, F.A.; Olthof, T.; de Mey, J.R.P.B.; Willemen, A.M.

    2013-01-01

    This study examined the social cognitions of outsiders and defenders about intervening in situations of victimization by bullying. Do outsiders and defenders behave differently in victimization situations because of differences in competence beliefs, or because of a selectivity effect in

  1. ISPARTA v RICHTER 2013 6 SA 529 (GP)

    African Journals Online (AJOL)

    10332324

    In order to follow the reasoning of the court, the discussion starts off with a brief overview ..... It was therefore easy to identify to whom the first defendant was ..... defendant made defamatory comments about the plaintiff's business to a company.

  2. Territory and group sizes in Eurasian beavers (Castor fiber): echoes of settlement and reproduction?

    NARCIS (Netherlands)

    Campbell, R.D.; Rosell, F.; Nolet, B.A.; Dijkstra, V.A.A.

    2005-01-01

    According to current theories of territoriality, an animal is expected to defend the smallest area that can provide resources for maximisation of reproduction, known as the economically defendable area. In group territorial species however, the strategies behind resource defence are likely to be

  3. A multiobjective approach towards weapon assignment in a ground ...

    African Journals Online (AJOL)

    A typical ground-based air defence (GBAD) environment comprises defended assets on the ground which require protection from enemy aircraft entering the defended airspace. ... of computerised threat evaluation and weapon assignment (TEWA) decision support systems (DSSs) within the context of a GBAD system.

  4. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    Science.gov (United States)

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  5. Sleep-related violence and sexual behavior in sleep: a systematic review of medical-legal case reports.

    Science.gov (United States)

    Ingravallo, Francesca; Poli, Francesca; Gilmore, Emma V; Pizza, Fabio; Vignatelli, Luca; Schenck, Carlos H; Plazzi, Giuseppe

    2014-08-15

    To review systematically medical-legal cases of sleep-related violence (SRV) and sexual behavior in sleep (SBS). We searched Pubmed and PsychINFO (from 1980 to 2012) with pre-specified terms. We also searched reference lists of relevant articles. Case reports in which a sleep disorder was purported as the defense during a criminal trial and in which information about the forensic evaluation of the defendant was provided. Information about legal issues, defendant and victim characteristics, circumstantial factors, and forensic evaluation was extracted from each case. A qualitative-comparative assessment of cases was performed. Eighteen cases (9 SRV and 9 SBS) were included. The charge was murder or attempted murder in all SRV cases, while in SBS cases the charge ranged from sexual touching to rape. The defense was based on sleepwalking in 11 of 18 cases. The trial outcome was in favor of the defendant in 14 of 18 cases. Defendants were relatively young males in all cases. Victims were usually adult relatives of the defendants in SRV cases and unrelated young girls or adolescents in SBS cases. In most cases the criminal events occurred 1-2 hours after the defendant's sleep onset, and both proximity and other potential triggering factors were reported. The forensic evaluations widely differed from case to case. SRV and SBS medical-legal cases did not show apparent differences, except for the severity of the charges and the victim characteristics. An international multidisciplinary consensus for the forensic evaluation of SRV and SBS should be developed as an urgent priority.

  6. Mitigated Democracy

    NARCIS (Netherlands)

    Doomen, J.

    2016-01-01

    Militant democracy is an attempt to defend democracy against totalitarian parties that would use democratic procedures to rise to power. This article is focused on the consistency of the concept of 'militant democracy'. I argue that what militant democracy defends is not the democratic procedure

  7. Games Based Study of Nonblind Confrontation

    Directory of Open Access Journals (Sweden)

    Yixian Yang

    2017-01-01

    Full Text Available Security confrontation is the second cornerstone of the General Theory of Security. And it can be divided into two categories: blind confrontation and nonblind confrontation between attackers and defenders. In this paper, we study the nonblind confrontation by some well-known games. We show the probability of winning and losing between the attackers and defenders from the perspective of channel capacity. We establish channel models and find that the attacker or the defender wining one time is equivalent to one bit transmitted successfully in the channel. This paper also gives unified solutions for all the nonblind confrontations.

  8. Unpacking insanity defence standards: An experimental study of rationality and control tests in criminal law

    Directory of Open Access Journals (Sweden)

    Rebecca K. Helm

    2016-07-01

    Full Text Available The present study investigated the impact of different legal standards on mock juror decisions concerning whether a defendant was guilty or not guilty by reason of insanity. Undergraduate students (N = 477 read a simulated case summary involving a murder case and were asked to make an insanity determination. The cases differed in terms of the condition of the defendant (rationality deficit or control deficit and the legal standard given to the jurors to make the determination (Model Penal Code, McNaughten or McNaughten plus a separate control determination. The effects of these variables on the insanity determination were investigated. Jurors also completed questionnaires measuring individualism and hierarchy attitudes and perceptions of facts in the case. Results indicate that under current insanity standards jurors do not distinguish between defendants with rationality deficits and defendants with control deficits regardless of whether the legal standard requires them to do so. Even defendants who lacked control were found guilty at equal rates under a legal standard excusing rationality deficits only and a legal standard excluding control and rationality deficits. This was improved by adding a control test as a partial defence, to be determined after a rationality determination. Implications for the insanity defence in the Criminal Justice System are discussed.

  9. PERTANGGUNGJAWABAN PIDANA TERHADAP PELAKU TINDAK PIDANA PEMILU LEGISLATIF TAHUN 2014 (Studi Putusan Nomor: 70/Pid./2014/PT.TJK.

    Directory of Open Access Journals (Sweden)

    Selvi Yuliyanti

    2017-03-01

    Full Text Available The criminal responsibility of the perpetrators of criminal acts of legislative elections in 2014 in Decision No. 70/Pid./2014/PT.TJK based on the presence of errors and intentional element in the commission of a crime, the defendant's ability to be responsible, there is no justification and forgiving for the defendant in committing criminal offenses legislative elections, by deliberately adding voice to a certain election participants. The judges convict the Defendants therefore with imprisonment for 3 (three months, and a fine IDR 500.000 (five hundred thousand rupiah provided that if the fine is not paid then replaced with imprisonment for 1 (one month. Basic legal considerations judges in imposing criminal offense to legislative elections in 2014 juridically is the fulfillment of the evidence in the trial referred to in Article 183 and Article 184 Criminal Procedure Code. Philosophically considered that the criminal as a guidance to the behavior of the accused. Sociologically consists of aggravating factors, namely the defendant as the election organizer has injured the implementation of democracy and the mitigating circumstances that the defendants confessed and has not been convicted, have family responsibilities and polite during the trial.   Keywords: Criminal Liability, Election, Legislative

  10. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  11. Defending against Browser Based Data Exfiltration Attacks

    Science.gov (United States)

    Sood, Aditya

    2013-01-01

    The global nature of Internet has revolutionized cultural and commercial interactions while at the same time it has provided opportunities for cyber criminals. Crimeware services now exist that have transformed the nature of cyber crime by making it more automated and robust. Furthermore, these crimeware services are sold as a part of a growing…

  12. Creating Political Space To Defend Chinese Workers.

    Science.gov (United States)

    Dongfang, Han

    2002-01-01

    Presents comments spoken at a human rights conference by Han Dongfang, a Chinese activist who was jailed after an attempt to organize China's first independent union from a tent in Tiananmen Square during the democracy movement. Today, he is barred from the mainland but works from Hong Kong through Radio Free Asia. Comments focus on foreign…

  13. Defending the solo and small practice neurologist.

    Science.gov (United States)

    Jones, Elaine C; Evans, David A

    2015-04-01

    Changes in health care are having a dramatic effect on the practice of medicine. In 2005, a National Center for Health Statistics survey showed that 55%-70% of physicians are in small/solo practices. These data also demonstrated that 70% of physicians identified themselves as owners. Since passage of the Affordable Care Act (ACA) in 2010, neurologists report an 8% increase in academic practice settings, a 2% decrease in private practice settings, and a 5% decrease in solo practice settings. Surveys of family physicians showed that 60% are now employees of hospitals or larger groups. A survey by The Physicians Foundation showed that 89% of physicians believed that the traditional model of independent private practice is either "on shaky ground" or "a dinosaur soon to go extinct." With the changes expected from the ACA, solo/small practices will continue to face challenges and therefore must pay close attention to business and clinical metrics.

  14. Defending Critical Infrastructure as Cyber Key Terrain

    Science.gov (United States)

    2016-08-01

    to Secure Cyberspace (NSSC) is as it lists three strategic objectives:4 1) Prevent cyber attacks against America’s critical infrastructures; 2...House, “National Strategy to Secure Cyberspace,” (Washington, DC: The White House, 2003) Trey Herr, "PrEP: A framework for malware & cyber weapons...David Kuipers and Mark Fabro. “Control Systems Cyber Security : Defense in Depth Strategies,” [United States: Department of Energy, 2006]: 4

  15. Can the neutrino speed anomaly be defended?

    CERN Document Server

    Knobloch, Jurgen

    2011-01-01

    The OPERA collaboration reported [1] a measurement of the neutrino velocity exceeding the speed of light by 0.025%. For the 730 km distance from CERN in Geneva to the OPERA experiment an early arrival of the neutrinos of 60.7 ns is measured with an accuracy of \\pm6.9 ns (stat.) and \\pm7.4 ns (sys.). A basic assumption in the analysis is that the proton time structure represents exactly the time structure of the neutrino flux. In this manuscript, we challenge this assumption. We identify two main origins of systematic effects: a group delay due to low pass filters acting on the particular shape of the proton time distribution and a movement of the proton beam at the target during the leading and trailing slopes of the spill.

  16. Eosinophils in helminth infection: defenders and dupes

    Science.gov (United States)

    Huang, Lu; Appleton, Judith A.

    2016-01-01

    Eosinophilia is a central feature of the host response to helminth infection. Larval stages of parasitic worms are killed in vitro by eosinophils in the presence of specific antibodies or complement. These findings established host defense as the paradigm for eosinophil function. Recently, studies in eosinophil-ablated mouse strains have revealed an expanded repertoire of immunoregulatory functions for this cell. Other reports document crucial roles for eosinophils in tissue homeostasis and metabolism, processes that are central to the establishment and maintenance of parasitic worms in their hosts. In this review, we summarize current understanding of the significance of eosinophils at the host-parasite interface, highlighting their distinct functions during primary and secondary exposure. PMID:27262918

  17. Defending the Pittsburgh Waterways Against Catastrophic Disruption

    Science.gov (United States)

    2012-06-01

    by the Hannibal L/D. Along the Allegheny River our AOI is bounded by the Allegheny L/D 5. Along the Monongahela River our AOI is bounded by the...22  Figure 9.  Dams segment the river into pools, which are numbered. Locks enable transit between pools. The Hannibal L/D and the Pike Island...AOI, listed in the table to the right. Along the Ohio River our AOI is bounded by the Hannibal L/D. Along the Allegheny River our AOI is bounded by

  18. Smart-Guard: Defending User Input from Malware

    DEFF Research Database (Denmark)

    Denzel, Michael; Bruni, Alessandro; Ryan, Mark

    2016-01-01

    Trusted input techniques can profoundly enhance a variety of scenarios like online banking, electronic voting, Virtual Private Networks, and even commands to a server or Industrial Control System. To protect the system from malware of the sender’s computer, input needs to be reliably authenticated...

  19. Freedom and Information. Assessing Publicly Available Data Regarding U.S. Transportation Infrastructure Security

    Science.gov (United States)

    2007-01-01

    know or can learn may be advantageous to defenders. If defend- ers are unaware that a terrorist group knows about a particular vulnerability, that...cases, this information is necessarily in the public domain because it provides an important service. For instance, as noted above, ecommerce sites for

  20. The "general recognition and acceptance" standard of objectivity for good faith in prescribing: legal and medical implications.

    Science.gov (United States)

    Brushwood, David B

    2007-01-01

    The United States Court of Appeals for the 4th Circuit has ruled that a jury considering charges of drug trafficking against a pain management physician should be instructed that the defendant's good faith is a defense to the charges. The court rejected a subjective standard of good faith, and instead ruled that the good faith of the defendant must be evaluated from an objective perspective. This objective standard requires that the jury determine whether the defendant was practicing in accordance with the standard generally recognized and accepted in the United States. General recognition and acceptance are determined on a case-by-case basis, within the context of a defendant's practice. Simply because a physician's practice is out of the norm for many physicians does not mean it can't be generally recognized and accepted within the standard of medical practice. Expert witness testimony of pain management physicians will assist juries in the application of this standard for good faith in prescribing.

