WorldWideScience

Sample records for methods subterfuge theft

  1. Impact of identity theft on methods of identification.

    Science.gov (United States)

    McLemore, Jerri; Hodges, Walker; Wyman, Amy

    2011-06-01

    Responsibility for confirming a decedent's identity commonly falls on the shoulders of the coroner or medical examiner. Misidentification of bodies results in emotional turmoil for the next-of-kin and can negatively impact the coroner's or medical examiner's career. To avoid such mishaps, the use of scientific methods to establish a positive identification is advocated. The use of scientific methods of identification may not be reliable in cases where the decedent had assumed the identity of another person. Case studies of erroneously identified bodies due to identity theft from the state medical examiner offices in Iowa and New Mexico are presented. This article discusses the scope and major concepts of identity theft and how identity theft prevents the guarantee of a positive identification.

  2. METHODS OF PROVIDING NOISE IMMUNITY IN AUTOMOBILE ANTI-THEFT SYSTEM CONTROL

    Directory of Open Access Journals (Sweden)

    Frolov, V.

    2013-06-01

    Full Text Available In modern ani-theft systems they use frequency and phase modulation. Since the width of the signal is limited, it is possible to intercept the signal and then switch off the alarm at the right time.To ensure the noise immunity and secrecy manufacturers use more sophisticated codes using the methods of cryptography. Significant increase in noise immunity in modern ani-theft systems is possible using broadband signals.

  3. The Step Method - Battling Identity Theft Using E-Retailers' Websites

    Science.gov (United States)

    Schulze, Marion; Shah, Mahmood H.

    Identity theft is the fastest growing crime in the 21st century. This paper investigates firstly what well-known e-commerce organizations are communicating on their websites to address this issue. For this purpose we analyze secondary data (literature and websites of ten organizations). Secondly we investigate the good practice in this area and recommend practical steps. The key findings are that some organizations only publish minimum security information to comply with legal requirements. Others inform consumers on how they actively try to prevent identity theft, how consumers can protect themselves, and about supporting actions when identity theft related fraud actually happens. From these findings we developed the Support - Trust - Empowerment -Prevention (STEP) method. It is aimed at helping to prevent identity theft and dealing with consequences when it occurs. It can help organizations on gaining and keeping consumers’ trust which is so essential for e-retailers in a climate of rising fraud.

  4. Electricity theft: a comparative analysis

    International Nuclear Information System (INIS)

    Smith, T.B.

    2004-01-01

    Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and unpaid bills. Estimates of the extent of electricity theft in a sample of 102 countries for 1980 and 2000 are undertaken. The evidence shows that theft is increasing in most regions of the world. The financial impacts of theft are reduced income from the sale of electricity and the necessity to charge more to consumers. Electricity theft is closely related to governance indicators, with higher levels of theft in countries without effective accountability, political instability, low government effectiveness and high levels of corruption. Electricity theft can be reduced by applying technical solutions such as tamper-proof meters, managerial methods such as inspection and monitoring, and in some cases restructuring power systems ownership and regulation

  5. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  6. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  7. Essays on electricity theft

    Science.gov (United States)

    Steadman, Keva Ullanda

    Electricity theft is a relatively unknown crime with high economic costs. In this dissertation, I try to identify the factors that motivate persons to steal electricity. First, I use a panel dataset of 97 countries spanning the five year period 2003--2007 to estimate a model that describes the effect of the unemployment rate, GDP per capita, male population and urbanization on theft, robbery and homicide rates. The results are consistent with previous empirical work on crime and economic opportunity. The second and main contribution of this paper is to estimate the same model using distribution loss as a proxy for electricity theft. The results show that the unemployment rate, a key explanatory economic factor for crime, cannot explain variation in electricity theft, although there is some evidence, albeit weak, supporting correlation in rich countries. Therefore, policies that target the reduction of property crime through a reduction in unemployment will have no effect on electricity theft. The third contribution relates to the role that political institutions play in the incentives to steal electricity. After control for socioeconomic factors, I find that there is no relationship between political governance indicators and electricity theft. In the second and third chapters, I compare the United States, a high income, low electricity theft country with Jamaica, a middle income, high electricity theft country. The effect of unemployment on electricity theft mirrors the results found in the first chapter. In the United States, electricity theft is affected by changes in economic conditions but in Jamaica, it is not. These results suggest that the state of institutions plays a role in how social norms are determined. Poor countries will be more likely than rich countries to have weak institutions with social norms that encourage electricity theft.

  8. Gun Theft and Crime.

    Science.gov (United States)

    Cook, Philip J

    2018-06-01

    Some law enforcement officials and other observers have asserted that theft is the primary source of guns to crime. In fact, the role of theft in supplying the guns used in robbery, assault, and murder is unknown, and current evidence provides little guidance about whether an effective program to reduce gun theft would reduce gun violence. The current article analyzes publicly available national data on gun theft together with a unique data set for Chicago. The results tend to support a conclusion that stolen guns play only a minor role in crime. First, publicly available data are used to calculate that thefts are only about 1% of all gun transactions nationwide. Second, an analysis of original data from Chicago demonstrates that less than 3% of crime guns recovered by the police have been reported stolen to the Chicago Police Department (CPD). If a gun is reported stolen, there is a 20% chance that it will be recovered, usually in conjunction with an arrest for illegal carrying. Less than half of those picked up with a stolen gun have a criminal record that includes violent offenses. Third, results from surveys of convicted criminals, both nationally and in Chicago, suggest that it is rare for respondents to have stolen the gun used in their most recent crime. The data on which these results are based have various shortcomings. A research agenda is proposed that would provide more certainty about the role of theft.

  9. Development of car theft crime index in peninsular Malaysia

    Science.gov (United States)

    Zulkifli, Malina; Ismail, Noriszura; Razali, Ahmad Mahir; Kasim, Maznah Mat

    2014-06-01

    Vehicle theft is classified as property crime and is considered as the most frequently reported crime in Malaysia. The rising number of vehicle thefts requires proper control by relevant authorities, especially through planning and implementation of strategic and effective measures. Nevertheless, the effort to control this crime would be much easier if there is an indication or index which is more specific to vehicle theft. This study aims to build an index crime which is specific to vehicle theft. The development of vehicle theft index proposed in this study requires three main steps; the first involves identification of criteria related to vehicle theft, the second requires calculation of degrees of importance, or weighting criteria, which involves application of correlation and entropy methods, and the final involves building of vehicle theft index using method of linear combination, or weighted arithmetic average. The results show that the two methods used for determining weights of vehicle theft index are similar. Information generated from the results can be used as a primary source for local authorities to plan strategies for reduction of vehicle theft and for insurance companies to determine premium rates of automobile insurance.

  10. Motor Vehicle Theft. Special Report.

    Science.gov (United States)

    Harlow, Caroline Wolf

    Thirteen years of data from the National Crime Survey were analyzed to examine the characteristics of motor vehicle theft, to identify trends during the past 13 years, and to determine who are most likely to be victims of motor vehicle theft. All motor vehicle thefts reported to the National Crime Survey from 1973 through 1985 were examined.…

  11. Identity theft and your practice.

    Science.gov (United States)

    Asbell, Lisa

    2010-01-01

    Medical identity theft is a growing problem in America. The federal government has passed laws to help "prevent" identity theft. However, several powerful medical associations are fighting the legislation. Americans need to know what is happening with these laws and why these laws are important to protect providers from lawsuits and consumers of healthcare from medical identity theft.

  12. Controlling hospital library theft.

    Science.gov (United States)

    Cuddy, Theresa M; Marchok, Catherine

    2003-04-01

    At Capital Health System/Fuld Campus (formerly Helene Fuld Medical Center), the Health Sciences Library lost many books and videocassettes. These materials were listed in the catalog but were missing when staff went to the shelves. The hospital had experienced a downsizing of staff, a reorganization, and a merger. When the library staff did an inventory, $10,000 worth of materials were found to be missing. We corrected the situation through a series of steps that we believe will help other libraries control their theft. Through regularly scheduling inventories, monitoring items, advertising, and using specific security measures, we have successfully controlled the library theft. The January 2002 inventory resulted in meeting our goal of zero missing books and videocassettes. We work to maintain that goal.

  13. REPORTING THEFTS, ETC.

    CERN Multimedia

    Property Protection Group

    2001-01-01

    The Property Protection Group wishes to remind you that: the theft, loss, disappearance, etc. of equipment belonging to CERN may be reported only by members of the Organization's personnel; members of the personnel are required to report such incidents at the Fire Brigade office, providing all the information needed to identify the equipment concerned (serial and inventory numbers, purchase price, etc.); in the event of theft, loss, etc., CERN cards, keys and mobile telephones will be replaced only upon presentation of a copy of the report made to the Fire Brigade. The Fire Brigade is located in Building 65 on the Meyrin Site (Tel. 74444) and is open every day of the week, 24 hours a day.

  14. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  15. Basic bookkeeping and avoiding theft.

    Science.gov (United States)

    Nelson, Ian M

    2008-07-01

    Bookkeeping practices in dental offices may be relatively simple, but care must be taken to prevent employee theft. Well-chosen accounting software and routine office practices may facilitate smooth operations. Systems of internal control should be established to safeguard the practice's finances. The dental practitioner should be very involved in their practice's accounting to maintain order, prevent theft, and keep costs under control.

  16. Gas theft: Prevention and detection

    International Nuclear Information System (INIS)

    Johnson, G.

    1992-01-01

    The problem of gas theft is discussed. Roughly 2% of gas and power customers in the United States either steal or attempt to steal service. Most diversion programs focus on theft from a revenue protection viewpoint, however there is often insufficient money recovered to justify an anti-theft program. Successful action often involves focusing on large volume users. Safety should be a prime consideration in searching out gas theft, as many people have been killed or injured as a result of careless theft. A brief review is presented of anti-theft devices such as locks and seals; automated meter reading can also help reduce theft. The best defence against theft is a highly trained and motivated field staff, especially meter readers, and a computer billing program that monitors changes in gas usage. Fixed bypasses may be unlocked and used at will; fraud is also common. Investigation and prosecution should be carried out by trained personnel following a carefully developed procedure. Safety issues should be stressed, and every effort should be made to avoid the appearance that the justice system is being used as a bill collector. 3 refs

  17. 75 FR 50733 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-17

    ... [Docket No. NHTSA 2010-0098] Preliminary Theft Data; Motor Vehicle Theft Prevention Standard AGENCY... of preliminary theft data; request for comments. SUMMARY: This document requests comments on data about passenger motor vehicle thefts that occurred in calendar year (CY) 2008 including theft rates for...

  18. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  19. Doubly illegal: Qualitative accounts of underage alcohol access through theft

    Science.gov (United States)

    Jennings, Vanessa K.; Friese, Bettina; Moore, Roland S.; Grube, Joel W.

    2012-01-01

    This study investigated sources of alcohol for underage drinkers. In-depth, semi-structured interviews were individually conducted with 47 youths, ages 15–18, who reported drinking within the last 12 months, to explore alcohol access. Theft was one method that some youths reported using to obtain alcohol. In addition to 9% of respondents who reported stealing alcohol from commercial outlets themselves, a total of 26% respondents reported occasions when their close friends stole alcohol. Our findings unveiled that teens had a body of knowledge that some drew upon for stealing alcohol. Youths revealed detailed knowledge about store layout, theft protection devices and store policies. In particular, respondents disclosed knowledge about which aisles have blind spots, how to remove security tops on bottles, and no-chase policies. Theft of alcohol from commercial sources may be reduced by examining the weaknesses of existing theft prevention practices, and revising store policies. PMID:22303285

  20. Modeling the number of car theft using Poisson regression

    Science.gov (United States)

    Zulkifli, Malina; Ling, Agnes Beh Yen; Kasim, Maznah Mat; Ismail, Noriszura

    2016-10-01

    Regression analysis is the most popular statistical methods used to express the relationship between the variables of response with the covariates. The aim of this paper is to evaluate the factors that influence the number of car theft using Poisson regression model. This paper will focus on the number of car thefts that occurred in districts in Peninsular Malaysia. There are two groups of factor that have been considered, namely district descriptive factors and socio and demographic factors. The result of the study showed that Bumiputera composition, Chinese composition, Other ethnic composition, foreign migration, number of residence with the age between 25 to 64, number of employed person and number of unemployed person are the most influence factors that affect the car theft cases. These information are very useful for the law enforcement department, insurance company and car owners in order to reduce and limiting the car theft cases in Peninsular Malaysia.

  1. Unlocking the condoms: The effect on sales and theft

    Directory of Open Access Journals (Sweden)

    Ashwood D

    2011-03-01

    Full Text Available Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use.Objective: Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmaciesMethods: Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined.Results: Theft varied by pharmacy and ranged from an average of 1.33 boxes (units per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason.Conclusion: After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  2. Sensors prevent theft; Sensoren gegen Langfinger

    Energy Technology Data Exchange (ETDEWEB)

    Hannen, Petra

    2012-07-01

    Solar farms are interesting objects not only for planners and investors but also for criminals intending theft. Operators attempt to prevent theft by different means. The contribution takes a look at four different countries.

  3. 25 CFR 11.412 - Theft.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Theft. 11.412 Section 11.412 Indians BUREAU OF INDIAN... Criminal Offenses § 11.412 Theft. A person who, without permission of the owner, shall take, shoplift... thereto shall be guilty of theft, a misdemeanor. ...

  4. On the electricity shortage, price and electricity theft nexus

    International Nuclear Information System (INIS)

    Jamil, Faisal

    2013-01-01

    Pakistan is facing severe electricity shortfall of its history since 2006. Several measures have been implemented in order to mitigate electricity shortage. The focus has been on raising the installed capacity of electricity generation and transmission. The present policy results in expensive thermal electricity generation mostly using expensive and environmentally hazardous furnace oil and inability of utilities to recover their cost of supply although there is unprecedented rise in electricity tariffs. This study concentrates on the electricity demand and traces the relationship between electricity shortfalls, tariff rate and electricity theft in the background of recent electricity crisis using the data for the period 1985–2010. We employed the Granger causality test through error correction model and out-of-sample causality through variance decomposition method. Empirical evidence shows that electricity theft greatly influences electricity shortfalls through lowering investment and inefficient use of electricity. The study concludes that electricity crisis cannot be handled without combating rampant electricity theft in the country. - Highlights: ► The study investigates relationship among electricity outages, price and electricity theft. ► It employed Johansen approach, ECM and variance decomposition analysis. ► Empirical evidence shows that electricity theft causes outages and rising tariff rates. ► Variance decomposition analysis results are slightly different from ECM

  5. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    International Nuclear Information System (INIS)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay

    2011-01-01

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  6. Electricity theft. Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy; Wang, Lingfeng; Devabhaktuni, Vijay [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. (author)

  7. Electricity theft: Overview, issues, prevention and a smart meter based approach to control theft

    Energy Technology Data Exchange (ETDEWEB)

    Depuru, Soma Shekara Sreenadh Reddy, E-mail: sdepuru@rockets.utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Wang Lingfeng, E-mail: Lingfeng.Wang@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States); Devabhaktuni, Vijay, E-mail: Vijay.Devabhaktuni@utoledo.ed [Department of Electrical Engineering and Computer Science, University of Toledo, Toledo, OH 43606 (United States)

    2011-02-15

    Non-technical loss (NTL) during transmission of electrical energy is a major problem in developing countries and it has been very difficult for the utility companies to detect and fight the people responsible for theft. Electricity theft forms a major chunk of NTL. These losses affect quality of supply, increase load on the generating station, and affect tariff imposed on genuine customers. This paper discusses the factors that influence the consumers to steal electricity. In view of these ill effects, various methods for detection and estimation of the theft are discussed. This paper proposes an architectural design of smart meter, external control station, harmonic generator, and filter circuit. Motivation of this work is to deject illegal consumers, and conserve and effectively utilize energy. As well, smart meters are designed to provide data of various parameters related to instantaneous power consumption. NTL in the distribution feeder is computed by external control station from the sending end information of the distribution feeder. If a considerable amount of NTL is detected, harmonic generator is operated at that feeder for introducing additional harmonic component for destroying appliances of the illegal consumers. For illustration, cost-benefit analysis for implementation of the proposed system in India is presented. - Research Highlights: {yields} Discusses several cases, issues and setbacks in the design of smart meters. {yields} Evaluates socio-economic, infrastructural, political and power quality issues. {yields} Proposes a smart meter that overcame several setbacks in implementation. {yields} Proposes a smart meter that chastises appliances of illegal consumers.

  8. AN EMPIRICAL ANALYSIS OF THE RELATIONSHIP BETWEEN UNEMPLOYMENT AND THEFT CRIMES

    Directory of Open Access Journals (Sweden)

    Majid Maddah

    2013-01-01

    Full Text Available The purpose of this study is to examine the effect of unemployment rate on theft crimes among the provinces of Iran. This study covered the annual data from 1997 to 2006 by using of GMM method. Results have shown that there is a strong significant and positive relationship between unemployment and theft crimes in various categories. Other factors such as poverty and demographic characteristics influence on people’s motivation to crime commitment of theft. Results from estimation of crime models demonstrated that there is a significant and positive relationship between unemployment rate and theft in Iran. In fact, to fight theft crimes, government have to use policies that cause reducing the unemployment rate in society.

  9. Deterring and remedying employee theft.

    Science.gov (United States)

    Buzogany, Bill; Mueller, Michael J

    2010-01-01

    Employee theft of patient-related information for personal financial gain is a serious threat to the success and financial viability of many healthcare providers. You can safeguard your financial interest in your patient base by taking three preventative measures designed to dissuade your employees from stealing from you. The first step is the implementation of policies and procedures that inform your employees that patient-related information is a valuable business asset that you vigorously protect from misappropriation. The second step is strictly limiting and monitoring employee access to patient-related information. The third step is educating your employees of the potential legal consequences to them in the event they steal from you and, in the event of theft, pursuing all legal remedies available to you.

  10. 10 CFR 74.11 - Reports of loss or theft or attempted theft or unauthorized production of special nuclear material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Reports of loss or theft or attempted theft or... Requirements § 74.11 Reports of loss or theft or attempted theft or unauthorized production of special nuclear... plutonium shall notify the NRC Operations Center within 1 hour of discovery of any loss or theft or other...

  11. Brake to the theft of fuels

    International Nuclear Information System (INIS)

    Cardenas, Diego Hernan

    2003-01-01

    After the fall of the decree 1900, the government responded again to the abilities that it grants him the interior commotion and at the end of November it issued the decree 2748, by means of which punishes the theft of hydrocarbons and it penalizes the concealment of this criminal activity. The lost overcome the US$100 millions in the 2002. The author makes a recount and shows statistical of lost by theft of fuels and lost by theft of refined products

  12. Using aerial infrared thermography to detect utility theft of service

    Science.gov (United States)

    Stockton, Gregory R.; Lucas, R. Gillem

    2012-06-01

    Natural gas and electric utility companies, public utility commissions, consumer advocacy groups, city governments, state governments and the federal government United States continue to turn a blind eye towards utility energy theft of service which we conservatively estimate is in excess of 10 billion a year. Why? Many in the United States have exhausted their unemployment benefits. The amounts for federal funding for low income heating assistance programs (LIHEAP) funds were cut by nearly 40% for 2012 to 3.02 billion. "At peak funding ($5.1 billion in 2009), the program was national in scale but still only had enough resources to support roughly 1/4 of the eligible households.i" Contributions to charities are down and the number of families below the poverty line who are unable to pay to heat their houses continues to rise. Many of the less fortunate in our society now consider theft and fraud to be an attractive option for their supply of natural gas and/or electricity. A record high mild winter in 2011-2012 coupled with 10-year low natural gas prices temporarily obscured the need for low income heating assistance programs (LIHEAPs) from the news and federal budgets, but cold winters will return. The proliferation of smart meters and automated meter infrastructures across our nation can do little to detect energy theft because the thieves can simply by-pass the meters, jumper around the meters and/or steal meters from abandoned houses and use them. Many utility systems were never set-up to stop these types of theft. Even with low-cost per identified thief method using aerial infrared thermography, utilities continue to ignore theft detection.

  13. Energy Theft in the Advanced Metering Infrastructure

    Science.gov (United States)

    McLaughlin, Stephen; Podkuiko, Dmitry; McDaniel, Patrick

    Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an advanced metering infrastructure (AMI). AMI replaces the analog meters with computerized systems that report usage over digital communication interfaces, e.g., phone lines. However, with this infrastructure comes new risk. In this paper, we consider adversary means of defrauding the electrical grid by manipulating AMI systems. We document the methods adversaries will use to attempt to manipulate energy usage data, and validate the viability of these attacks by performing penetration testing on commodity devices. Through these activities, we demonstrate that not only is theft still possible in AMI systems, but that current AMI devices introduce a myriad of new vectors for achieving it.

  14. 76 FR 24402 - Federal Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-05-02

    ... [Docket No. NHTSA-2009-0069] RIN 2127-AK81 Federal Motor Vehicle Theft Prevention Standard AGENCY... address for submission, and the procedure to submit designation of target areas on high theft major parts... the Theft Prevention Standard, manufacturers of high theft passenger motor vehicle lines subject to...

  15. The Relationship between Cell Phone Use and Identity Theft

    Science.gov (United States)

    Saunders, Lewis O.

    2014-01-01

    The growth of mobile phone use has paralleled increased reports of identity theft. Identity theft can result in financial loss and threats to a victim's personal safety. Although trends in identity theft are well-known, less is known about individual cell phone users' attitudes toward identity theft and the extent to which they connect it to cell…

  16. Current trends in copper theft prevention

    Energy Technology Data Exchange (ETDEWEB)

    Mastrofrancesco, A. [Electrical Safety Authority, ON (Canada)

    2009-07-01

    Copper is used in electrical wiring, water and gas piping, currency, and in household items. An increase in the price and demand for copper has made copper theft a profitable venture for some thieves. Copper consumed in North America is typically supplied by recycling. Scrap dealers may pay near-market prices for pure copper wires. However, copper theft poses a serious threat to the safety of utility workers and the public. Power outages caused by copper theft are now affecting grid reliability. This paper examined technologies and techniques used to prevent copper theft as part of a security strategy for utilities. Attempts to steal copper can leave utility substations unsecured and accessible to children. The theft of neutral grounds will cause the local distribution company (LDC) to malfunction and may cause power surges in homes as well as appliance fires. Utilities are now looking at using a hybrid steel and copper alternative to prevent copper theft. Asset identification techniques are also being used to identify the original owners of the copper and more easily prosecute thieves. Automated monitoring techniques are also being used to increase substation security. Utilities are also partnering with law enforcement agencies and pressuring governments to require scrap dealers to record who they buy from. It was concluded that strategies to prevent copper theft should be considered as part of an overall security strategy for utilities. tabs., figs.

  17. Design of power cable grounding wire anti-theft monitoring system

    Science.gov (United States)

    An, Xisheng; Lu, Peng; Wei, Niansheng; Hong, Gang

    2018-01-01

    In order to prevent the serious consequences of the power grid failure caused by the power cable grounding wire theft, this paper presents a GPRS based power cable grounding wire anti-theft monitoring device system, which includes a camera module, a sensor module, a micro processing system module, and a data monitoring center module, a mobile terminal module. Our design utilize two kinds of methods for detecting and reporting comprehensive image, it can effectively solve the problem of power and cable grounding wire box theft problem, timely follow-up grounded cable theft events, prevent the occurrence of electric field of high voltage transmission line fault, improve the reliability of the safe operation of power grid.

  18. Overt theft and the peculiarities of the qualification

    OpenAIRE

    Abramavičius, Armanas; Vosyliūtė, Andželika

    2017-01-01

    The article focuses on understanding the Overt theft as one of the aggravating elements of the theft stipulated in Part 2 of Article 178 of the Criminal Code of Lithuania. The content of Overt theft is presented. Moreover, the authors show the difficulties of the Criminal law concerning the aggravated theft enforcement in judicial practice; evaluate the expediency of the Overt theft defined by the Criminal law as aggravating one, discusses the issue of judicial problems relating to the Overt ...

  19. Theft in Price-Volatile Markets: On the Relationship between Copper Price and Copper Theft

    OpenAIRE

    Sidebottom, A.; Belur, J.; Bowers, K.; Tompson, L.; Johnson, S. D.

    2011-01-01

    Recently, against a backdrop of general reductions in acquisitive crime, increases have been observed in the frequency of metal theft offences. This is generally attributed to increases in metal prices in response to global demand exceeding supply. The main objective of this article was to examine the relationship between the price of copper and levels of copper theft, focusing specifically on copper cable theft from the British railway network. Results indicated a significant positive correl...

  20. Thefts, break-ins, etc.

    CERN Multimedia

    Property Protection Group

    2004-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  1. Deterrence and Geographical Externalities in Auto Theft

    OpenAIRE

    Marco Gonzalez-Navarro

    2013-01-01

    Understanding the degree of geographical crime displacement is crucial for the design of crime prevention policies. This paper documents changes in automobile theft risk that were generated by the plausibly exogenous introduction of Lojack, a highly effective stolen vehicle recovery device, into a number of new Ford car models in some Mexican states, but not others. Lojack-equipped vehicles in Lojack-coverage states experienced a 48 percent reduction in theft risk due to deterrence effects. H...

  2. Combating employee theft in the healthcare industry.

    Science.gov (United States)

    Marquet, Christopher T

    2011-01-01

    The healthcare industry is especially susceptible to internal fraud and employee theft, the author's research has found. He presents details of 14 costly healthcare embezzlements that took place in three months and gives insight into schemes employed on the most common types of embezzlement. He also describes proactive steps which can be taken to prevent, detect and respond to this phenomenon as well as providing a primer on conducting an internal theft investigation.

  3. 76 FR 2598 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-01-14

    ... the Toyota Matrix. NHTSA is correcting the final theft data to include the thefts and production volumes for the Toyota Matrix. As a result of this correction, the Toyota Matrix, previously not listed........... 219 99,176 2.2082 47 TOYOTA COROLLA 374 170,360 2.1954 48 AUDI AUDI S6 2 928 2.1552 49 GENERAL MOTORS...

  4. 78 FR 50014 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-08-16

    ... about thefts of model year (MY) 2011 passenger motor vehicles that occurred in calendar year (CY) 2011... produced. Accordingly, Figure 1: Theft Rate Data Trend (1993-2011) has been amended to reflect the revised... comment, if submitted on behalf of an association, business, labor union, etc.). You may review DOT's...

  5. Anti Theft Mechanism Through Face recognition Using FPGA

    Science.gov (United States)

    Sundari, Y. B. T.; Laxminarayana, G.; Laxmi, G. Vijaya

    2012-11-01

    The use of vehicle is must for everyone. At the same time, protection from theft is also very important. Prevention of vehicle theft can be done remotely by an authorized person. The location of the car can be found by using GPS and GSM controlled by FPGA. In this paper, face recognition is used to identify the persons and comparison is done with the preloaded faces for authorization. The vehicle will start only when the authorized personís face is identified. In the event of theft attempt or unauthorized personís trial to drive the vehicle, an MMS/SMS will be sent to the owner along with the location. Then the authorized person can alert the security personnel for tracking and catching the vehicle. For face recognition, a Principal Component Analysis (PCA) algorithm is developed using MATLAB. The control technique for GPS and GSM is developed using VHDL over SPTRAN 3E FPGA. The MMS sending method is written in VB6.0. The proposed application can be implemented with some modifications in the systems wherever the face recognition or detection is needed like, airports, international borders, banking applications etc.

  6. Thefts, break-ins, etc.

    CERN Multimedia

    Host States Relations Secretariat

    2005-01-01

    TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION On the eve of CERN's annual end-of-year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Host States Relations Service would like to wish you a Merry Christmas and a Happy New Year! Host States Relations Secretariat Tel. 72848

  7. The Great Dinosaur Feud: Science against All Odds

    Science.gov (United States)

    Clary, Renee; Wandersee, James; Carpinelli, Amy

    2008-01-01

    In the 19th century, the race to uncover dinosaur fossils and name new dinosaur species inspired two rival scientists, Edward Drinker Cope and Othniel Charles Marsh, to behave in ways that were the antithesis of scientific methods. Subterfuge, theft, and espionage were the ingredients of the Great Dinosaur Feud. Because students often enjoy…

  8. Is your practice at risk for medical identity theft?

    Science.gov (United States)

    Weinstock, Donna

    2014-01-01

    Medical identity theft has become increasingly prevalent. Medical practices need to take action and have policies and procedures in place to prevent data breaches. This will protect both the patient and the practice from medical identity theft.

  9. Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance

    OpenAIRE

    Wieteska, Stanisław

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We als...

  10. 26 CFR 1.165-8 - Theft losses.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Theft losses. 1.165-8 Section 1.165-8 Internal... TAXES (CONTINUED) Itemized Deductions for Individuals and Corporations § 1.165-8 Theft losses. (a... arising from theft is allowable as a deduction under section 165(a) for the taxable year in which the loss...

  11. 14 CFR 1214.609 - Loss or theft.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Loss or theft. 1214.609 Section 1214.609... Flights § 1214.609 Loss or theft. (a) Responsibility. The National Aeronautics and Space Administration will not be responsible for the loss or theft of, or damage to, items carried in OFK's or PPK's. (b...

  12. 19 CFR 112.46 - Report of loss or theft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Report of loss or theft. 112.46 Section 112.46... TREASURY CARRIERS, CARTMEN, AND LIGHTERMEN Identification Cards § 112.46 Report of loss or theft. The loss or theft of an identification card shall be promptly reported by the cardholder to the port director. ...

  13. 27 CFR 24.265 - Losses by theft.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Losses by theft. 24.265... OF THE TREASURY LIQUORS WINE Losses of Wine § 24.265 Losses by theft. The proprietor shall be liable... to the satisfaction of the appropriate TTB officer that the theft did not occur as the result of...

  14. The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive Computing

    DEFF Research Database (Denmark)

    Pedersen, Michael Østergaard; Pagter, Jakob Illeborg

    2007-01-01

    In many application scenarios for pervasive computing, theft is a serious security threat. In this paper we present the All-Or-Nothing anti-theft policy aimed at providing theft protection for pervasive computing. The overall idea behind the All-Or-Nothing anti-theft policy is to chain devices...... together in friendly networks so that any device will only work when it can see all of its friends. Thus a thief will have to keep the network of friendly devices together even if he only desires to steal one of the devices. Otherwise the device will not work. We provide a detailed security policy, present...... the required cryptographic protocols, provide three different applications, and finally we document that the policy is suitable for implementation on typical pervasive computing devices....

  15. A database model for evaluating material accountability safeguards effectiveness against protracted theft

    International Nuclear Information System (INIS)

    Sicherman, A.; Fortney, D.S.; Patenaude, C.J.

    1993-07-01

    DOE Material Control and Accountability Order 5633.3A requires that facilities handling special nuclear material evaluate their effectiveness against protracted theft (repeated thefts of small quantities of material, typically occurring over an extended time frame, to accumulate a goal quantity). Because a protracted theft attempt can extend over time, material accountability-like (MA) safeguards may help detect a protracted theft attempt in progress. Inventory anomalies, and material not in its authorized location when requested for processing are examples of MA detection mechanisms. Crediting such detection in evaluations, however, requires taking into account potential insider subversion of MA safeguards. In this paper, the authors describe a database model for evaluating MA safeguards effectiveness against protracted theft that addresses potential subversion. The model includes a detailed yet practical structure for characterizing various types of MA activities, lists of potential insider MA defeat methods and access/authority related to MA activities, and an initial implementation of built-in MA detection probabilities. This database model, implemented in the new Protracted Insider module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security), helps facilitate the systematic collection of relevant information about MA activity steps, and ''standardize'' MA safeguards evaluations

  16. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    Directory of Open Access Journals (Sweden)

    Samuel Musungwini

    2016-07-01

    Full Text Available The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design science paradigm, data was collected through semi-structured interviews, participant observation, document review and qualitative questionnaire. The findings of the study revealed that the power utility in Zimbabwe uses very basic methods and techniques in detecting and countering electricity theft. This has made it difficult to deal with all the possible electricity theft strategies that are employed by the consumers. This study recommends that the power utility in Zimbabwe should use a framework for mobile technologies to monitor electricity theft in order to reduce revenue leakages caused by electricity theft.

  17. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    Directory of Open Access Journals (Sweden)

    Bang Liu

    2018-01-01

    Full Text Available In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptively use GPS, cellular/WiFi localization, and dead reckoning to locate the vehicle during driving. Especially, a novel Velocity-Aware Dead Reckoning (VA-DR method is presented, which utilizes map knowledge and vehicle’s turns at road curves and intersections to estimate velocity for trajectory computation. Compared to traditional dead reckoning, it reduces accumulated errors and achieves great improvement in localization accuracy. Furthermore, based on the learning of the driving history, our system can establish individual mobility model for a vehicle and distinguish abnormal driving behaviors by a Long Short Term Memory (LSTM network. With the help of ad hoc authentication, the system can identify vehicle theft and send out timely alarming and tracking messages for rapid recovery. The realistic experiments running on Android smartphones prove that our system can detect vehicle theft effectively and locate a stolen vehicle accurately, with average errors less than the sight range.

  18. Electrical injuries due to theft of copper.

    Science.gov (United States)

    Curinga, Giuseppe; Pietramaggiori, Giorgio; Scherer, Sandra Saja; Masellis, Alessandro; Gherardini, Giulio; Brancato, Renato; Conte, Francesco; Bistoni, Giovanni

    2010-01-01

    This study shows that the theft of copper, mainly from electrical wires, is becoming a more frequent crime as the value of this metal rises. We have collected all the data from the Burn Centre of the Hospital of Palermo, Italy, from 1992 to 2007. Over the last two decades, we assisted to a dramatic increase of patients admitted to our hospital, reporting burn injuries while attempting to steal it in dangerous conditions. The circumstances of the injury, the clinical management of the case, and the long-term consequences are presented and discussed. We found that the electrical burn related to the theft of copper is often a life-threatening event because of the high-voltage electrical current passing through the patients. Patients, due to the type of activity, often requiring physical effort, were generally young and healthy. From a review of the literature on the subject, we have noticed that theft of copper is not reported as an important risk factor for electrical burns. Our report clearly shows that theft of copper-related electrical injury is becoming more frequent in the community and should be added as a "new" risk factor. The already high incidence reported here may actually be lower than the actual incidence because many patients tend not to come to the hospital because of the risk of being prosecuted by the police.

  19. Decision-based model development for nuclear material theft, smuggling, and illicit use

    International Nuclear Information System (INIS)

    Scott, B.

    2002-01-01

    Full text: Nuclear material is vulnerable to a range of theft, sabotage, smuggling and illicit use scenarios. These scenarios are dependent on the choices of individuals and organizations involved in these activities. These choices, in turn; are dependent on the perceived payoff vectors of the involved players. These payoff vectors can include monetary gain, ability to avoid detection, penalties for detection, difficulty of accomplishment, resource constraints, infrastructure support, etc. Threat scenarios can be developed from these individual choices, and the set of worst-case threat scenarios can be compiled into a threat definition. The implementation of physical protection controls is dependent on the developed threat scenarios. The analysis of the composition of the postulated threat can be based on the analysis of the postulated decisions of the individuals and organizations involved on theft, smuggling, and illicit use. This paper proposes a model to systematically analyze the significant decision points that an individual or organization addresses as result of its goals. The model's dependence on assumptions is discussed. Using these assumptions, a model is developed that assigns probabilities to a set of decisions performed by the individuals involved in theft/smuggling. The individual and organisation's decisions are based on the perceived cost/benefit of the decisions and the resource constraints. Methods for functionally obtaining decision probabilities from perceived cost/benefit are proposed. The treatment of high-consequence/low-probability events is discussed in terms of analysis of precursor events, and the use of sensitivity analysis is discussed. An example of a simplified model for nuclear material theft, smuggling, and illicit use is presented, and the results of this simplified model are evaluated. By attempting to model the potential distribution of nuclear material theft/smuggling events, this model increases the analytical tools available

  20. The Transfer of Property Rights by Theft

    DEFF Research Database (Denmark)

    Rose, Caspar

    2005-01-01

    jurisdictions treat this issue differently. The traditional theory suggests that there is a tradeoffbetween the costs of protecting the good and the costs of verifying the ownership. However, asshown, the rule of law concerning this issue significantly affects parties' incentives. Specifically, itis shown...... the ownership when good faith is decisive for the transfer of property rights.JEL Classification: K11, K14 and K42Keywords: property right law, theft, good faith and game theory...