  1. Deciding the fate of others: the cognitive underpinnings of racially biased juror decision making.

    Science.gov (United States)

    Kleider, Heather M; Knuycky, Leslie R; Cavrak, Sarah E

    2012-01-01

    In criminal law, jurors are supposed to ignore defendant race when considering factual matters of culpability. However, when judging the merits of a criminal case, jurors' ability (or inability) to avoid bias may affect verdicts. Fact-based decision making expend cognitive resources, while heuristic-based decisions (e.g., using criminal stereotypes) conserve resources. Here, we investigated whether differences in cognitive resources and prejudice attitudes about Blacks influenced trial outcomes. We tested the impact of working memory capacity (WMC), cognitive load, prejudice, and target race (Black, White) on penalties ascribed to fictional criminal defendants in ambiguous-fact cases. Results showed that when "loaded," prejudiced-low-WMC persons supported guilty verdicts with higher confidence more often for Black than White defendants. Conversely, regardless of WMC or prejudice attitude, participants penalized White defendants more often when not loaded. We suggest that cognitive resources and prejudice attitude influence fact-based decisions. Links to juror judgments and potential trial outcomes are discussed.

  2. People with Mental Retardation Are Dying, Legally.

    Science.gov (United States)

    Keyes, Denis; And Others

    1997-01-01

    Criticizes the institution of the death penalty for convicted criminals with mental retardation. Examples are given of cases in which juries were not told of the defendant's mental retardation before sentencing, and a list of defendants with mental retardation that have been executed since 1976 is provided. (CR)

  3. Science | AAAS

    Science.gov (United States)

    Giuseppe Conte Italy's new prime minister defended discredited stem cell therapy By Luca Tancredi Barone defended discredited stem cell therapy By Luca Tancredi Barone May. 24, 2018 illustration of GOES-17 | May. 24, 2018 STEPHAN JUNEK/MPI BRAIN RESEARCH Apparatus for building a single NaCs molecule from two

  4. The Effects of Ethnicity, SES, and Crime Status on Juror Decision Making: A Cross-Cultural Examination of European American and Mexican American Mock Jurors

    Science.gov (United States)

    Esqueda, Cynthia Willis; Espinoza, Russ K. E.; Culhane, Scott E.

    2008-01-01

    In two studies, a defendant's ethnicity, socioeconomic status (SES), and crime status were varied for effects on verdict decisions, sentencing recommendations, culpability assignments, and trait assessments. In Study 1, European Americans (N = 221) provided a low SES Mexican American defendant with more guilt verdicts, a lengthier sentence, and…

  5. Currency crises and the interest rate defence

    NARCIS (Netherlands)

    Daniëls, T.

    2008-01-01

    While virtually all modern models of exchange rate crises recognise that the decision to abandon an exchange rate peg depends on how harshly policy makers are willing to defend the regime, they virtually never model how the exchange rate is defended. We argue that incorporating both the mechanics of

  6. 76 FR 15998 - Notice of Lodging of Consent Decree Under the Clean Water Act

    Science.gov (United States)

    2011-03-22

    ..., treatment plant, and landfill. To address two mines with discharges into the Ohio River Basin, Defendants... DEPARTMENT OF JUSTICE Notice of Lodging of Consent Decree Under the Clean Water Act Notice is..., Defendants will perform injunctive relief with two components. To address four mines with discharges into the...

  7. Combined evaluations of competency to stand trial and mental state at the time of the offense: An overlooked methodological consideration?

    Science.gov (United States)

    Kois, Lauren; Wellbeloved-Stone, James M; Chauhan, Preeti; Warren, Janet I

    2017-06-01

    Combined evaluations of competency to stand trial (CST; competency) and mental state at the time of the offense (MSO; sanity) frequently co-occur. However, most research examines the 2 as discrete constructs without considering 4 potential combined evaluation outcomes: competent-sane, incompetent-sane, competent-insane, and incompetent-insane. External validity can be improved if research more closely mirrored practice. It may be incorrect to assume incompetent defendants are similar across CST-only and combined evaluations, and insane defendants are similar across MSO-only and combined evaluations. Using a sample of 2,751 combined evaluations, we examined demographic, clinical, offense, evaluation, and psycholegal characteristics associated with evaluators' combined evaluation opinions. Multinomial regression analyses revealed older defendants were more likely to be opined incompetent-insane. Defendants with psychotic disorders were more often opined insane, regardless of competency status. Affective diagnoses predicted competent-insane opinions. Developmental disorders were closely related to incompetence, regardless of sanity status. Defendants with organic disorders tended to have global psycholegal impairment, in that they were more often opined incompetent-insane, incompetent-sane, or competent-insane, relative to competent-sane. Prior hospitalization predicted competent-insane relative to competent-sane opinions. Defendants not under the influence of a substance during the offense or with no prior convictions were more likely to be opined insane, regardless of competency status. We interpret these findings in light of psycholegal theory and provide recommendations for research and practice. Collectively, results suggest incorporation of combined evaluations into CST and MSO research is an important methodological consideration not to be overlooked. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. The importance of ecological costs for the evolution of plant defense against herbivory.

    Science.gov (United States)

    van Velzen, Ellen; Etienne, Rampal S

    2015-05-07

    Plant defense against herbivory comes at a cost, which can be either direct (reducing resources available for growth and reproduction) or indirect (through reducing ecological performance, for example intraspecific competitiveness). While direct costs have been well studied in theoretical models, ecological costs have received almost no attention. In this study we compare models with a direct trade-off (reduced growth rate) to models with an ecological trade-off (reduced competitive ability), using a combination of adaptive dynamics and simulations. In addition, we study the dependence of the level of defense that can evolve on the type of defense (directly by reducing consumption, or indirectly by inducing herbivore mortality (toxicity)), and on the type of herbivore against which the plant is defending itself (generalists or specialists). We find three major results: First, for both direct and ecological costs, defense only evolves if the benefit to the plant is direct (through reducing consumption). Second, the type of cost has a major effect on the evolutionary dynamics: direct costs always lead to a single optimal strategy against herbivores, but ecological costs can lead to branching and the coexistence of non-defending and defending plants; however, coexistence is only possible when defending against generalist herbivores. Finally, we find that fast-growing plants invest less than slow-growing plants when defending against generalist herbivores, as predicted by the Resource Availability Hypothesis, but invest more than slow-growing plants when defending against specialists. Our results clearly show that assumptions about ecological interactions are crucial for understanding the evolution of defense against herbivores. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. [Judgment of 30 November 1990].

    Science.gov (United States)

    1991-01-01

    The defendant, who was infected with HIV, was convicted of larceny committed with violence and was sentenced to imprisonment for two years and three months. He appealed the sentence on the grounds that it was too harsh, given his state of health. The German Federal Court agreed with the defendant, ruling that the lower court had not taken into account the fact that the defendant had been infected with HIV for three years and might be subject to an outbreak of AIDS at any time. It held that consideration of such a circumstance is generally necessary because of the drastic effects that such a life-threatening diseases will have on the future life of a defendant. On 23 July 1991, the German Federal Court also held that the fact that a defendant is infected with HIV is normally to be taken into account to the benefit of the defendant in determining a sentence. It ruled that the trial court in this case had properly considered this fact. See Neue Zeitschrift fuer Strafrecht, No. 11, 1991, p. 527. On 25 September 1991, the High Regional Court at Hamm ruled that prison authorities could prohibit the distribution in prison of a brochure entitled "Positive, what next?," published by the German AIDS Assistance Organization. The Court concluded that the section of the brochure dealing with legal remedies was hostile to the objectives of imprisonment to such an extent that distribution to prisoners would undermine the purpose of imprisonment and endanger the security and order of the prison. See Neue Zeitschrift fuer Strafrecht, No. 11, 1992, pp. 559-60.

  10. Radiation injuries/ionizing radiation

    International Nuclear Information System (INIS)

    Gooden, D.S.

    1991-01-01

    This book was written to aid trial attorneys involved in radiation litigation. Radiologists and medical physicists will also find it helpful as they prepare for trial, either as a litigant or an expert witness. Two chapters present checklists to guide attorneys for both plaintiffs and defendants. Gooden titles these checklists Elements of Damages and Elements of Proof and leads the reader to conclusions about each of these. One section that will be particularly helpful to attorneys contains sample interrogatories associated with a case of alleged radiation exposure resulting in a late radiation injury. There are interrogatories for the plaintiff to ask the defendant and for the defendant to ask the plaintiff

  11. An indoor air quality-pharmacokinetic simulation of passive inhalation of marijuana smoke and the resultant buildup of 11-nor-delta-9-tetrahydrocannabinol-9-carboxylic acid in urine.

    Science.gov (United States)

    Giardino, N J

    1997-03-01

    In military courts of law, the good soldier defense is often used by the defendant to explain the presence of 11-nor-delta-9-tetrahydrocannabinol-9-carboxylic acid in urine (hereafter referred to as THCA) above the Department of Defense (DOD) established limit of 15 ng/mL. The defense will contend the defendant unwittingly breathed side-stream marijuana smoke, thus resulting in the presence of THCA in the defendant's urine. The purpose of this work was to link an indoor air quality model (IAQ) with a pharmacokinetic (PK) model to predict a passive marijuana smoker's resultant concentration of the major urinary metabolite THCA.

  12. Analysis of Factors Associated With Rhytidectomy Malpractice Litigation Cases.

    Science.gov (United States)

    Kandinov, Aron; Mutchnick, Sean; Nangia, Vaibhuv; Svider, Peter F; Zuliani, Giancarlo F; Shkoukani, Mahdi A; Carron, Michael A

    2017-07-01

    This study investigates the financial burden of medical malpractice litigation associated with rhytidectomies, as well as factors that contribute to litigation and poor defendant outcomes, which can help guide physician practices. To comprehensively evaluate rhytidectomy malpractice litigation. Jury verdict and settlement reports related to rhytidectomy malpractice litigations were obtained using the Westlaw Next database. Use of medical malpractice in conjunction with several terms for rhytidectomy, to account for the various procedure names associated with the procedure, yielded 155 court cases. Duplicate and nonrelevant cases were removed, and 89 cases were included in the analysis and reviewed for outcomes, defendant specialty, payments, and other allegations raised in proceedings. Data were collected from November 21, 2015, to December 25, 2015. Data analysis took place from December 25, 2015, to January 20, 2016. A total of 89 cases met our inclusion criteria. Most plaintiffs were female (81 of 88 with known sex [92%]), and patient age ranged from 40 to 76 years (median age, 56 years). Fifty-three (60%) were resolved in the defendant's favor, while the remaining 36 cases (40%) were resolved with either a settlement or a plaintiff verdict payment. The mean payment was $1.4 million. A greater proportion of cases involving plastic surgeon defendants were resolved with payment compared with cases involving defendants with ear, nose, and throat specialty (15 [36%] vs 4 [24%]). The most common allegations raised in litigation were intraoperative negligence (61 [69%]), poor cosmesis or disfigurement (57 [64%]), inadequate informed consent (30 [34%]), additional procedures required (14 [16%]), postoperative negligence (12 [14%]), and facial nerve injury (10 [11%]). Six cases (7%) involved alleged negligence surrounding a "lifestyle-lift" procedure, which tightens or oversews the superficial muscular aponeurosis system layer. In this study, although most cases of

  13. Compulsory Medication, Trial Competence, and Penal Theory

    DEFF Research Database (Denmark)

    Ryberg, Jesper

    2016-01-01

    competence? Would it be morally acceptable for the state to forcibly subject a defendant to psychotropic medication in order to restore his/her competence to stand trial? In this article it is argued that the reason that has constituted the main argument in favor of forcible medication of defendants —namely...

  14. 78 FR 52786 - Notice of Lodging of Proposed Consent Decree Under the Park System Resource Protection Act

    Science.gov (United States)

    2013-08-26

    ... access to Defendants' property to plant, water, and monitor replacement trees, and conduct other appropriate activities. Defendants will also supply water and equipment to water the trees. The publication of....C. 19jj et seq., for destruction of, loss of, or injury to park system resources of the Saint Croix...

  15. [Chartered specialist training in gerontology and geriatrics. Dissertation Council no. 601.001.01 working practice].

    Science.gov (United States)

    Kozina, L S

    2014-01-01

    The article highlights basic facts about the foundation and activity of the Gerontology and Geriatrics Dissertation Council of St. Petersburg Institute of Bioregulation and Gerontology, which took invaluable part in chartered specialist training in this field of science that has actively developed in Russia in recent decades. Over the period from June, 2001 to December, 2013, a total of 41 doctoral dissertations were defended, of which 32 dissertations were on Medicine and 9 on Biological Sciences. Likewise, over the same period, a total of 186 candidate's dissertations were defended, of which 152 dissertations were on Medicine and 34 on Biological Sciences, the defenders coming from various regions of Russia and other countries. The defence-representative trend data acquired over the period of the Dissertation Council activities shows that the number of defended doctoral dissertations was relatively small within the period from 2002 to 2008, but it increased significantly in the years 2009 to 2013. The number of defended candidate's dissertations increased significantly over the same period, too. Among many others considered by the Dissertation Council, there were dissertations dedicated to basic research in the field of gerontology and geriatrics. The priority topics of a large number of dissertations performed in St. Petersburg and other Russian towns are age pathology mechanisms, geroprotective effects of regulatory peptides and effectiveness of their use in clinic.

  16. Exploring the potential for joint training between legal professionals in the criminal justice system and health and social care professionals in the mental-health services.

    Science.gov (United States)

    Hean, Sarah; Heaslip, Vanessa; Warr, Jerry; Staddon, Sue

    2011-05-01

    Effective screening of mentally-ill defendants in the criminal court system requires cooperation between legal professionals in the criminal justice system (CJS), and health and social care workers in the mental-health service (MHS). This interagency working, though, can be problematic, as recognized in the Bradley inquiry that recommended joint training for MHS and CJS professionals. The aim of this study was to examine the experiences and attitudes of workers in the CJS and MHS to inform the development of relevant training. The method was a survey of mental-health workers and legal professionals in the court. The results showed that both agencies were uncertain of their ability to work with the other and there is little training that supports them in this. Both recognized the importance of mentally-ill defendants being dealt with appropriately in court proceedings but acknowledged this is not achieved. There is a shared willingness to sympathize with defendants and a common lack of willingness to give a definite, unqualified response on the relationship between culpability, mental-illness and punishment. Views differ around defendants' threat to security.Findings suggest there is scope to develop interprofessional training programs between the CJS and MHS to improve interagency working and eventually impact on the quality of defendants' lives. Recommendations are made on the type of joint training that could be provided.

  17. Students' Views of Factors Affecting Their Bystander Behaviors in Response to School Bullying: A Cross-Collaborative Conceptual Qualitative Analysis

    Science.gov (United States)

    Forsberg, Camilla; Wood, Laura; Smith, Jennifer; Varjas, Kris; Meyers, Joel; Jungert, Tomas; Thornberg, Robert

    2018-01-01

    The aim of the present study was to focus on how students articulate and discuss what factors influence students' decisions to defend or not defend victims when witnessing bullying. In this unique qualitative cross-collaborative study, where two research teams collected interviews from two cultural contexts, eighty-nine students with an age-range…

  18. Admissibility of Evidence from Compelled Mental Examinations: MRE 302 and Beyond

    Science.gov (United States)

    1988-04-01

    technically hearsay), the defendant is thereby estopped from objecting to the government’s use of them its rebuttal case (the " estoppel " theory); 91...court rejected the " estoppel " theory reasoning that when a defendant introduces his own statements on his defense case, he makes no express or implied

  19. Training Tribal Lay Advocates at Sitting Bull College

    Science.gov (United States)

    Shelley, W. L.

    2015-01-01

    Students in Sitting Bull College's lay advocate program develop a well-rounded understanding of the law, enabling them to represent defendants in tribal courts. The program offers legal training for its students--and illustrates how American Indian nations can broaden legal representation for Native defendants in tribal courts. It is one of only…

  20. Žürii kommenteerib Kultuurkapitali arhitektuuripreemiaid 2008 / Marika Lõoke, Laila Põdra, Liina Jänes... [jt.

    Index Scriptorium Estoniae

    2009-01-01

    Peapreemia: Markus Kaasik, Andres Ojari, Ilmar Valdur, Mihkel Tüür, Kalle Komissarov (Pärnu Keskraamatukogu hoone), tegevuspreemia: Maarja Kask, Ralf Lõoke, Neeme Külm, Ingrid Ruudi (projekt Gaasitoru 11. Veneetsia arhitektuuribiennaalil), aastapreemia: Maarja Kask, Ralf Lõoke, Karli Luik (Tartu Kesklinna Kooli juurdeehitus) ja Peep Jänes (Raudna Põhikooli spordihoone), sisearhitektuuri preemia: Tea Tammelaan, Malle Jürgenson, Krista Lepland, restaureerimispreemia: Mari Hammer, Tiiu Lõhmus, Helve Ilves, Villu Kadakas (Vanalinna Hariduskolleegiumi hoone)

  1. Archaeological excavations at Viltina - a viking age harbour site and meeting place / Marika Mägi

    Index Scriptorium Estoniae

    Mägi, Marika, 1968-

    2007-01-01

    2006 jätkusid kaevamised Viltina viikingiaegsel sadamakohal, millega oli alustatud juba 2004. aastal. Kaevati läbi 327,25 m2. Suuremas osas kaevandites paljandunud kiht on vaieldamatult asulakiht. Viltina asulakihiga aladel leidus tavapärasest asulakihist tunduvalt rohkem metall-leide. Leidudest. Tõenäoliselt oli sadamakoht kasutusajal piiratud taraga

  2. 75 FR 13781 - Notice of Lodging of Consent Decree Pursuant to the Clean Water Act

    Science.gov (United States)

    2010-03-23

    ... Operating Partnership LP, Civ. A. No. 10-106, was lodged with the United States Court for the District of... Act, 33 U.S.C. 1321, against Defendant NuStar Pipeline Operating Partnership LP. The Complaint alleges that Defendant failed to comply with regulations issued pursuant to Section 311(j)(5) of the CWA, 33 U...

  3. To Help or Not to Help? The Relation between Jewish Children's Perceptions of Their Parent Attitudes about Bullying and Pro-Social Engagement with Classmates in Bullying Instances

    Science.gov (United States)

    Joel, Penny

    2017-01-01

    The purpose of this study is to focus on the influence that children's perceptions of their parents' attitudes about bullying has on their own attitudes about bullying and defending victims, as well as their actual defending behavior and general pro-social behavior. This study utilizes data collected for a previous study of the BRAVE bully…

  4. A Narrative Model of Recovery | Kelland | South African Journal of ...

    African Journals Online (AJOL)

    In this paper I defend the suggestion that narratively understanding her experience of rape can help a survivor in her recovery from the harm that she has suffered. Susan Brison defends a similar suggestion, but, I argue, does not get all of the possible mileage out of narrative understanding because she does not explore ...

  5. Stability and Change of Outsider Behavior in School Bullying: The Role of Shame and Guilt in a Longitudinal Perspective

    Science.gov (United States)

    Mazzone, Angela; Camodeca, Marina; Salmivalli, Christina

    2018-01-01

    We analyzed developmental changes in outsider behavior, testing whether the likelihood that it turns into bullying or defending over time depends on the individual proneness to feel shame or guilt. Participants were 155 preadolescents (72 boys and 83 girls; [X-bar][subscript age] at T1 = 10.74 years). Bullying, defending, and outsider behaviors…

  6. Ferocious Fighting between Male Grasshoppers

    Science.gov (United States)

    Umbers, Kate D. L.; Tatarnic, Nikolai J.; Holwell, Gregory I.; Herberstein, Marie E.

    2012-01-01

    Contests among individuals over mating opportunities are common across diverse taxa, yet physical conflict is relatively rare. Due to the potentially fatal consequences of physical fighting, most animals employ mechanisms of conflict resolution involving signalling and ritualistic assessment. Here we provide the first evidence of ubiquitous escalated fighting in grasshoppers. The chameleon grasshopper (Kosciuscola tristis) is an Australian alpine specialist, in which males engage in highly aggressive combat over ovipositing females. We describe discrete agonistic behaviours including mandible flaring, mounting, grappling, kicking and biting, and their use depending on the individual’s role as challenger or defender. We show that male role predicts damage, with challengers being more heavily damaged than males defending females (defenders). Challengers also possess wider mandibles than defenders, but are similar in other metrics of body size. Our data suggest that fights escalate between males matched in body size and that mandibles are used as weapons in this species. This system represents an exciting opportunity for future research into the evolution of costly fighting behaviour in an otherwise placid group. PMID:23166725

  7. Ferocious fighting between male grasshoppers.

    Directory of Open Access Journals (Sweden)

    Kate D L Umbers

    Full Text Available Contests among individuals over mating opportunities are common across diverse taxa, yet physical conflict is relatively rare. Due to the potentially fatal consequences of physical fighting, most animals employ mechanisms of conflict resolution involving signalling and ritualistic assessment. Here we provide the first evidence of ubiquitous escalated fighting in grasshoppers. The chameleon grasshopper (Kosciuscola tristis is an Australian alpine specialist, in which males engage in highly aggressive combat over ovipositing females. We describe discrete agonistic behaviours including mandible flaring, mounting, grappling, kicking and biting, and their use depending on the individual's role as challenger or defender. We show that male role predicts damage, with challengers being more heavily damaged than males defending females (defenders. Challengers also possess wider mandibles than defenders, but are similar in other metrics of body size. Our data suggest that fights escalate between males matched in body size and that mandibles are used as weapons in this species. This system represents an exciting opportunity for future research into the evolution of costly fighting behaviour in an otherwise placid group.

  8. Determining criminal responsibility: How relevant are insight and personal attitudes to mock jurors?

    Science.gov (United States)

    Jung, Sandy

    2015-01-01

    High levels of insight are interpreted as indications of a treatment compliance and good outcome by clinical professionals. However, it is unclear whether a defendant's insight plays a role in the decision-making of jurors when determining criminal responsibility. It may be the case that personal biases and attitudes toward the mentally ill and the insanity defense are more relevant in such decisions. This study examines the influence of two core dimensions of insight and personal attitudes on juror decision-making. Participants read trial scenarios describing a defendant who is accused of a violent crime and is diagnosed with schizophrenia. Assigning a verdict of not criminally responsible to the defendant was not influenced by insight, but instead, by supportive attitudes of the insanity defense and higher attributions of blame to external factors and to psychological factors. These findings highlight the need for continued investigation in the area of extra-legal factors that guide legal decision-making when defendants have a mental disorder. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Dissociative identity disorder: Medicolegal challenges.

    Science.gov (United States)

    Farrell, Helen M

    2011-01-01

    Persons with dissociative identity disorder (DID) often present in the criminal justice system rather than the mental health system and perplex experts in both professions. DID is a controversial diagnosis with important medicolegal implications. Defendants have claimed that they committed serious crimes, including rape or murder, while they were in a dissociated state. Asserting that their alter personality committed the bad act, defendants have pleaded not guilty by reason of insanity (NGRI). In such instances, forensic experts are asked to assess the defendant for DID and provide testimony in court. Debate continues over whether DID truly exists, whether expert testimony should be allowed into evidence, and whether it should exculpate defendants for their criminal acts. This article reviews historical and theoretical perspectives on DID, presents cases that illustrate the legal implications and controversies of raising an insanity defense based on multiple personalities, and examines the role of forensic experts asked to comment on DID with the goal of assisting clinicians in the medicolegal assessment of DID in relation to crimes.

  10. Investigating Miranda waiver decisions: An examination of the rational consequences.

    Science.gov (United States)

    Blackwood, Hayley L; Rogers, Richard; Steadham, Jennifer A; Fiduccia, Chelsea E

    2015-01-01

    Millions of custodial suspects waive their Miranda rights each year without the benefit of legal counsel. Miranda understanding, appreciation, and reasoning abilities are essential to courts' acceptance of Miranda waivers (Grisso, 2003; Rogers & Shuman, 2005). The question posed to forensic psychologists and psychiatrists in the disputed Miranda waivers is whether a particular waiver decision was knowing, intelligent, and voluntary. Despite the remarkable development of Miranda research in recent decades, studies have generally focused on understanding and appreciation of Miranda rights, but with comparatively minimal emphasis on Miranda reasoning and attendant waiver decisions. Research on defendants' decisional capacities constitutes a critical step in further developing theoretical and clinical models for Miranda waiver decisions. The current study evaluated Miranda waiver decisions for 80 pretrial defendants from two Oklahoma jails to study systematically how rational decision abilities affect defendants' personal waiver decisions. In stark contrast to what was expected, many defendants were able to identify a rational decisional process in their own legal cases, yet cast such reasoning aside and chose a completely contradictory Miranda waiver decision. Published by Elsevier Ltd.

  11. Is courtship intensity a signal of male parental care in Red-winged Blackbirds (Agelaius phoeniceus)?

    Science.gov (United States)

    Yasukawa, Ken; Knight, Richard L.; Skagen, Susan Knight

    1987-01-01

    We studied Red-winged Blackbird (Agelaius phoeniceus) behavior in marsh and prairie habitats to determine whether courting males provide cues of their nest defense, whether females prefer males that defend nests vigorously, and whether male nest defense affects nest success. We found no evidence that courtship behavior provides cues of male nest defense, or that females prefer males that court intensely. We found evidence that females nesting in marshes prefer males that defend nests intensely, but no evidence that intensely defending males in the prairie habitat achieve high nest success. We found differences, however, between marsh and prairie habitats that suggest a coarse-grained relationship between male parental quality and female choice of mate in this species.

  12. 76 FR 2134 - Notice of Lodging of Consent Decree Under the Comprehensive Environmental Response, Compensation...

    Science.gov (United States)

    2011-01-12

    ... Seven Out, LLC and BCX, Inc. (``Settling Defendants'') in United States of America v. Seven Out LLC, and BCX, Inc., Case No. 3:11-cv-0009-UAMH-MCR (U.S.D.C. M.D. Fla.), with respect to the BCX Tank Superfund... at or from the Site. Financial information provided by the Settling Defendants indicated an inability...