  1. An Optimum Solution for Electric Power Theft

    Directory of Open Access Journals (Sweden)

    Aamir Hussain Memon

    2013-07-01

    Full Text Available Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already

  2. Money and Credit With Limited Commitment and Theft

    OpenAIRE

    Williamson, Stephen; Sanches, Daniel

    2009-01-01

    We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as this mitigates punishment for bad behavior in the credit market. Theft matters for optimal monetary ...

  3. Consumptive emasculation: the ecological and evolutionary consequences of pollen theft.

    Science.gov (United States)

    Hargreaves, Anna L; Harder, Lawrence D; Johnson, Steven D

    2009-05-01

    Many of the diverse animals that consume floral rewards act as efficient pollinators; however, others 'steal' rewards without 'paying' for them by pollinating. In contrast to the extensive studies of the ecological and evolutionary consequences of nectar theft, pollen theft and its implications remain largely neglected, even though it affects plant reproduction more directly. Here we review existing studies of pollen theft and find that: (1) most pollen thieves pollinate other plant species, suggesting that theft generally arises from a mismatch between the flower and thief that precludes pollen deposition, (2) bees are the most commonly documented pollen thieves, and (3) the floral traits that typically facilitate pollen theft involve either spatial or temporal separation of sex function within flowers (herkogamy and dichogamy, respectively). Given that herkogamy and dichogamy occur commonly and that bees are globally the most important floral visitors, pollen theft is likely a greatly under-appreciated component of floral ecology and influence on floral evolution. We identify the mechanisms by which pollen theft can affect plant fitness, and review the evidence for theft-induced ecological effects, including pollen limitation. We then explore the consequences of pollen theft for the evolution of floral traits and sexual systems, and conclude by identifying key directions for future research.

  4. The President’s Identity Theft Task Force: Combating Identity Theft a Strategic Plan

    Science.gov (United States)

    2007-04-11

    27 a. Safeguarding of Information in the Public Sector ............... 27 b. Responding to Data Breaches in the Public...72 APPENDICES Appendix A: Identity Theft Task Force’s Guidance Memorandum on Data Breach Protocol...government, and the private sector. Consumers, overwhelmed with weekly media reports of data breaches , feel vulnerable and uncertain of how to protect

  5. Rural farmers' perspectives on stock theft: police crime statistics ...

    African Journals Online (AJOL)

    Rural farmers are not only facing challenges of severe drought blamed on the El Nino weather pattern, but the stock theft as well. The South African Police's annual crime statistics report and surveys indicates that rural livestock farmers are mostly affected by stock theft in South Africa. The costs paid by these farmers to ...

  6. Mutilation and Theft of Library Materials: The Perception and ...

    African Journals Online (AJOL)

    Mutilation and theft in libraries is a menace that has persisted, and it is indeed a global problem. However, the worsening state of libraries in Nigeria appears to have aggravated its intensity and the consequent detrimental impact. This study attempts to investigate the perception of students on the dynamics of book theft and ...

  7. Do Data Breach Disclosure Laws Reduce Identity Theft?

    Science.gov (United States)

    Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro

    2011-01-01

    In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…

  8. 27 CFR 478.33a - Theft of firearms.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Theft of firearms. 478.33a Section 478.33a Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND... and Miscellaneous Provisions § 478.33a Theft of firearms. No person shall steal or unlawfully take or...

  9. 43 CFR 423.25 - Vandalism, tampering, and theft.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Vandalism, tampering, and theft. 423.25 Section 423.25 Public Lands: Interior Regulations Relating to Public Lands BUREAU OF RECLAMATION... of Conduct § 423.25 Vandalism, tampering, and theft. (a) You must not tamper or attempt to tamper...

  10. 47 CFR 76.1209 - Theft of service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Theft of service. 76.1209 Section 76.1209 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Competitive Availability of Navigation Devices § 76.1209 Theft of service...

  11. Fighting the scourge of metal theft.

    Science.gov (United States)

    Baillie, Jonathan

    2012-03-01

    Last December one acute hospital in south Wales, the University Hospital Llandough near Cardiff, was forced to cancel eight operations, with 81 patients affected in total, after thieves stole copper cabling from a back-up generator. HEJ editor, Jonathan Baillie, reports on the growing theft of cabling, pipework, and other vital supply infrastructure, from the healthcare estate, and asks senior estates personnel what lessons have been learned that might be useful in combating this lucrative, opportunistic, and also potentially highly dangerous, practice, in the future.

  12. Dog Theft: A Case for Tougher Sentencing Legislation.

    Science.gov (United States)

    Harris, Lauren K

    2018-05-22

    Dogs, and other companion animals, are currently classed as "property" in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere "property" are used to support this argument. The review concludes that the Sentencing Council's guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that "theft of a companion animal" should be listed in the Sentencing Council's guidelines as an aggravating factor.

  13. IDENTITY THEFT SERVICES: Services Offer Some Benefits but Are Limited in Preventing Fraud

    Science.gov (United States)

    2017-03-01

    17-254 Identity Theft Services standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to... audited financial statements. Page 34 GAO-17-254 Identity Theft Services Although the websites of many identity theft services ...reasonable assurance that significant decisions on the use of identity theft services are appropriately documented. We provided a draft of this

  14. 78 FR 4195 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... deterring motor vehicle theft as compliance with the parts marking requirements of the Theft Prevention..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  15. 78 FR 4192 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2013-01-18

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  16. 78 FR 24304 - Petition for Exemption From the Vehicle Theft Prevention Standard; Maserati North America Inc.

    Science.gov (United States)

    2013-04-24

    ... From the Vehicle Theft Prevention Standard; Maserati North America Inc. AGENCY: National Highway... exemption of the Quattroporte vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft... motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard...

  17. 78 FR 19363 - Petition for Exemption From the Vehicle Theft Prevention Standard; Honda

    Science.gov (United States)

    2013-03-29

    ... From the Vehicle Theft Prevention Standard; Honda AGENCY: National Highway Traffic Safety... Honda Civic vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR...

  18. 75 FR 30103 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2010-05-28

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  19. 7 CFR 331.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Notification of theft, loss, or release. 331.19... TOXINS § 331.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select agent or toxin. Thefts or losses must...

  20. 27 CFR 555.165 - Failure to report theft or loss.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Failure to report theft or..., Seizures and Forfeitures § 555.165 Failure to report theft or loss. (a) Any person who has knowledge of the theft or loss of any explosive materials from his stock and fails to report the theft or loss within 24...

  1. Medical identity theft in the emergency department: awareness is crucial.

    Science.gov (United States)

    Mancini, Michelino

    2014-11-01

    Medical identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient's identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior.

  2. POWER THEFT PREVENTION USING SMART METER WITH GSM TECHNIQUE

    OpenAIRE

    S.L.Narnaware#1, P.R.Mandape#2, L.R.Sarate#3 ,A.C.Lokhande#4

    2018-01-01

    Electricity theft is a major concern for the utilities. With the advent of smart meters, the frequency of collecting household energy consumption data has increased, making it possible for advanced data analysis, which was not possible earlier. In developing countries like India, power theft is one of the most prevalent issues which not only cause economic losses but also irregular supply of electricity. It hampers functioning of industries and factories, due to shortage of power supplied to...

  3. When accepting a gift can be professional misconduct and theft.

    Science.gov (United States)

    Griffith, Richard

    2016-07-01

    Gifts are often given as tokens of gratitude by grateful patients to district nurses. However, there are circumstances where the Nursing and Midwifery Council (NMC), as the professional regulator, and the courts, have held that accepting gifts, large or small, from vulnerable adults is dishonest and amounts to professional misconduct and even theft. Richard Griffith discusses the circumstances where a district nurse who accepts a gift can face a fitness-to-practise investigation and an allegation of theft.

  4. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Science.gov (United States)

    Mancini, Michelino

    2014-01-01

    Medical Identity theft in the emergency department (ED) can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. PMID:25493150

  5. Identity Theft in the Academic World Leads to Junk Science.

    Science.gov (United States)

    Dadkhah, Mehdi; Lagzian, Mohammad; Borchardt, Glenn

    2018-02-01

    In recent years, identity theft has been growing in the academic world. Cybercriminals create fake profiles for prominent scientists in attempts to manipulate the review and publishing process. Without permission, some fraudulent journals use the names of standout researchers on their editorial boards in the effort to look legitimate. This opinion piece, highlights some of the usual types of identity theft and their role in spreading junk science. Some general guidelines that editors and researchers can use against such attacks are presented.

  6. Beating the Red Gold Rush: Copper Theft and Homeland Security

    Science.gov (United States)

    2015-12-01

    the overall costs associated with the products they steal. A piece published in the Journal of Research in Crime and Delinquency in 2014 hypothesized...Sidebottom, Matt Ashby, and Shane Johnson, “Copper Cable Theft: Revisiting the Price- Theft Hypothesis,” Journal of Research in Crime and Delinquency 51, no...175 “Telecom Italia Mobile: Company History ,” International Director of Company Histories , 2004, accessed September 4, 2015, http://www.company

  7. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  8. Analyzing Space-Time Dynamics of Theft Rates Using Exchange Mobility

    Directory of Open Access Journals (Sweden)

    Yicheng Tang

    2018-06-01

    Full Text Available A critical issue in the geography of crime is the quantitative analysis of the spatial distribution of crimes which usually changes over time. In this paper, we use the concept of exchange mobility across different time periods to determine the spatial distribution of the theft rate in the city of Wuhan, China, in 2016. To this end, we use a newly-developed spatial dynamic indicator, the Local Indicator of Mobility Association (LIMA, which can detect differences in the spatial distribution of theft rate rankings over time from a distributional dynamics perspective. Our results provide a scientific reference for the evaluation of the effects of crime prevention efforts and offer a decision-making tool to enhance the application of temporal and spatial analytical methods.

  9. 49 CFR Appendix B to Part 541 - Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Light Duty Truck Lines With Theft Rates Below the 1990/91 Median Theft Rate, Subject to the Requirements of This Standard B Appendix B to Part 541... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION FEDERAL MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. B...

  10. Unlocking the condoms: The effect on sales and theft.

    Science.gov (United States)

    Ashwood, Daniel; Farris, Karen B; Campo, Shelly; Aquilino, Mary L; Losch, Mary

    2011-01-01

    Community pharmacies may place condoms in locked displays or behind glass, thereby reducing access and consequent use. Quantify sales and theft of condoms when condoms were unlocked and removed from behind glass in grocery pharmacies. Design. In this pilot study, condom displays were unlocked in selected pharmacies for three months. Participants. Eight grocery pharmacies in central Iowa agreed to participate. Intervention. Stores provided inventory at baseline, sales/theft thereafter in three monthly reports and sales for the same period one-year earlier. Outcome measures. Descriptive statistics quantified condom theft and sales. Number of pharmacies leaving condoms unlocked after the intervention was determined. Theft varied by pharmacy and ranged from an average of 1.33 boxes (units) per month to 27.33 per month. All stores experienced some increase in sales during the intervention. Two locations decided to re-lock their displays, only one indicated theft as the reason. After removing condoms from locked displays, more condoms were purchased and stolen from the study pharmacies. Sales outweighed theft in all pharmacies.

  11. Preventing thefts and damage to property

    CERN Document Server

    HR Department

    2007-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from be...

  12. PREVENTING THEFTS AND DAMAGE TO PROPERTY

    CERN Document Server

    2006-01-01

    Discouraging thieves is the best way of protecting your property. On the eve of CERN's annual end-of-year closure, in your own interest, that of your colleagues and that of the Organization, we would strongly advise you to take the following precautions: MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and spare keys must be taken away or kept in a safe place (please avoid supposedly 'safe hiding places' such as drawers, even if they are locked, metal boxes and flowers pots, all of which are well-known to burglars). Change lock codes regularly. Be careful if you have to leave your keys with a third party and make sure that they do not pass them on to anyone else. DOORS & WINDOWS: Lock office, workshop and meeting-room doors, etc. when you leave. Also make sure windows are properly shut, especially if they are easily accessible from outside. REPORTING INCIDENTS: Each theft solved could prevent another from being perpetrated. Please report thef...

  13. On the Statistical Dependency of Identity Theft on Demographics

    Science.gov (United States)

    di Crescenzo, Giovanni

    An improved understanding of the identity theft problem is widely agreed to be necessary to succeed in counter-theft efforts in legislative, financial and research institutions. In this paper we report on a statistical study about the existence of relationships between identity theft and area demographics in the US. The identity theft data chosen was the number of citizen complaints to the Federal Trade Commission in a large number of US municipalities. The list of demographics used for any such municipality included: estimated population, median resident age, estimated median household income, percentage of citizens with a high school or higher degree, percentage of unemployed residents, percentage of married residents, percentage of foreign born residents, percentage of residents living in poverty, density of law enforcement employees, crime index, and political orientation according to the 2004 presidential election. Our study findings, based on linear regression techniques, include statistically significant relationships between the number of identity theft complaints and a non-trivial subset of these demographics.

  14. Developmental Trajectories of Male Physical Violence and Theft

    Science.gov (United States)

    Barker, Edward D.; Séguin, Jean R.; White, Helene Raskin; Bates, Marsha E.; Lacourse, Éric; Carbonneau, René; Tremblay, Richard E.

    2012-01-01

    Context Neurocognitive mechanisms have long been hypothesized to influence developmental trajectories of antisocial behavior. However, studies examining this association tend to aggregate a variety of problem behaviors that may be differently affected by neurocognitive deficits. Objective To describe the developmental trajectories of physical violence and theft from adolescence to adulthood, their associations, and the neurocognitive characteristics of individuals following different patterns of trajectory association. Design Accelerated cohort-sequential, longitudinal design. Setting Rutgers Health and Human Development Project. Participants Six hundred ninety-eight men. Main Outcome Measures Self-reports of physical violence (ages 12–24 years) and theft (ages 12–31 years) were collected across 5 waves. Neurocognitive performance was assessed with executive function and verbal IQ tests between late adolescence and early adulthood. Results The majority (55%) of subjects showed an increased frequency of theft during the study period, while only a minority (13%) evinced an increasing frequency of physical violence. Executive function and verbal IQ performance were negatively related to high frequency of physical violence but positively related to high frequency of theft. Conclusions Developmental trajectories of physical violence and theft during adolescence and early adulthood are different and differently related to neurocognitive functioning. Global indexes of antisocial behavior mask the development of antisocial behavior subtypes and putative causal mechanisms. PMID:17485611

  15. 19 CFR 158.26 - Loss or theft in public stores.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Loss or theft in public stores. 158.26 Section 158... Casualty, Loss, or Theft While in Customs Custody § 158.26 Loss or theft in public stores. In the case of alleged loss or theft while the merchandise is in the public stores, there shall be filed a declaration of...

  16. Sim-based detection tools to minimize motorcycle theft

    Science.gov (United States)

    Triansyah, F. A.; Mudhafar, Z.; Lestari, C.; Amilia, S.; Ruswana, N. D.; Junaeti, E.

    2018-05-01

    The number of motorcycles in Indonesia spurs the increased criminal acts of motorcycle theft. In addition, the number of motorcycles increases the number of traffic accidents caused by improper motorists. The purpose of this research is to make METEOR (SIM Detector) which is a tool to detect the feasibility of SIM (driver license) which is used to operate and protect motorcycle against theft. METEOR is made through the assembly, encoding, testing, and sequencing stages of the motorcycle. Based on the research that has been done, METEOR generated that can detect the SIM by using additional RFID chip and can be set on the motorcycle. Without the proper SIM, motorized chests coupled with METEOR cannot be turned on. So it can be concluded that motorcycles with additional METEOR is able to be a safety device against theft and as a tool to test the feasibility of motorcycle riders.

  17. Dog Theft: A Case for Tougher Sentencing Legislation

    Science.gov (United States)

    Harris, Lauren K.

    2018-01-01

    Simple Summary The Sentencing Council (England and Wales) currently considers dogs to be “property”. This means that if someone steals a dog, they may be punished in the same way as someone who steals a non-living object, like a mobile phone or a piece of furniture. This review argues that losing a dog is very different to losing a non-living object, and that many people consider their dog to be a friend or a family member, not just a “possession”. The review concludes that that people who steal dogs should be punished in a way that reflects the emotional harm that can be caused to victims of dog theft. Abstract Dogs, and other companion animals, are currently classed as “property” in theft sentencing legislation for England and Wales. This means that offenders who steal dogs are given similar sentences to those that steal inanimate objects. This review presents the argument that the penalty for dog theft should be more severe than for the theft of non-living property. Evidence of the unique bond between dogs and humans, and discussion of the implications of labelling a living being as mere “property” are used to support this argument. The review concludes that the Sentencing Council’s guidelines should be amended so that offences involving the theft of a companion animal are deemed to be a Category 2 offence or above. The review further proposes that “theft of a companion animal” should be listed in the Sentencing Council’s guidelines as an aggravating factor. PMID:29786637

  18. 76 FR 61477 - Petition for Exemption from the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2011-10-04

    ...: This document grants in full the Volkswagen Group of America's (VW) petition for exemption of the Audi... from the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... theft rate history or data available. However, VW provided data on the theft reduction benefits...

  19. Re-positioning the law of theft in view of recent developments in ...

    African Journals Online (AJOL)

    This article examines the impact of information and communication technologies (ICTs) on the development of the principles of theft. The Roman and South African law of theft forms the basis of such a study. This investigation is made against the background principle that the law of theft has to do with the traditional forms of ...

  20. 12 CFR Appendix J to Part 571 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ...; service provider arrangements; significant incidents involving identity theft and management's response... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft...—Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation Section 571.90 of this part...

  1. 12 CFR Appendix J to Part 222 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft..., App. J Appendix J to Part 222—Interagency Guidelines on Identity Theft Detection, Prevention, and...

  2. 12 CFR Appendix J to Part 41 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... on Identity Theft Detection, Prevention, and Mitigation Section 41.90 of this part requires each...

  3. 16 CFR Appendix A to Part 681 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... arrangements; significant incidents involving identity theft and management's response; and recommendations for... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Interagency Guidelines on Identity Theft... THE FAIR CREDIT REPORTING ACT IDENTITY THEFT RULES Pt. 681, App. A Appendix A to Part 681—Interagency...

  4. 78 FR 67213 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars...

    Science.gov (United States)

    2013-11-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Porsche Cars North America, Inc. AGENCY... From Vehicle Theft Prevention Standard. This petition is granted because the agency has determined that... reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR...

  5. 75 FR 34527 - Volkswagen Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... for Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic... the Theft Prevention Standard. This document corrects the model year of the new Volkswagen vehicle... effective in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of...

  6. 75 FR 6254 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2010-02-08

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  7. 77 FR 20486 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mitsubishi Motors

    Science.gov (United States)

    2012-04-04

    ... From the Vehicle Theft Prevention Standard; Mitsubishi Motors AGENCY: National Highway Traffic Safety... exemption of the Mitsubishi i-MiEV vehicle line in accordance with 49 CFR part 543, Exemption From the Theft... motor vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal...

  8. 78 FR 16040 - Petition for Exemption From the Vehicle Theft Prevention Standard; Jaguar Land Rover North...

    Science.gov (United States)

    2013-03-13

    ... From the Vehicle Theft Prevention Standard; Jaguar Land Rover North America Llc AGENCY: National... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of... Part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft...

  9. 76 FR 16472 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-03-23

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with Sec. 543.9(c)(2) of 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with [[Page 16473

  10. 77 FR 15843 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2012-03-16

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard. This... as standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as...

  11. 76 FR 41557 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mazda

    Science.gov (United States)

    2011-07-14

    ... From the Vehicle Theft Prevention Standard; Mazda AGENCY: National Highway Traffic Safety... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... parts-marking pursuant to 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard, based on...

  12. 76 FR 2444 - Petition for Exemption From the Vehicle Theft Prevention Standard; Ford Motor Company

    Science.gov (United States)

    2011-01-13

    ... From the Vehicle Theft Prevention Standard; Ford Motor Company AGENCY: National Highway Traffic Safety... vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention Standard. This... standard equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance...

  13. 49 CFR 571.114 - Standard No. 114; Theft protection and rollaway prevention.

    Science.gov (United States)

    2010-10-01

    ... STANDARDS Federal Motor Vehicle Safety Standards § 571.114 Standard No. 114; Theft protection and rollaway... incidence of crashes resulting from theft and accidental rollaway of motor vehicles. S2. Purpose. The... 49 Transportation 6 2010-10-01 2010-10-01 false Standard No. 114; Theft protection and rollaway...

  14. 75 FR 29812 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen

    Science.gov (United States)

    2010-05-27

    ... From the Vehicle Theft Prevention Standard; Volkswagen AGENCY: National Highway Traffic Safety... in reducing and deterring motor vehicle theft as compliance with the parts marking requirements of..., Exemption from Vehicle Theft Prevention Standard, based on the installation of an antitheft device as...

  15. 76 FR 4991 - Petition for Exemption From the Vehicle Theft Prevention Standard; Suzuki

    Science.gov (United States)

    2011-01-27

    ... From the Vehicle Theft Prevention Standard; Suzuki AGENCY: National Highway Traffic Safety... of the Kizashi vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the 49 CFR part 541, Federal Motor...

  16. 78 FR 28018 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2013-05-13

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  17. 75 FR 19458 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2010-04-14

    ... From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... Cube vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention Standard... of the Theft Prevention Standard (49 CFR Part 541) for the MY 2011 Nissan Cube vehicle line. The...

  18. 7 CFR 3015.170 - Damage, loss, or theft of equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Damage, loss, or theft of equipment. 3015.170 Section... Damage, loss, or theft of equipment. (a) Applicability. This section applies to equipment with a unit... damage, loss, or theft, the recipient does not have a control system in effect as required by § 3015.169...

  19. 77 FR 29752 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2012-05-18

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... part 543, Exemption from the Theft Prevention Standard. This petition is granted, because the agency... be as effective in reducing and deterring motor vehicle theft as compliance with the parts-marking...

  20. 77 FR 36008 - Agency Information Collection Activities; Proposed Collection: Cargo Theft Incident Report...

    Science.gov (United States)

    2012-06-15

    ... Collection Activities; Proposed Collection: Cargo Theft Incident Report, Revision of a Currently Approved... collection: Revision of a currently approved collection. (2) The title of the form/collection: Cargo Theft... enforcement agencies. Brief Abstract: This collection is needed to collect information on cargo theft...

  1. 75 FR 2589 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-01-15

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... Jeep Patriot vehicle line in accordance with 49 CFR Part 543, Exemption from Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  2. 76 FR 5248 - Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005...

    Science.gov (United States)

    2011-01-28

    ...] Insurer Reporting Requirements; Annual Insurer Report on Motor Vehicle Theft for the 2005 Reporting Year... on motor vehicle theft for the 2005 reporting year. Section 33112(h) of Title 49 of the U.S. Code... report provides information on theft and recovery of vehicles; rating rules and plans used by motor...

  3. 9 CFR 121.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Notification of theft, loss, or..., USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 121.19 Notification of theft, loss, or release. (a) An individual or entity must immediately notify APHIS or CDC upon discovery of the theft or loss of a select...

  4. 76 FR 12792 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2011-03-08

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY..., Exemption from the Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  5. 42 CFR 73.19 - Notification of theft, loss, or release.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Notification of theft, loss, or release. 73.19..., INSPECTION, LICENSING SELECT AGENTS AND TOXINS § 73.19 Notification of theft, loss, or release. (a) Upon discovery of the theft or loss of a select agent or toxin, an individual or entity must immediately notify...

  6. 7 CFR 1786.35 - Loss, theft, destruction, mutilation, or defacement of RUS guarantee.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Loans Pursuant to Section 306(A) of the RE Act § 1786.35 Loss, theft, destruction, mutilation, or... circumstances of the loss, theft, or destruction of the guarantee; and (vi) The lender or holder, shall present...

  7. 31 CFR 309.12 - Relief on account of loss, theft or destruction, etc.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Relief on account of loss, theft or... BILLS § 309.12 Relief on account of loss, theft or destruction, etc. (a) Relief on account of the loss, theft, destruction, mutilation or defacement of Treasury bills may be given only under the authority of...

  8. 10 CFR 20.2201 - Reports of theft or loss of licensed material.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Reports of theft or loss of licensed material. 20.2201... § 20.2201 Reports of theft or loss of licensed material. (a) Telephone reports. (1) Each licensee shall... or theft occurred; and (iii) A statement of disposition, or probable disposition, of the licensed...

  9. 76 FR 12220 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar...

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Jaguar Land Rover AGENCY: National... 543, Exemption from the Theft Prevention Standard. This petition is granted because the agency has... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of...

  10. 75 FR 53375 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Chrysler

    Science.gov (United States)

    2010-08-31

    ... From the Federal Motor Vehicle Theft Prevention Standard; Chrysler AGENCY: National Highway Traffic... the Fiat 500 vehicle line in accordance with 49 CFR Part 543, Exemption From Vehicle Theft Prevention... vehicle theft as compliance with the parts-marking requirements of 49 CFR Part 541, Federal Motor Vehicle...

  11. 27 CFR 555.30 - Reporting theft or loss of explosive materials.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false Reporting theft or loss of... and Miscellaneous Provisions § 555.30 Reporting theft or loss of explosive materials. (a) Any licensee or permittee who has knowledge of the theft or loss of any explosive materials from his stock shall...

  12. Examining the Effects of a Low-Cost Prompt to Reduce Retail Theft

    Science.gov (United States)

    Rafacz, Sharlet D.; Boyce, Thomas E.; Williams, W. Larry

    2011-01-01

    The present study evaluated the extent to which a low-cost, antitheft intervention impacted theft and sales in a multiple baseline design across two grocery stores. Previous research has measured the impact on theft of items that have a sign indicating their high theft rate and stickers next to or on the items. In contrast, this study tracked four…

  13. AN AUTOMATIC CAR ANTI-THEFT ALARM SYSTEM

    OpenAIRE

    J. A. Enokela; E.J. Ibanga

    2007-01-01

    The theft of cars and other automobiles by criminals has become so frequent in our society as to be classified as alarming. Most of the thefts are organized by gangs of robbers but sometimes individuals engage in this activity. The result usually, however, is that the persons from whom the vehicles have been stolen are left to grieve as many of these vehicles are never recovered. This paper describes a simple alarm system that can be easily installed in all kinds of vehicles. The system desc...

  14. Medical Identity Theft in the Emergency Department: Awareness is Crucial

    Directory of Open Access Journals (Sweden)

    Michelino Mancini

    2014-11-01

    Full Text Available Medical Identity theft in the emergency department (ED can harm numerous individuals, and many frontline healthcare providers are unaware of this growing concern. The two cases described began as typical ED encounters until red flags were discovered upon validating the patient’s identity. Educating all healthcare personnel within and outside the ED regarding the subtle signs of medical identity theft and implementing institutional policies to identify these criminals will discourage further fraudulent behavior. [West J Emerg Med. 2014;15(7:–0.

  15. The Criminalisation of Identity Theft Under the Saudi Anti-Cybercrime Law 2007

    OpenAIRE

    Almerdas, Suhail

    2014-01-01

    This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi Anti-Cybercrime Law 2007 is capable of encompassing possible methods for obtaining the financial information of others, including phishing, pharming, using malware and hacking, which appear to be the most common methods of obtaining the personal information of others online. It also questions ...

  16. 77 FR 1973 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2012-01-12

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... effective in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA...

  17. 77 FR 52393 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2012-08-29

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... of the Carline 4 vehicle line in accordance with 49 CFR Part 543, Exemption from the Theft Prevention... vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard (49 CFR...

  18. 78 FR 53498 - Petition for Exemption From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A...

    Science.gov (United States)

    2013-08-29

    ... From the Vehicle Theft Prevention Standard; Fuji Heavy Industries U.S.A., Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. FUSA requested confidential...

  19. 78 FR 50489 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2013-08-19

    ... From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway... deterring motor vehicle theft as compliance with the parts-marking requirements of the Theft Prevention Standard, 49 CFR part 541, Federal Motor Vehicle Theft Prevention Standard. Volkswagen requested...

  20. 49 CFR 542.2 - Procedures for selecting low theft light duty truck lines with a majority of major parts...

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false Procedures for selecting low theft light duty... TRUCK LINES TO BE COVERED BY THE THEFT PREVENTION STANDARD § 542.2 Procedures for selecting low theft... a low theft rate have major parts interchangeable with a majority of the covered major parts of a...

  1. Investigating the Identity Theft Prevention Strategies in M-Commerce

    Science.gov (United States)

    Shah, Mahmood Hussain; Ahmed, Javed; Soomro, Zahoor Ahmed

    2016-01-01

    Mobile commerce has provided extended business opportunities for online organisations and made it easier for customers to purchase products on-line from anywhere at any time. However, there are several risks associated with it, especially the identity theft. Online organisations commonly use electronic commerce approaches; however, these have some…

  2. New consumer load prototype for electricity theft monitoring

    International Nuclear Information System (INIS)

    Abdullateef, A I; Salami, M J E; Musse, M A; Onasanya, M A; Alebiosu, M I

    2013-01-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft

  3. Religiosity and Music Copyright Theft among Canadian Baptist Youth

    Science.gov (United States)

    Fawcett, Bruce G.; Francis, Leslie J.; Henderson, Amanda J.; Robbins, Mandy; Linkletter, Jody

    2013-01-01

    This study examines the views of 706 Canadian Baptist youth (between the ages of 14 and 18 years) on the moral issue of music copyright theft, and explores the influence on these views of age, sex, Sunday church attendance, personal prayer, personal Bible reading, and conservative Bible believing. The participants were attending Springforth 2005…

  4. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  5. Reducing theft and embezzlement by encouraging ethical behavior.

    Science.gov (United States)

    Weinstock, Donna

    2010-01-01

    Medical practices are often faced with employee embezzlement and theft. To protect themselves and their practices, physicians should have in place policies and procedures for identifying and handling unethical behaviors by employees. This article will deal with the need to set guidelines for what is considered ethical and professional conduct in the office.

  6. New consumer load prototype for electricity theft monitoring

    Science.gov (United States)

    Abdullateef, A. I.; Salami, M. J. E.; Musse, M. A.; Onasanya, M. A.; Alebiosu, M. I.

    2013-12-01

    Illegal connection which is direct connection to the distribution feeder and tampering of energy meter has been identified as a major process through which nefarious consumers steal electricity on low voltage distribution system. This has contributed enormously to the revenue losses incurred by the power and energy providers. A Consumer Load Prototype (CLP) is constructed and proposed in this study in order to understand the best possible pattern through which the stealing process is effected in real life power consumption. The construction of consumer load prototype will facilitate real time simulation and data collection for the monitoring and detection of electricity theft on low voltage distribution system. The prototype involves electrical design and construction of consumer loads with application of various standard regulations from Institution of Engineering and Technology (IET), formerly known as Institution of Electrical Engineers (IEE). LABVIEW platform was used for data acquisition and the data shows a good representation of the connected loads. The prototype will assist researchers and power utilities, currently facing challenges in getting real time data for the study and monitoring of electricity theft. The simulation of electricity theft in real time is one of the contributions of this prototype. Similarly, the power and energy community including students will appreciate the practical approach which the prototype provides for real time information rather than software simulation which has hitherto been used in the study of electricity theft.

  7. Towards creating believable decoy project folders for detecting data theft

    NARCIS (Netherlands)

    Thaler, S.; den Hartog, J.; Petkovic, M.

    2016-01-01

    Digital data theft is difficult to detect and typically it also takes a long time to discover that data has been stolen. This paper introduces a data-driven approach based on Markov chains to create believable decoy project folders which can assist in detecting potentially ongoing attacks. This can

  8. Whose guns are stolen? The epidemiology of Gun theft victims.

    Science.gov (United States)

    Hemenway, David; Azrael, Deborah; Miller, Matthew

    2017-12-01

    Gun theft is an important source of guns used by criminals. Yet no empirical work has focused on the characteristics of gun owners that distinguish those who have had their guns stolen from those who have not. In this study, we examine the demographics and behavioral characteristics of gun owners who report having had a gun stolen. Data come from a nationally representative probability-based online survey conducted in April 2015, with a linked follow-up survey in November 2015 that asked gun owners about any theft of their guns in the past 5 years. Of 1,604 gun-owning respondents, 2.4% (95% CI 1.6,3.6) reported that one or more guns had been stolen, with a mean number of guns stolen per theft of 1.5 (95% CI 1.0,2.0]. Risk factors for having a gun stolen were owning 6 or more guns, owning guns for protection, carrying a gun in the past month, storing guns unsafely, and living in the South region of the United States. The South accounts for 37% of US households, 43% of gun owners, and two-thirds of all gun thefts. We estimate that there are approximately 250,000 gun theft incidents per year, with about 380,000 guns stolen. We find that certain types of gun owners-who own many guns, who carry guns, and who do not store guns safely-are at higher risk to have their guns stolen. Tracing data show that states in the South are exporters of crime guns used in other states. Our survey results find that the majority of guns stolen in the US come from the South.

  9. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. REPORTING: Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.). A thief caught is a theft prevented: a contractor's employee was recently apprehended for stealing tools and he is now forbidden to enter the CERN site.

  10. THEFTS, BREAK-INS, ETC. THE BEST PROTECTION IS CAUTION

    CERN Multimedia

    Property Protection Group

    2001-01-01

    In your own interest and that of your colleagues and the Organization please apply the following recommendations: 1. MONEY, VALUABLES AND KEYS: Keep only a minimum of cash about your person. Never leave your money, valuables or keys unattended. 2. DOORS AND WINDOWS: Always lock your office, workshop or place of work when you leave it, if only for a short space of time. Also close any windows that are easily accessible from the outside. 3. PICKPOCKETS: Pay particular attention if you are jostled or bumped into. 4. REPORTING: A thief caught is a theft prevented. Immediately report any thefts, losses, items mislaid and other incidents to the CERN Fire and Rescue Service (Tel. 74848) and inform them of any major developments (recovery of missing property, new information, etc.)

  11. Tempering of accounts and records to disguise SNM theft

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-07-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise SNM theft and the collusion requirements needed to accomplish this feat

  12. Copper wire theft and high voltage electrical burns.

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale.

  13. Copper wire theft and high voltage electrical burns

    OpenAIRE

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresenc...

  14. Measuring Identity Theft at Top Banks (Version 1.5)

    OpenAIRE

    Hoofnagle, Chris

    2008-01-01

    There is no reliable way for consumers, regulators, and businesses to assess the relative rates of identity fraud at major financial institutions. This lack of information prevents a consumer market for bank safety from emerging. As part of a multiple strategy approach to obtaining more actionable data on identity theft, the Freedom of Information Act was used to obtain complaint data submitted by victims in 2006 to the Federal Trade Commission. This complaint data identifies the instituti...

  15. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against protracted theft of SNM. Protracted theft means repeated thefts of small quantities of material to accumulate a goal quantity. In this paper the authors discuss issues regarding the evaluation of safeguards and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the timely detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  16. An Optimum Solution for Electric-Power Theft

    International Nuclear Information System (INIS)

    Memon, A.H.; Memon, F.