  13. Moral Disengagement, Normative Beliefs of Peer Group, and Attitudes Regarding Roles in Bullying

    Science.gov (United States)

    Almeida, Ana; Correia, Isabel; Marinho, Sylvie

    2010-01-01

    This article examines how moral disengagement, empathy, belief in a just world, and peer group normative beliefs regarding the roles of bully and defender of the victim are associated with attitudes regarding the roles of the bully and the defender of the victim. Two hundred ninety-two students from grades 6-9 participated. Results showed that…

  14. Defending an Area with Autonomy: Autonomous Intelligence, Surveillance, and Reconnaissance Capabilities Leveraging Unmanned Aerial Systems for Defending Forward Operating Locations

    Science.gov (United States)

    2017-05-08

    plan or global communications proves this behavior has potential.51 To decrease technical maturity and risk, current swarm implementations focus on...22 Figure 5 Hermes 900 with Modular Payloads...challenge current US C2ISR advantages by being faster, harder to detect, more maneuverable, have greater destructive power, disrupt communications

  15. Learning stochastic reward distributions in a speeded pointing task.

    Science.gov (United States)

    Seydell, Anna; McCann, Brian C; Trommershäuser, Julia; Knill, David C

    2008-04-23

    Recent studies have shown that humans effectively take into account task variance caused by intrinsic motor noise when planning fast hand movements. However, previous evidence suggests that humans have greater difficulty accounting for arbitrary forms of stochasticity in their environment, both in economic decision making and sensorimotor tasks. We hypothesized that humans can learn to optimize movement strategies when environmental randomness can be experienced and thus implicitly learned over several trials, especially if it mimics the kinds of randomness for which subjects might have generative models. We tested the hypothesis using a task in which subjects had to rapidly point at a target region partly covered by three stochastic penalty regions introduced as "defenders." At movement completion, each defender jumped to a new position drawn randomly from fixed probability distributions. Subjects earned points when they hit the target, unblocked by a defender, and lost points otherwise. Results indicate that after approximately 600 trials, subjects approached optimal behavior. We further tested whether subjects simply learned a set of stimulus-contingent motor plans or the statistics of defenders' movements by training subjects with one penalty distribution and then testing them on a new penalty distribution. Subjects immediately changed their strategy to achieve the same average reward as subjects who had trained with the second penalty distribution. These results indicate that subjects learned the parameters of the defenders' jump distributions and used this knowledge to optimally plan their hand movements under conditions involving stochastic rewards and penalties.

  16. Russian Media Education Researches: 1950-2010

    Science.gov (United States)

    Federov, Alexander

    2010-01-01

    This article analyzed the development of Russian media education researches from 1950 to 2010 years. The list of theses of the Russian authors on the subject of Media Education is about 180 titles since 1950. Nearly 70 of them have been defended for the recent 10 years. From 1950 till 1959 six theses were defended, from 1960 till 1969--15; from…

  17. The Armed Services and Model Employer Status for Child Support Enforcement: A Proposal to Improve Service of Process

    Science.gov (United States)

    1996-04-01

    and derives substantial revenue from interstate or international commerce; or (b) Personal JURISDICTION over non-resident defendant in matrimonial ...actions or family court proceedings. A court in any matrimonial action or family court proceeding involving a demand for support, alimony, maintenance...distributive awards or special relief in matrimonial actions may exercise personal JURISDICTION over the respondent or defendant notwithstanding the

  18. The link between bond forfeiture and pretrial release mechanism: The case of Dallas County, Texas.

    Science.gov (United States)

    Clipper, Stephen J; Morris, Robert G; Russell-Kaplan, Amanda

    2017-01-01

    The goal of this study was to evaluate the efficacy of four pretrial jail release mechanisms (i.e., bond types) commonly used during the pretrial phase of the criminal justice process in terms of their ability to discriminate between defendants failing to appear in court (i.e., bond forfeiture). These include attorney bonds, cash bonds, commercial bail bonds, and release via a pretrial services agency. A multi-treatment propensity score matching protocol was employed to assess between-release-mechanism differences in the conditional probability of failure to appear/bond forfeiture. Data were culled from archival state justice records comprising all defendants booked into the Dallas County, Texas jail during 2008 (n = 29,416). The results suggest that defendants released via commercial bail bonds were less likely to experience failure to appear leading to the bond forfeiture process compared to equivalent defendants released via cash, attorney, and pretrial services bonds. This finding held across different offense categories. The study frames these differences within a discussion encompassing procedural variation within and between each release mechanism, thereby setting the stage for further research and dialog regarding potential justice reform.

  19. The link between bond forfeiture and pretrial release mechanism: The case of Dallas County, Texas.

    Directory of Open Access Journals (Sweden)

    Stephen J Clipper

    Full Text Available The goal of this study was to evaluate the efficacy of four pretrial jail release mechanisms (i.e., bond types commonly used during the pretrial phase of the criminal justice process in terms of their ability to discriminate between defendants failing to appear in court (i.e., bond forfeiture. These include attorney bonds, cash bonds, commercial bail bonds, and release via a pretrial services agency.A multi-treatment propensity score matching protocol was employed to assess between-release-mechanism differences in the conditional probability of failure to appear/bond forfeiture. Data were culled from archival state justice records comprising all defendants booked into the Dallas County, Texas jail during 2008 (n = 29,416.The results suggest that defendants released via commercial bail bonds were less likely to experience failure to appear leading to the bond forfeiture process compared to equivalent defendants released via cash, attorney, and pretrial services bonds. This finding held across different offense categories. The study frames these differences within a discussion encompassing procedural variation within and between each release mechanism, thereby setting the stage for further research and dialog regarding potential justice reform.

  20. No sympathy for the devil: attributing psychopathic traits to capital murderers also predicts support for executing them.

    Science.gov (United States)

    Edens, John F; Davis, Karen M; Fernandez Smith, Krissie; Guy, Laura S

    2013-04-01

    Mental health evidence concerning antisocial and psychopathic traits appears to be introduced frequently in capital murder trials in the United States to argue that defendants are a "continuing threat" to society and thus worthy of execution. Using a simulation design, the present research examined how layperson perceptions of the psychopathic traits exhibited by a capital defendant would impact their attitudes about whether he should receive a death sentence. Across three studies (total N = 362), ratings of a defendant's perceived level of psychopathy strongly predicted support for executing him. The vast majority of the predictive utility was attributable to interpersonal and affective traits historically associated with psychopathy rather than traits associated with a criminal and socially deviant lifestyle. A defendant's perceived lack of remorse in particular was influential, although perceptions of grandiose self-worth and a manipulative interpersonal style also contributed incrementally to support for a death sentence. These results highlight how attributions regarding socially undesirable personality traits can have a pronounced negative impact on layperson attitudes toward persons who are perceived to exhibit these characteristics. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  1. Impact of behavioral genetic evidence on the adjudication of criminal behavior.

    Science.gov (United States)

    Appelbaum, Paul S; Scurich, Nicholas

    2014-01-01

    Recent advances in behavioral genetics suggest a modest relationship among certain gene variants, early childhood experiences, and criminal behavior. Although scientific research examining this link is still at an early stage, genetic data are already being introduced in criminal trials. However, the extent to which such evidence is likely to affect jurors' decisions has not been explored. In the present study, a representative sample of the U.S. population (n = 250) received a vignette describing an apparently impulsive homicide, accompanied by one of four explanations of the defendant's impulsivity: childhood abuse, genetic predisposition, childhood abuse and genetic predisposition, or simple impulsive behavior. The participants were asked to identify the crime that the defendant had committed and to select an appropriate sentence range. Evidence of genetic predisposition did not affect the crime of which the defendant was convicted or the sentence. However, participants who received the abuse or genetic + abuse explanation imposed longer prison sentences. Paradoxically, the genetic and genetic + abuse conditions engendered the greatest fear of the defendant. These findings should allay concerns that genetic evidence in criminal adjudications will be overly persuasive to jurors, but should raise questions about the impact of genetic attributions on perceptions of dangerousness.

  2. Defending submission-year analyses of new drug approvals.

    Science.gov (United States)

    Carpenter, Daniel P

    2003-01-01

    In response to the critique of Mary Olsen, Daniel Carpenter, on behalf of his co-authors, addresses the issue of analysis based on the year a new drug is submitted for Food and Drug Administration (FDA) approval, not the year it is approved. Both substantive knowledge of the FDA drug review process and sound social science theory favor submission-year averaging. The history and bureaucratic mechanics of the Center for Drug Evaluation and Review (CDER) conform to the author's assumption. The statistical theory of optimal experimentation also points to the beginning of review as a locus for effects upon decisions.

  3. Male Pattern Blindness: The Consequences of Defending Manhood

    OpenAIRE

    Jackson, Matthew Christian

    2013-01-01

    Research on threats to masculine gender identity reveals that they occur in a diversity of contexts. In conjunction with research on the content of masculine identity, there is converging evidence that manhood is seen as a status that men must work hard to earn and maintain (Vandello, Bosson, Cohen, Burnaford, & Weaver, 2008). In the defense of claims to manhood, men often perform behavior that restores their sense of masculinity in the short term, but has harmful future consequences for the...

  4. Defending Air Bases in an Age of Insurgency

    Science.gov (United States)

    2014-05-01

    2003, accessed 11 January 2013, http://www.au.af.mil/au/awc/awcgate /af/123004768.htm. 87. Jason Beers, “786 SFS Lessons Learned Operation Iraqi...04_SB8K8xLLM9MSSzPy8xBz9CP3I5EyrpHK9nHK9_KJ0vfykr GL9gmxHRQB9GD_G/. 82. Additional information on the Objektschutzregiment der Luftwaffe “ Fries - land...Assessing Air Base Defense,” Air and Space Power Journal 18, no. 3 (Fall 2004): 65–74. It has been reworked here to account for more recent develop- ments

  5. The defender's dilemma charting a course toward cybersecurity

    CERN Document Server

    Libicki, Martin C; Webb, Tim

    2015-01-01

    Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures-and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.

  6. Defending Cultural Assets Against a Cosmic Impact Risk

    Science.gov (United States)

    Burke, James; Camacho, Sergio

    2016-04-01

    Asteroid or comet impacts on Earth have the potential to destroy humanity's cultural heritage, ranging from local regions to total obliteration. Fortunately we now have means to cope with this hazard -- if and only if we devote resources to finding, intercepting and deflecting threatening objects. Early preparations have already begun. Under auspices of the UN's Committee on the Peaceful Uses of Outer Space (COPUOS) an International Asteroid Warning Network (IAWN) and a Space Mission Planning Advisory Group (SMPAG) have been set up. Upon validation of a threat by IAWN and SMPAG, agencies with capacity, funding and authority to launch intercept missions are to act. A model for this is the existing arrangement for organizing and dispatching UN peacekeeping forces. In this paper we describe current technical options and needed policy and legal developments to enable the world to divert threats and, if that fails or is impossible, to save lives through evacuation and civil defense. In parallel with those efforts, we advocate the creation of safe archives as backup for lost cultural treasures.

  7. Taylorism, Tylerism, and Performance Indicators: Defending the Indefensible?

    Science.gov (United States)

    Helsby, Gill; Saunders, Murray

    1993-01-01

    Explores the antecedents to the growing interest in the use of educational performance indicators. Discusses this issue in relation to the work of economist F. W. Taylor and evaluator Ralph Tyler. Describes a five-year project that demonstrates the promise of teacher-developed performance indicators. (CFR)

  8. Defending Malicious Script Attacks Using Machine Learning Classifiers

    Directory of Open Access Journals (Sweden)

    Nayeem Khan

    2017-01-01

    Full Text Available The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper method for dimensionality reduction. Supervised machine learning classifiers were used on the dataset for achieving high accuracy. Experimental results show that our method can efficiently classify malicious code from benign code with promising results.

  9. An Attacker-Defender Model for IP-Based Networks

    National Research Council Canada - National Science Library

    Barkley, Timothy R

    2008-01-01

    .... Because IP flows are defined essentially in terms of origin-destination (O-D) pairs, we represent IP traffic engineering as a multi-commodity flow problem in which each O-D pair is treated as a separate commodity...

  10. Net protectors defend the global commons | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-21

    Oct 21, 2010 ... Deep in the basement of the Munk Centre for International Studies, ... who heads the Berkman Center for Internet & Society at Harvard Law School, .... along with further analysis, in a book to be published early next year by ...

  11. Defendants are clueless the 30-day psychiatric observation

    African Journals Online (AJOL)

    Claimed amnesia. 0. 5 (5.7). Substance abuse. 0. 2 (2.3). Was sexually abused in childhood. 0. 1 (1.1). Mental retardation. 0. 1 (1.1). Lawyer could not understand client. 0. 1 (1.1). Table 11. Reasons for the referral. (17.0%). Defence counsel requests accounted for 18.2%, family 14.8%, the prosecutor 8.0%, the police officer ...

  12. Natural resource damage assessment -- Trustee and defendant perspectives

    International Nuclear Information System (INIS)

    McHugh, M.; Trimmier, R. Jr.

    1995-01-01

    The goal of the NRD process is restoration: restoring injured resources and the services they provide to a level that will compensate the public for the losses associated with injuries. While restoration, the final step in the cleanup process, has only recently been pursued, experience dictates that it is more effective and efficient for cleanup agencies. Industry and natural resource trustees to address NRD by integrating it into the cleanup process in a cooperative and coordinated manner. Early integration reduces transaction costs and liability by: (1) enabling the collection of NRD information by field personnel already conducting RI work; (2) promoting the selection of remedial alternatives that are protective of resources; and (3) creating opportunities to build restoration directly into the remedy. The damage assessment regulations provide an objective template to guide this process. Integration thus facilitates timely restoration, thereby halting the accrual of further damages and reducing the potential for time consuming and costly litigation. Delays in settlement and restoration are more likely when trustees are not made part of the cleanup process. Particularly under CERCLA, reliance on unproven science for injury determination and unreliable economics for damage assessment results in inflated values, prolonged litigation, delayed or vacuous remedial action and high transaction costs. Under OPA, where oil spills require immediate and effective response action, cooperation between PRPs and Trustees is more likely, but even there, the post-response assessment of NRD is unlikely to be cooperative for the same reason CERCLA assessments tend not to be

  13. Moral Law and Moral Education: Defending Kantian Autonomy

    Science.gov (United States)

    Johnston, James Scott

    2007-01-01

    In this paper, I examine why Kantian ethics has had such a hard time of it. I look at readings of Kant's moral theory that have had great force in the 20th century and conclude that these have much to do with an ensuing confusion, which has led to charges of rigidity, formality and severity. Then I demonstrate that when we make moral judgements we…

  14. SecureCPS: Defending a nanosatellite cyber-physical system

    Science.gov (United States)

    Forbes, Lance; Vu, Huy; Udrea, Bogdan; Hagar, Hamilton; Koutsoukos, Xenofon D.; Yampolskiy, Mark

    2014-06-01

    Recent inexpensive nanosatellite designs employ maneuvering thrusters, much as large satellites have done for decades. However, because a maneuvering nanosatellite can threaten HVAs on-­orbit, it must provide a level of security typically reserved for HVAs. Securing nanosatellites with maneuvering capability is challenging due to extreme cost, size, and power constraints. While still in the design process, our low-­cost SecureCPS architecture promises to dramatically improve security, to include preempting unknown binaries and detecting abnormal behavior. SecureCPS also applies to a broad class of cyber-­physical systems (CPS), such as aircraft, cars, and trains. This paper focuses on Embry-­Riddle's ARAPAIMA nanosatellite architecture, where we assume any off-­the-­shelf component could be compromised by a supply chain attack.1 Based on these assumptions, we have used Vanderbilt's Cyber Physical -­ Attack Description Language (CP-­ADL) to represent realistic attacks, analyze how these attacks propagate in the ARAPAIMA architecture, and how to defeat them using the combination of a low-­cost Root of Trust (RoT) Module, Global InfoTek's Advanced Malware Analysis System (GAMAS), and Anomaly Detection by Machine Learning (ADML).2 Our most recent efforts focus on refining and validating the design of SecureCPS.

  15. Marketing and the law: defending single color trademarks

    OpenAIRE

    Keating, Byron W.; Coltman, Tim

    2008-01-01

    Most international jurisdictions have sought to broaden their definition of a trade mark following the Qualitex v Jacobson Products (Qualitex Case)2. In Australia, the Trade Marks Act (Cth) 1995 was introduced to recognise that colors, scents, shapes and sounds could be registered as a trade mark provided the mark was capable of distinguishing, in the course of trade, the proprietor’s goods or services from the goods or services of others. However, to date, it has proven extremely difficult t...

  16. Estonian president defends imminent euro-accession / Valentina Pop

    Index Scriptorium Estoniae

    Pop, Valentina

    2010-01-01

    President Toomas Hendrik Ilves räägib Eesti liitumisest euroalaga, eelarvelisest vastutustundest, e-kaubanduse arendamise tähtsusest, Euroopa Liidu lepingust, WikiLeaksi avaldatud materjalidest, küberkaitsest. Töövisiit Brüsselisse 08.12.2010 - 10.12.2010

  17. A Combined Arms Approach to Defending Army Networks

    Science.gov (United States)

    2012-01-01

    GIG operates, through cyberspace, as a globally interconnected, end...operations from the friendly to adversary box increases the situational awareness and unity of effort the Army lacks, and creates an economy of force that...indica- tions and warnings • Present a timely and accurate estimate of technical impact result- ing from the threat activity and determine

  18. DNA repair: Dynamic defenders against cancer and aging

    Energy Technology Data Exchange (ETDEWEB)

    Fuss, Jill O.; Cooper, Priscilla K.

    2006-04-01

    You probably weren't thinking about your body's cellular DNA repair systems the last time you sat on the beach in the bright sunshine. Fortunately, however, while you were subjecting your DNA to the harmful effects of ultraviolet light, your cells were busy repairing the damage. The idea that our genetic material could be damaged by the sun was not appreciated in the early days of molecular biology. When Watson and Crick discovered the structure of DNA in 1953 [1], it was assumed that DNA is fundamentally stable since it carries the blueprint of life. However, over 50 years of research have revealed that our DNA is under constant assault by sunlight, oxygen, radiation, various chemicals, and even our own cellular processes. Cleverly, evolution has provided our cells with a diverse set of tools to repair the damage that Mother Nature causes. DNA repair processes restore the normal nucleotide sequence and DNA structure of the genome after damage [2]. These responses are highly varied and exquisitely regulated. DNA repair mechanisms are traditionally characterized by the type of damage repaired. A large variety of chemical modifications can alter normal DNA bases and either lead to mutations or block transcription if not repaired, and three distinct pathways exist to remove base damage. Base excision repair (BER) corrects DNA base alterations that do not distort the overall structure of the DNA helix such as bases damaged by oxidation resulting from normal cellular metabolism. While BER removes single damaged bases, nucleotide excision repair (NER) removes short segments of nucleotides (called oligonucleotides) containing damaged bases. NER responds to any alteration that distorts the DNA helix and is the mechanism responsible for repairing bulky base damage caused by carcinogenic chemicals such as benzo [a]pyrene (found in cigarette smoke and automobile exhaust) as well as covalent linkages between adjacent pyrimidine bases resulting from the ultraviolet (UV) component of sunlight. NER can be divided into two classes based on where the repair occurs. NER occurring in DNA that is not undergoing transcription (i.e., most of the genome) is called global genome repair (GGR or GGNER), while NER taking place in the transcribed strand of active genes is called transcription-coupled repair (TCR or TC-NER). We will explore NER in more detail below. Mismatch repair (MMR) is another type of excision repair that specifically removes mispaired bases resulting from replication errors. DNA damage can also result in breaks in the DNA backbone, in one or both strands. Single-strand breaks (SSBs) are efficiently repaired by a mechanism that shares common features with the later steps in BER. Double-strand breaks (DSBs) are especially devastating since by definition there is no intact complementary strand to serve as a template for repair, and even one unrepaired DSB can be lethal [3]. In cells that have replicated their DNA prior to cell division, the missing information can be supplied by the duplicate copy, or sister chromatid, and DSBs in these cells are faithfully repaired by homologous recombination involving the exchange of strands of DNA between the two copies. However, most cells in the body are non-dividing, and in these cells the major mechanism for repairing DSBs is by non-homologous end joining (NHEJ), which as the name implies involves joining two broken DNA ends together without a requirement for homologous sequence and which therefore has a high potential for loss of genetic information.

  19. Mario Bunge: Physicist, philosopher and defender of science

    Directory of Open Access Journals (Sweden)

    Michael R. Matthews

    2009-04-01

    Full Text Available Mario Bunge was born in Argentina in the final year of the First World War. He learnt atomic physics andquantum mechanics from an Austrian refugee who had been a student of Heisenberg. Additionally he taughthimself modern philosophy in an environment that was a philosophical backwater. He was the first SouthAmerican philosopher of science to be trained in science. His publications in physics, philosophy, psychology,sociology and the foundations of biology, are staggering in number, and include a massive 8-volume Treatise onPhilosophy. The unifying thread of his scholarship is the constant and vigorous advancement of theEnlightenment Project, and criticism of cultural and academic movements that deny or devalue the core planksof the project: namely its naturalism, the search for truth, the universality of science, rationality, and respect forindividuals. At a time when specialisation is widely decried, and its deleterious effects on science, philosophy ofscience, educational research and science teaching are recognised – it is salutary to see the fruits of one person’spursuit of the ‘Big’ scientific and philosophical picture.

  20. Defending the scientific integrity of conservation-policy processes.

    Science.gov (United States)

    Carroll, Carlos; Hartl, Brett; Goldman, Gretchen T; Rohlf, Daniel J; Treves, Adrian; Kerr, Jeremy T; Ritchie, Euan G; Kingsford, Richard T; Gibbs, Katherine E; Maron, Martine; Watson, James E M

    2017-10-01

    Government agencies faced with politically controversial decisions often discount or ignore scientific information, whether from agency staff or nongovernmental scientists. Recent developments in scientific integrity (the ability to perform, use, communicate, and publish science free from censorship or political interference) in Canada, Australia, and the United States demonstrate a similar trajectory. A perceived increase in scientific-integrity abuses provokes concerted pressure by the scientific community, leading to efforts to improve scientific-integrity protections under a new administration. However, protections are often inconsistently applied and are at risk of reversal under administrations publicly hostile to evidence-based policy. We compared recent challenges to scientific integrity to determine what aspects of scientific input into conservation policy are most at risk of political distortion and what can be done to strengthen safeguards against such abuses. To ensure the integrity of outbound communications from government scientists to the public, we suggest governments strengthen scientific integrity policies, include scientists' right to speak freely in collective-bargaining agreements, guarantee public access to scientific information, and strengthen agency culture supporting scientific integrity. To ensure the transparency and integrity with which information from nongovernmental scientists (e.g., submitted comments or formal policy reviews) informs the policy process, we suggest governments broaden the scope of independent reviews, ensure greater diversity of expert input and transparency regarding conflicts of interest, require a substantive response to input from agencies, and engage proactively with scientific societies. For their part, scientists and scientific societies have a responsibility to engage with the public to affirm that science is a crucial resource for developing evidence-based policy and regulations in the public interest. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  1. Protection of warehouses and plants under capacity constraint

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2015-01-01

    While warehouses may be subjected to less protection effort than plants, their unavailability may have substantial impact on the supply chain performance. This paper presents a method for protection of plants and warehouses against intentional attacks in the context of the capacitated plant and warehouses location and capacity acquisition problem. A non-cooperative two-period game is developed to find the equilibrium solution and the optimal defender strategy under capacity constraints. The defender invests in the first period to minimize the expected damage and the attacker moves in the second period to maximize the expected damage. Extra-capacity of neighboring functional plants and warehouses is used after attacks, to satisfy all customers demand and to avoid the backorders. The contest success function is used to evaluate success probability of an attack of plants and warehouses. A numerical example is presented to illustrate an application of the model. The defender strategy obtained by our model is compared to the case where warehouses are subjected to less protection effort than the plants. This comparison allows us to measure how much our method is better, and illustrates the effect of direct investments in protection and indirect protection by warehouse extra-capacities to reduce the expected damage. - Highlights: • Protection of warehouses and plants against intentional attacks. • Capacitated plant and warehouse location and capacity acquisition problem. • A non-cooperative two-period game between the defender and the attacker. • A method to evaluate the utilities and determine the optimal defender strategy. • Using warehouse extra-capacities to reduce the expected damage

  2. An analysis of shoot and scoot tactics

    Science.gov (United States)

    2017-03-01

    15. Transition diagram when the system is in “ Travel ” transient states ..........39 Figure 16. The optimization algorithm...Harari (2008) considers the opposite side of this thesis. The scenario is that insurgents attack the defender using mortars and short range rockets ...defender’s decision making and suggests a new counter- mortar/ rocket tactic. The new tactic is that the defender launches his missile immediately after

  3. Why Thailand’s Military Stepped In

    Science.gov (United States)

    2011-03-01

    8 Craig J. Reynolds (ed.), National Identity and its Defenders: Thailand Today ( Chiang Mai : Silkworm Books, 2002). 9...and Authority in Thailand,” in National Identity and its Defenders: Thailand Today (rev. ed.), ed. Craig J. Reynolds ( Chiang Mai : Silkworm Books, 2002...Business of Politics in Thailand ( Chiang Mai : Silkworm Books, 2004), 230. 128 Ockey, “Thailand,” 199. 52 days of the military directly administering

  4. In defence of academic freedom: bioethics journals under siege.

    Science.gov (United States)

    Schüklenk, Udo

    2013-05-01

    This article analyses, from a bioethics journal editor's perspective, the threats to academic freedom and freedom of expression that academic bioethicists and academic bioethics journals are subjected to by political activists applying pressure from outside of the academy. I defend bioethicists' academic freedom to reach and defend conclusions many find offensive and 'wrong'. However, I also support the view that academics arguing controversial matters such as, for instance, the moral legitimacy of infanticide should take clear responsibility for the views they defend and should not try to hide behind analytical philosophers' rationales such as wanting to test an argument for the sake of testing an argument. This article proposes that bioethics journals establish higher-quality requirements and more stringent mechanisms of peer review than usual for iconoclastic articles.