    2013-01-01

    Electric power theft is a problem that continues to plague power sector across the whole country. Every year, the electricity companies face the line losses at an average 20-30% and according to power ministry estimation WAPDA companies lose more than Rs. 125 billion. Significantly, it is enough to destroy the entire power sector of country. According to sources 20% losses means the masses would have to pay extra 20% in terms of electricity tariffs. In other words, the innocent consumers pay the bills of those who steal electricity. For all that, no any permanent solution for this major issue has ever been proposed. We propose an applicable and optimum solution for this impassable problem. In our research, we propose an Electric power theft solution based on three stages; Transmission stage, Distribution stage, and User stage. Without synchronization among all, the complete solution can not be achieved. The proposed solution is simulated on NI (National Instruments) Circuit Design Suite Multisim v.10.0. Our research work is an implicit and a workable approach towards the Electric power theft, as for conditions in Pakistan, which is bearing the brunt of power crises already. (author)

  17. Kleptomania or common theft - diagnostic and judicial difficulties.

    Science.gov (United States)

    Sipowicz, Justyna; Kujawski, Ryszard

    2018-02-28

    First descriptions of kleptomania as a mental disorder date back to the nineteenth century. For the first time, kleptomania as an accompanying symptom rather than a formal diagnosis was included in the classification of psychiatric disorders of the American Psychiatric Association DSM-I in 1952. It was included in the International Classification of Diseases ICD-10 and classified under "habit and impulse disorders". Kleptomania is a serious disorder, as numerous thefts are impulsively carried out, carrying the risk of detection and consequently criminal liability. In Poland, we lack epidemiological data, however, it is estimated that 5% of those who commit theft are affected by kleptomania. People suffering from this disorder often do not seek a medical opinion so reviewing such cases is challenging for expert psychiatrists. The authors have proposed the term "kleptomania spectrum" for defining cases in which patients have an intense urge to steal, experienced a sense of tension from such an action, and relief following it, however, the criterion of theft of a superfluous object, without a profitable motive for themselves or others is not met.

  18. Getting ready for identity theft rules: creating a prevention program for your medical practice.

    Science.gov (United States)

    Cascardo, Debra

    2009-01-01

    Identity theft worries have found their way into medical practices. By August 1, 2009, all "creditors" must have a written program to prevent, detect, and minimize damage from identity theft. Any medical practice that bills patients is considered a creditor. Like HIPAA, these new Red Flag guidelines will serve to protect your practice from lawsuits as well as protect your patients from identity theft of their financial, personal, and medical information.

  19. Evaluating safeguards effectiveness against protracted theft of special nuclear material by insiders

    International Nuclear Information System (INIS)

    Al-Ayat, R.; Sicherman, A.

    1991-01-01

    The new draft DOE Material Control and Accountability Order 5633.3 requires that facilities handling special nuclear material (SNM) evaluate their effectiveness against provided theft of SNMProtracted theft means repeated thefts of small quantities of material to accumulate a goal quanfity. To evaluate the safeguards effectiveness against pro thefts, one must addresses several issues: (1) defining relevant time frames for various threat scenarios and delayed detection safeguards: (2) identifying which safeguards come into play more than once because of repeated adversary actions or because of periodic occurrence during the theft time frame (e.g., daily administrative check on presence of material): (3) considering whether the second and subsequent applications of safeguards are different in effectiveness from the first; (4)synthesizing how physical security, material control, and material accountability safeguards combine to provide protection against protracted theft scenarios. In this paper we discuss these issues and describe how we are augmenting the Analytic System and Software for Evaluating Safeguards and Security (ASSESS) to provide the user with a tool for evaluating effectiveness against protracted theft. Currently, the Insider module of ASSESS focuses on evaluating the ''timely'' detection of abrupt theft attempts by various types of single nonviolent insiders. In this paper we describe the approach we're implementing to augment ASSESS to handle various cases of protracted theft attempts

  20. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms

    NARCIS (Netherlands)

    Barker, E.D.; Tremblay, R.E.; van Lier, P.A.C.; Vitaro, F.; Nagin, D.S.; Assaad, J.M.; Seguin, J.R.

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been

  1. 27 CFR 25.282 - Beer lost by fire, theft, casualty, or act of God.

    Science.gov (United States)

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 1 2010-04-01 2010-04-01 false Beer lost by fire, theft... TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS BEER Refund or Adjustment of Tax or Relief From Liability § 25.282 Beer lost by fire, theft, casualty, or act of God. (a) General. The tax paid by...

  2. 77 FR 15351 - Federal Motor Vehicle Safety Standards; Theft Protection and Rollaway Prevention

    Science.gov (United States)

    2012-03-15

    ... [Docket No. NHTSA-2011-0174] RIN 2127-AK88 Federal Motor Vehicle Safety Standards; Theft Protection and... (NPRM) to amend Federal Motor Vehicle Safety Standard (FMVSS) No. 114, Theft Protection and Rollaway... requesting that certain information, including vehicle owner questionnaires (VOQs) referenced in the NPRM, be...

  3. 75 FR 34526 - Ford Petition for Exemption From the Vehicle Theft Prevention Standard; Correction

    Science.gov (United States)

    2010-06-17

    ... Exemption From the Vehicle Theft Prevention Standard; Correction AGENCY: National Highway Traffic Safety..., granting in full Ford Motor Company's (Ford) petition for an exemption of its new Explorer vehicle line in accordance with 49 CFR part 543, Exemption from the Theft Prevention Standard. This document corrects certain...

  4. Dutch Supreme Court 2012: Virtual Theft Ruling a One-Off or First in a Series?

    NARCIS (Netherlands)

    Lodder, A.R.

    2013-01-01

    In January 2012 the Dutch Supreme Court decided that virtual objects and pre-paid accounts can be stolen. This paper examines the Supreme Court’s Runescape decision and discusses virtual theft. Virtual theft is legally interesting from various perspectives. First, the rules of Runescape do not allow

  5. 31 CFR 328.8 - Loss, theft, or destruction of securities bearing restrictive endorsements.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Loss, theft, or destruction of securities bearing restrictive endorsements. 328.8 Section 328.8 Money and Finance: Treasury Regulations... DEBT RESTRICTIVE ENDORSEMENTS OF U.S. BEARER SECURITIES § 328.8 Loss, theft, or destruction of...

  6. 16 CFR Appendix E to Part 698 - Summary of Consumer Identity Theft Rights

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Summary of Consumer Identity Theft Rights E Appendix E to Part 698 Commercial Practices FEDERAL TRADE COMMISSION THE FAIR CREDIT REPORTING ACT MODEL FORMS AND DISCLOSURES Pt. 698, App. E Appendix E to Part 698—Summary of Consumer Identity Theft Rights...

  7. Exploring the Identity-Theft Prevention Efforts of Consumers in the United States

    Science.gov (United States)

    Lewis, Jacquelyne L.

    2011-01-01

    Identity theft is quite expensive and devastating for victims; unfortunately, it is also a rapidly growing crime. Much of the prior research on identity theft has focused on legislative efforts that may prevent the crime. However, limited research exists on what consumers perceive as identity prevention and the measures they take to prevent…

  8. 77 FR 22383 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA

    Science.gov (United States)

    2012-04-13

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; TESLA AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Tesla Motors Inc's. (Tesla) for an... 49 CFR Part 541, Federal Motor Vehicle Theft Prevention Standard. Tesla requested confidential...

  9. Copper wire theft and high voltage electrical burns

    Science.gov (United States)

    Francis, Eamon C; Shelley, Odhran P

    2014-01-01

    High voltage electrical burns are uncommon. However in the midst of our economic recession we are noticing an increasing number of these injuries. Copper wire is a valuable commodity with physical properties as an excellent conductor of electricity making it both ubiquitous in society and prized on the black market. We present two consecutive cases referred to the National Burns Unit who sustained life threatening injuries from the alleged theft of high voltage copper wire and its omnipresence on an international scale. PMID:25356371

  10. 75 FR 1447 - Petition for Exemption From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical...

    Science.gov (United States)

    2010-01-11

    ... From the Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc. AGENCY: National... equipment is likely to be as effective in reducing and deterring motor vehicle theft as compliance with the... pursuant to 49 CFR part 543, Exemption from Vehicle Theft Prevention Standard, based on the installation of...

  11. 75 FR 6253 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia...

    Science.gov (United States)

    2010-02-08

    ... From the Federal Motor Vehicle Theft Prevention Standard; Hyundia-Kia America Technical Center, Inc..., Exemption from Vehicle Theft Prevention Standard. This petition is granted because the agency has determined... in reducing and deterring motor vehicle theft as compliance with the parts-marking requirements of 49...

  12. 7 CFR 1779.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation..., theft, destruction, mutilation, or defacement of Loan Note Guarantee or Assignment Guarantee Agreement... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  13. 7 CFR 1901.509 - Loss, theft, destruction, mutilation, or defacement of insured notes, insurance contracts, and...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Loss, theft, destruction, mutilation, or defacement... Notes § 1901.509 Loss, theft, destruction, mutilation, or defacement of insured notes, insurance... writing. (iv) A full statement of circumstances of the loss, theft, or destruction of the note. (2) An...

  14. 49 CFR Appendix C to Part 541 - Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates

    Science.gov (United States)

    2010-10-01

    ... Likely To Have High Theft Rates C Appendix C to Part 541 Transportation Other Regulations Relating to... MOTOR VEHICLE THEFT PREVENTION STANDARD Pt. 541, App. C Appendix C to Part 541—Criteria for Selecting Light Duty Truck Lines Likely To Have High Theft Rates Scope These criteria specify the factors the...

  15. 19 CFR 158.21 - Allowance in duties for casualty, loss, or theft while in Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Allowance in duties for casualty, loss, or theft... LOST, DAMAGED, ABANDONED, OR EXPORTED Casualty, Loss, or Theft While in Customs Custody § 158.21 Allowance in duties for casualty, loss, or theft while in Customs custody. Section 563(a), Tariff Act of...

  16. 7 CFR 3575.73 - Replacement of loss, theft, destruction, mutilation, or defacement of Loan Note Guarantee or...

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Replacement of loss, theft, destruction, mutilation... AGRICULTURE GENERAL Community Programs Guaranteed Loans § 3575.73 Replacement of loss, theft, destruction... circumstances of the loss, theft, or destruction of the Loan Note Guarantee or Assignment Guarantee Agreement...

  17. 75 FR 38168 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-07-01

    ... Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines Subject to the Requirements of... light-duty truck lines subject to the requirements of the Federal motor vehicle theft prevention... exemption from the parts marking requirements of the Theft Prevention Standard for the Jaguar XJ vehicle...

  18. Vehicle Theft Identification and Intimation Using GSM & IOT

    Science.gov (United States)

    Eswar Kumar, M.; Thippa Reddy, G.; Sudheer, K.; Reddy, M. Praveen Kumar; Kaluri, Rajesh; Singh Rajput, Dharmendra; Lakshmanna, Kuruva

    2017-11-01

    Internet of Things is the most predominant innovation associates the things through web. IoT is a technology which interfaces things from different places on the planet. Home mechanization is a wide range innovation in IoT technology on the planet. Home automation constitutes in security issues, controlling gadgets and so on. In existing model, the vehicle theft is distinguished and controlled by physically with GSM module. Furthermore, there are a few in controlling the vehicle is major issue for owner from theft. Here in this paper a technique described to overcome issue of existing one. In this the vehicle is identified, controlled and connected updates with Internet in a simple way. By utilization of AT commands of GSM module a message will be send to the owner that the vehicle is recognized. Action can be taken by sending a reply to GSM module to stop motor of vehicle. Arduino uno board is used to interface the GSM and engine of vehicle with appropriate sensors. Visual studio, Arduino uno are the programming software used to outline this application.

  19. Information on the thefts committed in the Pays de Gex

    CERN Multimedia

    2007-01-01

    A large number of e-mails are currently circulating regarding thefts committed in the Pays de Gex. At CERN's request, the French authorities have provided the following information: A few armed robberies, muggings and attacks at private houses were committed in the Pays de Gex in December 2006 and January 2007. As a result, a night squad has been set up to supplement the Gendarmerie's Peloton de Surveillance et d'Intervention de la Gendarmerie (PSIG) in order to reinforce the visibility of the police presence. In this context, the Authorities point out that the number of crimes and offences committed in the Pays de Gex in 2006 dropped by 16% (this figure also relates to thefts and includes break-ins). If you notice people acting suspiciously, you are advised to notify the Gendarmerie immediately (the emergency telephone number in France is 17) and to make a note of the number and appearance of the persons concerned (height, age, hair colour, build, clothing, distinguishing features, etc.), as well as t...

  20. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  1. The determinants of electricity theft: An empirical analysis of Indian states

    International Nuclear Information System (INIS)

    Gaur, Vasundhara; Gupta, Eshita

    2016-01-01

    More than 20% of the electricity generated in India is lost to rampant thefts. Drawing data from 28 states of India over a time span of five years (2005–2009), this paper examines the role played by socio-economic and governance factors in determining the extent of electricity thefts in Indian states. Results from the Feasible Generalised Least Squares (FGLS) model demonstrate that lesser corruption, higher state tax to GDP ratio, greater collection efficiency of electricity bills by state utilities, higher share of private installed capacity, lesser poverty, greater literacy and greater income are closely associated with lesser power thefts. A better understanding of the key determinants of thefts in electricity distribution is vital for policy makers for designing policies. - Highlights: •Over 20% of total electricity generated in India is lost to thefts. •The study attempts to identify the determinants of electricity theft in India. •Use of panel data from 2005 to 2009 for 28 Indian states. •FGLS and OLS regression results are compared. •The determinants of power theft are both governmental and socio-economic in nature.

  2. The Role of Self-esteem in Tendency towards Drugs, Theft and Prostitution.

    Science.gov (United States)

    Alavi, Hamid Reza

    2011-01-01

    Addiction, theft and Prostitution are of the most important problems of contemporary society. On the other hand, self-esteem is one of the most important variables and concepts that might have a meaningful influence on these problems. This study aims to investigate the role of self-esteem in the individuals' tendency to addiction, theft and prostitution in Kerman city, Iran. The statistical population of this study is those individuals who had a record of addiction, theft and prostitution in Kerman prison, and the ordinary individuals. The research sample consisted of 300 individuals, 200 of whom were those with record of addiction, theft and prostitution in the central prison of Kerman city, and 100 ordinary people. Because some of the research questionnaires were not returned, only 283 questionnaires were analyzed. The instrument for determining the respondents' self-esteem was Eysenck Self-esteem Inventory. Self-esteem had a meaningful role in the individual's tendency to addiction, theft and prostitution. On the basis of the research results, it can be concluded that those who are involved in addiction, theft and prostitution have a lower self-esteem compared with the ordinary person. Thus, it is necessary to increase an individual's self-esteem in order to decrease their tendency to addiction, theft and prostitution.

  3. Well-Being and Functioning at Work Following Thefts and Robberies: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Ilaria Setti

    2018-02-01

    Full Text Available Thefts and robberies may be traumatizing experiences for employees. The aim of this study is to explore to what extent experiencing robberies and/or thefts at work affect workers' mental health, coping-self-efficacy, social support seeking, workload and job satisfaction. Drawing on Conservation of Resources theory, this research contributes to our understanding of the psychological sequelae of robbery and theft for employees working in small businesses. The few studies on the effects of robberies and thefts in the past have predominantly focused on bank employees. A sample of Italian tobacconists and jewelers completed an anonymous self-report questionnaire examining the experience of robbery and/or theft, social support seeking (Coping Orientation to Problem Experienced scale, COPE-IV, psycho-somatic well-being (General Health Questionnaire, GHQ-12, job satisfaction (a single item. Victims of thefts and/or robberies reported their PTSD symptoms (Impact of Event- Revised 6, IES-R-6 and trauma-related coping self-efficacy (Coping Self-Efficacy scale, CSE-7, based on the last event (N = 319. Descriptive analyses, ANOVA, ANCOVA and multiple regressions analyses have been carried out. The results indicated that victims of thefts and robberies experienced greater workload, higher psycho-physical complaints and greater tendency to seek social support in comparison with their non-affected counterparts. They additionally experienced more post-traumatic symptomatology and perceived lower coping self-efficacy, when compared to those who experienced thefts “only.” Multiple regression analyses revealed that CSE was positively related to job satisfaction, although the presence of psycho-physical symptoms was the main predictor of job satisfaction among both non-affected and affected employees. PTSD was not an independent predictor of job satisfaction. In sum, robberies and/or thefts exposure undermines differently workers' well-being.

  4. A Low-Cost Vehicle Anti-Theft System Using Obsolete Smartphone

    OpenAIRE

    Liu, Bang; Liu, Nianbo; Chen, Guihai; Dai, Xili; Liu, Ming

    2018-01-01

    In modern society, vehicle theft has become an increasing problem to the general public. Deploying onboard anti-theft systems could relieve this problem, but it often requires extra investment for vehicle owners. In this paper, we propose the idea of PhoneInside, which does not need a special device but leverages an obsolete smartphone to build a low-cost vehicle anti-theft system. After being fixed in the vehicle body with a car charger, the smartphone can detect vehicle movement and adaptiv...

  5. Investigation of natural gas theft by magnetic remanence mapping.

    Science.gov (United States)

    Dobó, Zsolt; Kovács, Helga; Tóth, Pál; Palotás, Árpád B

    2014-12-01

    Natural gas theft causes major losses in the energy industry in Hungary. Among the non-technical losses occurring in natural gas networks, fraudulent residential consumption is one of the main factors. Up to 2014, gas meters that are most widely used in residential monitoring are manufactured with ferromagnetic moving components, which makes it possible to alter or disrupt the operation of the meters non-intrusively by placing permanent magnets on the casing of the meters. Magnetic remanence mapping was used to investigate a sample of 80 recalled residential meters and detect potentially fraudulent activity. 10% of the meters were found suspect by magnetic remanence measurement, of which 50% were confirmed to be potentially hijacked by further mechanical investigation. The details of the technique are described in this paper, along with experimental results and the discussion of the analysis of the real-world samples. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. 77 FR 65765 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-10-30

    ... the vehicle. The antenna module translates the radio frequency signal received from the key into a... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  7. 77 FR 25534 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General...

    Science.gov (United States)

    2012-04-30

    ... response back to the vehicle. The antenna module translates the radio frequency signal received from the... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; General Motors Corporation AGENCY...

  8. 78 FR 77790 - Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors...

    Science.gov (United States)

    2013-12-24

    ... vehicle. The antenna module translates the radio frequency signal received from the key into a digital... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Theft Prevention Standard; General Motors Corporation AGENCY: National...

  9. 75 FR 71184 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; BMW AGENCY: National Highway Traffic Safety Administration... changes to prevent an unauthorized person from opening the vehicle by intercepting the signals of its...

  10. Identity Theft: Greater Awareness and Use of Existing Data Are Needed

    National Research Council Canada - National Science Library

    2002-01-01

    This report responds to your request that we review federal and state efforts to address identity theft, which has been characterized by law enforcement as the fastest growing type of crime in the United States...

  11. The Faustian bargain-hazards of theft and sabotage: Nuclear proliferation

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    It is argued that the fissionable material in nuclear reactors, fuel reprocessing plants, waste storage facilities and that contained in the shipments of radioactive waste are vulnerable to sabotage and theft. (R.L.)

  12. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: IV

    National Research Council Canada - National Science Library

    2001-01-01

    .... In Experiments 1 and 2 two groups of 16 participants who were assigned to be either guilty or innocent of the mock theft of a ring were tested using the Zone Comparison Test, a PDD examination taught...

  13. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Directory of Open Access Journals (Sweden)

    Lucy Waruguru Mburu

    Full Text Available Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  14. Environmental Risk Factors influencing Bicycle Theft: A Spatial Analysis in London, UK.

    Science.gov (United States)

    Mburu, Lucy Waruguru; Helbich, Marco

    2016-01-01

    Urban authorities are continuously drawing up policies to promote cycling among commuters. However, these initiatives are counterproductive for the targeted objectives because they increase opportunities for bicycle theft. This paper explores Inner London as a case study to address place-specific risk factors for bicycle theft at the street-segment level while controlling for seasonal variation. The presence of certain public amenities (e.g., bicycle stands, railway stations, pawnshops) was evaluated against locations of bicycle theft between 2013 and 2016 and risk effects were estimated using negative binomial regression models. Results showed that a greater level of risk stemmed from land-use facilities than from area-based socioeconomic status. The presence of facilities such as train stations, vacant houses, pawnbrokers and payday lenders increased bicycle theft, but no evidence was found that linked police stations with crime levels. The findings have significant implications for urban crime prevention with respect to non-residential land use.

  15. Increased sales and thefts of candy as a function of sales promotion activities: Preliminary findings.

    Science.gov (United States)

    Carter, N; Kindstedt, A; Melin, L

    1995-01-01

    We used an A-B-A design to evaluate the effects of two commonly used promotional activities-price reduction and increased exposure, in combination and separately-on sales and thefts of candy at a grocery store. The combination of activities and the increased exposure condition produced the greatest increases in sales. The combination of activities was also associated with the greatest increase in thefts.

  16. Tricks of the trade: Mechanism of brood theft in an ant.

    Science.gov (United States)

    Paul, Bishwarup; Annagiri, Sumana

    2018-01-01

    Thievery is ubiquitous in the animal kingdom, social insects not being an exception. Brood is invaluable for the survival of social insect colonies and brood theft is well documented in ants. In many species the stolen brood act as slaves in the thief colony as they take up tasks related to foraging, defence and colony maintenance. Slave-making (dulotic) ants are at an advantage as they gain workforce without investing in rearing immature young, and several slave-making species have been recorded in temperate regions. In the current study we investigate brood theft in a primitively eusocial ponerine ant Diacamma indicum that inhabits the tropics. In the context of colony relocation we asked how thieves steal brood and what victim colonies do to prevent theft. While exposed nests increased colonies' vulnerability, the relocation process itself did not enhance the chances of theft. Various aggressive interactions, in particular immobilization of intruders helped in preventing theft. Thieves that acted quickly, stayed furtive and stole unguarded brood were found to be successful. This comprehensive study of behavioural mechanism of theft reveals that these are the 'tricks' adopted by thieves.

  17. The neurocognition of conduct disorder behaviors: specificity to physical aggression and theft after controlling for ADHD symptoms.

    Science.gov (United States)

    Barker, Edward D; Tremblay, Richard E; van Lier, Pol A C; Vitaro, Frank; Nagin, Daniel S; Assaad, Jean-Marc; Séguin, Jean R

    2011-01-01

    There is growing evidence that among the different conduct disorder (CD) behaviors, physical aggression, but not theft, links to low neurocognitive abilities. Specifically, physical aggression has consistently been found to be negatively related to neurocognitive abilities, whereas theft has been shown to be either positively or not related to neurocognition. The specificity of these links needs further examination because attention deficit hyperactivity disorder (ADHD) links to both physical aggression and neurocognitive variation. The development of self-reported physical aggression and theft, from age 11 to 17 years, was studied in a prospective at-risk male cohort via a dual process latent growth curve model. Seven neurocognitive tests at age 20 were regressed on the growth parameters of physical aggression and theft. The links between neurocognition and the growth parameters of physical aggression and theft were adjusted for ADHD symptoms at ages 11 and 15 (parent, child and teacher reports). Results indicated that verbal abilities were negatively related to physical aggression while they were positively associated with theft. However, inductive reasoning was negatively associated with increases in theft across adolescence. Symptoms of ADHD accounted for part of the neurocognitive test links with physical aggression but did not account for the associations with theft. These differences emphasize the importance of examining specific CD behaviors to better understand their neurodevelopmental mechanisms. They also suggest that youth who engage in different levels of physical aggression or theft behaviors may require different preventive and corrective interventions. © 2010 Wiley-Liss, Inc.

  18. Medical identity theft: prevention and reconciliation initiatives at Massachusetts General Hospital.

    Science.gov (United States)

    Judson, Timothy; Haas, Mark; Lagu, Tara

    2014-07-01

    Medical identity theft refers to the misuse of another individual's identifying medical information to receive medical care. Beyond the financial burden on patients, hospitals, health insurance companies, and government insurance programs, undetected cases pose major patient safety challenges. Inaccuracies in the medical record may persist even after the theft has been identified because of restrictions imposed by patient privacy laws. Massachusetts General Hospital (MGH; Boston) has conducted initiatives to prevent medical identity theft and to better identify and respond to cases when they occur. Since 2007, MGH has used a notification tree to standardize reporting of red flag incidents (warning signs of identity theft, such as suspicious personal identifiers or account activity). A Data Integrity Dashboard allows for tracking and reviewing of all potential incidents of medical identity theft to detect trends and targets for mitigation. An identity-checking policy, VERI-(Verify Everyone's Identity) Safe Patient Care, requires photo identification at every visit and follow-up if it is not provided. Data from MGH suggest that an estimated 120 duplicate medical records are created each month, 25 patient encounters are likely tied to identity theft or fraud each quarter, and 14 patients are treated under the wrong medical record number each year. As of December 2013, 80%-85% of patients were showing photo identification at appointments. Although an organization's policy changes and educational campaigns can improve detection and reconciliation of medical identity theft cases, national policies should be implemented to streamline the process of correcting errors in medical records, reduce the financial disincentive for hospitals to detect and report cases, and create a single point of entry to reduce the burden on individuals and providers to reconcile cases.

  19. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Darius Štitilis

    2013-08-01

    Full Text Available The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration as it is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft. In this article it is

  20. Developmental Links between Trajectories of Physical Violence, Vandalism, Theft, and Alcohol-Drug Use from Childhood to Adolescence

    Science.gov (United States)

    van Lier, Pol A. C.; Vitaro, Frank; Barker, Edward D.; Koot, Hans M.; Tremblay, Richard E.

    2009-01-01

    Differences in developmental trajectories of physical violence, vandalism, theft, and alcohol-drug use from ages 10 to 15 were studied. For females and for males, three trajectories of theft and of alcohol-drug use increased from 10 years to 15 years, while only the high trajectory of vandalism increased from ten to 14. All trajectories of…

  1. 20 CFR 632.124 - Theft or embezzlement from employment and training funds; improper inducement; obstruction of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Theft or embezzlement from employment and training funds; improper inducement; obstruction of investigations and other criminal provisions. 632.124... NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Prevention of Fraud and Program Abuse § 632.124 Theft or...

  2. A Real Time Approach to Theft Prevention in the field of Transportation System

    Directory of Open Access Journals (Sweden)

    Vartika Mehta

    2016-06-01

    Full Text Available This paper report discusses a theft prevention system, which can prevent the theft and also can be track the object. This system is capable to tracking the vehicle as well as theft prevention. An R.F. module is use to exchange the information regarding vehicle and owner of the vehicle with police control room or SOS services. The vehicle can be track with the help of R.F. receiver. A DTMF based fuel lock has been attached in this system. A cell phone with SIM card has been attached with DTMF IC. The fuel flow in the vehicle can be controlled by give a call to this cell phone. This system has been controlled by a microcontroller which can make the system cost effective, low power consumption, effective and reliable.

  3. Taking aim at medical identity theft. Document security key element to comply with government regulations.

    Science.gov (United States)

    Raymond, Colette

    2010-01-01

    Sensitive paper documents, such as patient records, customer data, and legal information, must be securely stored and destroyed when no longer needed. This is not only a good business practice that reduces costs and protects reputations, but also a legal and regulatory imperative. According to some experts, medical identity theft is the fastest-growing form of identity theft in North America. The Federal Trade Commission's Red Flags Rule, due to take effect June 1, 2010, requires banks; credit card companies; and, in some situations, retailers, hospitals, insurance companies, health clinics, and other organizations to store confidential personal information that can expose consumers to significant identity theft risks. This also includes healthcare providers and other organizations that are considered creditors according to their billing/payment procedures. This article highlights the steps healthcare providers must take to ensure data security.

  4. Compulsory declaration of the disappearance, loss or theft of property and of serious events

    CERN Multimedia

    DG Unit

    2009-01-01

    Change The rules governing internal and external declarations have been modified as follows. Incidents concerning CERN access cards and CERN vehicle stickers must be reported as follows: in the case of theft, to the competent authorities of the country in which the theft was committed; in the case of loss or disappearance, to the Reception and Access Control Service. The Services responsible for issuing replacement documents will henceforth require the presentation of proof of declaration to the competent authorities (in the case of theft) or a declaration by the holder of the card or sticker, signed on his/her honour (in the case of loss). In both cases specific reference to the card or sticker concerned must be made. Relations with the Host States Service Tel.: 72848 mailto:relations.secretariat@cern.ch

  5. 49 CFR 542.1 - Procedures for selecting new light duty truck lines that are likely to have high or low theft rates.

    Science.gov (United States)

    2010-10-01

    ... lines that are likely to have high or low theft rates. 542.1 Section 542.1 Transportation Other... OF TRANSPORTATION PROCEDURES FOR SELECTING LIGHT DUTY TRUCK LINES TO BE COVERED BY THE THEFT... or low theft rates. (a) Scope. This section sets forth the procedures for motor vehicle manufacturers...

  6. 41 CFR 301-10.451 - May I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance?

    Science.gov (United States)

    2010-07-01

    ... the cost of collision damage waiver (CDW) or theft insurance? 301-10.451 Section 301-10.451 Public... I be reimbursed for the cost of collision damage waiver (CDW) or theft insurance? (a) General rule—no. You will not be reimbursed for CDW or theft insurance for travel within CONUS for the following...

  7. On roots and nature of the normative regulation of the criminal offence of theft in the tradition of Tsar Dusan legislation

    Directory of Open Access Journals (Sweden)

    Vujović Ognjen B.

    2015-01-01

    Full Text Available In this paper the comparison between several norms of the Crimi­nal Offence of Theft in the tradition of Tsar Dusan legislation and certain provisions of the Roman law was performed. On this occa­sion, the issue of robbery, theft of fruits and complicity to theft were treated in particular.

  8. The tariff for fire and theft car insurance: analysis with a Cox model

    OpenAIRE

    Bruno Scarpa

    2013-01-01

    In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle t...

  9. The tariff for fire and theft car insurance: analysis with a Cox model

    Directory of Open Access Journals (Sweden)

    Bruno Scarpa

    2013-05-01

    Full Text Available In this paper we analyze the problem of identification of a tariff for a Fire & Theft Car policy for Insurance Companies. Usually companies obtain this tariff by empirical estimate of the pure rate by evaluating the impact of some personalization variables. In this paper we propose the usage of a semi-parametric Cox model, where the response variable is not the waiting time until an event, but the degree of damage because of theft or fire of a car. The proposed model allows to easily tackle typical problems in data available to the companies, like the presence of franchises, which are treated as censored data.

  10. Unusual Suspects: The Case of Insider Theft in Research Libraries and Special Collections

    Science.gov (United States)

    Samuelson, Todd; Sare, Laura; Coker, Catherine

    2012-01-01

    The widespread theft of collection materials, including rare and unique items, continues to be an issue of great concern to libraries of all types. The potential loss of such items threatens not only an institution's operations but, in many cases, global cultural heritage. Despite an increasingly open attitude among institutions regarding sharing…

  11. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Directory of Open Access Journals (Sweden)

    Daniel Nettle

    Full Text Available Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks.We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98, a large effect compared to other place-based crime prevention interventions.The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  12. 'Cycle thieves, we are watching you': impact of a simple signage intervention against bicycle theft.

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of 'watching eyes' has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04-8.98), a large effect compared to other place-based crime prevention interventions. The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending.

  13. The role of the family economy in theft in Chaharmahal and Bakhtiari ...

    African Journals Online (AJOL)

    Security establishment without doubt is one of the main objectives in the management of any society in which crime creates instability and imposes costs to society, ... This study, which was conducted on 108 prisoners committed to robbery, by the same token attempts to test the role of home economics in the crime of theft in ...

  14. 78 FR 4193 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo

    Science.gov (United States)

    2013-01-18

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Volvo AGENCY: National Highway Traffic... transponder is not identified, the CEM will not send an approved key signal to the IAU and the vehicle will be...

  15. 75 FR 31837 - Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz

    Science.gov (United States)

    2010-06-04

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Mercedes-Benz AGENCY: National Highway Traffic Safety... carried out by radio signal. The unlocking signal from the remote key sends a message to the vehicle's...

  16. 76 FR 36615 - Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Nissan AGENCY: National Highway Traffic Safety... signal to inform the vehicle owner as to the status of the immobilizer device. When the ignition key is...

  17. Come diventare una Rockstar. Gli Houser e l’evoluzione del franchise Grand Theft Auto.

    Directory of Open Access Journals (Sweden)

    Federico Giordano

    2013-03-01

    Full Text Available Wanted. La storia criminale di Grand Theft Auto, Multiplayer, 2012, il libro scritto da David Kushner, giornalista e docente universitario già autore del precedente, molto apprezzato, Master of Doom, è un testo importante per gli studi sui videogiochi, nonostante non si presenti in apparenza – a partire dal titolo evocativo – come testo accademico.

  18. 77 FR 4396 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2012-01-27

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic... exemption. SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota.... SUPPLEMENTARY INFORMATION: In a petition dated September 30, 2011, Toyota requested an exemption from the parts...

  19. 78 FR 3081 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2013-01-15

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full Toyota Motor North America, Inc.'s (Toyota) petition for an... a petition dated October 16, 2012, Toyota requested an exemption from the parts-marking requirements...

  20. 76 FR 12221 - Petition for Exemption From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota

    Science.gov (United States)

    2011-03-04

    ... From the Federal Motor Vehicle Motor Theft Prevention Standard; Toyota AGENCY: National Highway Traffic.... SUMMARY: This document grants in full the petition of Toyota Motor North America, Inc's., (Toyota... INFORMATION: In a petition dated January 24, 2011, Toyota requested an exemption from the parts-marking...

  1. Theft of virtual items in online multiplayer computer games: an ontological and moral analysis

    NARCIS (Netherlands)

    Strikwerda, Litska

    2012-01-01

    In 2009 Dutch judges convicted several minors for theft of virtual items in the virtual worlds of online multiplayer computer games. From a legal point of view these convictions gave rise to the question whether virtual items should count as “objects” that can be “stolen” under criminal law. This

  2. Theft detection and smart metering practices and expectations in the Netherlands

    NARCIS (Netherlands)

    Kadurek, P.; Blom, J.H.; Cobben, J.F.G.; Kling, W.L.

    2010-01-01

    This paper provides insight into the illegal use or abstraction of electricity in the Netherlands. The importance and the economic aspects of theft detection are presented and the current practices and experiences are discussed. The paper also proposes a novel methodology for automated detection of

  3. Evaluation of Residential Consumers Knowledge of Wireless Network Security and Its Correlation with Identity Theft

    Science.gov (United States)

    Kpaduwa, Fidelis Iheanyi

    2010-01-01

    This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…

  4. Risk factors for delusion of theft in patients with Alzheimer's disease showing mild dementia in Japan.

    Science.gov (United States)

    Murayama, N; Iseki, E; Endo, T; Nagashima, K; Yamamoto, R; Ichimiya, Y; Arai, H; Sato, K

    2009-07-01

    The mechanism underlying delusion in Alzheimer's disease patients has not been fully clarified; however, the occurrence of delusion is a critical issue for dementia patients and their caregivers. In Japan, delusion of theft is the most frequent delusion in AD patients. We examined the risk factors for delusion of theft in AD patients showing mild dementia. Fifty-six AD patients were administered HDS-R, MMSE and COGNISTAT, including the 'speech sample', to assess their neuropsychological and social cognitive functions. The age, years of education, presence of cohabiting family members and premorbid personality traits were obtained from family members. About 25.0% of AD patients showed delusion of theft (D-group), and 75% did not (non-D-group). About 33.3% of female patients and 5.9% of male patients were included in the D-group (p theft in AD patients was related to female gender, absence of cohabiting family members, neurotic personality and retained social cognitive function.

  5. Growing trend of identity theft poses safety and billing loss threats.

    Science.gov (United States)

    2010-08-01

    Identity theft is more than just a legal issue. Patients with improper identification are at risk for receiving potentially harmful treatment. Have registration department require photo identification from all patients. Ask additional questions, such as the patient's date of birth. Ask staff members to be the "eyes and ears" of registration and security, and ask them to report anything suspicious.

  6. 浅论盗窃罪的未遂%On the Attempted Crime of Theft

    Institute of Scientific and Technical Information of China (English)

    黄崇河

    2015-01-01

    With regard to the form of attempted theft in the act of stealing,the understanding and prac-tice of it in the j udicial practice vary.The recognition of the attempted theft is a difficult point in the crime of theft,and it is also involved in the criminal law and the relevant j udicial interpretations.Accord-ing to the provisions of the criminal law,the penalty of attempted theft crime can be contrasted with the theft of accomplished crime,and the penalty may be less severe or mitigated.The provision on the ele-ments of attempted burglary is very important to identify the attempted form.This article briefly analy-zes the qualitative and the penalty of the attempted theft cases,which plays the role of reference for the use and implementation of the law on the attempted theft cases.It aims at carrying out the basic principle of criminal law———legal punishment for a specified crime,suiting punishment to crime,and making peo-ple feel the impartial handling of the case.%盗窃实施行为中的盗窃犯罪未遂形态,在司法实践中理解和做法不一。盗窃未遂的认定是盗窃犯罪中的难点,刑法和相关司法解释中也多有涉及。根据刑法的规定,盗窃犯罪未遂的处罚,可以比照盗窃既遂犯,从轻或者减轻处罚。盗窃未遂构成要件的规定,对未遂形态的认定很重要。本文从盗窃未遂案件定性及处罚进行简要分析,为盗窃未遂案件的法律使用和实施起到参考作用。以便更好贯彻罪刑法定、罪刑相适应的刑法基本原则,让人民群众感受到案件的公正处理。

  7. Kradzieze samochodow w Polsce jako element ryzyka w ubezpieczeniach auto casco/Car Theft in Poland as a Part of the Risk in Auto Accident and Theft Insurance Approach to the Issue of Social Elites

    OpenAIRE

    Stanislaw Wieteska

    2015-01-01

    The problem of car theft has been observed for many years. The largest scale of this phenomenon occurred in the 1990’s. In this paper, the issue is discussed in social, ethical and economic aspects. We present the scale of the phenomenon of the theft of passenger vehicles in Poland in the years 2001–2012 in terms of the number of vehicles, type of stolen vehicles and the accident areas. In addition, we present the cause of theft and selected ways to protect cars from it. We also briefly discu...

  8. Wage theft as a neglected public health problem: an overview and case study from San Francisco's Chinatown District.

    Science.gov (United States)

    Minkler, Meredith; Salvatore, Alicia L; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-06-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice.

  9. Wage Theft as a Neglected Public Health Problem: An Overview and Case Study From San Francisco’s Chinatown District

    Science.gov (United States)

    Salvatore, Alicia L.; Chang, Charlotte; Gaydos, Megan; Liu, Shaw San; Lee, Pam Tau; Tom, Alex; Bhatia, Rajiv; Krause, Niklas

    2014-01-01

    Wage theft, or nonpayment of wages to which workers are legally entitled, is a major contributor to low income, which in turn has adverse health effects. We describe a participatory research study of wage theft among immigrant Chinatown restaurant workers. We conducted surveys of 433 workers, and developed and used a health department observational tool in 106 restaurants. Close to 60% of workers reported 1 or more forms of wage theft (e.g., receiving less than minimum wage [50%], no overtime pay [> 65%], and pay deductions when sick [42%]). Almost two thirds of restaurants lacked required minimum wage law signage. We discuss the dissemination and use of findings to help secure and enforce a wage theft ordinance, along with implications for practice. PMID:24825200

  10. The Criminalization of the Theft of Trade Secrets:\\ud An Analysis of the Economic Espionage Act

    OpenAIRE

    Searle, Nicola

    2012-01-01

    This paper presents a law and economics assessment of how the elevation of the theft of trade secrets from civil malfeasance to a felony affects the incentives for both firms and potential thieves. The paper begins with theoretical analysis of the EEA and concludes with an empirical assessment of prosecutions under the EEA. In comparison to penalties used in civil cases, the new incentive of a criminal deterrent to trade secret theft introduces severe consequences, such as incarceration as a ...

  11. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence.

    Science.gov (United States)

    Gordon, Rachel A; Rowe, Hillary L; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P

    2014-06-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency.

  12. Serious Delinquency and Gang Participation: Combining and Specializing in Drug Selling, Theft and Violence

    Science.gov (United States)

    Gordon, Rachel A.; Rowe, Hillary L.; Pardini, Dustin; Loeber, Rolf; White, Helene Raskin; Farrington, David P.

    2014-01-01

    Using Pittsburgh Youth Study data, we examined the extent to which over 600 gang members and non-gang involved young men specialized in drug selling, serious theft, or serious violence or engaged simultaneously in these serious delinquent behaviors, throughout the 1990s. We found that the increase in delinquency associated with gang membership was concentrated in two combinations: serious violence and drug selling; serious violence, drug selling, and serious theft. Several covariates were similarly associated with multi-type serious delinquency and gang membership (age, historical time, Black race, and residential mobility), suggesting that these behaviors may share common developmental, familial, and contextual risks. We encourage future research to further examine the association of gang membership with engagement in particular configurations of serious delinquency. PMID:24954999

  13. Legal Environment Against Online Identity Theft: Comparative Analysis of USA’s and Lithuania’s Legislation

    Directory of Open Access Journals (Sweden)

    Paulius Pakutinskas

    2011-08-01

    Full Text Available Summary. The growth of the Internet and e-commerce has taken identity theft to new levels. Indeed, consumers, financial institutions and the whole economic suffer from online identity theft. This article analyses the legal environment which is concerned with online identity theft. The analysis is based on the comparison of two countries—USA’s and Lithuania’s— legislation, regulating such fields as personal data protection, electronic information security, identification, criminal liability and special legal acts, regulating online identity theft, because if all these fields are sufficiently regulated, the fight with online identity theft is more successful. The choice of the countries is based on the fact that USA has experience in fighting online identity theft while Lithuania is taken into a deeper consideration asit is a member of the European Union, the legal system of which has great differences in comparison to the USA. The analysis of legislation, regulating personal data protection, is based on comparison of the main requirements and principles of personal data protection, institutions which are responsible for personal data protection and liability for breaches of personal data protection rules. The authors of the present article also present similarities and differences of legal regulation of electronic information security in USA and Lithuania by comparing the institutional control of information security, main requirements for information security and liability for breaches of information security rules. Also, the variety of personal identity documents in the USA and Lithuania is analyzed, main personal identity documents are presented as well as regulation of online identity theft, elements and types of identification online are discussed. Moreover, criminal and special legislation of USA and Lithuania is taken into consideration in order to discuss and compare criminalization aspects of online identity theft.In this article

  14. A study for prevent theft of the bike design and analysis

    Science.gov (United States)

    Huang, Yu-Che; Huang, Tai-Shen

    2017-10-01

    This research will deal with the analysis and design of an anti-theft bicycle. At the first, the structure of the bicycle lock device will be focused. Therefore, all related academic journals, dissertations, and patent were collected, ordered, classified, and analysis in order to understand the phase of the developing tendency towards the bicycle lock apparatus presently. Nowadays, a wave of riding bicycles all over the world is quite prevailing. Also, the bicycles incline to be high-price sporting and recreational equipment. Due to this, the rate of stolen bicycles has increased as well. Even though there are many different types of bicycle locks sold on the market, they are unable to work out effectively to prevent from being stolen because they are easy to be broken. In this case, the target design in this research will be mainly put on the simple structure and facile use enabling users feeling secure to park their bicycles. The design also includes a lock that works together with the bicycle frame to provide a new option of anti-theft design for bicycles. We defined the functional requirements by the process of an innovative mechanical design, before designing the fundamental bicycle structure of the present anti-theft bicycle and finally integrate all the requirements of design. The SolidWorks software was used to draw a 3D model of the anti-theft bicycle; the ANSYS software was also used to do CAE analysis, to understand the distribution of stress, so that the design and the requirements of use are met.

  15. A Framework for Monitoring Electricity theft in Zimbabwe using Mobile Technologies

    OpenAIRE

    Samuel Musungwini

    2016-01-01

    The capabilities of mobile technology paradigm have indicated that almost every infrastructure, system or device has the potential to capture data and report it to the back-end system in real-time. Utilities need to deliver operational analytics by knowing what is happening across their entire infrastructure. The purpose of the study was to develop a framework for mobile technologies in monitoring electricity theft in Zimbabwe. Using a qualitative research in conjunction with the design scien...

  16. High-voltage electrical burns due to copper theft - Case series.

    Science.gov (United States)

    Braga, M J; Oliveira, I; Egipto, P; Silva, A

    2016-03-31

    Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring.

  17. High-voltage electrical burns due to copper theft – Case series

    Science.gov (United States)

    Braga, M.J.; Oliveira, I.; Egipto, P.; Silva, A.

    2016-01-01

    Summary Electrical burns are among the most devastating trauma inflicted on the human body. These burns have a higher morbidity, length of stay and a much higher risk of amputation than any other type of burn. Electrical burns affect mostly young, working males because they are more frequently the result of a work accident. However, possibly due to the worldwide economic crisis, we are experiencing a new phenomenon: the theft of high-voltage copper wiring. PMID:27857650

  18. IMPACT OF THE LOSS AND THEFT OF ELECTRONIC DATA ON COMPANIES

    Directory of Open Access Journals (Sweden)

    Stefan IOVAN

    2014-05-01

    Full Text Available Crimes committed via the Internet are no longer a novelty either for authorities and companies or for the general public, including potential victims. Transshipment of the human being to the virtual environment has not left out the bad habits and the propensity to steal of some people. On the contrary, it seems that the unprecedented development of the information technology [1] has given birth to a new category of dangerous criminals - those who steal by means of a computer not just huge amounts of money, but also ideas, data, identities and information from the most varied and unexpected areas. According to IT jargon, thefts via IT are those illegal activities by which the criminal(s causes (cause losses to those who store in the online environment personal information, saleable information, money or other valuables. Another “booming” category of Internet crime is the theft of identity. This is a serious crime that most often than not is targeted to stealing money. In today's society, we are often requested to disclose a great deal of personal information about who we are and what we do, such as our signature, address, passwords, phone numbers, and in particular information about our credit cards and the various banking services we use. The problem concerns not only the theft of data and information, but also the loss of data and information. This paper aims to tackle a few important aspects of this issue.

  19. Pattern of psychiatric morbidity among theft offenders remanded or referred for psychiatric evaluation and factors associated with reoffence.

    Science.gov (United States)

    Chan, Lai Gwen; Bharat, Saluja; Dani, Dhaval Kirti

    2013-06-01

    In Singapore, theft and related crimes constitute more than 50% of all reported crime, and are the most common offences committed by accused persons remanded to the Institute of Mental Health (IMH), Singapore. There is a need for better understanding of the forensic psychiatric aspects of such offenders. This study aimed to determine the prevalence of psychiatric disorders among theft offenders remanded or referred for forensic assessment in 2010, compare the differences between first-time and repeat theft offenders, and identify the factors associated with reoffence. Forensic evaluations of inpatient and outpatient theft offenders that were conducted at IMH in the year 2010 were retrieved and reviewed. The sociodemographic and clinical data of first-time and repeat theft offenders were collected and compared using Student's t-test and chi-square test for continuous and categorical variables, respectively. Multivariate regression was used to identify the factors that were predictive of repeat offence. Overall, 10% of offenders had no mental illness. Substance use disorders, mood disorders and psychotic disorders were the most common diagnoses. Psychotic disorders were significantly less common in repeat offenders. Repeat offenders also tended to have a history of conduct problems in childhood. Noncompliance with psychiatric treatment was positively associated with repeat offence, while psychotic disorders were negatively associated. The pattern of psychiatric morbidity among theft offenders in Singapore has changed over the last ten years. Kleptomania remains rare. Significant differences between first-time and repeat offenders have implications on the treatment, follow-up and rehabilitation of theft offenders in Singapore.

  20. Social norms, trust and control of power theft in Uganda: Does bulk metering work for MSEs?

    International Nuclear Information System (INIS)

    Never, Babette

    2015-01-01

    Power theft is still rampant in many developing countries. Governments and utility providers tend to favor technical solutions, neglecting the socio-economic dimension. This article analyzes the interaction between the socio-economic factors trust, informal social norms, awareness and electricity pricing effect and technical control measures in Uganda. After reforming its power sector, Uganda introduced two technical innovations: bulk metering for micro and small enterprises (MSE) and prepaid metering for households. The bulk metering system imposes a strong form of social control among MSEs. Drawing on semi-structured interviews with 29 MSEs and 16 experts in Uganda, this article shows how well bulk metering works in practice. It finds that trust is key in the relations between electricity user and utility provider, between citizens and government overseeing the energy sector as well as within bulk metering groups of MSEs. The electricity price impacts MSEs' ability to pay and to some extent also their willingness to pay. Finally, power theft used to be accepted as an informal social norm. Change is happening, but is currently undermined by corruption and patronage networks in the energy sector and the political system, impacting people's attitude to compliance – regardless of the privatization of the electricity sector. -- Highlights: •Socio-economic factors impact the control of power theft. •Bulk metering works well for those MSE groups with high trust and information. •Sub-meters need to be available and energy recordings possible. •Prepaid metering more suitable for areas with a lot of social tension. •Long-term norm change and social acceptance depends on perceptions of political economy

  1. The Effect of Electronic Devices Self-Efficacy, Electronic Devices Usage and Information Security Awareness on Identity-Theft Anxiety Level

    Science.gov (United States)

    Sanga, Sushma

    2016-01-01

    Identity-theft means stealing someone's personal information and using it without his or her permission. Each year, millions of Americans are becoming the victims of identity-theft, and this is one of the seriously growing and widespread issues in the U.S. This study examines the effect of electronic devices self-efficacy, electronic devices…

  2. With Due Consideration: Australian Human Service Practitioners' Understandings of Confidentiality and Disclosure Obligations in Regard to Cases Concerning Gambling-Related Theft

    Science.gov (United States)

    Patford, Janet; Tranent, Peter

    2013-01-01

    Preserving confidentiality is problematic for human service practitioners if they know that a client is seriously harming a third party or could do so in the future. The present study concerned financial harm, as generated by gambling-related theft. Clients who disclose gambling-related theft potentially create a dilemma for practitioners, who may…

  3. Protecting Personal Information in the Era of Identity Theft: Just how Safe is Our Personal Information from Identity Thieves?

    Directory of Open Access Journals (Sweden)

    Fawzia Cassim

    2015-07-01

    Full Text Available Identity theft has become one of the fastest growing white collar crimes in the world. It occurs when an individual's personal information such as inter alia his or her name, date of birth or credit card details is used by another individual to commit identity fraud. Identity theft can be committed via physical means or online. The increased use of the Internet for business and financial transactions, social networking and the storage of personal information has facilitated the work of identity thieves. Identity theft has an impact on the personal finances and emotional well-being of victims, and on the financial institutions and economies of countries. It presents challenges for law enforcement agencies and governments worldwide. This article examines how identity thieves use the personal information of individuals to commit identity fraud and theft, and looks at legislative solutions introduced in South Africa, the United States of America, the United Kingdom and India to combat identity theft crimes. The article examines measures introduced by the respective governments in these countries to counteract such crimes. Finally, the article will propose a way forward to counteract such crimes in the future. The study reveals that identity theft is a growing and evolving problem that requires a multi-faceted and multi-disciplinary approach by law enforcement agencies, businesses, individuals and collaboration between countries. It is advocated that businesses and institutions should take measures to protect personal information better and that individuals should be educated about their rights, and be vigilant and protect their personal information offline and in cyberspace.

  4. Minor Theft: Problems of the Initiation of a Case on an Administrative Offense and Conducting an Administrative Investigation

    Directory of Open Access Journals (Sweden)

    Oleg Y. Filippov

    2016-11-01

    Full Text Available The paper defines the problem of the initiation of an administrative case and conducting an administrative investigation on cases of identifying signs of minor theft under Art. 7.27 of the Code of Administrative Offences of the Russian Federation in cases where the identity of the offender at the time of committing minor theft is not established, this person is not detained. Guidance on the application of this provision under the existing legislation and on amendments and supplements to the law on administrative offenses is offered.

  5. Risk of being convicted of theft and other crimes in anorexia nervosa and bulimia nervosa: A prospective cohort study in a Swedish female population.

    Science.gov (United States)

    Yao, Shuyang; Kuja-Halkola, Ralf; Thornton, Laura M; Norring, Claes; Almqvist, Catarina; D'Onofrio, Brian M; Lichtenstein, Paul; Långström, Niklas; Bulik, Cynthia M; Larsson, Henrik

    2017-09-01

    We examined epidemiological associations between anorexia nervosa (AN) and bulimia nervosa (BN) and risks of committing theft and other crimes in a nationwide female population. Females born in Sweden during 1979-1998 (N = 957,106) were followed from age 15 for up to 20 years using information on clinically diagnosed AN and BN (exposures), convictions of theft and other crimes (outcomes), psychiatric comorbidities, and familial relatedness from Swedish national registers. We estimated hazard ratios (HRs) of criminality in exposed versus unexposed females using Cox proportional hazards regressions and explored how comorbidities and unmeasured familial factors explained the associations. The cumulative incidence of convictions of theft (primarily petty theft) and other crimes was higher in exposed females (AN: 11.60% theft, 7.39% other convictions; BN: 17.97% theft, 13.17% other convictions) than in unexposed females (∼5% theft, ∼6% other convictions). The significantly increased risk of being convicted of theft in exposed females (AN: HR = 2.51, 95% confidence interval = [2.29, 2.74], BN: 4.31 [3.68, 5.05]) was partially explained by comorbidities; unmeasured familial factors partially explained the association with convictions of theft in BN but not in AN. Females with BN had a doubled risk of convictions of other crimes, which was partially explained by comorbidities. Individuals with eating disorders had increased risk for convictions of theft and potentially other crimes. Results underscore the importance of regular forensic screening and encourage research on mechanisms underlying the relation between crime and eating disorder psychopathology and efforts to determine how best to address such relation in treatment. © 2017 Wiley Periodicals, Inc.

  6. Allosuckling in reindeer (Rangifer tarandus): milk-theft, mismothering or kin selection?

    Science.gov (United States)

    Engelhardt, Sacha C; Weladji, Robert B; Holand, Øystein; de Rioja, Covadonga M; Ehmann, Rosina K; Nieminen, Mauri

    2014-09-01

    Allosuckling, the suckling of offspring from females other than their own mother, has been reported in a number of mammalian species, including reindeer. The causes and function of this behaviour are still being investigated. We monitored 25 doe-calf pairs of semi-domestic reindeer Rangifer tarandus over 10 weeks to test three allosuckling/allonursing hypotheses: (1) milk theft, calves opportunistically allosuckle; (2) mismothering, misdirected maternal care; and (3) kin-selected allonursing. A calf soliciting an allosuckling bout was categorized as non-filial (NF), and a calf soliciting a suckling bout from its mother was categorized as filial (F). We recorded 9757 solicitations, of which 5176 were successful F bouts and 1389 were successful NF bouts. The rejection rates were greater for NF than F calves. The proportions of antiparallel positions adopted were greater for F than NF calves. The odds of an allobout were lower for calves arriving 1st, 3rd, 4th, 5th or 6th than for those arriving 2nd, but the odds did not vary with position adopted and relatedness. Our results provided support to the milk-theft hypothesis, whereas limited support for the mismothering hypothesis was found. Our results did not support the hypothesized kin selection function of allosuckling in reindeer. This article is part of a Special Issue entitled: insert SI title. Copyright © 2014 Elsevier B.V. All rights reserved.

  7. INTERFACING VISIBLE LIGHT COMMUNICATION WITH GSM NETWORKS TO PREVENT THE THEFT OF THE VEHICLE

    Directory of Open Access Journals (Sweden)

    P. Prabu

    2015-09-01

    Full Text Available Visible Light Communication (VLC by means of white Light Emitting Diode (LED is an alternate and most promising technology for existing Radio Frequency (RF communication. We proposed one of the important applications of VLC to prevent the theft of the vehicle. Every year approximately 36,000 vehicles worth Rs.115 crores are stolen in India. In critical road condition, only 15,000 are traced and many spare parts of vehicle are found missing. Even the existing technologies have some disadvantages related to the problem stated. In our paper, we dealt with the data communication through LED. One of the optical wireless communication having short range is called as VLC whose visible light spectrum starts from 380 nm and ends at 780 nm and it has an incomparable data rate of 10GB/s whereas the speed is 1MB/s on Bluetooth and for Infra Red (IR the speed is 4MB/s. We try to achieve the communication through VLC between 1 car - car to prevent the accident and 2 car - tollgate and received signal from tollgate is transmitted to Global System for Mobile communication (GSM network using microcontroller to prevent the theft of vehicle. To enhance the security of VLC, Advanced Encryption Standard (AES algorithm is used and the result is illustrated with the help of LabVIEW.

  8. RxPATROL: a Web-based tool for combating pharmacy theft.

    Science.gov (United States)

    Smith, Meredith Y; Graham, J Aaron; Haddox, J David; Steffey, Amy

    2009-01-01

    To report the incidence of pharmacy-related burglaries and robberies and characteristics of pharmacies where such crimes have occurred using recent data from Rx Pattern Analysis Tracking Robberies & Other Losses (RxPATROL), a national Web-based information clearinghouse on pharmacy-related theft of prescription medications and over-the-counter products. Descriptive, nonexperimental study. United States between 2005 and 2006. Not applicable. Not applicable. Number of pharmacy theft reports received; incident type, date, and location; point of entry; and pharmacy security features. Between 2005 and 2006, 202 pharmacy burglary and 299 pharmacy robbery reports from 45 different states were filed with RxPATROL. More than 70% of pharmacies reporting such crimes lacked a security camera. Among those reporting a burglary, 60% lacked dead bolt locks, a solid exterior door, a motion detector device, or a safe or vault for storage of controlled substances. Burglars most often obtained access to the pharmacy via the front door. RxPATROL is a Web-based tool that can assist pharmacies and law enforcement in collaborating more effectively to combat and prevent pharmacy-related crimes.

  9. 78 FR 21189 - Petition for Exemption From the Vehicle Theft Prevention Standard; BMW of North America, LLC

    Science.gov (United States)

    2013-04-09

    ... From the Vehicle Theft Prevention Standard; BMW of North America, LLC AGENCY: National Highway Traffic... device and allow the vehicle to start. When the EWS/CAS control unit has sent a correct release signal... and only then will the ignition signal and fuel supply be released. BMW stated that the vehicle is...

  10. 77 FR 65769 - Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc.

    Science.gov (United States)

    2012-10-30

    ... any of the protected components are violated, the horn will sound and the vehicle's turn signals will... DEPARTMENT OF TRANSPORTATION National Highway Traffic Safety Administration Petition for Exemption From the Vehicle Theft Prevention Standard; Volkswagen Group of America, Inc. AGENCY: National Highway...

  11. Will the Real Author Come Forward? Questions of Ethics, Plagiarism, Theft and Collusion in Academic Research Writing

    Science.gov (United States)

    Sikes, Pat

    2009-01-01

    This paper raises some questions about academic authorial honesty under the headings of Plagiarism (including self-plagiarism), Theft, and Collusion. Compared with the medical sciences, the social sciences in general and education specifically, lag behind in terms of critical attention being paid to the problem of plagiarism, the peer review…

  12. 76 FR 20251 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2012 Light Duty Truck Lines...

    Science.gov (United States)

    2011-04-12

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... all exemptions on our Web site. However, we believe that re-publishing a list containing vehicle lines...

  13. 77 FR 32903 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2013 Light Duty Truck Lines...

    Science.gov (United States)

    2012-06-04

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... exemptions on our Web site. However, we believe that republishing a list containing vehicle lines that have...

  14. 78 FR 44030 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2014 Light Duty Truck Lines...

    Science.gov (United States)

    2013-07-23

    ... vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers (VINs), VIN derivative... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  15. 75 FR 34946 - Federal Motor Vehicle Theft Prevention Standard; Final Listing of 2011 Light Duty Truck Lines...

    Science.gov (United States)

    2010-06-21

    ... the incidence of motor vehicle theft by facilitating the tracing and recovery of parts from stolen vehicles. The standard seeks to facilitate such tracing by requiring that vehicle identification numbers... continue to maintain a comprehensive database of all exemptions on our Web site. However, we believe that...

  16. 新型盗窃行为探析%An Analysis of the New types of Act of Theft

    Institute of Scientific and Technical Information of China (English)

    韩梅

    2013-01-01

    The 8th Amendment of the Criminal Law has added three new types act of theft, which makes the objective essentials of constituting crimes tend to be specific relatively. To study and discuss the new types of act of theft will be helpful for grasping the essence of theft and preventing such crimes more precisely. Indoor theft refers to an act entering relatively isolated residences of others’ living illegally to steal their properties. Theft with weapons refers to an act that the actor carrying the portable weapons banned in the country or other weapons to steal. Pick-pocketing refers to an act that the actor steals others’ properties in public places.%  《刑法修正案(八)》增加了三种新的盗窃行为类型,使盗窃罪的客观构成要件相对趋向于具体化。入户盗窃,是指非法进入他人生活的与外界相对隔离的住所窃取他人财物;携带凶器盗窃,是指行为人随身携带国家禁止个人携带的器械或其他器械进行盗窃的行为;扒窃是指行为人在公共场所盗窃别人随身的财物。对三种新类型盗窃行为方式的研究和探讨,有助于更准确地把握盗窃罪的实质和预防此类犯罪。

  17. Details of criminological investigations of large-valued thefts related to nuclear materials (diversion safeguards program)

    International Nuclear Information System (INIS)

    Leachman, R.B.; Cornella, A.P.

    1972-06-01

    Studies were made of five areas of criminology which have great similarity to the case of nuclear materials. Actual cases of crimes were analyzed by experts in law enforcement and criminal justice. To identify fields of analogous criminology, possible characteristics of nuclear material thefts were considered: total value, high unit cost, limited marketability, special technology for handling, and licensing. The items considered to be analogous to nuclear materials in these aspects were: narcotics, data (as exists in computer memories, tapes, or discs), precious metal and gems, objects of art, and weapons. A criminology survey was conducted in which 509 individuals received one or more questionnaires soliciting opinion responses. Sixty-five questionnaires were returned. Eighty-four individuals replied by letter indicating inadequate knowledge of the crimes being surveyed. The questionnaire was supplemented by 18 interviews with criminal justice and industry personnel for more definitive information on diversion problems. Results of this survey are reported

  18. THEFTS, BREAK-INS, ETC.: TAKING PRECAUTIONS IS THE BEST MEANS OF PROTECTION

    CERN Multimedia

    2003-01-01

    On the eve of CERN's annual end of year closure, it is in your own interest, that of your colleagues and that of the Organization, that the following recommendations be followed: 1. MONEY, VALUABLES & KEYS: Do not leave money or valuables in your office or your lockers. Keys and their copies should be removed or kept in a safe place. 2. DOORS & WINDOWS: Lock office, workshop, meeting-room doors etc. when you leave. Also close the windows if they are easily accessible from outside. 3. REPORTING INCIDENTS: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles etc.). The Property Protection Group would like to wish you a Merry Christmas and a Happy New Year! Property Protection Group Tel. 72848

  19. Thefts, break-ins, etc.: Taking precautions is the best means of protection

    CERN Multimedia

    Property Protection Group

    2004-01-01

    As the summer holidays approach, you are strongly recommended, in your own interest as well as that of your colleagues and of the Organization, to take the following precautions: Money, valuables & keys: Do not leave money or valuables in your office or your lockers. If possible, valuable items (such as laptops, cameras, tools, projectors) must be locked away inside a piece of furniture. Keys and duplicates should be removed or kept in a safe place. Doors & windows: Lock all doors to offices, workshops and meeting-rooms, etc., when you leave. Also close the windows if they are easily accessible from outside. Reporting incidents: Each crime solved could prevent another from being perpetrated. Please report any thefts, losses, objects gone missing and other incidents to the CERN Fire Brigade (tel. 74848) and keep them informed of any important developments (objects found, new clues, suspicious people or vehicles, etc.). The Property Protection Group would like to wish you a very good holiday...

  20. A Proven Method for Meeting Export Control Objectives in Postal and Shipping Sectors

    Science.gov (United States)

    2015-02-01

    A Proven Method for Meeting Export Control Objectives in Postal and Shipping Sectors Gregory Crabb, U.S. Postal Inspection Service Julia H...mail fraud, mail theft, identity theft, child exploitation, and prohibited mailings such as bombs and biological and chemical threats...April 2012. http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=10085 [Allen 2014a] Allen, Julia H., Crabb, Gregory; Curtis, Pamela D

  1. Risk and resilience in the Nigerian oil sector: The economic effects of pipeline sabotage and theft

    International Nuclear Information System (INIS)

    Yeeles, Adam; Akporiaye, Alero

    2016-01-01

    Political unrest in the Niger Delta has long been viewed as a hurdle for extracting maximum value from Nigeria's oil resources. Recently, investors and policymakers have laid blame for sector under-performance on pipeline sabotage and theft, and sounded the alarm for an impending ‘oil crisis’. However, our understanding of the economic effects of social action against oil companies is incomplete. Rigorous analysis has not heretofore been offered as evidence for such dire futures. Despite the obvious risk of pipeline interdiction, price dynamics and aggregate production respond minimally to pipeline interdiction. Based on quantitative analysis of the relationship among price, production and pipeline interdiction from multiple data sources covering different time intervals (monthly data from 2005 to 2014 and annual data from 1999 to 2013), we find no evidence of significant effects of pipeline interdiction on production and a weak relationship between pipeline interdiction and Bonny light crude prices. Reported losses in product are substantial, but there is no evidence of statistically significant impacts on price or production in the aggregate. Explanations for this counterintuitive result are cast in terms of sector resilience. The implications of this finding for producer risk and the likelihood of an impending ‘oil crisis’ are discussed. - Highlights: • We examine the impact of pipeline sabotage and theft on the Nigerian oil economy. • Econometric analysis of production, price and pipeline interdiction over different time intervals. • Aggregate price and production are impacted minimally by pipeline interdiction. • Oil sector business risk is high, but production is resilient to interruptions from social and political unrest.

  2. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    OpenAIRE

    Samuel Andrew Hardy

    2015-01-01

    Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hire...

  3. Is looting-to-order “just a myth”? Open-source analysis of theft-to-order of cultural property

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2015-12-01

    Full Text Available Looting-to-order or theft-to-order of cultural assets has been widely dismissed as a myth. To test that, an open-source analysis of cases and testimony from law enforcement agents, perpetrators of cultural property crime and cultural heritage professionals was conducted. Web searches were conducted for reports that addressed looting, stealing or theft of cultural property on commission or to order; for material that discussed looters, robbers or thieves who had been contracted, employed, hired or paid to extract antiquities; and for academic publications that discussed “looting to order”, “theft to order” or any commodity “stolen to order”. Source-end employment/contracting that did not demonstrate a direct connection to market-end purchase and other cases that might have constituted “stealing to offer” were excluded, as were implicit and complicit orders that did not establish a contractual relationship. The analysis found historic and global evidence of commissioned theft of cultural property. It also found evidence that theft-to-order was a significant problem in some places and had served as a structure for conflict antiquities trading in Argentina, Cambodia and Syria. Since it is an exceptionally challenging form of an already difficult-to-police crime, the evidence of theft-to-order reinforces demands for increased market regulation through export and import licensing.

  4. Compulsory declaration of the loss or theft of property and of serious events: New rules and reminder

    CERN Document Server

    2014-01-01

    This notification cancels and replaces the notifications published in Bulletins Nos. 13-14/2006 and 28-29/2009 and the update of 18 November 2011.   1.     Definitions "fenced part of the CERN site" means all the different fenced areas used by the Organization, including remote buildings and underground facilities, "serious event" means any event infringing the rules designed to protect people and property (e.g. attacks, threats, acts of sabotage, vandalism).   2.   Internal declarations The loss or theft of property and serious events must be declared internally if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned.   3.   Who must make the declaration? In principle, the loss or theft of property and serious events m...

  5. ‘Cycle Thieves, We Are Watching You’: Impact of a Simple Signage Intervention against Bicycle Theft

    Science.gov (United States)

    Nettle, Daniel; Nott, Kenneth; Bateson, Melissa

    2012-01-01

    Background Bicycle theft is a serious problem in many countries, and there is a lack of evidence concerning effective prevention strategies. Displaying images of ‘watching eyes’ has been shown to make people behave in more socially desirable ways in a number of settings, but it is not yet clear if this effect can be exploited for purposes of crime prevention. We report the results of a simple intervention on a university campus where signs featuring watching eyes and a related verbal message were displayed above bicycle racks. Methodology and Principal Findings We installed durable signs at three locations which had experienced high levels of bicycle theft, and used the rest of the university campus as a control location. Reported thefts were monitored for 12 months before and after the intervention. Bicycle thefts decreased by 62% at the experimental locations, but increased by 65% in the control locations, suggesting that the signs were effective, but displaced offending to locations with no signs. The Odds Ratio for the effect of the intervention was 4.28 (95% confidence interval 2.04–8.98), a large effect compared to other place-based crime prevention interventions. Conclusions and Significance The effectiveness of this extremely cheap and simple intervention suggests that there can be considerable crime-reduction benefits to engaging the psychology of surveillance, even in the absence of surveillance itself. Simple interventions for high-crime locations based on this principle should be considered as an adjunct to other measures, although a possible negative consequence is displacement of offending. PMID:23251615

  6. Some facts and issues related to livestock theft in Punjab province of Pakistan --findings of series of cases.

    Science.gov (United States)

    Abbas, Tariq; Muhammad, Younus; Raza, Sanan; Nasir, Amar; Höreth-Böntgen, Detlef W

    2014-01-01

    Stock theft is an endemic crime particularly affecting deep rural areas of Pakistan. Analysis of a series of cases was conducted to describe features of herds and farmers who have been the victims of cattle and/buffalo theft in various villages of Punjab in Pakistan during the year 2012. A structured interview was administered to a sample of fifty three affected farmers. The following were the important findings: i) incidents of theft were more amongst small scale farmers, ii) the rate of repeat victimization was high, iii) stealing was the most common modus operandi, iv) the majority of animals were adult, having high sale values, v) more cases occurred during nights with crescent moon, vi) only a proportion of victims stated to have the incident reported to the police, vii) many farmers had a history of making compensation agreements with thieves, viii) foot tracking failed in the majority of the cases, ix) all the respondents were willing to invest in radio frequency identification devices and advocated revision of existing laws. The study has implications for policy makers and proposes a relationship between crime science and veterinary medicine.

  7. On Theft with Lethal Weapons in Criminal Law%论刑法中的携带凶器盗窃

    Institute of Scientific and Technical Information of China (English)

    安军

    2012-01-01

    我国刑法中携带凶器型盗窃的立法意图及模式为具体理解与适用提供了基准。作为规范构成要件要素的凶器,除了需要考察凶器的客观因素外,还必须考虑行为人的主观因素,即在具体的案件中应以客观的及主观的要素为根据综合判断。携带凶器的时间段应包括着手实行盗窃行为至盗窃罪构成要件完成(既遂)的全过程。在这一过程中,行为人认识到自己携带了凶器,认识到自己在盗窃他人财物,希望通过携带的凶器排除或阻止他人的反抗,以便非法占有他人财物。与普通盗窃相比,携带凶器型盗窃除了属于行为犯外,更具有抽象危险犯的特征,二者并行不悖。%In Chinese criminal law,the legislative intent and model of theft with lethal weapons provides a benchmark for specific understanding and application.As normative elements of constitutive requirements of lethal weapons,the behavior of subjective factors should also be considered in addition to the objective factors of the weapon;in other words,the judgment should be based on objective and subjective elements in specific cases.The period of carrying lethal weapons should be from the start of acting to execute theft to complete offense of theft.The subject recognized carrying lethal weapons and his stealing behaviors,wished to exclude or block resistance and occupy property of others by carrying lethal weapons in this process.Compared with ordinary theft,theft with lethal weapons has more features of abstract potential damage offense in addition to belonging to behavioral offense,two of which are not contradictary to each other.