  5. Eesti merovingi- ja viikingiaegsed rinnanõelad - võõrapärased ja omad / Marika Mägi

    Index Scriptorium Estoniae

    Mägi, Marika

    1997-01-01

    Artiklis käsitletakse Eesti merovingi- ja viikingiaegsete ehtenõelte tüpoloogiat ja kandmisviise. Vaatluse alla on võetud rõngaspeaga, kolmnurkpeaga ja varasemad kaksikristpeaga nõelad, mille dateeringut ja tüpoloogilist arengut on varasemaga võrreldes täpsustatud. Joonised, diagrammid, fotod

  6. 22 tundi tõde ja õigust Anton Hansen Tammsaare moodi / Risto Berendson, Marika Rajamäe

    Index Scriptorium Estoniae

    Berendson, Risto, 1975-

    2008-01-01

    30. okt. kirjutati Anton Hansen Tammsaare sünniaastapäeva puhul alla lepingule, mis toob Vargamäele maratonetenduse kogu "Tõe ja õiguse" põhjal. Etendus toimub 21.-22. juunini. Kommenteerib Ülo Tonts

  7. Elu- ja mõtterännakud, minemised ja saatmised / Kaljo Põllu ; interv. Jonathan Roper, Marika Alver

    Index Scriptorium Estoniae

    Põllu, Kaljo, 1934-2010

    2007-01-01

    Kaljo Põllu oma kunstiõpingutest, loomingust, tööst Tartu Ülikooli kunstikabineti juhatajana, käikudest soomeugrilaste juurde, soome-ugri ekpeditsioonide korraldamisest kunstiinstituudis, ekspeditsioonide mõjust üliõpilaste mõtteviisile ja kunstile, rühmitusest Ydi, soomeugrilisusest eemaldumisest. Leedsi ülikooli inglise filoloogia lektor Jonathan Rops on käinud koos EKA üliõpilastega ekspeditsioonidel 1998., 1999. ja 2003. aastal

  8. Gurmaanlus ruulib / Marika Makarova ; kommenteerinud Anu Tali, René Uusmees, Tõnis Siigur, Hannes Võrno, Dimitri Demjanov

    Index Scriptorium Estoniae

    Makarova, Marika

    2010-01-01

    Tulevikutoidu konverentsil Tallinnas esinenud kuulsate kokkade Albert Adria, Fergus Hendersoni ja Claus Meyeri kokakunsti lähtekohtadest ja mõistet gurmaanlus mõtestavad lahti tuntud Eesti inimesed ja kokad

  9. Migration and Social Replacement Incomes: How to Protect Low-IncomeWorkers in the Industrialized Countries against the Forces of Globalizationand Market Integration

    OpenAIRE

    Sinn, Hans-Werner

    2005-01-01

    This paper discusses how an industrialized country could defend the wages and social benefits of its unskilled workers against wage competition from immigrants. It shows that fixing social standards harms the workers and that fixing social replacement incomes implies migration into unemployment. Defending wages with replacement incomes brings about first-order efficiency losses that outweigh the budget cost to the government. By contrast, wage subsidies involve much smaller welfare losses. Wh...

  10. Air & Space Power Journal. Volume 21, Number 3, Fall 2007

    Science.gov (United States)

    2007-01-01

    Lt Tim Larribau, French Air Force 27 The Servicio de Vigilancia Aérea: Defending Costa Rican Sovereignty...is bad. At the micro level, identification with a unit is cer­ tainly healthy, especially in combat forces, for building esprit and fostering...Statement PIREP-Overall.indd 33 7/31/07 12:47:44 PM The Servicio de Vigilancia Aérea Defending Costa Rican Sovereignty Mario E. ovErall* A

  11. Pengaruh Strategi Bisnis Perusahaan dan Kompetisi Pasar Ekuitas terhadap Risiko Crash Harga Saham dengan Overvalued Equities sebagai Variabel Mediasi

    OpenAIRE

    Arianwuri, Fidya Gumilang; T, Sutrisno; Prihatiningtyas, Yeney Widya

    2017-01-01

    Business Strategy, Equity Market Competition, Overvalued Equities, and Stock Price CrashRisk. The purpose of this research is to examine the influence of prospector business strategyand defender business strategy, equity market competition, and indirect effect of prospectorbusiness strategy on stock price crash risk through ovevalued equities. The sample of thisresearch are 192 companies that are divided into 96 prospector business strategy and 96 defender business strategy during 2010-2016. ...

  12. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  13. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  14. Intelligence and impact contests in systems with redundancy, false targets, and partial protection

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2009-01-01

    The paper considers a system consisting of identical elements that can be intentionally attacked. The cumulative performance of the system elements should meet a demand. To prevent loss of demand the defender provides system redundancy (deploying genuine system elements (GEs) with cumulative performance exceeding the demand); deploys false elements (FEs), and protects the GEs. If the attacker cannot distinguish GEs and FEs, he chooses the number of elements to attack and attacks at random these elements distributing his resource evenly among the attacked elements. In order to get the information about the system the attacker allocates a part of his resource into the intelligence activity. Analogously, the defender allocates a part of his resource into the counter-intelligence activity. The attacker's strategy presumes distribution of his resource among the intelligence and attack effort and choice of the number of attacked elements. If the attacker wins the intelligence contest, he can identify both FEs and unprotected GEs ignoring the former ones and destroying the latter ones with negligible effort. The defender's strategy presumes distribution of his resource among the counter-intelligence and the three defensive actions. The paper considers a three-period non-cooperative minmax game between the defender and the attacker and presents an algorithm for determining the agents' optimal strategies.

  15. You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites.

    Science.gov (United States)

    Leung, Angel N M; Wong, Natalie; Farver, JoAnn M

    2018-01-01

    The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders' perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims) × 2 condition (offend vs. defend) experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old) were randomly assigned into one of two conditions. Results showed that participants' involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments) was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become "upstanders" in educational programs to combat cyberbullying.

  16. What hysteria? A systematic study of newspaper coverage of accused child molesters.

    Science.gov (United States)

    Cheit, Ross E

    2003-06-01

    There were three aims: First, to determine the extent to which those charged with child molestation receive newspaper coverage; second, to analyze the nature of that coverage; and third, to compare the universe of coverage to the nature of child molestation charges in the criminal justice system as a whole. Two databases were created. The first one identified all defendants charged with child molestation in Rhode Island in 1993. The database was updated after 5 years to include relevant information about case disposition. The second database was created by electronic searching the Providence Journal for every story that mentioned each defendant. Most defendants (56.1%) were not mentioned in the newspaper. Factors associated with a greater chance of coverage include: cases involving first-degree charges, cases with multiple counts, cases involving additional violence or multiple victims, and cases resulting in long prison sentences. The data indicate that the press exaggerates "stranger danger," while intra-familial cases are underreported. Newspaper accounts also minimize the extent to which guilty defendants avoid prison. Generalizing about the nature of child molestation cases in criminal court on the basis of newspaper coverage is inappropriate. The coverage is less extensive than often claimed, and it is skewed in ways that are typical of the mass media.

  17. You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites

    Directory of Open Access Journals (Sweden)

    Angel N. M. Leung

    2018-04-01

    Full Text Available The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders’ perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims × 2 condition (offend vs. defend experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old were randomly assigned into one of two conditions. Results showed that participants’ involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become “upstanders” in educational programs to combat cyberbullying.

  18. Inherited proclivity: When should neurogenetics mitigate moral culpability for purposes of sentencing?

    Science.gov (United States)

    Segal, J Bradley

    2016-04-01

    Certain genes and neurobiology ('neurogenetics') may predispose some people to violent behavior. Increasingly, defendants introduce neurogenetic evidence as a mitigating factor during criminal sentencing. Identifying the cause of a criminal act, biological or otherwise, does not necessarily preclude moral or legal liability. However, valid scientific evidence of an inherited proclivity sometimes should be considered when evaluating whether a defendant is less morally culpable for a crime and perhaps less deserving of punishment. This Note proposes a two-pronged test to understand whether and when neurogenetic evidence should be considered to potentially mitigate an individual's culpability for criminal behavior. The first prong normatively assesses whether a defendant meets a threshold of having meaningfully managed his risk of harming others based on what he knew, or should have known, about his own proclivities to violence. The second prong considers the admissibility of the evidence based on whether the specific neurogenetic proclivity claimed by the defendant is relevant and adequately supported by science so as to be reliable. This proposed two-pronged test, beginning with an ethical threshold and followed by a scientific hurdle, can help judges and juries establish when to accept arguments for neurogenetic mitigation at sentencing, and when to reject them.

  19. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  20. You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites

    Science.gov (United States)

    Leung, Angel N. M.; Wong, Natalie; Farver, JoAnn M.

    2018-01-01

    The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders’ perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims) × 2 condition (offend vs. defend) experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old) were randomly assigned into one of two conditions. Results showed that participants’ involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments) was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become “upstanders” in educational programs to combat cyberbullying. PMID:29740362

  1. Proving personal use: the admissibility of evidence negating intent to distribute marijuana.

    Science.gov (United States)

    Mayer, Stephen

    2015-05-01

    Against the backdrop of escalating state efforts to decriminalize marijuana, U.S. Attorneys' Offices continue to bring drug-trafficking prosecutions against defendants carrying small amounts of marijuana that are permitted under state law. Federal district courts have repeatedly barred defendants from introducing evidence that they possessed this marijuana for their own personal use. This Note argues that district courts should not exclude three increasingly common kinds of "personal use evidence" under Federal Rules of Evidence 402 and 403 when that evidence is offered to negate intent to distribute marijuana. Three types of personal use evidence are discussed in this Note: (1) a defendant's possession of a state-issued medical marijuana license, (2) evidence that a state has legalized possession of marijuana for recreational purposes, and (3) evidence that a defendant suffers from a disease that marijuana arguably treats. Part I examines each of these three categories of personal use evidence and contends that district courts are likely to confront disputes over such evidence with increasing frequency. Part II analyzes objections to the admissibility of personal use evidence on direct examination, focusing primarily on Rules 402 and 403. Part III responds to those objections and argues that the evidence is probative of intent to distribute in federal marijuana-trafficking prosecutions.

  2. High-Order Numerical Methods for the Simulation of Linear and Nonlinear Waves: High-Frequency Radiation and Dynamic Stability

    Energy Technology Data Exchange (ETDEWEB)

    Nicholls, David P. [UIC-MSCS

    2014-04-23

    Over the past four years the Principal Investigator (PI) David Nicholls has worked on several projects in connection with award DE-SC0001549. Of the greatest import has been the continued supervision of ve Ph.D. students (Robyn Canning, Travis McBride, Andrew Sward, Zheng Fang, and Venu Tammali). Canning and McBride defended their theses and graduated in May 2012, while Sward defended his thesis and graduated in May 2013. Both Fang and Tammali plan to defend their theses within the year and graduate in May 2015. Fang is now a very experienced graduate researcher with one paper accepted for publication and another in preparation. Tammali is nearly to the point of writing a paper and will work this summer as an intern at Argonne National Laboratory in the Mathematics and Computer Science Division under the supervision of Paul Fischer.

  3. Legitimidade ativa da Defensoria Pública para a propositura de ação civil pública: interpretação a partir dos paradigmas constitucionais / Public Defender's Office active legimitacy for a public civil action's bringing: interpretation from the constitutional paradigms

    Directory of Open Access Journals (Sweden)

    Lucélia Sena Alves

    2010-12-01

    Full Text Available Este estudo tem o propósito de analisarcriteriosamente a legitimidade dada à DefensoriaPública pela Lei n. 11.448/2007 para a propositurade Ação Civil Pública, contextualizando-a nosparadigmas constitucionais. A escolha do temadeu-se pela importância que a Instituição tem naefetivação do acesso à justiça e na garantia doEstado Democrático de Direito. Também foramanalisados os papéis de outras instituições, comoo Ministério Público, na concorrência dessa legitimaçãoativa e sua imprescindibilidade paraa construção de uma ordem jurídica mais justa.A pesquisa valeu-se de análises pertencentes adiversos campos do saber humano, tais comoDireito Constitucional, Direito Processual e SociologiaJurídica / Abstract: The purpose of this study is to minutelyanalyze the legitimacy provided to thePublic Defender´s office by law 11.448/2007,for filing Public Civil Actions, in the light of aconstitutional doctrine. The reason for choosingsuch topic is the importance of this institutionfor a greater access to justice and in theguarantee of The Democratic State of Law.The article also discusses the legal role of otherinstitutions, such as the Public Prosecutor´soffice, to file civil public actions and to builda more just legal system. This article has profitedfrom analyses from other areas of humanknowledge, such as Constitutional Law, Civiland Criminal Procedure Law and Legal Sociology.