  8. Lead theft--a study of the "uniqueness" of lead from church roofs.

    Science.gov (United States)

    Bond, John W; Hainsworth, Sarah V; Lau, Tien L

    2013-07-01

    In the United Kingdom, theft of lead is common, particularly from churches and other public buildings with lead roofs. To assess the potential to distinguish lead from different sources, 41 samples of lead from 24 church roofs in Northamptonshire, U.K, have been analyzed for relative abundance of trace elements and isotopes of lead using X-ray fluorescence (XRF) and inductively coupled plasma mass spectrometry, respectively. XRF revealed the overall presence of 12 trace elements with the four most abundant, calcium, phosphorus, silicon, and sulfur, showing a large weight percentage standard error of the mean of all samples suggesting variation in the weight percentage of these elements between different church roofs. Multiple samples from the same roofs, but different lead sheets, showed much lower weight percentage standard errors of the mean suggesting similar trace element concentrations. Lead isotope ratios were similar for all samples. Factors likely to affect the occurrence of these trace elements are discussed. © 2013 American Academy of Forensic Sciences.

  9. Design of remote car anti-theft system based on ZigBee

    Science.gov (United States)

    Fang, Hong; Yan, GangFeng; Li, Hong Lian

    2015-12-01

    A set of remote car anti-theft system based on ZigBee and GPRS with ARM11 built-in chip S3C6410 as the controller is designed. This system can detect the alarm information of the car with vibration sensor, pyroelectric sensor and infrared sensor. When the sensor detects any alarm signal, the ZigBee node in sleep will be awakened and then directly send the alarm signal to the microcontroller chip S3C6410 in the control room of the parking lot through ZigBee wireless transceiver module. After S3C6410 processes and analyzes the alarm signal, when any two sensors of the three collect the alarm signal, the LCD will display and generate an alarm and meanwhile it will send the alarm signal to the phone of the user in a wireless manner through the form of short message through GPRS module. Thus, the wireless remote monitoring of the system is realized.

  10. The Attractiveness of Materials in Advanced Nuclear Fuel Cycles for Various Proliferation and Theft Scenarios

    International Nuclear Information System (INIS)

    Bathke, C.G.; Wallace, R.K.; Ireland, J.R.; Johnson, M.W.; Hase, Kevin R.; Jarvinen, G.D.; Ebbinghaus, B.B.; Sleaford, Brad W.; Bradley, Keith S.; Collins, Brian A.; Smith, Brian W.; Prichard, Andrew W.

    2010-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  11. Compulsory declaration of the disappearance, loss or theft of property and of serious incidents

    CERN Multimedia

    Relations with the Host States Service

    2006-01-01

    New rules and reminder The rules governing internal and external declarations have been modified as follows: internal declarations concerning CERN mobile phones must now be made to the Telecom Lab instead of the Fire Brigade in order to minimise call-outs, declarations concerning valid CERN access cards and CERN vehicle stickers must be made to the competent external authorities in order to make their holders more aware of their responsibilities and to prevent abuse. This notification replaces the notifications published in Bulletin Nos. 38/1999 and 13/2001 (ref. DSU-DO/RH/9198 and 10315 respectively). 1. What has to be declared? The disappearance, loss or theft of property and serious incidents must be declared if they occur: within the fenced part of the CERN site, irrespective of the person and item concerned, outside the fenced part of the CERN site if CERN is the owner or custodian of the item concerned. Definitions: 'fenced part of the CERN site'means all the different fenced areas used by...

  12. Selfish Pups: Weaning Conflict and Milk Theft in Free-Ranging Dogs.

    Directory of Open Access Journals (Sweden)

    Manabi Paul

    Full Text Available Parent-offspring conflict theory predicts the emergence of weaning conflict between a mother and her offspring arising from skewed relatedness benefits. Empirical observations of weaning conflict have not been carried out in canids. In a field-based study on free-ranging dogs we observed that nursing/suckling bout durations decrease, proportion of mother-initiated nursing bouts decrease and mother-initiated nursing/suckling terminations increase with pup age. We identified the 7th - 13th week period of pup age as the zone of conflict between the mother and her pups, beyond which suckling solicitations cease, and before which suckling refusals are few. We also report for the first time milk theft by pups who take advantage of the presence of multiple lactating females, due to the promiscuous mating system of the dogs. This behaviour, though apparently disadvantageous for the mothers, is perhaps adaptive for the dogs in the face of high mortality and competition for resources.

  13. Relationship between Delusion of Theft and Cognitive Functions in Patients with Mild Alzheimer’s Disease

    Science.gov (United States)

    Na, Hae-Ran; Kang, Dong Woo; Woo, Young-Sup; Bahk, Won-Myong; Lee, Chang-Uk; Lim, Hyun Kook

    2018-01-01

    Although delusion of theft (DT) is the most frequent type of delusion in Alzheimer’s disease (AD), its relationship to cognitive functions remains unclear. The aim of this study was to demonstrate the relationship between DT and cognitive functions in mild AD. Two hundred eighty-nine mild AD patients were enrolled in this study. These subjects were classified into three groups: patients with no delusions (ND, n=82), patients with paranoid delusions (PD, n=114) and patients with DT (n=93). Cognitive functions and their associations with the degree of delusion were compared among the three groups. The results showed that verbal Fluency scores were significantly lower in the PD group than in the DT and ND groups. Word List Recall scores were significantly lower in the DT group than in the PD and ND groups. Interestingly, delusion severity measured with the Neuropsychiatric Inventory delusion subscale correlated negatively with the Word List Recall scores in the DT group. In this study, we demonstrated that episodic memory functions in mild AD patients were associated with DT, but not with PD. Further studies might be needed to clarify the pathophysiology of delusions associated with AD. PMID:29669410

  14. Relationship between Delusion of Theft and Cognitive Functions in Patients with Mild Alzheimer's Disease.

    Science.gov (United States)

    Na, Hae-Ran; Kang, Dong Woo; Woo, Young-Sup; Bahk, Won-Myong; Lee, Chang-Uk; Lim, Hyun Kook

    2018-04-01

    Although delusion of theft (DT) is the most frequent type of delusion in Alzheimer's disease (AD), its relationship to cognitive functions remains unclear. The aim of this study was to demonstrate the relationship between DT and cognitive functions in mild AD. Two hundred eighty-nine mild AD patients were enrolled in this study. These subjects were classified into three groups: patients with no delusions (ND, n=82), patients with paranoid delusions (PD, n=114) and patients with DT (n=93). Cognitive functions and their associations with the degree of delusion were compared among the three groups. The results showed that verbal Fluency scores were significantly lower in the PD group than in the DT and ND groups. Word List Recall scores were significantly lower in the DT group than in the PD and ND groups. Interestingly, delusion severity measured with the Neuropsychiatric Inventory delusion subscale correlated negatively with the Word List Recall scores in the DT group. In this study, we demonstrated that episodic memory functions in mild AD patients were associated with DT, but not with PD. Further studies might be needed to clarify the pathophysiology of delusions associated with AD.

  15. The attractiveness of materials in advanced nuclear fuel cycles for various proliferation and theft scenarios

    International Nuclear Information System (INIS)

    Bathke, Charles G.; Wallace, Richard K.; Ireland, John R.; Johnson, M.W.; Hase, Kevin R.; Jarvinen, Gordon D.; Ebbinghaus, Bartley B.; Sleaford, Brad A.; Bradley, Keith S.; Collins, Brian W.; Smith, Brian W.; Prichard, Andrew W.

    2009-01-01

    This paper is an extension to earlier studies that examined the attractiveness of materials mixtures containing special nuclear materials (SNM) and alternate nuclear materials (ANM) associated with the PUREX, UREX, COEX, THOREX, and PYROX reprocessing schemes. This study extends the figure of merit (FOM) for evaluating attractiveness to cover a broad range of proliferant state and sub-national group capabilities. The primary conclusion of this study is that all fissile material needs to be rigorously safeguarded to detect diversion by a state and provided the highest levels of physical protection to prevent theft by sub-national groups; no 'silver bullet' has been found that will permit the relaxation of current international safeguards or national physical security protection levels. This series of studies has been performed at the request of the United States Department of Energy (DOE) and is based on the calculation of 'attractiveness levels' that are expressed in terms consistent with, but normally reserved for nuclear materials in DOE nuclear facilities. The expanded methodology and updated findings are presented. Additionally, how these attractiveness levels relate to proliferation resistance and physical security are discussed.

  16. Anti-theft device staining on banknotes detected by mass spectrometry imaging.

    Science.gov (United States)

    Correa, Deleon Nascimento; Zacca, Jorge Jardim; Rocha, Werickson Fortunato de Carvalho; Borges, Rodrigo; de Souza, Wanderley; Augusti, Rodinei; Eberlin, Marcos Nogueira; Vendramini, Pedro Henrique

    2016-03-01

    We describe the identification and limits of detection of ink staining by mass spectrometry imaging (MSI), as used in anti-theft devices (ATDs). Such ink staining is applied to banknotes during automated teller machine (ATM) explosions. Desorption electrospray ionization (DESI) coupled with high-resolution and high-accuracy orbitrap mass spectrometry (MS) and a moving stage device were applied to obtain 2D molecular images of the major dyes used for staining, that is, 1-methylaminoanthraquinone (MAAQ), rhodamine B (RB) and rhodamine 6G (R6G). MAAQ could not be detected because of its inefficient desorption by DESI from the banknote cellulose surface. By contrast, ATD staining on banknotes is perceptible by the human naked eye only at concentrations higher than 0.2 μg cm(-2), whereas both RB and R6G at concentrations 200 times lower (as low as 0.001 μg cm(-2)) could be easily detected and imaged by DESI-MSI, with selective and specific identification of each analyte and their spatial distribution on samples from suspects. This technique is non-destructive, and no sample preparation is required, which ensures sample preservation for further forensic investigations. Copyright © 2016. Published by Elsevier Ireland Ltd.

  17. Formación en valores sociales en adolescentes que juegan Grand Theft Auto V

    Directory of Open Access Journals (Sweden)

    Clara Victoria Meza-Maya

    2017-01-01

    Full Text Available Objeto: Comprensión de las relaciones entre los preadolescentes y las nuevas prácticas comunicativas en las redes informáticas, respecto a la construcción de valores sociales que se propician mediante su participación en los videojuegos colaborativos, en una observación en adolescentes con el videojuego Grand Theft Auto V (GTA V. Metodología: es un estudio cualitativo, con herramientas etnográficas, apoyado por una encuesta tipo Likert, con estudiantes de un colegio de Bogotá. Resultados y conclusiones: Los estudiantes diferencian con claridad el contexto valorativo del juego y el de la vida real. Los valores sociales como el respeto, la solidaridad, la otredad y el cumplimiento de las normas tienen significaciones diferentes en el juego y en la vida. La familia es la fuente de valores más reconocida en la vida real. Se extraen enseñanzas del mundo avieso del juego.

  18. Open literature review of threats including sabotage and theft of fissile material transport in Japan

    International Nuclear Information System (INIS)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-01-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty

  19. Safeguards and security by design (SSBD) for the domestic threat. Theft and sabotage

    International Nuclear Information System (INIS)

    DeMuth, Scott; Mullen, Mark; Pan, Paul

    2011-01-01

    In recent years, the Safeguards by Design (SBD) concept has received significant interest with respect to international (IAEA) safeguards objectives. However, less attention has been focused on the equally important topic of domestic (or national) Safeguards and Security by Design (SSBD), which addresses domestic requirements for material control and accounting (MC and A) and for physical protection, such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful uses to nuclear explosives purposes, domestic material control and accounting (MC and A) and physical protection are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE), and more specifically its Materials Protection, Accounting, and Control Technologies (MPACT) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts for international safeguards sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA. This paper identifies the key domestic safeguards and security requirements (i.e., MC and A and physical protection) and explains how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems. (author)

  20. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    International Nuclear Information System (INIS)

    Demuth, Scott F.; Mullen, Mark

    2011-01-01

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC and A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC and A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  1. Camel calves as opportunistic milk thefts? The first description of allosuckling in domestic bactrian camel (Camelus bactrianus.

    Directory of Open Access Journals (Sweden)

    Karolína Brandlová

    Full Text Available Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus and to test whether it can be explained as a 'milk-theft' (opportunistic behaviour of calves or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female. Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of 'milk theft', being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves.

  2. The problem of theft depravity in traditional Russian culture(middle of the 19th - beginning of the 20th century

    Directory of Open Access Journals (Sweden)

    Т В Лис

    2008-06-01

    Full Text Available This article touches upon the problem of perceiving and comprehending the theft within its interrelationship with the concept of sin, which is in its turn considered to be one of the most important notions of the Christian ethics. Considering this very aspect theft studies make it easy to pinpoint certain peculiarities of the traditional sense of justice and national morality. In terms of temporal perspective the idea of sin correlates with an image of theft victim. Then the larceny turns into a certain visitation for the recently committed offence or crime. Thus, we can draw up a certain cause-and-effect line: any crime or offence entails punishment, which is actually a crime aimed at somebody, who has committed the crime first. In this case we can talk about the synonymy of crime and punishment as well as about the cumulation of sin.

  3. Characterization of anti-theft devices directly from the surface of banknotes via easy ambient sonic spray ionization mass spectrometry.

    Science.gov (United States)

    Schmidt, Eduardo Morgado; Franco, Marcos Fernando; Cuelbas, Claudio José; Zacca, Jorge Jardim; de Carvalho Rocha, Werickson Fortunato; Borges, Rodrigo; de Souza, Wanderley; Sawaya, Alexandra Christine Helena Frankland; Eberlin, Marcos Nogueira; Correa, Deleon Nascimento

    2015-09-01

    Using Brazilian banknotes as a test case, forensic examination and identification of Rhodamine B dye anti-theft device (ATD) staining on banknotes were performed. Easy ambient sonic spray ionization mass spectrometry (EASI-MS) was used since it allows fast and simple analysis with no sample preparation providing molecular screening of the surface with direct desorption and ionization of the security dye. For a more accurate molecular characterization of the ATD dye, Q Exactive Orbitrap™ Fourier transform (tandem) mass spectrometry using eletrospray ionization (ESI-HRMS/MS) was also applied. Copyright © 2015 The Chartered Society of Forensic Sciences. Published by Elsevier Ireland Ltd. All rights reserved.

  4. The Most Frequent Energy Theft Techniques and Hazards in Present Power Energy Consumption: Cyber Security in Smart Metering Low Voltage Network

    DEFF Research Database (Denmark)

    Czechowski, Robert; Kosek, Anna Magdalena

    2016-01-01

    One of the challenging problems when it comes to electric energy distribution is electricity theft. Regardless of whether the deed is done on a large scale or only by a single consumer, it is a problem that generates losses and its detection is not always easy. One of the crucial factors making t...

  5. Computers in the Cop Car: Impact of the Mobile Digital Terminal Technology on Motor Vehicle Theft Clearance and Recovery Rates in a Texas City.

    Science.gov (United States)

    Nunn, Samuel

    1993-01-01

    Assessed the impact of the Mobile Digital Terminal technology (computers used to communicate with remote crime databases) on motor vehicle theft clearance (arresting a perpetrator) and recovery rates in Fort Worth (Texas), using a time series analysis. Impact has been ambiguous, with little evidence of improved clearance or recovery. (SLD)

  6. Analyzing the impact of theft and vandalism in relation to the sustainability of renewable energy development projects in Sub-Saharan Africa

    NARCIS (Netherlands)

    Ikejemba, Eugene C.X.; Schuur, Peter C.

    2018-01-01

    Theft and vandalism impede the sustainability of renewable energy (RE) development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances

  7. “C’è un furto con scasso in ogni vera lettura”. Calvino’s Thefts from Ariosto

    Directory of Open Access Journals (Sweden)

    Martin McLaughlin

    2013-06-01

    Full Text Available Calvino’s love for Ariosto throughout his writing life is well known. However, despite this life-long enthusiasm for Ariosto, there are some variations. In a 1980 interview with Tullio Pericoli Calvino used the metaphor of “stealing” words from other texts and discussed notions of artistic thievery, citing his own “thefts” from Ariosto. The article examines how Calvino carries out his thefts, and how he then systematically develops in his own way what he has “stolen”, concentrating on key episodes from Il cavaliere inesistente and Il castello dei destini incrociati. What emerges is that in the first phase of his literary career Calvino was more concerned with the content of the Furioso, while in later years he became fascinated by the poem’s structural and stylistic qualities.

  8. Design of anti-theft/cable cut real time alert system for copper cable using microcontroller and GSM technology

    Science.gov (United States)

    Lim, E. K.; Norizan, M. N.; Mohamad, I. S.; Yasin, M. N. M.; Murad, S. A. Z.; Baharum, N. A.; Jamalullail, N.

    2017-09-01

    This paper presents the design of anti-theft/cable cut real time alert system using microcontroller and GSM technology. The detection part is using the electrical circuit wire connection in detecting the voltage drop of the cable inside the microcontroller digital input port. The GSM wireless modem is used to send the location of cable cut directly to the authority mobile phone. Microcontroller SK40C with Microchip PIC16F887 is used as a controller to control the wireless modem and also the detection device. The device is able to detect and display the location of the cable cut on the LCD display besides of and sending out the location of the cable break to the authority mobile phone wirelessly via SMS.

  9. Bystander's willingness to report theft, physical assault, and sexual assault: the impact of gender, anonymity, and relationship with the offender.

    Science.gov (United States)

    Nicksa, Sarah C

    2014-01-01

    This research examines bystander willingness to report three different crimes to the police or campus authorities among a college student sample (n = 295). Twelve original vignettes varied anonymity when reporting, bystander's relationship with the offender (friend or stranger), and crime type. A factorial analysis of variance showed that main effects were found for crime type, bystander's gender, and bystander's relationship with the offender; anonymity was not significant. The physical assault was the most likely to be reported (4.47), followed by theft (3.26), and sexual assault (2.36). Women were more likely than men to report each crime type, and bystanders who were good friends of the offender were less likely to report than strangers. No two- or three-way interactions were significant, but a significant four-way interaction indicated that anonymity, relationship with the offender, and bystander's gender predicted willingness to report for the sexual assault scenario.

  10. Stealing land in the name of religion: A Rastafari religio-political critique of land theft by global imperial forces

    Directory of Open Access Journals (Sweden)

    Roderick Hewitt

    2016-10-01

    Full Text Available The issue of land has been central to Rastafari origins and ideological construct. Ethiopia, Africa, Babylon, Zion and Jamaica are symbols that point not only to physical location but also their ideological and psychological identity formation. This article uses Rastafari hermeneutics to critique the phenomenon of African Jamaican uprooting and dispossession of and from their land by powerful and global conglomerate forces that use the instrument of politics, economic and religion to accomplish their agenda. This article uses the Rastafari theological reflections, a theoretical framework that employs the phenomenon of faith, tradition and experience to interrogate the phenomenon of displacement of people through land theft. The religio-political narrative of Jamar Rolando McNaughton Jr, a young Jamaican reggae artist popularly known by his stage name Chronixx, will serve as the principal lens through which to interrogate the phenomenon of landlessness among the poor, primarily within the Jamaican context.

  11. Classification system of radioactive sources to attend radiological emergencies, the last three cases of theft in Mexico

    International Nuclear Information System (INIS)

    Ruiz C, M. A.; Garcia M, T.

    2014-10-01

    Following last three cases of theft of radioactive material in Mexico is convenient to describe how to classify radioactive sources and make decisions to confront the emergency. For this there are IAEA publications, which determine the Dangerous values or value D, for different radionuclides and activity values usually used in practice, and employees in industry, medicine and research. The literature also describes the different scenarios to determine the activity of different radioisotopes that can cause deterministic effects to workers or the population and thus classify the degree of relative risk that these sources may be involved in an accident. Defined the classification of sources, we can make decisions to respond to emergencies in their proper perspective also alert the public to the description of the risks associated with the sources in question, without this leading to a situation of greater crisis. (Author)

  12. Glioblastoma multiforme subterfuge as acute cerebral hemorrhage: A case report and literature review

    Directory of Open Access Journals (Sweden)

    Seidu A. Richard

    2018-04-01

    Full Text Available Hemorrhagic related Glioblastoma multiforme (GBM are rare and characterizes with severe clinical scuffle. The etiology of this presentation although not well known is believed to be multifactorial. We present a case as well as review on the pathogenesis of evolution of the hematoma into ring enhancing features of GBM on imaging studies. We present a case of 28 years old man who suddenly went into coma for 9 hours preceded with seizures that latest for 10 minutes. He had no focal neurological signs. CT-Scans images indicated acute cerebral hemorrhage near the frontal horn of the left ventricle with brain edema about the hemorrhagic lesion and MRI done a week later revealed a cerebral ring enhancing lesion. The lesion was partially resected during surgery and immunohistochemical staining confirmed GBM (WHO, grade 4. The diagnosis of intratumoral hemorrhage in GBM was very challenging at the initial stages but with time the hematoma evolved into ring enhancing images typical of GBM. It’s not every intracranial hematoma that is of pure vascular origin.

  13. Muse, Ruse, Subterfuge: Transdisciplinary "Praxis" in Ontario's Post-Secondary Bricolage?

    Science.gov (United States)

    Mitchell, Richard C.; Moore, Shannon A.

    2015-01-01

    In late 2013, Canada's national newspaper reported that the implementation of Ontario's "differentiation policy framework" was the province's "boldest step yet to compel universities and colleges to make hard choices about how they spend their resources...a draft policy designed to stretch limited provincial dollars by narrowing…

  14. Grand Theft Auto IV comes to Singapore: effects of repeated exposure to violent video games on aggression.

    Science.gov (United States)

    Teng, Scott Kie Zin; Chong, Gabriel Yew Mun; Siew, Amy Sok Cheng; Skoric, Marko M

    2011-10-01

    Given the increasingly dominant role of video games in the mainstream entertainment industry, it is no surprise that the scholarly debate about their impact has been lively and well attended. Although >100 studies have been conducted to examine the impact of violent video games on aggression, no clear consensus has been reached, particularly in terms of their long-term impact on violent behavior and aggressive cognitions. This study employs a first-ever longitudinal laboratory-based experiment to examine longer-term effects of playing a violent video game. One hundred thirty-five participants were assigned either to the treatment condition where they played a violent video game in a controlled laboratory setting for a total of 12 hours or to the control group where they did not play a game. Participants in the treatment group played Grand Theft Auto IV over a period of 3 weeks and were compared with a control group on the posttest measures of trait aggression, attitudes toward violence, and empathy. The findings do not support the assertion that playing a violent video game for a period of 3 weeks increases aggression or reduces empathy, but they suggest a small increase in proviolence attitudes. The implications of the findings are discussed.

  15. A theoretical and practical test of geographical profiling with serial vehicle theft in a U.K. context.

    Science.gov (United States)

    Tonkin, Matthew; Woodhams, Jessica; Bond, John W; Loe, Trudy

    2010-01-01

    Geographical profiling is an investigative methodology sometimes employed by the police to predict the residence of an unknown offender from the locations of his/her crimes. The validity of geographical profiling, however, has not been fully explored for certain crime types. This study, therefore, presents a preliminary test of the potential for geographical profiling with a sample of 145 serial vehicle thieves from the U.K. The behavioural assumptions underlying geographical profiling (distance decay and domocentricity) are tested and a simple practical test of profiling using the spatial mean is presented. There is evidence for distance decay but not domocentricity among the spatial behaviour of car thieves from the U.K. A degree of success was achieved when applying the spatial mean on a case-by-case basis. The level of success varied, however, and neither series length in days nor number of crimes could account for the variation. The findings question previously held assumptions regarding geographical profiling and have potential theoretical and practical implications for the study and investigation of vehicle theft in the U.K. 2009 John Wiley & Sons, Ltd.

  16. Special report. Update on EAS (electronic article surveillance) systems: protecting against patient wandering, infant abduction, property theft.

    Science.gov (United States)

    1993-10-01

    Concern about wandering patients and infant abduction on the part of hospitals has sparked renewed interest in Electronic Article Surveillance (EAS) systems. Such systems had their origins in department stores and libraries where they are almost universally used. They also have applications in hospitals for preventing the theft of supplies and equipment. A number of companies provide EAS products for the health care field. How do you select the system that is best for your needs? "Talk to users. Pick out a number of profit and non-profit hospitals to get their views," advises Ted Algaier, vice president, marketing and sales, Innovative Control Systems, Inc., Waukesha, WI. "Examine the history of the company or vendor to determine if it understands the health care market and find out if the product really works." In this report, we'll review a number of EAS systems currently on the market, and present information on how they work, how effective they are, and costs involved. Also included are comments from users who have installed such systems.

  17. Facing Fanon: Examining Neocolonial Aspects in Grand Theft Auto V through the Prism of the Machinima Film Finding Fanon II

    Directory of Open Access Journals (Sweden)

    Steffen Krüger

    2018-02-01

    Full Text Available In this article, I examine the Machinima film 'Finding Fanon II', by London-based artists Larry Achiampong and David Blandy, for what it can tell us about the relationship between video gaming and the postcolonial. Evoking Frantz Fanon, one of the most piercing voices of the decolonisation movement of the 1950s and 1960s, in the context of 'Grand Theft Auto' (GTA, one of the most technologically advanced and, at the same time, scandalous video game series of the 21st century, 'Finding Fanon II' amounts to a scathing critique of both the game series’ depiction of race and academic scholarship that has been defending the series on the grounds of its use of humour and irony. Shot in the in-game video editor of 'GTA V', 'Finding Fanon II' lets this critique emerge from inside the game and as an effect of the artists’ engagement with it. By suspending the game’s mechanisms and programmed forms of interaction, the artwork brings their racialised logic to the fore, pointing towards the ways in which 'GTA V' commodifies black men for the consumption of white players. This commodification has the effect of normalising and naturalising the precarious position of black people in Western society. What the artwork adds to this argument through its facilitation of a Fanonian perspective is a reminder that it is not only the gaming experience of 'white' players that is framed in this way. Players with ethnic minority backgrounds might also accept the white gaze of the game as a given. Acts of self-commodification along the lines of a white Western rationality must thus be seen as a plausible new form of cultural imperialism promoted by the GTA series.

  18. Camel Calves as Opportunistic Milk Thefts? The First Description of Allosuckling in Domestic Bactrian Camel (Camelus bactrianus)

    Science.gov (United States)

    Brandlová, Karolína; Bartoš, Luděk; Haberová, Tamara

    2013-01-01

    Allosuckling is a situation when a female nurses a non-filial offspring. It was described in various ungulate species; however for camels this is the first description of this behaviour. The aim of the study was to assess the occurrence of allosuckling in captive camels (Camelus bactrianus) and to test whether it can be explained as a ‘milk-theft’ (opportunistic behaviour of calves) or alternatively as an altruistic behaviour of females. During 2005 and 2007, nine camel females and ten calves in four zoological gardens in the Czech Republic were observed. In total, 373 sucking bouts were recorded, from which 32 were non-filial (the calf sucked from the non-maternal female). Allosuckling regularly appeared in captive camel herds. As predicted for the milk-theft explanation, the non-filial calves sucked more often in the lateral position and even did not suck in the antiparallel position at all. The non-filial calves preferably joined the filial calf when sucking but in five cases (15.6% of non-filial sucking bouts) the calves sucked from non-maternal dam without the presence of filial calf. We then expected the differences in terminations of sucking bouts by females but did not find any difference in sucking terminations for filial and non-filial calves. As the calves were getting older, the incidence of allosucking increased. This was probably because skills of the calf to outwit the non-maternal dam increased and/or the older calves might be more motivated for allosucking due to the weaning process. Finally, duration of a sucking bout was shorter with non-filial than filial calves. The results of the study support the hypothesis of ‘milk theft’, being mostly performed by calves behaving as opportunistic parasites, but we cannot reject certain level of altruism from the allonursing females or their increased degree of tolerance to non-filial calves. PMID:23326378

  19. Analyzing the Impact of Theft and Vandalism in Relation to the Sustainability of Renewable Energy Development Projects in Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Eugene C.X. Ikejemba

    2018-03-01

    Full Text Available Theft and vandalism impede the sustainability of renewable energy (RE development projects in Sub-Saharan Africa. Therefore, it is essential to explore where these crimes originate from, how they propagate and how they can be counteracted. In our study, we analyze the impact of these disturbances on implemented projects. We utilize a consumer clinic approach to generate data that represents the situation. We define our instigators practically (Government Inequality, Crime to Survive, Sabotage and demarcate the actions of the offenders into 4 types: (1 vandalization of small RE projects (SPv; (2 theft of RE infrastructures from small RE projects (SPt; (3 vandalization of large RE projects (LPv; and (4 theft of RE infrastructures from large RE projects (LPt. To counteract these actions we define three types of security interference: human, societal and technical. We model the career of an RE criminal as a multi-stage Markov model. In every stage the offender can commit any of the offences SPv, SPt, LPv, LPt, or go to rest. Transition probabilities are our means to reflect offender maturity. Crucial to our model is that they are affected by the level of interference installed at the project site. Calibrated on a dialogue with 144 respondents, our Markov model directs us to adequate interferences per project. Specifically, for large projects technical and human security are the most effective, whereas, for small projects we recommend societal security. The paper introduces a mathematical model of the career of a RE-offender including the influence of security interference and calibrates the parameters through an ethnographic approach.

  20. Crowdsourcing cyber security: a property rights view of exclusion and theft on the information commons

    Directory of Open Access Journals (Sweden)

    Gary Shiffman

    2013-02-01

    Full Text Available Individuals increasingly rely upon the internet for basic economic interaction. Current cyber security mechanisms are unable to stop adversaries and hackers from gaining access to sensitive information stored on government, business, and public computers. Experts propose implementing attribution and audit frameworks in cyberspace to deter, prevent, and prosecute cyber criminals and attackers. However, this method faces significant policy and resource constraints. Social science research, specifically in law and economics, concerning common-pool resources suggests an organic approach to cyber security may yield an appropriate solution. This cyber commons method involves treating the internet as a commons and encouraging individuals and institutions to voluntarily implement innovative and adaptive monitoring mechanisms. Such mechanisms are already in use and in many cases have proven more effective than attribution mechanisms in resisting and tracing the source of cyber attacks.

  1. Human reliability-based MC and A models for detecting insider theft

    International Nuclear Information System (INIS)

    Duran, Felicia Angelica; Wyss, Gregory Dane

    2010-01-01

    Material control and accounting (MC and A) safeguards operations that track and account for critical assets at nuclear facilities provide a key protection approach for defeating insider adversaries. These activities, however, have been difficult to characterize in ways that are compatible with the probabilistic path analysis methods that are used to systematically evaluate the effectiveness of a site's physical protection (security) system (PPS). MC and A activities have many similar characteristics to operator procedures performed in a nuclear power plant (NPP) to check for anomalous conditions. This work applies human reliability analysis (HRA) methods and models for human performance of NPP operations to develop detection probabilities for MC and A activities. This has enabled the development of an extended probabilistic path analysis methodology in which MC and A protections can be combined with traditional sensor data in the calculation of PPS effectiveness. The extended path analysis methodology provides an integrated evaluation of a safeguards and security system that addresses its effectiveness for attacks by both outside and inside adversaries.

  2. Modeling Hot Spot Motor Vehicle Theft Crime in Relation to Landuse and Settlement Patterns

    Directory of Open Access Journals (Sweden)

    Djaka Marwasta

    2004-01-01

    Full Text Available The crowd of Yogyakarta urban has impacted its surrounding area, including Depok sub district, which is indicated by the rising of physical development, for example education facilities and settlements. The progress does not only bring positive impact, but also negative impact for instance the rising of crime number i.e. motor vehicle robbery. The aims of this research are 1 mapping motor vehicle robbery data as the distribution map and identifying motor vehicle robbery hot spot base on distrbution map; and 2 studying the correlation of motor vehicle robbery hot spot with physical environment phenomena, i.e. land use type and settlement pattern. The research method consists of two parts; they are motor vehicle robbery cluster analysis and the relation of motor vehicle robbery and physical environment analysis. Motor vehicle robbery cluster analysis is using distribution data, which analyzes the distribution into motor vehicle robbery hot spot with nearest neighbor tehnique. Contingency coefficient and frequency distribution analysis is used to analyze the correlation of motor vehicle robbery hot spot and physical environment. Contingency coefficient is used to study the relation of motor vehicle robbery hot spot polygon with physical environment condition, whereas frequency distribution is used to study the distribution of motor vehicle robbery in the hot spot with physical environment condition. Physical environment which consists of land use type, housing density, house regularity pattern, and the average of building size, are obtained from interpretation of black and white panchromatic aerial photograph year 2000, in the scale 1 : 20.000. the most motor vehicle robbery hot spot is found on the settlement area, 68,3% from 378 motor vehicle robbery cases in the hot spot. The seond level is found on the education area (16.4%. The most motor vehicle hot spot in the settlement is found on the hight density and irregular settlement, which have big

  3. ID THEFT IN CYBERSPACE

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2014-05-01

    Full Text Available Obtaining personal data, identification data, including data which allow the use of a electronic payment instrument, or any other data generated in the context of one person’s activities in the social, economic or financial life, without its consent or by deceit, if this occurs in computer systems or through electronic means of communications, should be considered as a crime and punished accordingly.

  4. Avoiding Medical Identity Theft

    Science.gov (United States)

    ... medical records that can plague your medical and financial life for years, or even put your health at risk. ... Monitor your health records closely and address any errors quickly Share personal and health insurance information only ...

  5. Method

    Directory of Open Access Journals (Sweden)

    Ling Fiona W.M.

    2017-01-01

    Full Text Available Rapid prototyping of microchannel gain lots of attention from researchers along with the rapid development of microfluidic technology. The conventional methods carried few disadvantages such as high cost, time consuming, required high operating pressure and temperature and involve expertise in operating the equipment. In this work, new method adapting xurography method is introduced to replace the conventional method of fabrication of microchannels. The novelty in this study is replacing the adhesion film with clear plastic film which was used to cut the design of the microchannel as the material is more suitable for fabricating more complex microchannel design. The microchannel was then mold using polymethyldisiloxane (PDMS and bonded with a clean glass to produce a close microchannel. The microchannel produced had a clean edge indicating good master mold was produced using the cutting plotter and the bonding between the PDMS and glass was good where no leakage was observed. The materials used in this method is cheap and the total time consumed is less than 5 hours where this method is suitable for rapid prototyping of microchannel.

  6. method

    Directory of Open Access Journals (Sweden)

    L. M. Kimball

    2002-01-01

    Full Text Available This paper presents an interior point algorithm to solve the multiperiod hydrothermal economic dispatch (HTED. The multiperiod HTED is a large scale nonlinear programming problem. Various optimization methods have been applied to the multiperiod HTED, but most neglect important network characteristics or require decomposition into thermal and hydro subproblems. The algorithm described here exploits the special bordered block diagonal structure and sparsity of the Newton system for the first order necessary conditions to result in a fast efficient algorithm that can account for all network aspects. Applying this new algorithm challenges a conventional method for the use of available hydro resources known as the peak shaving heuristic.

  7. Proposal and Its Evaluation of a Shoulder-Surfing Attack Resistant Authentication Method:Secret Tap with Double Shift

    OpenAIRE

    Yoshihiro Kita; Fumio Sugai; MiRang Park; Naonobu Okazaki

    2015-01-01

    Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile terminals store several types of important data, such as personal information. Therefore, it is necessary to lock and unlock terminals using a personal authentication method such as personal identification numbers (PINs) in order to prevent data theft. However, most existing authentication methods have a common problem referred to here as “shoulder-surfing”, in which authentication information is...

  8. Subterfuge Hegemony: The Simmering Politics of the Shelved Hong Kong Moral and National Education Debates in the Media

    Science.gov (United States)

    Koh, Aaron

    2018-01-01

    The implementation of moral and national education (MNE) in Hong Kong came to a stand-still when in 2012 anti-MNE student protests triumphantly saw it being shelved. Many perceived MNE as indoctrination and politically motivated by the leadership. Five years have gone by since the demise of the MNE. Ostensibly, the struggle for hegemonic control…

  9. Distribution of illegal incident characteristics: cases of bank fraud and embezzlement, computer-related crime, and insider theft from drug manufacturers and distributors

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J M

    1979-10-01

    Three data sets were used to estimate joint and conditional probability distributions between various variables of interest in bank fraud and embezzlement (BF and E) cases of $10,000 dollars or more, computer-related crime cases of various types, and cases of insider theft from drug manufacturers and distributors. This report describes in tabular form the information contained in the three rather extensive data sets from industries facing insider threats which, in one or more dimensions, are analogous to insider threats potentially confronting managers in the nuclear industry. The data in Tables 1 through 29 were computed from the 313 cases of bank fraud and embezzlement (BF and E) representing losses of $10,000 or more reported to the Federal Deposit Insurance Corporation (FDIC) for the period 1977 to 1978. The data in Tables 30 through 64 were computed from the 461 cases of computer-related crime obtained from SRI International for the period 1958 to 1978. These incidents include inventory manipulations designed to hide errors, phony entries used to cover embezzlements, schemes used to penetrate a system and surreptitiously bring about a system crash, and sabotage. The data in Tables 65 through 67 were computed from data reported by the Drug Enforcement Agency (DEA) for the period 1973 to 1978. These data, though limited, provided several interesting insights into the insider-threat problem.

  10. The application of a figure of merit for nuclear explosive utility as a metric for material attractiveness in a nuclear material theft scenario

    International Nuclear Information System (INIS)

    King, Wayne E.; Bradley, Keith; Jones, Edwin D.; Kramer, Kevin J.; Latkowski, Jeffery F.; Robel, Martin; Sleaford, Brad W.

    2010-01-01

    Effective integration of nonproliferation management into the design process is key to the broad deployment of advanced nuclear energy systems, and is an explicit goal of the Laser Inertial Fusion Energy (LIFE) project at Lawrence Livermore National Laboratory. The nuclear explosives utility of a nuclear material to a state (proliferator) or sub-state (terrorist) is a critical factor to be assessed and is one aspect of material attractiveness. In this work, we approached nuclear explosives utility through the calculation of a 'figure of merit' (FOM) that has recently been developed to capture the relative viability and difficulty of constructing nuclear explosives starting from various nuclear material forms and compositions. We discuss the integration of the figure of merit into an assessment of a nuclear material theft scenario and its use in the assessment. This paper demonstrates that material attractiveness is a multidimensional concept that embodies more than the FOM. It also seeks to propose that other attributes may be able to be quantified through analogous FOMs (e.g., transformation) and that, with quantification, aggregation may be possible using concepts from the risk community.

  11. The application of a figure of merit for nuclear explosive utility as a metric for material attractiveness in a nuclear material theft scenario

    Energy Technology Data Exchange (ETDEWEB)

    King, Wayne E., E-mail: weking@llnl.go [Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Bradley, Keith [Global Security Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Jones, Edwin D. [Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Kramer, Kevin J.; Latkowski, Jeffery F. [Engineering Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Robel, Martin [Physical and Life Sciences Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States); Sleaford, Brad W. [Engineering Directorate, Lawrence Livermore National Laboratory, Livermore, CA 94551 (United States)

    2010-11-15

    Effective integration of nonproliferation management into the design process is key to the broad deployment of advanced nuclear energy systems, and is an explicit goal of the Laser Inertial Fusion Energy (LIFE) project at Lawrence Livermore National Laboratory. The nuclear explosives utility of a nuclear material to a state (proliferator) or sub-state (terrorist) is a critical factor to be assessed and is one aspect of material attractiveness. In this work, we approached nuclear explosives utility through the calculation of a 'figure of merit' (FOM) that has recently been developed to capture the relative viability and difficulty of constructing nuclear explosives starting from various nuclear material forms and compositions. We discuss the integration of the figure of merit into an assessment of a nuclear material theft scenario and its use in the assessment. This paper demonstrates that material attractiveness is a multidimensional concept that embodies more than the FOM. It also seeks to propose that other attributes may be able to be quantified through analogous FOMs (e.g., transformation) and that, with quantification, aggregation may be possible using concepts from the risk community.

  12. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation

  13. This illness diminishes me. What it does is like theft. A qualitative synthesis of people's experiences of living with asthma

    OpenAIRE

    Pickles, K; Eassey, D; Reddel, H; Locock, L; Kirkpatrick, SF; Smith, L

    2017-01-01

    Background: What matters to people in their everyday experiences of living with asthma is influenced by a diverse range of personal, social, medical and environmental factors. Previous reviews of the asthma literature have largely focused on medical aspects of asthma or specific population groups with particular needs. Objective: To identify, describe and synthesise from the available qualitative literature the views and experiences of adults living with asthma. Method: We syst...

  14. Preventing thefts and wilful damage

    CERN Multimedia

    DG Unit

    2011-01-01

    The best means of preventing crime is to make it difficult to commit. As the summer holidays begin, in everybody’s interest we advise the following precautions: 1. MONEY, VALUABLES & KEYS Never leave money or objects of value unattended in offices or changing rooms, even locked. Keys and spares must always be taken away or kept in a safe place. Supposedly “safe” hiding places such as drawers, even locked, metal boxes and flower pots, are well known to burglars and should be avoided. Change lock codes regularly. 2. DOORS & WINDOWS Offices, workshops and meeting-rooms, etc. should be locked when vacated. Care should also be taken that windows are properly shut, especially if they are easily accessible from the outside. 3. VANDALISM If you witness an act of vandalism of public or private property, please report all the facts and your observations immediately to the CERN Fire Brigade (74444). 4. REPORTING INCIDENTS Every misdemeanour solved increases the chances of others be...

  15. Classification system of radioactive sources to attend radiological emergencies, the last three cases of theft in Mexico; Sistema de clasificacion fuentes radiactivas para atender emergencias radiologicas, los tres ultimos casos de robo en Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Ruiz C, M. A.; Garcia M, T., E-mail: marcoa.ruiz@inin.gob.mx [ININ, Carretera Mexico-Toluca s/n, 52750 Ocoyoacac, Estado de Mexico (Mexico)

    2014-10-15

    Following last three cases of theft of radioactive material in Mexico is convenient to describe how to classify radioactive sources and make decisions to confront the emergency. For this there are IAEA publications, which determine the Dangerous values or value D, for different radionuclides and activity values usually used in practice, and employees in industry, medicine and research. The literature also describes the different scenarios to determine the activity of different radioisotopes that can cause deterministic effects to workers or the population and thus classify the degree of relative risk that these sources may be involved in an accident. Defined the classification of sources, we can make decisions to respond to emergencies in their proper perspective also alert the public to the description of the risks associated with the sources in question, without this leading to a situation of greater crisis. (Author)

  16. Study on Pick-pocketing Theft-- with the Relevant Provisions to the Eighth Criminal Law Amendment as Background%扒窃型盗窃罪研究——以《刑法修正案(八)》相关规定为背景

    Institute of Scientific and Technical Information of China (English)

    薛进展; 蔡正华

    2012-01-01

    扒窃型盗窃罪是《刑法修正案(八)》新增的盗窃罪独立定罪类型,也拓宽了扒窃行为入罪的评价路径。刑法上的扒窃是指“以非法占有为目的,秘密窃取他人随身携带的财物的行为”。但并不是所有的扒窃都可以构成扒窃型盗窃罪,只有符合“公共场合”、“从他人身上”以及“取得”等标准的扒窃行为才能构成扒窃型盗窃罪。扒窃型盗窃罪作为内涵最为丰富的盗窃罪定罪类型,其外延受到的限制最严格,所以当出现多种类型盗窃罪竞合时,理应首先认定行为是否构成扒窃型盗窃罪。%The pick-pocketing type Theft is a new type of independent theft in the "eighth Criminal Law Amendment ", which at the same time clear the way of incorporating pick-pocketing behavior into crime. Pick-pocketing in the criminal law referred to those behaviors which are for the purpose of illegal possession and by means of stealing others' property carried with in secret. However not all of pick-pocketing may constitute of pick-pocketing type theft, only those which are conducted in the "public places", from others' body and acquire may meet the definition. Pick-pocketing theft criminal type, who is the richest in connotation, has also the strictest restriction in its epitaxial. So when we meet multiple types of Theft competing, pick-pocketing type theft shall be considered in the first.

  17. Prediksi Kerawanan Wilayah Terhadap Tindak Pencurian Sepeda Motor Menggunakan Metode (S)ARIMA Dan CART

    OpenAIRE

    Utomo, Pradita Eko Prasetyo; SN, Azhari

    2017-01-01

    Motor vehicle theft is a crime that is most common in Indonesia. Growth of vehicle motorcycle significant in each year accompanied by the increasing theft of motorcycles in each year, we need a system that is able to forecast the development and the theft of the motorcycle. This research proposes the development of forecasting models vulnerability criminal offense of theft of motorcycles with ARIMA forecasting method. This method not only forecast from variable of theft but also residents...

  18. New method for assessing risks of email

    Science.gov (United States)

    Raja, Seyyed H.; Afrooz, Farzad

    2013-03-01

    E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.

  19. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  20. Preventing thefts and damage to property

    CERN Multimedia

    2013-01-01

    The best means of preventing crime is to make it difficult to commit. As the summer holidays begin, in everybody's interest we advise the following precautions.   1. Money, valuables and keys Never leave money or objects of value unattended in offices or changing rooms, even if they are locked. Keys and spares must always be taken away or kept in a safe place. Supposedly "safe" hiding places such as drawers, even locked ones, metal boxes and flower pots, are well known to burglars and should be avoided. Change lock codes regularly. 2. Doors and windows Offices, workshops and meeting rooms, etc. should be locked when vacated. Care should also be taken that windows are properly shut, especially if they are easily accessible from the outside. 3. Vandalism If you witness an act of vandalism of public or private property, please report all the facts and your observations immediately to the CERN Fire Brigade (74444). 4. Reporting incidents Every misdemeanour solved increase...

  1. Choline Theft-An Inside Job.

    Science.gov (United States)

    Mora-Ortiz, Marina; Claus, Sandrine Paule

    2017-09-13

    Choline is a crucial methyl donor necessary for epigenetic regulation. In this issue of Cell Host & Microbe, Romano et al. (2017) demonstrate that choline-utilizing gut bacteria compete with their host for this essential resource, calling for a systematic consideration of gut microbial composition for personalized diet recommendations. Copyright © 2017. Published by Elsevier Inc.

  2. Chemical Safety Alert: Anhydrous Ammonia Theft

    Science.gov (United States)

    This extremely hazardous substance is largely used as an agricultural fertilizer, but is also a key ingredient in the illegal production of methamphetamines. It is stored as a liquid under pressure, but becomes a toxic gas when released.

  3. Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat)

    International Nuclear Information System (INIS)

    Strait, R.S.; Renis, T.A.

    1986-01-01

    The Safeguards Evaluation Method - Insider Threat, developed by Lawrence Livermore National Laboratory, is a field-applicable tool to evaluate facility safeguards against theft or diversion of special nuclear material (SNM) by nonviolent insiders. To ensure successful transfer of this technology from the laboratory to DOE field offices and contractors, LLNL developed a three-part package. The package includes a workbook, user-friendly microcomputer software, and a three-day training program. The workbook guides an evaluation team through the Safeguards Evaluation Method and provides forms for gathering data. The microcomputer software assists in the evaluation of safeguards effectiveness. The software is designed for safeguards analysts with no previous computer experience. It runs on an IBM Personal Computer or any compatible machine. The three-day training program is called the Insider Protection Workshop. The workshop students learn how to use the workbook and the computer software to assess insider vulnerabilities and to evaluate the benefits and costs of potential improvements. These activities increase the students' appreciation of the insider threat. The workshop format is informal and interactive, employing four different instruction modes: classroom presentations, small-group sessions, a practical exercise, and ''hands-on'' analysis using microcomputers. This approach to technology transfer has been successful: over 100 safeguards planners and analysts have been trained in the method, and it is being used at facilities through the DOE complex

  4. A comparison of moving object detection methods for real-time moving object detection

    Science.gov (United States)

    Roshan, Aditya; Zhang, Yun

    2014-06-01

    Moving object detection has a wide variety of applications from traffic monitoring, site monitoring, automatic theft identification, face detection to military surveillance. Many methods have been developed across the globe for moving object detection, but it is very difficult to find one which can work globally in all situations and with different types of videos. The purpose of this paper is to evaluate existing moving object detection methods which can be implemented in software on a desktop or laptop, for real time object detection. There are several moving object detection methods noted in the literature, but few of them are suitable for real time moving object detection. Most of the methods which provide for real time movement are further limited by the number of objects and the scene complexity. This paper evaluates the four most commonly used moving object detection methods as background subtraction technique, Gaussian mixture model, wavelet based and optical flow based methods. The work is based on evaluation of these four moving object detection methods using two (2) different sets of cameras and two (2) different scenes. The moving object detection methods have been implemented using MatLab and results are compared based on completeness of detected objects, noise, light change sensitivity, processing time etc. After comparison, it is observed that optical flow based method took least processing time and successfully detected boundary of moving objects which also implies that it can be implemented for real-time moving object detection.

  5. What Price Privacy? (and why identity theft is about neither identity nor theft)

    National Research Council Canada - National Science Library

    Shostack, Adam; Syverson, Paul

    2004-01-01

    It is commonplace to note that in surveys people claim to place a high value on privacy while they paradoxically throw away their privacy in exchange for a free hamburger or a two dollar discount on groceries...

  6. 75 FR 11005 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-03-10

    ...)....... 91 41867 2.1735 45 TOYOTA......... COROLLA 740 351414 2.1058 46 NISSAN......... INFINITI FX45... 18579 1.6147 70 NISSAN......... INFINITI M35/M45.... 48 30144 1.5924 71 TOYOTA......... YARIS 252 159292... QUATTRO/ 18 11660 1.5437 S6/S6 AVANT. 77 FORD MOTOR CO.. FIVE HUNDRED........ 94 61270 1.5342 78 TOYOTA...

  7. 76 FR 65610 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-10-24

    ......... S-CLASS 22 10,189 2.1592 34 GENERAL MOTORS..... CHEVROLET HHR...... 172 80,781 2.1292 35 TOYOTA... MOTOR CO...... LINCOLN TOWN CAR... 24 11,596 2.0697 39 TOYOTA AVALON 45 22,030 2.0427 40 NISSAN 350Z 1....7552 50 TOYOTA CAMRY/SOLARA....... 781 447,882 1.7438 51 TOYOTA COROLLA 632 363,515 1.7386 52 HYUNDAI...

  8. 77 FR 38024 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-06-26

    ............ SEBRING......... 130 43,022 3.0217 8 TOYOTA LEXUS SC........ 1 335 2.9851 9 CHRYSLER......... DODGE...,199 2.1822 24 TOYOTA CAMRY/SOLARA.... 691 317,754 2.1746 25 GENERAL MOTORS... CHEVROLET MALIBU 381 183...... SATURN VUE...... 4 2,904 1.3774 47 TOYOTA 4RUNNER......... 18 13,345 1.3488 48 NISSAN MAXIMA 89 66,639 1...

  9. 77 FR 58500 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2012-09-21

    ....0217 8 TOYOTA LEXUS SC 1 335 2.9851 9 CHRYSLER DODGE AVENGER....... 197 67,604 2.9140 10 KIA RIO 55 18....1822 24 TOYOTA CAMRY/SOLARA........ 691 317,754 2.1746 25 GENERAL MOTORS...... CHEVROLET MALIBU.... 381......... SATURN VUE 4 2,904 1.3774 47 TOYOTA 4RUNNER 18 13,345 1.3488 48 NISSAN MAXIMA 89 66,639 1.3356 49 NISSAN...

  10. 76 FR 36486 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2011-06-22

    ... 10,189 2.1592 33 GENERAL MOTORS......... CHEVROLET HHR 172 80,781 2.1292 34 TOYOTA SCION TC 57 27,179... LINCOLN TOWN CAR....... 24 11,596 2.0697 38 TOYOTA AVALON 45 22,030 2.0427 39 NISSAN 350Z 1 503 1.9881 40....7898 48 GENERAL MOTORS......... CADILLAC CTS 91 50,926 1.7869 49 VOLVO S60 12 6,837 1.7552 50 TOYOTA...

  11. 75 FR 47720 - Final Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2010-08-09

    ........... 223 99681 2.2371 43 MERCEDES-BENZ......... 220 (S-CLASS)........ 91 41867 2.1735 44 TOYOTA COROLLA 740... M35/M45..... 48 30144 1.5924 71 TOYOTA YARIS 252 159292 1.5820 72 HONDA ACCORD 664 421206 1.5764 73............ FIVE HUNDRED......... 94 61270 1.5342 78 TOYOTA AVALON 121 79137 1.5290 79 NISSAN MURANO 137 92516 1...

  12. 78 FR 41016 - Preliminary Theft Data; Motor Vehicle Theft Prevention Standard

    Science.gov (United States)

    2013-07-09

    ... MOTORS..... CHEVROLET CAMARO.. 196 97,518 2.0099 21 MERCEDES-BENZ...... S-CLASS 19 9,652 1.9685 22 TOYOTA... 62,836 1.6074 32 TOYOTA CAMRY/SOLARA...... 781 486,288 1.6060 33 FORD MOTOR CO...... TAURUS 118 76,821 1.5360 34 TOYOTA YARIS 38 24,850 1.5292 35 AUDI AUDI A3 10 6,734 1.4850 36 CHRYSLER 300 42 28,373...

  13. Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

    Science.gov (United States)

    Rojali, Salman, Afan Galih; George

    2017-08-01

    Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.

  14. Perturbation methods

    CERN Document Server

    Nayfeh, Ali H

    2008-01-01

    1. Introduction 1 2. Straightforward Expansions and Sources of Nonuniformity 23 3. The Method of Strained Coordinates 56 4. The Methods of Matched and Composite Asymptotic Expansions 110 5. Variation of Parameters and Methods of Averaging 159 6. The Method of Multiple Scales 228 7. Asymptotic Solutions of Linear Equations 308 References and Author Index 387 Subject Index 417

  15. Distillation methods

    International Nuclear Information System (INIS)

    Konecny, C.

    1975-01-01

    Two main methods of separation using the distillation method are given and evaluated, namely evaporation and distillation in carrier gas flow. Two basic apparatus are described for illustrating the methods used. The use of the distillation method in radiochemistry is documented by a number of examples of the separation of elements in elemental state, volatile halogenides and oxides. Tables give a survey of distillation methods used for the separation of the individual elements and give conditions under which this separation takes place. The suitability of the use of distillation methods in radiochemistry is discussed with regard to other separation methods. (L.K.)

  16. galerkin's methods

    African Journals Online (AJOL)

    user

    The assumed deflection shapes used in the approximate methods such as in the Galerkin's method were normally ... to direct compressive forces Nx, was derived by Navier. [3]. ..... tend to give higher frequency and stiffness, as well as.

  17. Mining Method

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Shik; Lee, Kyung Woon; Kim, Oak Hwan; Kim, Dae Kyung [Korea Institute of Geology Mining and Materials, Taejon (Korea, Republic of)

    1996-12-01

    The reducing coal market has been enforcing the coal industry to make exceptional rationalization and restructuring efforts since the end of the eighties. To the competition from crude oil and natural gas has been added the growing pressure from rising wages and rising production cost as the workings get deeper. To improve the competitive position of the coal mines against oil and gas through cost reduction, studies to improve mining system have been carried out. To find fields requiring improvements most, the technologies using in Tae Bak Colliery which was selected one of long running mines were investigated and analyzed. The mining method appeared the field needing improvements most to reduce the production cost. The present method, so-called inseam roadway caving method presently is using to extract the steep and thick seam. However, this method has several drawbacks. To solve the problems, two mining methods are suggested for a long term and short term method respectively. Inseam roadway caving method with long-hole blasting method is a variety of the present inseam roadway caving method modified by replacing timber sets with steel arch sets and the shovel loaders with chain conveyors. And long hole blasting is introduced to promote caving. And pillar caving method with chock supports method uses chock supports setting in the cross-cut from the hanging wall to the footwall. Two single chain conveyors are needed. One is installed in front of chock supports to clear coal from the cutting face. The other is installed behind the supports to transport caved coal from behind. This method is superior to the previous one in terms of safety from water-inrushes, production rate and productivity. The only drawback is that it needs more investment. (author). 14 tabs., 34 figs.

  18. Projection Methods

    DEFF Research Database (Denmark)

    Wagner, Falko Jens; Poulsen, Mikael Zebbelin

    1999-01-01

    When trying to solve a DAE problem of high index with more traditional methods, it often causes instability in some of the variables, and finally leads to breakdown of convergence and integration of the solution. This is nicely shown in [ESF98, p. 152 ff.].This chapter will introduce projection...... methods as a way of handling these special problems. It is assumed that we have methods for solving normal ODE systems and index-1 systems....

  19. Discipline methods

    OpenAIRE

    Maria Kikila; Ioannis Koutelekos

    2012-01-01

    Child discipline is one of the most important elements of successful parenting. As discipline is defined the process that help children to learn appropriate behaviors and make good choices. Aim: The aim of the present study was to review the literature about the discipline methods. The method οf this study included bibliography research from both the review and the research literature, mainly in the pubmed data base which referred to the discipline methods. Results: In the literature it is ci...

  20. Maintenance methods

    International Nuclear Information System (INIS)

    Sanchis, H.; Aucher, P.

    1990-01-01

    The maintenance method applied at the Hague is summarized. The method was developed in order to solve problems relating to: the different specialist fields, the need for homogeneity in the maintenance work, the equipment diversity, the increase of the materials used at the Hague's new facilities. The aim of the method is to create a knowhow formalism, to facilitate maintenance, to ensure the running of the operations and to improve the estimation of the maintenance cost. One of the method's difficulties is the demonstration of the profitability of the maintenance operations [fr

  1. Spectroscopic methods

    International Nuclear Information System (INIS)

    Ivanovich, M.; Murray, A.

    1992-01-01

    The principles involved in the interaction of nuclear radiation with matter are described, as are the principles behind methods of radiation detection. Different types of radiation detectors are described and methods of detection such as alpha, beta and gamma spectroscopy, neutron activation analysis are presented. Details are given of measurements of uranium-series disequilibria. (UK)

  2. Method Mixins

    DEFF Research Database (Denmark)

    Ernst, Erik

    2002-01-01

    . Method mixins use shared name spaces to transfer information between caller and callee, as opposed to traditional invocation which uses parameters and returned results. This relieves a caller from dependencies on the callee, and it allows direct transfer of information further down the call stack, e......The procedure call mechanism has conquered the world of programming, with object-oriented method invocation being a procedure call in context of an object. This paper presents an alternative, method mixin invocations, that is optimized for flexible creation of composite behavior, where traditional...

  3. Method Mixins

    DEFF Research Database (Denmark)

    Ernst, Erik

    2002-01-01

    invocation is optimized for as-is reuse of existing behavior. Tight coupling reduces flexibility, and traditional invocation tightly couples transfer of information and transfer of control. Method mixins decouple these two kinds of transfer, thereby opening the doors for new kinds of abstraction and reuse......The procedure call mechanism has conquered the world of programming, with object-oriented method invocation being a procedure call in context of an object. This paper presents an alternative, method mixin invocations, that is optimized for flexible creation of composite behavior, where traditional....... Method mixins use shared name spaces to transfer information between caller and callee, as opposed to traditional invocation which uses parameters and returned results. This relieves a caller from dependencies on the callee, and it allows direct transfer of information further down the call stack, e...

  4. Dosimetry methods

    DEFF Research Database (Denmark)

    McLaughlin, W.L.; Miller, A.; Kovacs, A.

    2003-01-01

    Chemical and physical radiation dosimetry methods, used for the measurement of absorbed dose mainly during the practical use of ionizing radiation, are discussed with respect to their characteristics and fields of application....

  5. Method Mixins

    DEFF Research Database (Denmark)

    Ernst, Erik

    2005-01-01

    The world of programming has been conquered by the procedure call mechanism, including object-oriented method invocation which is a procedure call in context of an object. This paper presents an alternative, method mixin invocations, that is optimized for flexible creation of composite behavior, ...... the call stack, e.g., to a callee's callee. The mechanism has been implemented in the programming language gbeta. Variants of the mechanism could be added to almost any imperative programming language.......The world of programming has been conquered by the procedure call mechanism, including object-oriented method invocation which is a procedure call in context of an object. This paper presents an alternative, method mixin invocations, that is optimized for flexible creation of composite behavior...

  6. Ensemble Methods

    Science.gov (United States)

    Re, Matteo; Valentini, Giorgio

    2012-03-01

    Ensemble methods are statistical and computational learning procedures reminiscent of the human social learning behavior of seeking several opinions before making any crucial decision. The idea of combining the opinions of different "experts" to obtain an overall “ensemble” decision is rooted in our culture at least from the classical age of ancient Greece, and it has been formalized during the Enlightenment with the Condorcet Jury Theorem[45]), which proved that the judgment of a committee is superior to those of individuals, provided the individuals have reasonable competence. Ensembles are sets of learning machines that combine in some way their decisions, or their learning algorithms, or different views of data, or other specific characteristics to obtain more reliable and more accurate predictions in supervised and unsupervised learning problems [48,116]. A simple example is represented by the majority vote ensemble, by which the decisions of different learning machines are combined, and the class that receives the majority of “votes” (i.e., the class predicted by the majority of the learning machines) is the class predicted by the overall ensemble [158]. In the literature, a plethora of terms other than ensembles has been used, such as fusion, combination, aggregation, and committee, to indicate sets of learning machines that work together to solve a machine learning problem [19,40,56,66,99,108,123], but in this chapter we maintain the term ensemble in its widest meaning, in order to include the whole range of combination methods. Nowadays, ensemble methods represent one of the main current research lines in machine learning [48,116], and the interest of the research community on ensemble methods is witnessed by conferences and workshops specifically devoted to ensembles, first of all the multiple classifier systems (MCS) conference organized by Roli, Kittler, Windeatt, and other researchers of this area [14,62,85,149,173]. Several theories have been

  7. Method Mixins

    DEFF Research Database (Denmark)

    Ernst, Erik

    2005-01-01

    The world of programming has been conquered by the procedure call mechanism, including object-oriented method invocation which is a procedure call in context of an object. This paper presents an alternative, method mixin invocations, that is optimized for flexible creation of composite behavior...... of abstraction and reuse. Method mixins use shared name spaces to transfer information between caller and callee, as opposed to traditional invocation which uses parameters and returned results. This relieves the caller from dependencies on the callee, and it allows direct transfer of information further down...... the call stack, e.g., to a callee's callee. The mechanism has been implemented in the programming language gbeta. Variants of the mechanism could be added to almost any imperative programming language....

  8. THEfT AND ROBBERY IN CHRYSOSTOM'S TIME

    African Journals Online (AJOL)

    This study will make a contribution to our knowledge ... was dangerous, and travellers could fall victim to the forces of nature at sea or on land .... they can even display love.48 But this type of love stems from an impure heart, which is false and ... Chrysostom tells us that when you find your goods in someone's pos- session ...

  9. 77 FR 13449 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2012-03-06

    ... a user of consumer reports must employ when a consumer reporting agency sends the user a notice of... imposed under the FCRA ``with respect to consumer reporting agencies, persons who use consumer reports... uses consumer reports, directly or indirectly, in connection with a credit transaction; (ii) furnishes...

  10. Grand-scale theft: kleptoplasty in parasitic plants?

    Science.gov (United States)

    Krause, Kirsten

    2015-04-01

    The angiosperm Rafflesia lives as an obligate holoparasite in intimate contact with its hosts, vines in the genus Tetrastigma. The hosts are forced to supply the parasite with all the necessary nutrients. Novel data tentatively suggest that the thievery may happen on a larger scale and include entire organellar genomes. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Reducing the threat of nuclear theft and sabotage

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling events of September II, 2001 make clear that the threat of well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. There is evidence that Osama bin Laden's Al Quaida organization is seeking weapons of mass destruction, and has attempted to purchase stolen nuclear material from the former Soviet Union for use in nuclear explosives. Ensuring that the technologies and materials of weapons of mass destruction - especially weapons-usable nuclear materials, do not fall into the hands of terrorist groups or hostile states must therefore be a central element of the coming global battle to prevent mass-destruction terrorism. At the same time, nuclear facilities and radioactive materials - along with a wide range of other especially hazardous facilities and materials - must be protected from mass-consequence sabotage. Limited access to fissile materials, the essential ingredients of nuclear weapons, is the principal technical barrier to nuclear proliferation in the world today. The international community has an overwhelming interest in seeing that all such material is secure and accounted for. These events highlight the urgent need to: Dramatically expand international cooperation to upgrade security and accounting for weapons- usable nuclear material, in the former Soviet Union and worldwide, with the goal of ensuring that all such material is protected to stringent standards within a few years; Ensure that all nuclear facilities and materials (and other particularly hazardous facilities) are secure from mass-consequence sabotage; Strengthen national and international standards for security of nuclear materials and facilities; Greatly expand international efforts to interdict nuclear smuggling, including the difficult but essential task of strengthening efforts to share intelligence in this critical area; Reduce the number of sites where significant quantities of weapons-usable nuclear material exist, and the size of the stockpiles of such materials (through measures such as using these materials as fuel, blending down highly enriched uranium, or immobilizing plutonium); Reconsider the design basis threat used in designing and analyzing security systems, in the light of the magnitude of the threat demonstrated on September II; Provide greatly increased international training in security for nuclear materials and facilities - including emphasizing the crucial role of such security in preventing the spread of nuclear weapons and stopping nuclear terrorism. This paper analyzes each of these areas and provides recommendations for specific steps that should be taken toward the goal of a world in which all weapons-usable nuclear material is secure and accounted for, and all nuclear facilities secured from sabotage, with sufficient transparency that the international community can have confidence that this is the case. Over the long term, the paper concludes, the goal should be to attempt to come as close as possible to the 'stored weapon standard' proposed by a committee of the U.S. National Academy of Sciences in 1994 - that is to say, to protect and account for weapons-usable nuclear materials as rigorously as the nuclear weapon states protect and account for nuclear weapons themselves. The road to that objective is a long one, however

  12. Unauthorized Data Theft from Bluetooth-Enabled Devices Using RFCOMMVulnerabilities

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The article is dedicated to the attacks on Bluetooth devices. The described attacks allow hackers to steal private data from mobile devices. The attack is based on vulnerabilities found in RFCOMM-level of Bluetooth protocols stack. The described attack is even more dangerous because of the fact that a hacker can also implement any AT-command on the attacked mobile phone.

  13. Nuclear theft and sabotage. Priorities for reducing new threats

    International Nuclear Information System (INIS)

    Bunn, Matthew; Bunn, George

    2001-01-01

    The appalling attacks of 11 September 2001 in the United States make clear that the threat of large, well-organized global terrorist groups bent on causing mass destruction is not hypothetical but real. The attackers achieved horrifying destruction with box-cutters. The results could have been even more horrific if the attackers would have had access to, and used, weapons of mass destruction. Ensuring that technologies and materials for weapons of mass destruction - especially weapons-usable nuclear materials, whose acquisition is the most difficult part of making a nuclear bomb - do not fall into the hands of terrorist groups or hostile States must be a central element of the coming global effort to prevent catastrophic terrorism. At the same time, nuclear facilities and materials - along with a wide range of other especially hazardous facilities and materials must be protected from mass-consequence sabotage. Securing these materials and facilities must be a top priority on the international agenda - pursued at every opportunity, at every level of authority, until the job is done. At the same time, the threats against which we must defend have to be fundamentally reconsidered. On 11 September, the threat revealed itself to be bigger, smarter, better organized, and more deadly than the threats most of the world's security systems were designed to defend against. We must ensure that our defensive response is every bit as intelligent and capable as the September attackers. And we may have to rethink some of the approaches to nuclear energy that the world has been pursuing or contemplating. Every reasonable effort must be made to ensure that nuclear materials and facilities are effectively secured. In the past, many scenarios with enormously high consequences were dismissed as too unlikely to contribute much to overall risk - but now many of these probability estimates will have to be revised. A far-reaching new effort is needed to strengthen security for nuclear materials and facilities worldwide, and to put stringent security standards in place. This is a global problem, requiring a global solution - but the best global solution may be a mosaic including national, bilateral, and multilateral pieces

  14. 78 FR 23637 - Identity Theft Red Flags Rules

    Science.gov (United States)

    2013-04-19

    ... notifications of changes of address under certain circumstances. DATES: Effective date: May 20, 2013; Compliance... Card Issuer Rules III. Related Matters A. Cost-Benefit Considerations (CFTC) and Economic Analysis (SEC... Address Control Issues with Implementing Cloud Computing (May 2010), available at http://www.gao.gov/new...

  15. Theft and Mutilation in an Academic Library: College of Medicine ...

    African Journals Online (AJOL)

    Statistics had shown the seemingly excesses on the part of clientele and if the excesses is unchecked it may bring into extinction the existence of the medical library studied in particular and others in general. It is an open truth that medical journals and books are these days very prohibitive. Therefore, their preservation is a ...

  16. A Preliminary Model of Insider Theft of Intellectual Property

    Science.gov (United States)

    2011-01-01

    social, and technical factors. We expect future work to use modeling and simulation to identify and evaluate the effectiveness of deterrent measures in...umentation tools and has provided solutions across the energy, consumer business, health care, communications, publishing, manufacturing, media...received his B.A. from Colgate University and his Masters and Ph.D. in Psychology from Duke University. He per- formed a fellowship in Psychology in the

  17. Behind the Box: A Sociological Analysis of Theft, Tampering and ...

    African Journals Online (AJOL)

    There is no gainsaying the fact that besides the physical requirements of food and shelter, man has another fundamental need, the need to communicate with his fellow human beings. The urge for communication is natural, primal and, in our modern interdependent world, a necessity. Indeed, our social life revolves around ...

  18. Code Recognition Device for Automobile, a Panacea for Automobiles Theft

    Directory of Open Access Journals (Sweden)

    Ozomata David AHMED

    2011-06-01

    Full Text Available Code Recognition Device is a security device for automobiles. It responds only to the right sequence of codes that are keyed from the key pad. This closes the electrical circuitry of the automobile and enables it to start. If a wrong key is touched, it resets the device which disengages the electrical circuit of the automobile from the power supply. The device works properly on closing all the doors of the automobile, otherwise it cannot start. Also, once the automobile is in operation, opening of any door will disengage the device and the engine will stop. To restart the engine, the doors must be closed and the codes rendered sequentially-in this case the codes are 1974.

  19. Theft of Debris from the Space Shuttle Columbia: Criminal Penalties

    National Research Council Canada - National Science Library

    Murnane, Andrew W; Eig, Larry

    2003-01-01

    .... This report briefly describes possible criminal penalties for conversion of government property, and does not address issues related to the personal property of the Columbia's crew. This report will be updated as warranted.

  20. A Preliminary Model of Insider Theft of Intellectual Property

    Science.gov (United States)

    2011-06-01

    insider IT sabotage [Moore 2008] [Cappelli 2006]. The primary personality model used in CWB research is the Five Factor Model ( FFM ). The FFM includes... FFM dimensions and CWBs, Salgado found 44 studies conducted between 1990 and 1999 that examine the relationship between the FFM dimensions and deviant

  1. The President’s Identity Theft Task Force Report

    Science.gov (United States)

    2008-09-01

    effeCtIve, RISk-BASed ReSPOnSeS tO dAtA BReACheS SUffeRed By fedeRAl AGenCIeS Issue Data Breach Guidance to Agencies Publish a “Routine Use...and developing a data breach response plan. The FTC will continue to seek opportunities to work with state and local officials and policymakers...of fiscal year 2008. ReCOMMendAtIOn 4: enSURe effeCtIve, RISk-BASed ReSPOnSeS tO dAtA BReACheS SUffeRed By fedeRAl AGenCIeS The Task Force

  2. Identity theft and consumers' reaction to preventive technological innovations.

    Science.gov (United States)

    Ainscough, Thomas L; Brody, Richard G; Trocchia, Philip J

    2007-08-01

    The use of identification technology by commercial entities has broad and, for some consumers, disturbing social implications. This two-phase study was done to specify consumers' concerns regarding various identification technologies which may be encountered in retail environments. From the qualitative findings, a 26-item survey was constructed to quantify identified areas of concern with 303 survey participants (147 women and 156 men), whose mean age category was 30 to 39 years. Using exploratory factor analysis (principal components with varimax rotation), five dimensions of consumers' concern emerged: privacy, ethics, health, humanity, and complexity.