  4. Scrutinizing and Assessing the Performance of the German and U.S.-Led Provincial Reconstruction Teams in Afghanistan

    Science.gov (United States)

    2008-06-01

    other to fight and win the war against global terror. . . . In this war, we defend not just America or Europe; we are defending civilization itself.”42...two years “by claiming that Pakistan provides a reliable, safe, and fertile recruiting, training and fund-raising haven just across the border.”286...over a million Afghans, most of them civilians; maimed and orphaned over a million people, leaving many families without breadwinners ; forced about

  5. Physical Activities, Exercises, and Their Effects to the Immune System

    OpenAIRE

    Nurmasitoh, Titis

    2015-01-01

    Every systems in human body correlate to maintain homeostasis. One of those systems which contribute to maintain homeostasis is the immune system. The immune system defends physiological functions against foreign substances and cancer cells through a complex and multilayered mechanism. The ability to defend against foreign substances and abnormal cells is done by two types of immune system, which are Innate immune system and adaptive/acquired immune system. There are also certain factors that...

  6. Combat Resource Management (11bm) Applied Research Project (ARP)

    Science.gov (United States)

    2009-12-01

    tactiques de combat embarquées, comme partie du processus C2 naval militaire, définit un domaine application qui implique à la fois des décideurs humains ...combat ships defending against incoming threats and where coordination of their respective resources is a complex problem of capital importance...the case of the several frigates defending against incoming threats, multi-agent coordi- nation is a complex problem of capital importance. Better

  7. Danko Markovinović, PhD in Technical Sciences

    Directory of Open Access Journals (Sweden)

    Miljenko Lapaine

    2009-12-01

    Full Text Available Danko Markovinović defended his dissertation Gravimetric Reference System of the Republic of Croatia at the Faculty of Geodesy of the University of Zagreb on October 16, 2009. The dissertation was defended in front of the committee: Prof. Dr. Mario Brkić, Prof. Dr. Tomislav Bašić (mentor and Assist. Prof. Dr. Miran Kuhar from the Faculty of Civil Engineering and Geodesy of the University of Ljubljana.

  8. The Social Environment and the Health Care sector

    OpenAIRE

    da Rocha Fernandes, Joao Diogo

    2012-01-01

    The objective of this thesis was to defend an alternative approach by health policy makers for improving health outcomes through investing on social factors of peoples' lives, rather than by increasing health expenditures. In order to defend this theory, this master thesis addresses two research questions: Which are the social determinants of health with largest impact on health status of individuals? And what is the statistical correlation between those social determinants of health and self...

  9. Examining an Online Microbiology Game as an Effective Tool for Teaching the Scientific Process ?

    OpenAIRE

    Bowling, Kristi G.; Klisch, Yvonne; Wang, Shu; Beier, Margaret

    2013-01-01

    This study investigates the effectiveness of the online Flash game Disease Defenders in producing knowledge gains for concepts related to the scientific process. Disease Defenders was specifically designed to model how the scientific process is central to a variety of disciplines and science careers. An additional question relates to the game?s ability to shift attitudes toward science. Middle school classes from grades six to eight were assigned to the experimental group (n = 489) or control...

  10. A Hypothetical Case: UNITED STATES v. Clonaid

    OpenAIRE

    Wu, Chun-Ying

    2003-01-01

    The government took the place of FDA to bring a suit against Clonaid Company to grant preliminary injunction to enjoin defendant Clonaid Company from cloning human beings and using human embryos in SCNT research in violation of the Federal Food, Drug and Cosmetic Act and the Public Health Service Act. In response to government¡¦s motion for injunction, the defendant, Clonaid, first challenges the statutory authority of FDA to regulate human cloning. Then Clonaid ass...

  11. Culturally divergent responses to mortality salience.

    Science.gov (United States)

    Ma-Kellams, Christine; Blascovich, Jim

    2011-08-01

    Two experiments compared the effects of death thoughts, or mortality salience, on European and Asian Americans. Research on terror management theory has demonstrated that in Western cultural groups, individuals typically employ self-protective strategies in the face of death-related thoughts. Given fundamental East-West differences in self-construal (i.e., the independent vs. interdependent self), we predicted that members of Eastern cultural groups would affirm other people, rather than defend and affirm the self, after encountering conditions of mortality salience. We primed European Americans and Asian Americans with either a death or a control prime and examined the effect of this manipulation on attitudes about a person who violates cultural norms (Study 1) and on attributions about the plight of an innocent victim (Study 2). Mortality salience promoted culturally divergent responses, leading European Americans to defend the self and Asian Americans to defend other people.

  12. How jurors use and misuse character evidence.

    Science.gov (United States)

    Hunt, Jennifer S; Budesheim, Thomas Lee

    2004-04-01

    The Federal Rules of Evidence allow defendants to offer testimony about their good character, but that testimony can be impeached with cross-examination or a rebuttal witness. It is assumed that jurors use the defense's character evidence (CE) to form guilt and conviction judgments but use impeachment evidence only to assess the character witness's credibility. Two experiments tested these assumptions by presenting mock jurors with various forms of CE and impeachment. Participants made trait ratings for the character witness and defendant and guilt and conviction judgments. Positive CE did not affect guilt or conviction judgments, but cross-examination caused a backlash in which judgments were harsher than when no CE was given. Using path analysis, the authors tested a model of the process by which CE and impeachment affect defendant and witness impressions and guilt and conviction judgments. Implications for juror decision making are discussed.

  13. Artificial intelligence methodologies applied to quality control of the positioning services offered by the Red Andaluza de Posicionamiento (RAP network

    Directory of Open Access Journals (Sweden)

    Antonio José Gil

    2012-12-01

    Full Text Available On April 26, 2012, Elena Giménez de Ory defend-ed her Ph.D. thesis at University of Jaén, entitled: “Robust methodologies applied to quality control of the positioning services offered by the Red Andaluza de Posicionamiento (RAP network”. Elena Giménez de Ory defended her dissertation in a publicly open presentation held in the Higher Polytechnic School at the University of Jaén, and was able to comment on every question raised by her thesis committee and the audience. The thesis was supervised by her advisor, Prof. Antonio J. Gil Cruz, and the rest of his thesis committee, Prof. Manuel Sánchez de la Orden, Dr. Antonio Miguel Ruiz Armenteros and Dr. Gracia Rodríguez Caderot. The thesis has been read and approved by his thesis committee, receiving the highest rating. All of them were present at the presentation.

  14. Animal cruelty and psychiatric disorders.

    Science.gov (United States)

    Gleyzer, Roman; Felthous, Alan R; Holzer, Charles E

    2002-01-01

    Animal cruelty in childhood, although generally viewed as abnormal or deviant, for years was not considered symptomatic of any particular psychiatric disorder. Although animal cruelty is currently used as a diagnostic criterion for conduct disorder, research establishing the diagnostic significance of this behavior is essentially nonexistent. In the current study, investigators tested the hypothesis that a history of substantial animal cruelty is associated with a diagnosis of antisocial personality disorder (APD) and looked for associations with other disorders commonly diagnosed in a population of criminal defendants. Forty-eight subjects, criminal defendants who had histories of substantial animal cruelty, were matched with defendants without this history. Data were systematically obtained from the files by using four specifically designed data retrieval outlines. A history of animal cruelty during childhood was significantly associated with APD, antisocial personality traits, and polysubstance abuse. Mental retardation, psychotic disorders, and alcohol abuse showed no such association.

  15. Anthropometric characteristics, physical fitness and technical performance of under-19 soccer players by competitive level and field position

    DEFF Research Database (Denmark)

    Rebelo, A; Brito, J; Maia, J

    2013-01-01

    Anthropometric characteristics, physical fitness and technical skills of under-19 (U19) soccer players were compared by competitive level (elite, n=95; non-elite, n=85) and playing position (goalkeeper, central defender, fullback, midfield, forward). Fitness tests included 5- and 30-m sprints......, agility, squat jump (SJ) and countermovement jump (CMJ), strength and Yo-Yo intermittent endurance test level 2 (Yo-Yo IE2). Soccer-specific skills included ball control and dribbling. Independent of position, elite players presented more hours of training per year than non-elite players (d>1.2). Stature...... and body mass discriminated elite from non-elite players among goalkeepers and central defenders (d>0.6). Major differences were noted between elite and non-elite goalkeepers for SJ, CMJ, Yo-Yo IE2, and ball control (d>1.2). Elite central defenders performed better than their non-elite counterparts in SJ...

  16. A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

    Directory of Open Access Journals (Sweden)

    Mário S. Alvim

    2018-05-01

    Full Text Available In the inference attacks studied in Quantitative Information Flow (QIF, the attacker typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choice among different protocols, and its effect on the amount of leakage depends heavily on whether or not this choice is visible to the attacker. In this work, we consider operators for modeling visible and hidden choice in protocol composition, and we study their algebraic properties. We then formalize the interplay between defender and attacker in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage. We consider various kinds of leakage games, depending on whether players act simultaneously or sequentially, and on whether or not the choices of the defender are visible to the attacker. In the case of sequential games, the choice of the second player is generally a function of the choice of the first player, and his/her probabilistic choice can be either over the possible functions (mixed strategy or it can be on the result of the function (behavioral strategy. We show that when the attacker moves first in a sequential game with a hidden choice, then behavioral strategies are more advantageous for the defender than mixed strategies. This contrasts with the standard game theory, where the two types of strategies are equivalent. Finally, we establish a hierarchy of these games in terms of their information leakage and provide methods for finding optimal strategies (at the points of equilibrium for both attacker and defender in the various cases.

  17. Physiological Responses of Water-Polo Players Under Different Tactical Strategie

    Directory of Open Access Journals (Sweden)

    Petros G. Botonis, Argyris G. Toubekis

    2015-01-01

    Full Text Available The aim of this study was to investigate the effect of defense tactical strategy on physiological responses characterizing playing intensity in water-polo game. In the first part of the study, fourteen players were assigned to defending (n = 7 and offending (n = 7 groups and participated in nine 4-min plays applying three different defending systems: press, static-zone and zone-press, in front of the defense court of one goalpost. In the second part, 18 players participated in nine different real full court water-polo games consisting of 3X15min of live-time playing periods. Both in defense court plays and real games, the three defense systems were played in a counterbalanced order and heart rate (HR was continuously recorded. Additionally, in defense court plays, blood lactate concentration (La was measured at the end of each 4-min period. Mean HR within defense court plays was higher in press (153 ± 10 beats.min-1 than in static-zone (140 ± 11 beats.min-1 and zone-press (143 ± 16 beats.min-1, p 0.05. Defenders and offenders showed similar HR and La responses across the tactical modes. In conclusion, defense tactical strategies affect physiological responses within a part of the game but do not affect the overall playing intensity of a real water-polo game. Tactical strategies similarly affect offenders and defenders.

  18. Intelligence, previous convictions and interrogative suggestibility: a path analysis of alleged false-confession cases.

    Science.gov (United States)

    Sharrock, R; Gudjonsson, G H

    1993-05-01

    The main purpose of this study was to investigate the relationship between interrogative suggestibility and previous convictions among 108 defendants in criminal trials, using a path analysis technique. It was hypothesized that previous convictions, which may provide defendants with interrogative experiences, would correlate negatively with 'shift' as measured by the Gudjonsson Suggestibility Scale (Gudjonsson, 1984a), after intelligence and memory had been controlled for. The hypothesis was partially confirmed and the theoretical and practical implications of the findings are discussed.

  19. Alexios I Komnenos and his Church Policy

    Directory of Open Access Journals (Sweden)

    Iakovos MENELAOU

    2018-01-01

    Full Text Available Alexios I Komnenos has been characterized as a gifted military leader. Nevertheless, apart from his military career and after he took the throne, Alexios proceeded to certain measures in order to revive an empire in condition of decline. Alexios established himself as a defender of Orthodoxy, since he helped monasticism, fought heresies and supported the building or renewal of foundations, such as monasteries and churches. In this paper, I deal with Alexios’ church policy and how he defended Orthodoxy.

  20. The Anders Behring Breivik Trial: Performing Justice, Defending Democracy

    NARCIS (Netherlands)

    de Graaf, B.A.; van der Heide, E.J.; Wanmaker, S.; Weggemans, D.J.

    On 24 August 2012, the judges of the Oslo District Court passed their final verdict in the case of Anders Behring Breivik, declaring Breivik criminally sane and legally responsible for the killing of 77 people during the bombing of government buildings in Oslo and the shooting spree on the island of

  1. Defending Privacy: the Development and Deployment of a Darknet

    OpenAIRE

    McManamon, Conor; Mtenzi, Fredrick

    2010-01-01

    New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined i...