  3. Identity Theft: Gentrification, Latinidad, and American Girl Marisol Luna

    Science.gov (United States)

    Rudolph, Jennifer Domino

    2009-01-01

    Released by Mattel in 2005, American Girl doll Marisol Luna quickly provoked controversy. The doll's accompanying narrative depicts her Chicago neighborhood of Pilsen as "dangerous" and recounts her family's move to the suburbs. Pilsen, located just south and west of downtown Chicago, has a long history as a Mexican (im)migrant port of…

  4. Fighting identity theft with advances in fingerprint recognition

    CSIR Research Space (South Africa)

    Mathekga, D

    2015-10-01

    Full Text Available The ease with which the green South African ID book could be forged has led to many instances of identity fraud, costing retail businesses millions in lost revenue on fraudulently created credit accounts. This has led the government, through...

  5. Statistical methods

    CERN Document Server

    Szulc, Stefan

    1965-01-01

    Statistical Methods provides a discussion of the principles of the organization and technique of research, with emphasis on its application to the problems in social statistics. This book discusses branch statistics, which aims to develop practical ways of collecting and processing numerical data and to adapt general statistical methods to the objectives in a given field.Organized into five parts encompassing 22 chapters, this book begins with an overview of how to organize the collection of such information on individual units, primarily as accomplished by government agencies. This text then

  6. Sieve methods

    CERN Document Server

    Halberstam, Heine

    2011-01-01

    Derived from the techniques of analytic number theory, sieve theory employs methods from mathematical analysis to solve number-theoretical problems. This text by a noted pair of experts is regarded as the definitive work on the subject. It formulates the general sieve problem, explores the theoretical background, and illustrates significant applications.""For years to come, Sieve Methods will be vital to those seeking to work in the subject, and also to those seeking to make applications,"" noted prominent mathematician Hugh Montgomery in his review of this volume for the Bulletin of the Ameri

  7. Characterization methods

    Energy Technology Data Exchange (ETDEWEB)

    Glass, J.T. [North Carolina State Univ., Raleigh (United States)

    1993-01-01

    Methods discussed in this compilation of notes and diagrams are Raman spectroscopy, scanning electron microscopy, transmission electron microscopy, and other surface analysis techniques (auger electron spectroscopy, x-ray photoelectron spectroscopy, electron energy loss spectroscopy, and scanning tunnelling microscopy). A comparative evaluation of different techniques is performed. In-vacuo and in-situ analyses are described.

  8. Digital Methods

    NARCIS (Netherlands)

    Rogers, R.

    2013-01-01

    In Digital Methods, Richard Rogers proposes a methodological outlook for social and cultural scholarly research on the Web that seeks to move Internet research beyond the study of online culture. It is not a toolkit for Internet research, or operating instructions for a software package; it deals

  9. Chromatographic methods

    International Nuclear Information System (INIS)

    Marhol, M.; Stary, J.

    1975-01-01

    The characteristics are given of chromatographic separation and the methods are listed. Methods and data on materials used in partition, adsorption, precipitation and ion exchange chromatography are listed and conditions are described under which ion partition takes place. Special attention is devoted to ion exchange chromatography where tables are given to show the course of values of the partition coefficients of different ions in dependence on the concentration of agents and the course of equilibrium sorptions on different materials in dependence on the solution pH. A theoretical analysis is given and the properties of the most widely used ion exchangers are listed. Experimental conditions and apparatus used for each type of chromatography are listed. (L.K.)

  10. Numerical methods

    CERN Document Server

    Dahlquist, Germund

    1974-01-01

    ""Substantial, detailed and rigorous . . . readers for whom the book is intended are admirably served."" - MathSciNet (Mathematical Reviews on the Web), American Mathematical Society.Practical text strikes fine balance between students' requirements for theoretical treatment and needs of practitioners, with best methods for large- and small-scale computing. Prerequisites are minimal (calculus, linear algebra, and preferably some acquaintance with computer programming). Text includes many worked examples, problems, and an extensive bibliography.

  11. Sampling methods

    International Nuclear Information System (INIS)

    Loughran, R.J.; Wallbrink, P.J.; Walling, D.E.; Appleby, P.G.

    2002-01-01

    Methods for the collection of soil samples to determine levels of 137 Cs and other fallout radionuclides, such as excess 210 Pb and 7 Be, will depend on the purposes (aims) of the project, site and soil characteristics, analytical capacity, the total number of samples that can be analysed and the sample mass required. The latter two will depend partly on detector type and capabilities. A variety of field methods have been developed for different field conditions and circumstances over the past twenty years, many of them inherited or adapted from soil science and sedimentology. The use of them inherited or adapted from soil science and sedimentology. The use of 137 Cs in erosion studies has been widely developed, while the application of fallout 210 Pb and 7 Be is still developing. Although it is possible to measure these nuclides simultaneously, it is common for experiments to designed around the use of 137 Cs along. Caesium studies typically involve comparison of the inventories found at eroded or sedimentation sites with that of a 'reference' site. An accurate characterization of the depth distribution of these fallout nuclides is often required in order to apply and/or calibrate the conversion models. However, depending on the tracer involved, the depth distribution, and thus the sampling resolution required to define it, differs. For example, a depth resolution of 1 cm is often adequate when using 137 Cs. However, fallout 210 Pb and 7 Be commonly has very strong surface maxima that decrease exponentially with depth, and fine depth increments are required at or close to the soil surface. Consequently, different depth incremental sampling methods are required when using different fallout radionuclides. Geomorphic investigations also frequently require determination of the depth-distribution of fallout nuclides on slopes and depositional sites as well as their total inventories

  12. Decontaminating method

    International Nuclear Information System (INIS)

    Furukawa, Toshiharu; Shibuya, Kiichiro.

    1985-01-01

    Purpose: To provide a method of eliminating radioactive contaminations capable of ease treatment for decontaminated liquid wastes and grinding materials. Method: Those organic grinding materials such as fine wall nuts shell pieces cause no secondary contaminations since they are softer as compared with inorganic grinding materials, less pulverizable upon collision against the surface to be treated, being capable of reusing and producing no fine scattering powder. In addition, they can be treated by burning. The organic grinding material and water are sprayed by a nozzle to the surface to be treated, and decontaminated liquid wastes are separated into solid components mainly composed of organic grinding materials and liquid components mainly composed of water by filtering. The thus separated solid components are recovered in a storage tank for reuse as the grinding material and, after repeating use, subjected to burning treatment. While on the other hand, water is recovered into a storage tank and, after repeating use, purified by passing through an ion exchange resin-packed column and decontaminated to discharge. (Horiuchi, T.)

  13. WELDING METHOD

    Science.gov (United States)

    Cornell, A.A.; Dunbar, J.V.; Ruffner, J.H.

    1959-09-29

    A semi-automatic method is described for the weld joining of pipes and fittings which utilizes the inert gasshielded consumable electrode electric arc welding technique, comprising laying down the root pass at a first peripheral velocity and thereafter laying down the filler passes over the root pass necessary to complete the weld by revolving the pipes and fittings at a second peripheral velocity different from the first peripheral velocity, maintaining the welding head in a fixed position as to the specific direction of revolution, while the longitudinal axis of the welding head is disposed angularly in the direction of revolution at amounts between twenty minutas and about four degrees from the first position.

  14. Casting methods

    Science.gov (United States)

    Marsden, Kenneth C.; Meyer, Mitchell K.; Grover, Blair K.; Fielding, Randall S.; Wolfensberger, Billy W.

    2012-12-18

    A casting device includes a covered crucible having a top opening and a bottom orifice, a lid covering the top opening, a stopper rod sealing the bottom orifice, and a reusable mold having at least one chamber, a top end of the chamber being open to and positioned below the bottom orifice and a vacuum tap into the chamber being below the top end of the chamber. A casting method includes charging a crucible with a solid material and covering the crucible, heating the crucible, melting the material, evacuating a chamber of a mold to less than 1 atm absolute through a vacuum tap into the chamber, draining the melted material into the evacuated chamber, solidifying the material in the chamber, and removing the solidified material from the chamber without damaging the chamber.

  15. Radiochemical methods

    International Nuclear Information System (INIS)

    Geary, W.J.

    1986-01-01

    This little volume is one of an extended series of basic textbooks on analytical chemistry produced by the Analytical Chemistry by Open Learning project in the UK. Prefatory sections explain its mission, and how to use the Open Learning format. Seventeen specific sections organized into five chaptrs begin with a general discussion of nuclear properties, types, and laws of nuclear decay and proceeds to specific discussions of three published papers (reproduced in their entirety) giving examples of radiochemical methods which were discussed in the previous chapter. Each section begins with an overview, contains one or more practical problems (called self-assessment questions or SAQ's), and concludes with a summary and a list of objectives for the student. Following the main body are answers to the SAQ's, and several tables of physical constants, SI prefixes, etc. A periodic table graces the inside back cover

  16. Moment methods and Lanczos methods

    International Nuclear Information System (INIS)

    Whitehead, R.R.

    1980-01-01

    In contrast to many of the speakers at this conference I am less interested in average properties of nuclei than in detailed spectroscopy. I will try to show, however, that the two are very closely connected and that shell-model calculations may be used to give a great deal of information not normally associated with the shell-model. It has been demonstrated clearly to us that the level spacing fluctuations in nuclear spectra convey very little physical information. This is true when the fluctuations are averaged over the entire spectrum but not if one's interest is in the lowest few states, whose spacings are relatively large. If one wishes to calculate a ground state (say) accurately, that is with an error much smaller than the excitation energy of the first excited state, very high moments, μ/sub n/, n approx. 200, are needed. As I shall show, we use such moments as a matter of course, albeit without actually calculating them; in fact I will try to show that, if at all possible, the actual calculations of moments is to be avoided like the plague. At the heart of the new shell-model methods embodied in the Glasgow shell-model program and one or two similar ones is the so-called Lanczos method and this, it turns out, has many deep and subtle connections with the mathematical theory of moments. It is these connections that I will explore here

  17. On method

    Directory of Open Access Journals (Sweden)

    Frederik Kortlandt

    2018-01-01

    Full Text Available The basis of linguistic reconstruction is the comparative method, which starts from the assumption that there is “a stronger affinity, both in the roots of verbs and in the forms of grammar, than could possibly have been produced by accident”, implying the existence of a common source (thus Sir William Jones in 1786. It follows that there must be a possible sequence of developments from the reconstructed system to the attested data. These developments must have been either phonetically regular or analogical. The latter type of change requires a model and a motivation. A theory which does not account for the data in terms of sound laws and well-motivated analogical changes is not a linguistic reconstruction but philosophical speculation.The pre-laryngealist idea that any Proto-Indo-European long vowel became acute in Balto-Slavic is a typical example of philosophical speculation contradicted by the comparative evidence. Other examples are spontaneous glottalization (Jasanoff’s “acute assignment”, unattested anywhere in the world, Jasanoff’s trimoraic long vowels, Eichner’s law, Osthoff’s law, and Szemerényi’s law, which is an instance of circular reasoning. The Balto-Slavic acute continues the Proto-Indo-European laryngeals and the glottalic feature of the traditional Proto-Indo-European “unaspirated voiced” obstruents (Winter’s law. My reconstruction of Proto-Indo-European glottalic obstruents is based on direct evidence from Indo-Iranian, Armenian, Baltic and Germanic and indirect evidence from Indo-Iranian, Greek, Latin and Slavic.

  18. Human reliability-based MC and A methods for evaluating the effectiveness of protecting nuclear material - 59379

    International Nuclear Information System (INIS)

    Duran, Felicia A.; Wyss, Gregory D.

    2012-01-01

    probabilities and to formulate 'timely detection' for MC and A operations. This work has enabled the development of an integrated path analysis methodology in which MC and A operations can be combined with traditional sensor data in the calculation of PPS effectiveness. Explicitly incorporating MC and A operations into the existing evaluation methodology provides the basis for an effectiveness measure for insider threats, and the resulting PE calculations will provide an integrated effectiveness measure that addresses both external and insider threats. The extended path analysis methodology is being further investigated as the basis for including the PPS and MC and A activities in an integrated safeguards and security system for advanced fuel cycle facilities. This work has demonstrated the application of HRA methods used in NPP PRAs for defining detection probabilities for MC and A activities. The approaches used to characterize and evaluate MC and A activities highlight their importance as protection elements for insider theft. In addition, this work has identified three key MC and A factors that can be manipulated to enhance the effectiveness of MC and A as a 'sensor' within the larger PPS. The overall MC and A detection probability can be increased by proper selection of MC and A activities. The effectiveness of subsequent observations can also be increased by reducing the dependence between observations through the use of HRA and human factor techniques. Finally, steps can be taken to lengthen the adversary's timeline by reducing the frequency of potentially vulnerable states and providing more opportunities for MC and A detection. Defining MC and A detection probabilities has supported the probabilistic basis for and enabled the development of an extended path analysis methodology in which MC and A protections can be combined with traditional sensor data in the calculation of PPS effectiveness. In evaluating the initial modeling and analysis, it is evident that these

  19. Linear filtering applied to safeguards of nuclear material

    International Nuclear Information System (INIS)

    Pike, D.H.; Morrison, G.W.; Holland, C.W.

    1975-01-01

    In regard to the problem of nuclear materials theft or diversion in the fuel cycle, a method is needed to detect continual thefts of relatively small amounts of material. It is suggested that Kalman filtering techniques be used. A hypothetical material flow situation is used to illustrate the technique; losses could be detected in as few as 5 months. (DLC)

  20. How does Iran negotiate? Diplomatic bazaar or the Iranian art of negotiation

    International Nuclear Information System (INIS)

    Bordes, Marjorie

    2014-01-01

    As Iran is using a speech building designed to save time while making the evolutions of its nuclear programme less unacceptable, the author proposes an analysis of the Iranian approach and practice of negotiations, its rhetoric and its staging. She first outlines some cultural, religious, political and ideological backgrounds. Then, she highlights the main objectives of Iran: to face sanctions and restrictions on the short term, while keeping technological gains and know-how on the long term. In the last part, the author identifies some methods and subterfuges used by Iran like a toolbox: principle of 'argumentum ad nauseam', disinformation, manipulation and concealment, use of various problematics to digress, and use of multiple channels of discussion

  1. VIOLAÇÃO DOS DIREITOS SOCIAIS POR MEIO DO USO FRAUDULENTO DAS COOPERATIVAS DE TRABALHO

    Directory of Open Access Journals (Sweden)

    Rocco Antonio Rangel Rosso Nelson

    2015-01-01

    Full Text Available he protection regulatory structure that covers the worker, which aims to humanize and give social and ethical content to the benefit that comes from the capitalist activity, is often attacked by the corporate community, which seeks, in any way, to reduce costs through basic and fun - damental labor rights resulting from a historic constitutional process. o ne of the subterfuges used was the fraudulent creation of cooperative companies of workers in order to denature a real job where the employer simulates this relationship through a service contract with the cooperative company of workers, which is the intermediary in the workforce, denying all principles of cooperativism. t he research uses a methodology of qualitative analysis using the methods of hypothetical approach - deductive of descriptive and analytical character, having as background the analysis of new legal provisions of a ct 12.690/12, created by the regulatory framework of cooperative work.

  2. Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

    OpenAIRE

    Haydar Teymourlouei

    2015-01-01

    It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such t...

  3. Dosimetry Methods for Human Exposure to Non-Ionising Radiation

    International Nuclear Information System (INIS)

    Poljak, D.; Sarolic, A.; Doric, V.; Peratta, C.; Peratta, A.

    2011-01-01

    The paper deals with human exposure to electromagnetic fields from extremely low frequencies (ELF) to GSM frequencies. The problem requires (1) the assessment of external field generated by electromagnetic interference (EMI) source at a given frequency (incident field dosimetry) and then (2) the assessment of corresponding fields induced inside the human body (internal field dosimetry). Several methods used in theoretical and experimental dosimetry are discussed within this work. Theoretical dosimetry models at low frequencies are based on quasistatic approaches, while analyses at higher frequencies use the full-wave models. Experimental techniques involve near and far field measurement. Human exposure to power lines, transformer substations, power line communication (PLC) systems, Radio Frequency Identification (RFID) antennas and GSM base station antenna systems is analyzed. The results o are compared to the exposure limits proposed by relevant safety guidelines. Theoretical incident dosimetry used in this paper is based on the set of Pocklington integro-differential equations for the calculation of the current distribution and subsequently radiated field from power lines. Experimental incident dosimetry techniques involve measurement techniques of fields radiated by RFID antennas and GSM base station antennas. First example set of numerical results is related to the internal dosimetry of realistic well-grounded body model exposed to vertical component of the electric field E = 10 kV/m generated by high voltage power line. The results obtained via the HNA model exceed the ICNIRP basic restrictions for public exposure (2 mA/m 2 ) in knee (8.6 mA/m 2 ) and neck (9.8 mA/m 2 ) and for occupational exposure (10 mA/m 2 ) in ankle (32 mA/m 2 ). In the case of a conceptual model of a realistic human body inside a transformer substation room touching a control panel at the potential φ0 = 400 V and with two scenarios for dry-air between worker's hand and panel, the values

  4. Ensemble Data Mining Methods

    Data.gov (United States)

    National Aeronautics and Space Administration — Ensemble Data Mining Methods, also known as Committee Methods or Model Combiners, are machine learning methods that leverage the power of multiple models to achieve...

  5. BDF-methods

    DEFF Research Database (Denmark)

    Hostrup, Astrid Kuijers

    1999-01-01

    An introduction to BDF-methods is given. The use of these methods on differential algebraic equations (DAE's) with different indexes with respect to order, stability and convergens of the BDF-methods is presented.......An introduction to BDF-methods is given. The use of these methods on differential algebraic equations (DAE's) with different indexes with respect to order, stability and convergens of the BDF-methods is presented....

  6. Uranium price forecasting methods

    International Nuclear Information System (INIS)

    Fuller, D.M.

    1994-01-01

    This article reviews a number of forecasting methods that have been applied to uranium prices and compares their relative strengths and weaknesses. The methods reviewed are: (1) judgemental methods, (2) technical analysis, (3) time-series methods, (4) fundamental analysis, and (5) econometric methods. Historically, none of these methods has performed very well, but a well-thought-out model is still useful as a basis from which to adjust to new circumstances and try again

  7. Methods in aquatic bacteriology

    National Research Council Canada - National Science Library

    Austin, B

    1988-01-01

    .... Within these sections detailed chapters consider sampling methods, determination of biomass, isolation methods, identification, the bacterial microflora of fish, invertebrates, plants and the deep...

  8. Prediksi Kerawanan Wilayah Terhadap Tindak Pencurian Sepeda Motor Menggunakan Metode (SARIMA Dan CART

    Directory of Open Access Journals (Sweden)

    Pradita Eko Prasetyo Utomo

    2017-07-01

    Full Text Available Motor vehicle theft is a crime that is most common in Indonesia. Growth of vehicle motorcycle significant in each year accompanied by the increasing theft of motorcycles in each year, we need a system that is able to forecast the development and the theft of the motorcycle. This research proposes the development of forecasting models vulnerability criminal offense of theft of motorcycles with ARIMA forecasting method. This method not only forecast from variable of theft but also residents, vehicles and unemployment. The study also determined the classification level of vulnerability to the crime of theft of a motorcycle using a method based on the Decision Tree CART ARIMA forecasting method. Forecasting time series data with ARIMA method performed by each of the variables to produce the best ARIMA forecasting model which varies based on the data pattern of each of those variables. The results of classification by CART method to get the value of accuracy of 92% for the city of Yogyakarta and 85% for DIY. Based on the above, the results of ARIMA forecasting and classification CART can be used in determining the level of vulnerability to the crime of theft of motorcycles.

  9. Transport equation solving methods

    International Nuclear Information System (INIS)

    Granjean, P.M.

    1984-06-01

    This work is mainly devoted to Csub(N) and Fsub(N) methods. CN method: starting from a lemma stated by Placzek, an equivalence is established between two problems: the first one is defined in a finite medium bounded by a surface S, the second one is defined in the whole space. In the first problem the angular flux on the surface S is shown to be the solution of an integral equation. This equation is solved by Galerkin's method. The Csub(N) method is applied here to one-velocity problems: in plane geometry, slab albedo and transmission with Rayleigh scattering, calculation of the extrapolation length; in cylindrical geometry, albedo and extrapolation length calculation with linear scattering. Fsub(N) method: the basic integral transport equation of the Csub(N) method is integrated on Case's elementary distributions; another integral transport equation is obtained: this equation is solved by a collocation method. The plane problems solved by the Csub(N) method are also solved by the Fsub(N) method. The Fsub(N) method is extended to any polynomial scattering law. Some simple spherical problems are also studied. Chandrasekhar's method, collision probability method, Case's method are presented for comparison with Csub(N) and Fsub(N) methods. This comparison shows the respective advantages of the two methods: a) fast convergence and possible extension to various geometries for Csub(N) method; b) easy calculations and easy extension to polynomial scattering for Fsub(N) method [fr

  10. Advanced differential quadrature methods

    CERN Document Server

    Zong, Zhi

    2009-01-01

    Modern Tools to Perform Numerical DifferentiationThe original direct differential quadrature (DQ) method has been known to fail for problems with strong nonlinearity and material discontinuity as well as for problems involving singularity, irregularity, and multiple scales. But now researchers in applied mathematics, computational mechanics, and engineering have developed a range of innovative DQ-based methods to overcome these shortcomings. Advanced Differential Quadrature Methods explores new DQ methods and uses these methods to solve problems beyond the capabilities of the direct DQ method.After a basic introduction to the direct DQ method, the book presents a number of DQ methods, including complex DQ, triangular DQ, multi-scale DQ, variable order DQ, multi-domain DQ, and localized DQ. It also provides a mathematical compendium that summarizes Gauss elimination, the Runge-Kutta method, complex analysis, and more. The final chapter contains three codes written in the FORTRAN language, enabling readers to q...

  11. Inflow Turbulence Generation Methods

    Science.gov (United States)

    Wu, Xiaohua

    2017-01-01

    Research activities on inflow turbulence generation methods have been vigorous over the past quarter century, accompanying advances in eddy-resolving computations of spatially developing turbulent flows with direct numerical simulation, large-eddy simulation (LES), and hybrid Reynolds-averaged Navier-Stokes-LES. The weak recycling method, rooted in scaling arguments on the canonical incompressible boundary layer, has been applied to supersonic boundary layer, rough surface boundary layer, and microscale urban canopy LES coupled with mesoscale numerical weather forecasting. Synthetic methods, originating from analytical approximation to homogeneous isotropic turbulence, have branched out into several robust methods, including the synthetic random Fourier method, synthetic digital filtering method, synthetic coherent eddy method, and synthetic volume forcing method. This article reviews major progress in inflow turbulence generation methods with an emphasis on fundamental ideas, key milestones, representative applications, and critical issues. Directions for future research in the field are also highlighted.

  12. Methods of nonlinear analysis

    CERN Document Server

    Bellman, Richard Ernest

    1970-01-01

    In this book, we study theoretical and practical aspects of computing methods for mathematical modelling of nonlinear systems. A number of computing techniques are considered, such as methods of operator approximation with any given accuracy; operator interpolation techniques including a non-Lagrange interpolation; methods of system representation subject to constraints associated with concepts of causality, memory and stationarity; methods of system representation with an accuracy that is the best within a given class of models; methods of covariance matrix estimation;methods for low-rank mat

  13. Consumer Behavior Research Methods

    DEFF Research Database (Denmark)

    Chrysochou, Polymeros

    2017-01-01

    This chapter starts by distinguishing consumer behavior research methods based on the type of data used, being either secondary or primary. Most consumer behavior research studies phenomena that require researchers to enter the field and collect data on their own, and therefore the chapter...... emphasizes the discussion of primary research methods. Based on the nature of the data primary research methods are further distinguished into qualitative and quantitative. The chapter describes the most important and popular qualitative and quantitative methods. It concludes with an overall evaluation...... of the methods and how to improve quality in consumer behavior research methods....

  14. Dissolution Methods Database

    Data.gov (United States)

    U.S. Department of Health & Human Services — For a drug product that does not have a dissolution test method in the United States Pharmacopeia (USP), the FDA Dissolution Methods Database provides information on...

  15. The three circle method

    International Nuclear Information System (INIS)

    Garncarek, Z.

    1989-01-01

    The three circle method in its general form is presented. The method is especially useful for investigation of shapes of agglomerations of objects. An example of its applications to investigation of galaxies distribution is given. 17 refs. (author)

  16. Design Methods in Practice

    DEFF Research Database (Denmark)

    Jensen, Torben Elgaard; Andreasen, Mogens Myrup

    2010-01-01

    The paper challenges the dominant and widespread view that a good design method will guarantee a systematic approach as well as certain results. First, it explores the substantial differences between on the one hand the conception of methods implied in Pahl & Beitz’s widely recognized text book...... on engineering design, and on the other hand the understanding of method use, which has emerged from micro-sociological studies of practice (ethnomethodology). Second, it reviews a number of case studies conducted by engineering students, who were instructed to investigate the actual use of design methods...... in Danish companies. The paper concludes that design methods in practice deviate substantially from Pahl & Beitz’s description of method use: The object and problems, which are the starting points for method use, are more contested and less given than generally assumed; The steps of methods are often...

  17. Advances in Numerical Methods

    CERN Document Server

    Mastorakis, Nikos E

    2009-01-01

    Features contributions that are focused on significant aspects of current numerical methods and computational mathematics. This book carries chapters that advanced methods and various variations on known techniques that can solve difficult scientific problems efficiently.

  18. Basic Finite Element Method

    International Nuclear Information System (INIS)

    Lee, Byeong Hae

    1992-02-01

    This book gives descriptions of basic finite element method, which includes basic finite element method and data, black box, writing of data, definition of VECTOR, definition of matrix, matrix and multiplication of matrix, addition of matrix, and unit matrix, conception of hardness matrix like spring power and displacement, governed equation of an elastic body, finite element method, Fortran method and programming such as composition of computer, order of programming and data card and Fortran card, finite element program and application of nonelastic problem.

  19. Conformable variational iteration method

    Directory of Open Access Journals (Sweden)

    Omer Acan

    2017-02-01

    Full Text Available In this study, we introduce the conformable variational iteration method based on new defined fractional derivative called conformable fractional derivative. This new method is applied two fractional order ordinary differential equations. To see how the solutions of this method, linear homogeneous and non-linear non-homogeneous fractional ordinary differential equations are selected. Obtained results are compared the exact solutions and their graphics are plotted to demonstrate efficiency and accuracy of the method.

  20. VALUATION METHODS- LITERATURE REVIEW

    OpenAIRE

    Dorisz Talas

    2015-01-01

    This paper is a theoretical overview of the often used valuation methods with the help of which the value of a firm or its equity is calculated. Many experts (including Aswath Damodaran, Guochang Zhang and CA Hozefa Natalwala) classify the methods. The basic models are based on discounted cash flows. The main method uses the free cash flow for valuation, but there are some newer methods that reveal and correct the weaknesses of the traditional models. The valuation of flexibility of managemen...

  1. Mixed methods research.

    Science.gov (United States)

    Halcomb, Elizabeth; Hickman, Louise

    2015-04-08

    Mixed methods research involves the use of qualitative and quantitative data in a single research project. It represents an alternative methodological approach, combining qualitative and quantitative research approaches, which enables nurse researchers to explore complex phenomena in detail. This article provides a practical overview of mixed methods research and its application in nursing, to guide the novice researcher considering a mixed methods research project.

  2. Possibilities of roentgenological method

    International Nuclear Information System (INIS)

    Sivash, Eh.S.; Sal'man, M.M.

    1980-01-01

    Literary and experimental data on estimating possibilities of roentgenologic investigations using an electron optical amplifier, X-ray television and roentgen cinematography are generalized. Different methods of studying gastro-intestinal tract are compared. The advantage of the roentgenologic method over the endoscopic method after stomach resection is shown [ru

  3. The Generalized Sturmian Method

    DEFF Research Database (Denmark)

    Avery, James Emil

    2011-01-01

    these ideas clearly so that they become more accessible. By bringing together these non-standard methods, the book intends to inspire graduate students, postdoctoral researchers and academics to think of novel approaches. Is there a method out there that we have not thought of yet? Can we design a new method...... generations of researchers were left to work out how to achieve this ambitious goal for molecular systems of ever-increasing size. This book focuses on non-mainstream methods to solve the molecular electronic Schrödinger equation. Each method is based on a set of core ideas and this volume aims to explain...

  4. Mimetic discretization methods

    CERN Document Server

    Castillo, Jose E

    2013-01-01

    To help solve physical and engineering problems, mimetic or compatible algebraic discretization methods employ discrete constructs to mimic the continuous identities and theorems found in vector calculus. Mimetic Discretization Methods focuses on the recent mimetic discretization method co-developed by the first author. Based on the Castillo-Grone operators, this simple mimetic discretization method is invariably valid for spatial dimensions no greater than three. The book also presents a numerical method for obtaining corresponding discrete operators that mimic the continuum differential and

  5. DOE methods compendium

    International Nuclear Information System (INIS)

    Leasure, C.S.

    1992-01-01

    The Department of Energy (DOE) has established an analytical methods compendium development program to integrate its environmental analytical methods. This program is administered through DOE's Laboratory Management Division (EM-563). The primary objective of this program is to assemble a compendium of analytical chemistry methods of known performance for use by all DOE Environmental Restoration and Waste Management program. This compendium will include methods for sampling, field screening, fixed analytical laboratory and mobile analytical laboratory analyses. It will also include specific guidance on the proper selection of appropriate sampling and analytical methods in using specific analytical requirements

  6. Methods for assessing geodiversity

    Science.gov (United States)

    Zwoliński, Zbigniew; Najwer, Alicja; Giardino, Marco

    2017-04-01

    The accepted systematics of geodiversity assessment methods will be presented in three categories: qualitative, quantitative and qualitative-quantitative. Qualitative methods are usually descriptive methods that are suited to nominal and ordinal data. Quantitative methods use a different set of parameters and indicators to determine the characteristics of geodiversity in the area being researched. Qualitative-quantitative methods are a good combination of the collection of quantitative data (i.e. digital) and cause-effect data (i.e. relational and explanatory). It seems that at the current stage of the development of geodiversity research methods, qualitative-quantitative methods are the most advanced and best assess the geodiversity of the study area. Their particular advantage is the integration of data from different sources and with different substantive content. Among the distinguishing features of the quantitative and qualitative-quantitative methods for assessing geodiversity are their wide use within geographic information systems, both at the stage of data collection and data integration, as well as numerical processing and their presentation. The unresolved problem for these methods, however, is the possibility of their validation. It seems that currently the best method of validation is direct filed confrontation. Looking to the next few years, the development of qualitative-quantitative methods connected with cognitive issues should be expected, oriented towards ontology and the Semantic Web.

  7. Perspectives on nuclear material safety management methods at DOE sites

    International Nuclear Information System (INIS)

    Hyder, M.L.

    1997-01-01

    The management of nuclear materials, and fissile materials in particular, at the USDOE facilities is undergoing significant changes. These result in large part from decreasing requirements for these materials in the US weapons program. Not only is new production no longer required, but returns must be handled and safely stored. Eventually surplus fissile material will be used for power production, or else put into a form suitable for long term disposition. In the meanwhile concentrates must be stored with protection against releases of radioactive material to the environment, and also against theft or deliberate dispersion. In addition, cleaning up large volumes of materials contaminated with fissile isotopes will be a major activity, and there will also be some quantity of spent fuel containing enriched uranium that cannot readily be processed. All these activities pose safety problems, some of which are addressed here

  8. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  9. Radiometric dating methods

    International Nuclear Information System (INIS)

    Bourdon, B.

    2003-01-01

    The general principle of isotope dating methods is based on the presence of radioactive isotopes in the geologic or archaeological object to be dated. The decay with time of these isotopes is used to determine the 'zero' time corresponding to the event to be dated. This paper recalls the general principle of isotope dating methods (bases, analytical methods, validation of results and uncertainties) and presents the methods based on natural radioactivity (Rb-Sr, Sm-Nd, U-Pb, Re-Os, K-Ar (Ar-Ar), U-Th-Ra- 210 Pb, U-Pa, 14 C, 36 Cl, 10 Be) and the methods based on artificial radioactivity with their applications. Finally, the methods based on irradiation damages (thermoluminescence, fission tracks, electron spin resonance) are briefly evoked. (J.S.)

  10. Performative Schizoid Method

    DEFF Research Database (Denmark)

    Svabo, Connie

    2016-01-01

    is presented and an example is provided of a first exploratory engagement with it. The method is used in a specific project Becoming Iris, making inquiry into arts-based knowledge creation during a three month visiting scholarship at a small, independent visual art academy. Using the performative schizoid......A performative schizoid method is developed as a method contribution to performance as research. The method is inspired by contemporary research in the human and social sciences urging experimentation and researcher engagement with creative and artistic practice. In the article, the method...... method in Becoming Iris results in four audio-visual and performance-based productions, centered on an emergent theme of the scholartist as a bird in borrowed feathers. Interestingly, the moral lesson of the fable about the vain jackdaw, who dresses in borrowed peacock feathers and becomes a castout...

  11. Angular correlation methods

    International Nuclear Information System (INIS)

    Ferguson, A.J.

    1974-01-01

    An outline of the theory of angular correlations is presented, and the difference between the modern density matrix method and the traditional wave function method is stressed. Comments are offered on particular angular correlation theoretical techniques. A brief discussion is given of recent studies of gamma ray angular correlations of reaction products recoiling with high velocity into vacuum. Two methods for optimization to obtain the most accurate expansion coefficients of the correlation are discussed. (1 figure, 53 references) (U.S.)

  12. Maximum Quantum Entropy Method

    OpenAIRE

    Sim, Jae-Hoon; Han, Myung Joon

    2018-01-01

    Maximum entropy method for analytic continuation is extended by introducing quantum relative entropy. This new method is formulated in terms of matrix-valued functions and therefore invariant under arbitrary unitary transformation of input matrix. As a result, the continuation of off-diagonal elements becomes straightforward. Without introducing any further ambiguity, the Bayesian probabilistic interpretation is maintained just as in the conventional maximum entropy method. The applications o...

  13. Rossi Alpha Method

    International Nuclear Information System (INIS)

    Hansen, G.E.

    1985-01-01

    The Rossi Alpha Method has proved to be valuable for the determination of prompt neutron lifetimes in fissile assemblies having known reproduction numbers at or near delayed critical. This workshop report emphasizes the pioneering applications of the method by Dr. John D. Orndoff to fast-neutron critical assemblies at Los Alamos. The value of the method appears to disappear for subcritical systems where the Rossi-α is no longer an α-eigenvalue

  14. Qualitative methods textbooks

    OpenAIRE

    Barndt, William

    2003-01-01

    Over the past few years, the number of political science departments offering qualitative methods courses has grown substantially. The number of qualitative methods textbooks has kept pace, providing instructors with an overwhelming array of choices. But how to decide which text to choose from this exhortatory smorgasbord? The scholarship desperately needs evaluated. Yet the task is not entirely straightforward: qualitative methods textbooks reflect the diversity inherent in qualitative metho...

  15. The Box Method

    DEFF Research Database (Denmark)

    Nielsen, Peter Vilhelm

    The velocity level in a room ventilated by jet ventilation is strongly influenced by the supply conditions. The momentum flow in the supply jets controls the air movement in the room and, therefore, it is very important that the inlet conditions and the numerical method can generate a satisfactor...... description of this momentum flow. The Box Method is a practical method for the description of an Air Terminal Device which will save grid points and ensure the right level of the momentum flow....

  16. Applied Bayesian hierarchical methods

    National Research Council Canada - National Science Library

    Congdon, P

    2010-01-01

    ... . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Posterior Inference from Bayes Formula . . . . . . . . . . . . 1.3 Markov Chain Monte Carlo Sampling in Relation to Monte Carlo Methods: Obtaining Posterior...

  17. [Methods of quantitative proteomics].