  2. Plant Physiology: FERONIA Defends the Cell Walls against Corrosion.

    Science.gov (United States)

    Verger, Stéphane; Hamant, Olivier

    2018-03-05

    A new study uncovers the role of wall sensing and remodeling in the plant response to salt stress, identifying the FERONIA receptor kinase as a key player in that process, likely through direct sensing of cell wall pectins. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. Defending the Amazon: Conservation, Development and Security in Brazil

    Science.gov (United States)

    2009-03-01

    Globo, August 6, 2008, http://oglobo.globo.com/ economia /miriam/post.asp?t=rota_das_drogas&cod_Post=118173&a=496 (accessed February 24, 2009). 193...oglobo.globo.com/ economia /miriam/post.asp?t=rota_das_drogas&cod_Post =118173&a=496 (accessed February 24, 2009). Levitsky, Melvyn (U.S. Ambassador

  4. The Anders Behring Breivik Trial: Performing Justice, Defending Democracy

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2013-08-01

    Full Text Available On 24 August 2012, the judges of the Oslo District Court passed their final verdict in the case of Anders Behring Breivik, declaring Breivik criminally sane and legally responsible for the killing of 77 people during the bombing of government buildings in Oslo and the shooting spree on the island of Utøya on 22 July 2011. This Research Paper examines to what extent the Breivik trial attained the goals of criminal justice: retribution, prevention, restoring democratic order and upholding the rule of law. Furthermore, it aims to determine if the trial contributed to the need for closure in society. The Research Paper concludes that the trial did indeed have a positive impact on the coping mechanisms in Norwegian society and that most Norwegians viewed the trial as a positive counter-weight to the brutality of Breivik’s acts. Overall, the trial was viewed as an example of justice and as a trial that upheld the democratic values of Norwegian society – in stark contrast to Breivik’s values.

  5. Defendants are clueless the 30-day psychiatric observation | Kaliski ...

    African Journals Online (AJOL)

    Mentally ill subjects differed only in their not being able to distinguish between a guilty/not guilty plea Most did not have legal representation, did not personally request the assessment and denied guilt of the alleged offence. Conclusions. Mental illness affects triability but not necessarily criminal responsibility. Disturbingly ...

  6. Reclaiming Professionalism for Geography Education: Defending Our Own Territory

    Science.gov (United States)

    Bourke, Theresa; Ryan, Mary; Lidstone, John

    2012-01-01

    In a world where governments increasingly attempt to impose regulation on all professional activities, this paper advocates that professional standards for teachers be developed "by the profession for the profession". Foucauldian archaeology is applied to two teacher standards documents recently published in Australia, one developed at…

  7. Feng shui väärtus on vaimujõus / Marika Tomberg ; komment. Lea Eermann, komment. Rein Weber

    Index Scriptorium Estoniae

    Tomberg, Marika

    1999-01-01

    Feng shui järgi korraldatud Lea Eermanni kodust Nõmmel. Feng shui- ja geobioloogia-alase nõustamisega tegelev arhitekt Rein Weber keskkonna mõjust tervisele, magamistoast. Enda ja maja kaitsmisest halbade mõjude eest. 10 illustratsiooni

  8. Mis muutub Eesti Kunstimuuseumi elus, rollis ja tähenduses, kui Kumu valmis on saanud? / Marika Valk

    Index Scriptorium Estoniae

    Valk, Marika

    2004-01-01

    EKMi filiaalidest jäävad edasi tegutsema Kadrioru lossi väliskunstimuuseum (koos Mikkeli muuseumiga), Niguliste muuseum, Adamson-Ericu muuseum, Kristjan Raua majamuuseum, juurde tuleb Kumu, tegevuse lõpetavad Rüütelkonna hoone ja kunstimuuseumi näitusepind Rotermanni soolalaos

  9. 3- ja 4-aastaste laste intellektuaalne areng erinevates kasvukeskkondades / Merit Laane, Kristina Nugin, Ingrid Tuisk, Marika Veisson

    Index Scriptorium Estoniae

    2001-01-01

    Uuringust, mille eesmärgiks oli selgitada, milline on 3- ja 4-aastaste laste intellektuaalne areng erinevates kasvukeskkondades. Uuringus osalesid longituuduurimuses osalenud lapsed, tavarühma lapsed ja Hea Alguse rühma lapsed

  10. Psychiatry and the death penalty.

    Science.gov (United States)

    Scott, Charles L

    2006-09-01

    Psychiatrists conducting forensic evaluations of defendants facing a potential death penalty must understand the legal and ethical parameters governing these assessments in addition to the important clinical issues. Important areas to review with each defendant include the role of the evaluator, the party requesting the evaluation, circumstances in which the evaluation is not confidential, the nature, scope, and purpose of the evaluation, and the parties to whom the results of the evaluation are to be forwarded. In those circumstances in which the defense attorney has not retained the psychiatrist, the defendant's attorney must be aware that an evaluation has been ordered by the court or requested by the prosecution. The psychiatrist also must be prepared for passionate challenges to their findings from the defense or prosecution and in some instances for vigorous attacks on their own personal ethics. To weather such storms, the mental health evaluator must base their opinion on objective evidence rather than letting any personal bias guide their assessment.

  11. Minmax defense strategy for complex multi-state systems

    International Nuclear Information System (INIS)

    Hausken, Kjell; Levitin, Gregory

    2009-01-01

    This paper presents a general optimization methodology that merges game theory and multi-state system survivability theory. The defender has multiple alternatives of defense strategy that presumes separation and protection of system elements. The attacker also has multiple alternatives of its attack strategy based on a combination of different possible attack actions against different groups of system elements. The defender minimizes, and the attacker maximizes, the expected damage caused by the attack (taking into account the unreliability of system elements and the multi-state nature of complex series-parallel systems). The problem is defined as a two-period minmax non-cooperative game between the defender who moves first and the attacker who moves second. An exhaustive minmax optimization algorithm is presented based on a double-loop genetic algorithm for determining the solution. A universal generating function technique is applied for evaluating the losses caused by system performance reduction. Illustrative examples with solutions are presented

  12. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  13. A REPRESENTAÇÃO DISCURSIVA DA VÍTIMA E DO RÉU NO GÊNERO SENTENÇA JUDICIAL / Discursive representation of the victim and defendant in the genre judiciary

    Directory of Open Access Journals (Sweden)

    Alba Valéria Saboia Teixeira Lopes

    2016-05-01

    Full Text Available RESUMO Esta comunicação apresenta resultados de uma pesquisa de mestrado, em que analisamos como a representação discursiva da vítima e do réu é construída no gênero sentença judicial. Assim, objetivamos analisar como os sujeitos são representados discursivamente no texto jurídico a partir de pontos de vista de enunciadores distintos e como os elementos referenciais colaboram no processo de construção dessas imagens, que são ativadas e compartilhadas entre enunciador e coenunciadores. O trabalho insere-se no âmbito teórico geral da linguística textual e, mais especificamente, na análise textual dos discursos (ATD, com base em Adam (2011. O trabalho é orientado pelos estudos de Rodrigues et al. (2010, 2014, Passeggi (2010, 2001, Capez (2012 e outros. É uma pesquisa documental, com caráter qualitativo, descritivo, explicativo e interpretativo. Para a análise, selecionamos uma sentença do TJSP, com a temática da violência contra a mulher. Os resultados indicaram que a construção da representação discursiva dos sujeitos é complexa e depende das escolhas feitas pelo enunciador, de suas intenções, seus objetivos, podendo aproximar-se ou distanciar-se, de acordo com a orientação argumentativa do texto. Palavras-chave: Análise textual dos discursos; representação discursiva; gênero sentença judicial ABSTRACT This paper presents results of a master degree research, in which we analyze how discursive representation of victim and defendant is built in court judgment genre. Thus, we aimed to assess how involved individuals are discursively represented in legal text from views of different enunciators and how referential elements collaborate in construction of these images, which are activated and shared between enunciator and co-enunciators. This work is part of general theoretical framework of text linguistics and, more specifically, of textual discourse analysis (ATD, based on Adam ([2008] 2011, being guided by

  14. Acoustic signalling in a small, socially monogamous canid

    DEFF Research Database (Denmark)

    Darden, Safi-Kirstine; Dabelsteen, Torben

    2008-01-01

    Animals that actively defend all or part of their home range for the exclusive use of members of their social group are considered territorial. Defended areas may contain resources such as dens or nests, key foraging sites, or sexual partners that vary in value by season. We investigated territor....... These results suggest that the barking sequence is used in territorial defence and we conclude that at least male swift foxes are territorial in the mating season and they use a long-ranging acoustic signal in territory defence....

  15. Posibilidad de un individualismo holista. Consideraciones hermenéuticas sobre el individualismo moderno desde la filosofía de Charles Taylor

    Directory of Open Access Journals (Sweden)

    Gracia Calandín, Javier

    2010-06-01

    Full Text Available The aim of this essay is to argue against the atomistic conception of man that underlies much of modern philosophy and to support, in contrast, a hermeneutical approach that makes possible to defend a holistic individualism. For this, starting from the distinction of Charles Taylor between «ontological issues» and «advocacy issues», I am going to focus on the presuppositions of individualism. What does holistic individualism mean? Thus, I try to clarify whether it is possible to defend such holistic individualism, and what advantages in terms of irreducible social goods and significative freedom brings for the articulation and development of the individual and modern society.

    Mi propósito en este artículo es argumentar contra la concepción atomista del ser humano que subyace a buena parte de la filosofía moderna y defender, por el contrario, un enfoque hermenéutico que haga posible sostener un individualismo holista. Para ello partiendo de la distinción entre «ontological issues» y «advocacy issues» a los que apunta Charles Taylor, recalamos en los presupuestos del individualismo. ¿Qué sentido tiene hablar de un individualismo holista? De este modo trataré de esclarecer si es posible defender dicho individualismo holista; así como qué ganancias supone en términos de libertad significativa y bienes sociales irreductibles para la articulación y desarrollo del individuo y de la sociedad moderna.

  16. Technical Performance Analysis of Iran Premier League Soccer Players in 2012-2013 Season

    Directory of Open Access Journals (Sweden)

    Javani Mohsen

    2015-10-01

    Full Text Available Background and purpose of study : analysis of IRAN premier league soccer players’ technical performance in season 2012-2013, using a computerized match analysis system (Borhan Mobin Development Management Co, IRAN. Material and methods: in this study, data were obtained from 120 players, who performed in competitions 90 minutes. The players were classified into 3 positional roles: defenders, midfielders and forwards. Technical performance variables analysis included: total passes, total successful passes, pass accuracy, total shots; total shots to target, shot accuracy, ball interception and ball losses. The data were statistically analyzed by one-way ANOVA, Kruskal-Wallis, Mann-Whitney U and Tukey post hoc test. Results : The findings of this study showed that players performed about 45 passes per competition. Midfielders and defenders had significantly higher number of passes than forwards. Pass accuracy was about 67% and there were no significant differences between positional roles. Also, the players performed about 0.8 shots per competition, forwards and midfielders had significantly higher number of shots than defenders. Shot accuracy was about 31%; midfielders and forwards had significantly higher shot accuracy than defenders. Forwards showed significantly lower ball interception and higher ball losses than other positions. Conclusion : The result of this study showed that there were significant differences between some technical actions in positional roles. Therefore, coaches can use this information for individualization of training according to playing positions and for optimization of training in the amateur game.

  17. In the Field of Solar Installing, There Is still Little Room for the most Ecological Entrepreneurs

    International Nuclear Information System (INIS)

    Amarillo, Hubert

    2016-01-01

    The solar photovoltaic installing is a new market in which three types of contractors intervene: the 'solar defenders', characterized by their ecological belief; the traditional craftsmen, and the subcontracting installers. It has been noticed that qualification was not an element in which the firms were involved, but it is socially embedded reality. As to the 'solar defenders', the most legitimate to 'testify' (according convention school) in favor of the ecological order of worth of their activity, they remain few. The reason is the lack of social networks able to support them

  18. "Cultural acupuncture": Fan activism and the Harry Potter Alliance

    Directory of Open Access Journals (Sweden)

    Henry Jenkins

    2012-06-01

    Full Text Available Fan activists have struggled to defend series from cancellation, defend themselves from cease and desist orders, promote alternative representations, and raise money for charity. Building on this background, this article examines how the Harry Potter Alliance encourages young people to speak out as fans on a broad range of human rights and social justice issues through what the group's leader, Andrew Slack, calls "cultural acupuncture." The group's practice of mapping the fictional content world onto real-world concerns helps empower young people to become civicly engaged and politically active.

  19. Web application security is a stack how to CYA (cover your apps) completely

    CERN Document Server

    Mac Vittie, Lori

    2015-01-01

    The web application stack - a growing threat vector   Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio

  20. Domestic safeguards in the nuclear industry

    International Nuclear Information System (INIS)

    Uhrig, R.E.

    1979-01-01

    The Energy Reorganization Act of 1974 brought about markedly increased security requirements at nuclear power plants. NRC established a threat level against which the security forces were expected to defend. It is asserted that an inadequate legal basis exists for the NRC requirement that nuclear plants be defended by the use of deadly force, if necessary, and that complex issues such as apprehension, retention, and pursuit of intruders are left vague. Security measures patterned after the airline industry, resolution of the deadly force issue, and definition of a creditable threat level are proposed