    Science.gov (United States)

    Kopylov, A T; Zgoda, V G

    2007-01-01

    In modern science proteomic analysis is inseparable from other fields of systemic biology. Possessing huge resources quantitative proteomics operates colossal information on molecular mechanisms of life. Advances in proteomics help researchers to solve complex problems of cell signaling, posttranslational modification, structure and functional homology of proteins, molecular diagnostics etc. More than 40 various methods have been developed in proteomics for quantitative analysis of proteins. Although each method is unique and has certain advantages and disadvantages all these use various isotope labels (tags). In this review we will consider the most popular and effective methods employing both chemical modifications of proteins and also metabolic and enzymatic methods of isotope labeling.

  18. Methods in ALFA Alignment

    CERN Document Server

    Melendez, Jordan

    2014-01-01

    This note presents two model-independent methods for use in the alignment of the ALFA forward detectors. Using a Monte Carlo simulated LHC run at \\beta = 90m and \\sqrt{s} = 7 TeV, the Kinematic Peak alignment method is utilized to reconstruct the Mandelstam momentum transfer variable t for single-diractive protons. The Hot Spot method uses fluctuations in the hitmap density to pinpoint particular regions in the detector that could signal a misalignment. Another method uses an error function fit to find the detector edge. With this information, the vertical alignment can be determined.

  19. Method of chronokinemetrical invariants

    International Nuclear Information System (INIS)

    Vladimirov, Yu.S.; Shelkovenko, A.Eh.

    1976-01-01

    A particular case of a general dyadic method - the method of chronokinemetric invariants is formulated. The time-like dyad vector is calibrated in a chronometric way, and the space-like vector - in a kinemetric way. Expressions are written for the main physical-geometrical values of the dyadic method and for differential operators. The method developed may be useful for predetermining the reference system of a single observer, and also for studying problems connected with emission and absorption of gravitational and electromagnetic waves [ru

  20. Nondestructive testing method

    International Nuclear Information System (INIS)

    Porter, J.F.

    1996-01-01

    Nondestructive testing (NDT) is the use of physical and chemical methods for evaluating material integrity without impairing its intended usefulness or continuing service. Nondestructive tests are used by manufaturer's for the following reasons: 1) to ensure product reliability; 2) to prevent accidents and save human lives; 3) to aid in better product design; 4) to control manufacturing processes; and 5) to maintain a uniform quality level. Nondestructive testing is used extensively on power plants, oil and chemical refineries, offshore oil rigs and pipeline (NDT can even be conducted underwater), welds on tanks, boilers, pressure vessels and heat exchengers. NDT is now being used for testing concrete and composite materials. Because of the criticality of its application, NDT should be performed and the results evaluated by qualified personnel. There are five basic nondestructive examination methods: 1) liquid penetrant testing - method used for detecting surface flaws in materials. This method can be used for metallic and nonmetallic materials, portable and relatively inexpensive. 2) magnetic particle testing - method used to detect surface and subsurface flaws in ferromagnetic materials; 3) radiographic testing - method used to detect internal flaws and significant variation in material composition and thickness; 4) ultrasonic testing - method used to detect internal and external flaws in materials. This method uses ultrasonics to measure thickness of a material or to examine the internal structure for discontinuities. 5) eddy current testing - method used to detect surface and subsurface flaws in conductive materials. Not one nondestructive examination method can find all discontinuities in all of the materials capable of being tested. The most important consideration is for the specifier of the test to be familiar with the test method and its applicability to the type and geometry of the material and the flaws to be detected

  1. Methods for data classification

    Science.gov (United States)

    Garrity, George [Okemos, MI; Lilburn, Timothy G [Front Royal, VA

    2011-10-11

    The present invention provides methods for classifying data and uncovering and correcting annotation errors. In particular, the present invention provides a self-organizing, self-correcting algorithm for use in classifying data. Additionally, the present invention provides a method for classifying biological taxa.

  2. Computational methods working group

    International Nuclear Information System (INIS)

    Gabriel, T.A.

    1997-09-01

    During the Cold Moderator Workshop several working groups were established including one to discuss calculational methods. The charge for this working group was to identify problems in theory, data, program execution, etc., and to suggest solutions considering both deterministic and stochastic methods including acceleration procedures.

  3. Method for exchanging data

    NARCIS (Netherlands)

    2014-01-01

    The present invention relates to a method for exchanging data between at least two servers with use of a gateway. Preferably the method is applied to healthcare systems. Each server holds a unique federated identifier, which identifier identifies a single patient (P). Thus, it is possible for the

  4. WWW: The Scientific Method

    Science.gov (United States)

    Blystone, Robert V.; Blodgett, Kevin

    2006-01-01

    The scientific method is the principal methodology by which biological knowledge is gained and disseminated. As fundamental as the scientific method may be, its historical development is poorly understood, its definition is variable, and its deployment is uneven. Scientific progress may occur without the strictures imposed by the formal…

  5. Methods of numerical relativity

    International Nuclear Information System (INIS)

    Piran, T.

    1983-01-01

    Numerical Relativity is an alternative to analytical methods for obtaining solutions for Einstein equations. Numerical methods are particularly useful for studying generation of gravitational radiation by potential strong sources. The author reviews the analytical background, the numerical analysis aspects and techniques and some of the difficulties involved in numerical relativity. (Auth.)

  6. Differential equation method

    International Nuclear Information System (INIS)

    Kotikov, A.V.

    1993-01-01

    A new method of massive Feynman diagrams calculation is presented. It provides a fairly simple procedure to obtain the result without the D-space integral calculation (for the dimensional regularization). Some diagrams are calculated as an illustration of this method capacities. (author). 7 refs

  7. DISCOURSE ON METHODS.

    Science.gov (United States)

    BOUCHER, JOHN G.

    THE AUTHOR STATES THAT BEFORE PRESENT FOREIGN LANGUAGE TEACHING METHODS CAN BE DISCUSSED INTELLIGENTLY, THE RESEARCH IN PSYCHOLOGY AND LINGUISTICS WHICH HAS INFLUENCED THE DEVELOPMENT OF THESE METHODS MUST BE CONSIDERED. MANY FOREIGN LANGUAGE TEACHERS WERE BEGINNING TO FEEL COMFORTABLE WITH THE AUDIOLINGUAL APPROACH WHEN NOAM CHOMSKY, IN HIS 1966…

  8. Research Methods in Education

    Science.gov (United States)

    Check, Joseph; Schutt, Russell K.

    2011-01-01

    "Research Methods in Education" introduces research methods as an integrated set of techniques for investigating questions about the educational world. This lively, innovative text helps students connect technique and substance, appreciate the value of both qualitative and quantitative methodologies, and make ethical research decisions.…

  9. Attribute-Based Methods

    Science.gov (United States)

    Thomas P. Holmes; Wiktor L. Adamowicz

    2003-01-01

    Stated preference methods of environmental valuation have been used by economists for decades where behavioral data have limitations. The contingent valuation method (Chapter 5) is the oldest stated preference approach, and hundreds of contingent valuation studies have been conducted. More recently, and especially over the last decade, a class of stated preference...

  10. Proven Weight Loss Methods

    Science.gov (United States)

    Fact Sheet Proven Weight Loss Methods What can weight loss do for you? Losing weight can improve your health in a number of ways. It can lower ... at www.hormone.org/Spanish . Proven Weight Loss Methods Fact Sheet www.hormone.org

  11. Radiation borehole logging method

    International Nuclear Information System (INIS)

    Wylie, A.; Mathew, P.J.

    1977-01-01

    A method of obtaining an indication of the diameter of a borehole is described. The method comprises subjecting the walls of the borehole to monoenergetic gamma radiation and making measurements of the intensity of gamma radiation backscattered from the walls. The energy of the radiation is sufficiently high for the shape to be substantially independent of the density and composition of the borehole walls

  12. Isotope methods in hydrology

    International Nuclear Information System (INIS)

    Moser, H.; Rauert, W.

    1980-01-01

    Of the investigation methods used in hydrology, tracer methods hold a special place as they are the only ones which give direct insight into the movement and distribution processes taking place in surface and ground waters. Besides the labelling of water with salts and dyes, as in the past, in recent years the use of isotopes in hydrology, in water research and use, in ground-water protection and in hydraulic engineering has increased. This by no means replaces proven methods of hydrological investigation but tends rather to complement and expand them through inter-disciplinary cooperation. The book offers a general introduction to the application of various isotope methods to specific hydrogeological and hydrological problems. The idea is to place the hydrogeologist and the hydrologist in the position to recognize which isotope method will help him solve his particular problem or indeed, make a solution possible at all. He should also be able to recognize what the prerequisites are and what work and expenditure the use of such methods involves. May the book contribute to promoting cooperation between hydrogeologists, hydrologists, hydraulic engineers and isotope specialists, and thus supplement proven methods of investigation in hydrological research and water utilization and protection wherever the use of isotope methods proves to be of advantage. (orig./HP) [de

  13. Essential numerical computer methods

    CERN Document Server

    Johnson, Michael L

    2010-01-01

    The use of computers and computational methods has become ubiquitous in biological and biomedical research. During the last 2 decades most basic algorithms have not changed, but what has is the huge increase in computer speed and ease of use, along with the corresponding orders of magnitude decrease in cost. A general perception exists that the only applications of computers and computer methods in biological and biomedical research are either basic statistical analysis or the searching of DNA sequence data bases. While these are important applications they only scratch the surface of the current and potential applications of computers and computer methods in biomedical research. The various chapters within this volume include a wide variety of applications that extend far beyond this limited perception. As part of the Reliable Lab Solutions series, Essential Numerical Computer Methods brings together chapters from volumes 210, 240, 321, 383, 384, 454, and 467 of Methods in Enzymology. These chapters provide ...

  14. Adaptive method of lines

    CERN Document Server

    Saucez, Ph

    2001-01-01

    The general Method of Lines (MOL) procedure provides a flexible format for the solution of all the major classes of partial differential equations (PDEs) and is particularly well suited to evolutionary, nonlinear wave PDEs. Despite its utility, however, there are relatively few texts that explore it at a more advanced level and reflect the method''s current state of development.Written by distinguished researchers in the field, Adaptive Method of Lines reflects the diversity of techniques and applications related to the MOL. Most of its chapters focus on a particular application but also provide a discussion of underlying philosophy and technique. Particular attention is paid to the concept of both temporal and spatial adaptivity in solving time-dependent PDEs. Many important ideas and methods are introduced, including moving grids and grid refinement, static and dynamic gridding, the equidistribution principle and the concept of a monitor function, the minimization of a functional, and the moving finite elem...

  15. Bayesian Monte Carlo method

    International Nuclear Information System (INIS)

    Rajabalinejad, M.

    2010-01-01

    To reduce cost of Monte Carlo (MC) simulations for time-consuming processes, Bayesian Monte Carlo (BMC) is introduced in this paper. The BMC method reduces number of realizations in MC according to the desired accuracy level. BMC also provides a possibility of considering more priors. In other words, different priors can be integrated into one model by using BMC to further reduce cost of simulations. This study suggests speeding up the simulation process by considering the logical dependence of neighboring points as prior information. This information is used in the BMC method to produce a predictive tool through the simulation process. The general methodology and algorithm of BMC method are presented in this paper. The BMC method is applied to the simplified break water model as well as the finite element model of 17th Street Canal in New Orleans, and the results are compared with the MC and Dynamic Bounds methods.

  16. Methods in Modern Biophysics

    CERN Document Server

    Nölting, Bengt

    2006-01-01

    Incorporating recent dramatic advances, this textbook presents a fresh and timely introduction to modern biophysical methods. An array of new, faster and higher-power biophysical methods now enables scientists to examine the mysteries of life at a molecular level. This innovative text surveys and explains the ten key biophysical methods, including those related to biophysical nanotechnology, scanning probe microscopy, X-ray crystallography, ion mobility spectrometry, mass spectrometry, proteomics, and protein folding and structure. Incorporating much information previously unavailable in tutorial form, Nölting employs worked examples and 267 illustrations to fully detail the techniques and their underlying mechanisms. Methods in Modern Biophysics is written for advanced undergraduate and graduate students, postdocs, researchers, lecturers and professors in biophysics, biochemistry and related fields. Special features in the 2nd edition: • Illustrates the high-resolution methods for ultrashort-living protei...

  17. The surface analysis methods

    International Nuclear Information System (INIS)

    Deville, J.P.

    1998-01-01

    Nowadays, there are a lot of surfaces analysis methods, each having its specificity, its qualities, its constraints (for instance vacuum) and its limits. Expensive in time and in investment, these methods have to be used deliberately. This article appeals to non specialists. It gives some elements of choice according to the studied information, the sensitivity, the use constraints or the answer to a precise question. After having recalled the fundamental principles which govern these analysis methods, based on the interaction between radiations (ultraviolet, X) or particles (ions, electrons) with matter, two methods will be more particularly described: the Auger electron spectroscopy (AES) and x-rays photoemission spectroscopy (ESCA or XPS). Indeed, they are the most widespread methods in laboratories, the easier for use and probably the most productive for the analysis of surface of industrial materials or samples submitted to treatments in aggressive media. (O.M.)

  18. Cooperative method development

    DEFF Research Database (Denmark)

    Dittrich, Yvonne; Rönkkö, Kari; Eriksson, Jeanette

    2008-01-01

    The development of methods tools and process improvements is best to be based on the understanding of the development practice to be supported. Qualitative research has been proposed as a method for understanding the social and cooperative aspects of software development. However, qualitative...... research is not easily combined with the improvement orientation of an engineering discipline. During the last 6 years, we have applied an approach we call `cooperative method development', which combines qualitative social science fieldwork, with problem-oriented method, technique and process improvement....... The action research based approach focusing on shop floor software development practices allows an understanding of how contextual contingencies influence the deployment and applicability of methods, processes and techniques. This article summarizes the experiences and discusses the further development...

  19. Engaging with mobile methods

    DEFF Research Database (Denmark)

    Jensen, Martin Trandberg

    2014-01-01

    This chapter showcases how mobile methods are more than calibrated techniques awaiting application by tourism researchers, but productive in the enactment of the mobile (Law and Urry, 2004). Drawing upon recent findings deriving from a PhD course on mobility and mobile methods it reveals...... the conceptual ambiguousness of the term ‘mobile methods’. In order to explore this ambiguousness the chapter provides a number of examples deriving from tourism research, to explore how mobile methods are always entangled in ideologies, predispositions, conventions and practice-realities. Accordingly......, the engagements with methods are acknowledged to be always political and contextual, reminding us to avoid essentialist discussions regarding research methods. Finally, the chapter draws on recent fieldwork to extend developments in mobilities-oriented tourism research, by employing auto-ethnography to call...

  20. Determination method of radiostrontium

    International Nuclear Information System (INIS)

    1984-01-01

    This manual provides determination methods of strontium-90 and strontium-89 in the environment released from nuclear facilities, and it is a revised edition of the previous manual published in 1974. As for the preparation method of radiation counting sample, ion exchange method, oxalate separation method and solvent extraction method were adopted in addition to the method of fuming nitric acid separation adopted in the previous edition. Strontium-90 is determined by the separation and radioactivity determination of yttrium-90 in radioequilibrium with strontium-90. Strontium-89 is determined by subtraction of radioactivity of strontium-90 plus yttrium-90 from gross radioactivity of isolated strontium carbonate. Radioactivity determination should be carried out with a low-background 2 π-gas-flow counting system for the mounted sample on a filter having a chemical form of ferric hydroxide, yttrium oxalate or strontium carbonate. This manual describes sample preparation procedures as well as radioactivity counting procedures for environmental samples of precipitates as rain or snow, airborne dust, fresh water, sea water and soil, and also for ash sample made from biological or food samples such as grains, vegetables, tea leaves, pine needle, milk, marine organisms, and total diet, by employing a method of fuming nitric acid separation, ion exchange separation, oxalate precipitate separation or solvent extraction separation (only for an ash sample). Procedures for reagent chemicals preparation is also attached to this manual. (Takagi, S.)

  1. Basics of Bayesian methods.

    Science.gov (United States)

    Ghosh, Sujit K

    2010-01-01

    Bayesian methods are rapidly becoming popular tools for making statistical inference in various fields of science including biology, engineering, finance, and genetics. One of the key aspects of Bayesian inferential method is its logical foundation that provides a coherent framework to utilize not only empirical but also scientific information available to a researcher. Prior knowledge arising from scientific background, expert judgment, or previously collected data is used to build a prior distribution which is then combined with current data via the likelihood function to characterize the current state of knowledge using the so-called posterior distribution. Bayesian methods allow the use of models of complex physical phenomena that were previously too difficult to estimate (e.g., using asymptotic approximations). Bayesian methods offer a means of more fully understanding issues that are central to many practical problems by allowing researchers to build integrated models based on hierarchical conditional distributions that can be estimated even with limited amounts of data. Furthermore, advances in numerical integration methods, particularly those based on Monte Carlo methods, have made it possible to compute the optimal Bayes estimators. However, there is a reasonably wide gap between the background of the empirically trained scientists and the full weight of Bayesian statistical inference. Hence, one of the goals of this chapter is to bridge the gap by offering elementary to advanced concepts that emphasize linkages between standard approaches and full probability modeling via Bayesian methods.

  2. Methods in mummy research

    DEFF Research Database (Denmark)

    Lynnerup, Niels

    2009-01-01

    Mummies are human remains with preservation of non-bony tissue. Many mummy studies focus on the development and application of non-destructive methods for examining mummies, including radiography, CT-scanning with advanced 3-dimensional visualisations, and endoscopic techniques, as well as minima......Mummies are human remains with preservation of non-bony tissue. Many mummy studies focus on the development and application of non-destructive methods for examining mummies, including radiography, CT-scanning with advanced 3-dimensional visualisations, and endoscopic techniques, as well...... as minimally-destructive chemical, physical and biological methods for, e.g., stable isotopes, trace metals and DNA....

  3. Montessori Method and ICTs

    Directory of Open Access Journals (Sweden)

    Athanasios Drigas

    2016-03-01

    Full Text Available This article bridges the gap between the Montessori Method and Information and Communication Technologies (ICTs in contemporary education. It reviews recent research works which recall the Montessori philosophy, principles and didactical tools applying to today’s computers and supporting technologies in children’s learning process. This article reviews how important the stimulation of human senses in the learning process is, as well as the development of Montessori materials using the body and the hand in particular, all according to the Montessori Method along with recent researches over ICTs. Montessori Method within information society age acquires new perspectives, new functionality and new efficacy.

  4. Rubidium-strontium method

    International Nuclear Information System (INIS)

    Dubansky, A.

    1980-01-01

    The rubidium-strontium geological dating method is based on the determination of the Rb and Sr isotope ratio in rocks, mainly using mass spectrometry. The method is only practical for silicate minerals and rocks, potassium feldspars and slates. Also described is the rubidium-strontium isochrone method. This, however, requires a significant amount of experimental data and an analysis of large quantities of samples, often of the order of tons. The results are tabulated of rubidium-strontium dating of geological formations in the Czech Socialist Republic. (M.S.)

  5. Structural Reliability Methods

    DEFF Research Database (Denmark)

    Ditlevsen, Ove Dalager; Madsen, H. O.

    The structural reliability methods quantitatively treat the uncertainty of predicting the behaviour and properties of a structure given the uncertain properties of its geometry, materials, and the actions it is supposed to withstand. This book addresses the probabilistic methods for evaluation...... of structural reliability, including the theoretical basis for these methods. Partial safety factor codes under current practice are briefly introduced and discussed. A probabilistic code format for obtaining a formal reliability evaluation system that catches the most essential features of the nature...... of the uncertainties and their interplay is the developed, step-by-step. The concepts presented are illustrated by numerous examples throughout the text....

  6. Catalytic reforming methods

    Science.gov (United States)

    Tadd, Andrew R; Schwank, Johannes

    2013-05-14

    A catalytic reforming method is disclosed herein. The method includes sequentially supplying a plurality of feedstocks of variable compositions to a reformer. The method further includes adding a respective predetermined co-reactant to each of the plurality of feedstocks to obtain a substantially constant output from the reformer for the plurality of feedstocks. The respective predetermined co-reactant is based on a C/H/O atomic composition for a respective one of the plurality of feedstocks and a predetermined C/H/O atomic composition for the substantially constant output.

  7. Nuclear physics mathematical methods

    International Nuclear Information System (INIS)

    Balian, R.; Gervois, A.; Giannoni, M.J.; Levesque, D.; Maille, M.

    1984-01-01

    The nuclear physics mathematical methods, applied to the collective motion theory, to the reduction of the degrees of freedom and to the order and disorder phenomena; are investigated. In the scope of the study, the following aspects are discussed: the entropy of an ensemble of collective variables; the interpretation of the dissipation, applying the information theory; the chaos and the universality; the Monte-Carlo method applied to the classical statistical mechanics and quantum mechanics; the finite elements method, and the classical ergodicity [fr

  8. Methods for RNA Analysis

    DEFF Research Database (Denmark)

    Olivarius, Signe

    of the transcriptome, 5’ end capture of RNA is combined with next-generation sequencing for high-throughput quantitative assessment of transcription start sites by two different methods. The methods presented here allow for functional investigation of coding as well as noncoding RNA and contribute to future...... RNAs rely on interactions with proteins, the establishment of protein-binding profiles is essential for the characterization of RNAs. Aiming to facilitate RNA analysis, this thesis introduces proteomics- as well as transcriptomics-based methods for the functional characterization of RNA. First, RNA...

  9. Electromigration method in radiochemistry

    International Nuclear Information System (INIS)

    Makarova, T.P.; Stepanov, A.V.

    1977-01-01

    Investigations are reviewd of the period 1969-1975 accomplished by such methods as zonal electrophoresis in countercurrent, focusing electrophoresis, isotachophoresis, electrophoresis with elution, continuous two-dimensional electrophoresis. Since the methods considered are based on the use of porous fillers for stabilizing the medium, some attention is given to the effect of the solid-solution interface on the shape and rate of motion of the zones of the rare-earth elements investigated, Sr and others. The trend of developing electrophoresis as a method for obtaining high-purity elements is emphasized

  10. Numerical methods using Matlab

    CERN Document Server

    Lindfield, George

    2012-01-01

    Numerical Methods using MATLAB, 3e, is an extensive reference offering hundreds of useful and important numerical algorithms that can be implemented into MATLAB for a graphical interpretation to help researchers analyze a particular outcome. Many worked examples are given together with exercises and solutions to illustrate how numerical methods can be used to study problems that have applications in the biosciences, chaos, optimization, engineering and science across the board. Numerical Methods using MATLAB, 3e, is an extensive reference offering hundreds of use

  11. Model Correction Factor Method

    DEFF Research Database (Denmark)

    Christensen, Claus; Randrup-Thomsen, Søren; Morsing Johannesen, Johannes

    1997-01-01

    The model correction factor method is proposed as an alternative to traditional polynomial based response surface techniques in structural reliability considering a computationally time consuming limit state procedure as a 'black box'. The class of polynomial functions is replaced by a limit...... of the model correction factor method, is that in simpler form not using gradient information on the original limit state function or only using this information once, a drastic reduction of the number of limit state evaluation is obtained together with good approximations on the reliability. Methods...

  12. Imaging methods in otorhinolaryngology

    International Nuclear Information System (INIS)

    Frey, K.W.; Mees, K.; Vogl, T.

    1989-01-01

    This book is the work of an otorhinolaryngologist and two radiologists, who combined their experience and efforts in order to solve a great variety and number of problems encountered in practical work, taking into account the latest technical potentials and the practical feasibility, which is determined by the equipment available. Every chapter presents the full range of diagnostic methods applicable, starting with the suitable plain radiography methods and proceeding to the various tomographic scanning methods, including conventional tomography. Every technique is assessed in terms of diagnostic value and drawbacks. (orig./MG) With 778 figs [de

  13. Generalized subspace correction methods

    Energy Technology Data Exchange (ETDEWEB)

    Kolm, P. [Royal Institute of Technology, Stockholm (Sweden); Arbenz, P.; Gander, W. [Eidgenoessiche Technische Hochschule, Zuerich (Switzerland)

    1996-12-31

    A fundamental problem in scientific computing is the solution of large sparse systems of linear equations. Often these systems arise from the discretization of differential equations by finite difference, finite volume or finite element methods. Iterative methods exploiting these sparse structures have proven to be very effective on conventional computers for a wide area of applications. Due to the rapid development and increasing demand for the large computing powers of parallel computers, it has become important to design iterative methods specialized for these new architectures.

  14. Concrete compositions and methods

    Science.gov (United States)

    Chen, Irvin; Lee, Patricia Tung; Patterson, Joshua

    2015-06-23

    Provided herein are compositions, methods, and systems for cementitious compositions containing calcium carbonate compositions and aggregate. The compositions find use in a variety of applications, including use in a variety of building materials and building applications.

  15. Ensemble Data Mining Methods

    Science.gov (United States)

    Oza, Nikunj C.

    2004-01-01

    Ensemble Data Mining Methods, also known as Committee Methods or Model Combiners, are machine learning methods that leverage the power of multiple models to achieve better prediction accuracy than any of the individual models could on their own. The basic goal when designing an ensemble is the same as when establishing a committee of people: each member of the committee should be as competent as possible, but the members should be complementary to one another. If the members are not complementary, Le., if they always agree, then the committee is unnecessary---any one member is sufficient. If the members are complementary, then when one or a few members make an error, the probability is high that the remaining members can correct this error. Research in ensemble methods has largely revolved around designing ensembles consisting of competent yet complementary models.

  16. Diagnostic method and reagent

    International Nuclear Information System (INIS)

    Edgington, T.S.; Plow, E.F.

    1979-01-01

    The discovery of an isomeric species of carcinoembryonic antigen and methods of isolation, identification and utilization as a radiolabelled species of the same as an aid in the diagnosis of adenocarcinomas of the gastrointestinal tract are disclosed. 13 claims

  17. Methods of dating

    Energy Technology Data Exchange (ETDEWEB)

    Gatty, B

    1986-04-01

    Scientific methods of dating, born less than thirty years ago, have recently improved tremendously. First the dating principles will be given; then it will be explained how, through natural radioactivity, we can have access to the age of an event or an object; the case of radiocarbon will be especially emphasized. The principle of relative methods such as thermoluminescence or paleomagnetism will also be shortly given. What is the use for dating. The fields of its application are numerous; through these methods, relatively precise ages can be given to the major events which have been keys in the history of universe, life and man; thus, dating is a useful scientific tool in astrophysics, geology, biology, anthropology and archeology. Even if certain ages are still subject to controversies, we can say that these methods have confirmed evolution's continuity, be it on a cosmic, biologic or human scale, where ages are measured in billions, millions or thousands of years respectively.

  18. Energy consumption assessment methods

    Energy Technology Data Exchange (ETDEWEB)

    Sutherland, K S

    1975-01-01

    The why, what, and how-to aspects of energy audits for industrial plants, and the application of energy accounting methods to a chemical plant in order to assess energy conservation possibilities are discussed. (LCL)

  19. Stochastic optimization methods

    CERN Document Server

    Marti, Kurt

    2005-01-01

    Optimization problems arising in practice involve random parameters. For the computation of robust optimal solutions, i.e., optimal solutions being insensitive with respect to random parameter variations, deterministic substitute problems are needed. Based on the distribution of the random data, and using decision theoretical concepts, optimization problems under stochastic uncertainty are converted into deterministic substitute problems. Due to the occurring probabilities and expectations, approximative solution techniques must be applied. Deterministic and stochastic approximation methods and their analytical properties are provided: Taylor expansion, regression and response surface methods, probability inequalities, First Order Reliability Methods, convex approximation/deterministic descent directions/efficient points, stochastic approximation methods, differentiation of probability and mean value functions. Convergence results of the resulting iterative solution procedures are given.

  20. Predictive Methods of Pople

    Indian Academy of Sciences (India)

    Chemistry for their pioneering contri butions to the development of computational methods in quantum chemistry and density functional theory .... program of Pop Ie for ab-initio electronic structure calculation of molecules. This ab-initio MO ...

  1. Methods for cellobiosan utilization

    Energy Technology Data Exchange (ETDEWEB)

    Linger, Jeffrey; Beckham, Gregg T.

    2017-07-11

    Disclosed herein are enzymes useful for the degradation of cellobiosan in materials such a pyrolysis oils. Methods of degrading cellobiosan using enzymes or organisms expressing the same are also disclosed.

  2. Methods of neutron spectrometry

    International Nuclear Information System (INIS)

    Doerschel, B.

    1981-01-01

    The different methods of neutron spectrometry are based on the direct measurement of neutron velocity or on the use of suitable energy-dependent interaction processes. In the latter case the measuring effect of a detector is connected with the searched neutron spectrum by an integral equation. The solution needs suitable unfolding procedures. The most important methods of neutron spectrometry are the time-of-flight method, the crystal spectrometry, the neutron spectrometry by use of elastic collisions with hydrogen nuclei, and neutron spectrometry with the aid of nuclear reactions, especially of the neutron-induced activation. The advantages and disadvantages of these methods are contrasted considering the resolution, the measurable energy range, the sensitivity, and the experimental and computational efforts. (author)

  3. Methods in Modern Biophysics

    CERN Document Server

    Nölting, Bengt

    2010-01-01

    Incorporating recent dramatic advances, this textbook presents a fresh and timely introduction to modern biophysical methods. An array of new, faster and higher-power biophysical methods now enables scientists to examine the mysteries of life at a molecular level. This innovative text surveys and explains the ten key biophysical methods, including those related to biophysical nanotechnology, scanning probe microscopy, X-ray crystallography, ion mobility spectrometry, mass spectrometry, proteomics, and protein folding and structure. Incorporating much information previously unavailable in tutorial form, Nölting employs worked examples and about 270 illustrations to fully detail the techniques and their underlying mechanisms. Methods in Modern Biophysics is written for advanced undergraduate and graduate students, postdocs, researchers, lecturers, and professors in biophysics, biochemistry and related fields. Special features in the 3rd edition: Introduces rapid partial protein ladder sequencing - an important...

  4. Lean Government Methods Guide

    Science.gov (United States)

    This Guide focuses primarily on Lean production, which is an organizational improvement philosophy and set of methods that originated in manufacturing but has been expanded to government and service sectors.

  5. Number projection method

    International Nuclear Information System (INIS)

    Kaneko, K.

    1987-01-01

    A relationship between the number projection and the shell model methods is investigated in the case of a single-j shell. We can find a one-to-one correspondence between the number projected and the shell model states

  6. Etching method employing radiation

    International Nuclear Information System (INIS)

    Chapman, B.N.; Winters, H.F.

    1982-01-01

    This invention provides a method for etching a silicon oxide, carbide, nitride, or oxynitride surface using an electron or ion beam in the presence of a xenon or krypton fluoride. No additional steps are required after exposure to radiation

  7. GEM simulation methods development

    International Nuclear Information System (INIS)

    Tikhonov, V.; Veenhof, R.

    2002-01-01

    A review of methods used in the simulation of processes in gas electron multipliers (GEMs) and in the accurate calculation of detector characteristics is presented. Such detector characteristics as effective gas gain, transparency, charge collection and losses have been calculated and optimized for a number of GEM geometries and compared with experiment. A method and a new special program for calculations of detector macro-characteristics such as signal response in a real detector readout structure, and spatial and time resolution of detectors have been developed and used for detector optimization. A detailed development of signal induction on readout electrodes and electronics characteristics are included in the new program. A method for the simulation of charging-up effects in GEM detectors is described. All methods show good agreement with experiment

  8. Improved radioanalytical methods

    International Nuclear Information System (INIS)

    Erickson, M.D.; Aldstadt, J.H.; Alvarado, J.S.; Crain, J.S.; Orlandini, K.A.; Smith, L.L.

    1995-01-01

    Methods for the chemical characterization of the environment are being developed under a multitask project for the Analytical Services Division (EM-263) within the US Department of Energy (DOE) Office of Environmental Management. This project focuses on improvement of radioanalytical methods with an emphasis on faster and cheaper routine methods. We have developed improved methods, for separation of environmental levels of technetium-99 and strontium-89/90, radium, and actinides from soil and water; and for separation of actinides from soil and water matrix interferences. Among the novel separation techniques being used are element- and class-specific resins and membranes. (The 3M Corporation is commercializing Empore trademark membranes under a cooperative research and development agreement [CRADA] initiated under this project). We have also developed methods for simultaneous detection of multiple isotopes using inductively coupled plasma-mass spectrometry (ICP-MS). The ICP-MS method requires less rigorous chemical separations than traditional radiochemical analyses because of its mass-selective mode of detection. Actinides and their progeny have been isolated and concentrated from a variety of natural water matrices by using automated batch separation incorporating selective resins prior to ICP-MS analyses. In addition, improvements in detection limits, sample volume, and time of analysis were obtained by using other sample introduction techniques, such as ultrasonic nebulization and electrothermal vaporization. Integration and automation of the separation methods with the ICP-MS methodology by using flow injection analysis is underway, with an objective of automating methods to achieve more reproducible results, reduce labor costs, cut analysis time, and minimize secondary waste generation through miniaturization of the process

  9. Continuation Newton methods

    Czech Academy of Sciences Publication Activity Database

    Axelsson, Owe; Sysala, Stanislav

    2015-01-01

    Roč. 70, č. 11 (2015), s. 2621-2637 ISSN 0898-1221 R&D Projects: GA ČR GA13-18652S Institutional support: RVO:68145535 Keywords : system of nonlinear equations * Newton method * load increment method * elastoplasticity Subject RIV: IN - Informatics, Computer Science Impact factor: 1.398, year: 2015 http://www.sciencedirect.com/science/article/pii/S0898122115003818

  10. Nuclear methods monitor nutrition

    International Nuclear Information System (INIS)

    Allen, B.J.

    1988-01-01

    Neutron activation of nitrogen and hydrogen in the body, the isotope dilution technique and the measurement of naturally radioactive potassium in the body are among the new nuclear methods, now under collaborative development by the Australian Nuclear Scientific and Technology Organization and medical specialists from several Sydney hospitals. These methods allow medical specialists to monitor the patient's response to various diets and dietary treatments in cases of cystic fibrosis, anorexia nervosa, long-term surgical trauma, renal diseases and AIDS. ills

  11. The fission track method

    International Nuclear Information System (INIS)

    Hansen, K.

    1990-01-01

    During the last decade fission track (FT) analysis has evolved as an important tool in exploration for hydrocarbon resources. Most important is this method's ability to yield information about temperatures at different times (history), and thus relate oil generation and time independently of other maturity parameters. The purpose of this paper is to introduce the basics of the method and give an example from the author's studies. (AB) (14 refs.)

  12. Experimental physics method

    International Nuclear Information System (INIS)

    Jeong, Yang Su; Oh, Byeong Seong

    2010-05-01

    This book introduces measurement and error, statistics of experimental data, population, sample variable, distribution function, propagation of error, mean and measurement of error, adjusting to rectilinear equation, common sense of error, experiment method, and record and statement. It also explains importance of error of estimation, systematic error, random error, treatment of single variable, significant figure, deviation, mean value, median, mode, sample mean, sample standard deviation, binomial distribution, gauss distribution, and method of least squares.

  13. Methods for measuring shrinkage

    OpenAIRE

    Chapman, Paul; Templar, Simon

    2006-01-01

    This paper presents findings from research amongst European grocery retailers into their methods for measuring shrinkage. The findings indicate that: there is no dominant method for valuing or stating shrinkage; shrinkage in the supply chain is frequently overlooked; data is essential in pinpointing where and when loss occurs and that many retailers collect data at the stock-keeping unit (SKU) level and do so every 6 months. These findings reveal that it is difficult to benc...

  14. Method of saccharifying cellulose

    Science.gov (United States)

    Johnson, E.A.; Demain, A.L.; Madia, A.

    1983-05-13

    A method is disclosed of saccharifying cellulose by incubation with the cellulase of Clostridium thermocellum in a broth containing an efficacious amount of thiol reducing agent. Other incubation parameters which may be advantageously controlled to stimulate saccharification include the concentration of alkaline earth salts, pH, temperature, and duration. By the method of the invention, even native crystalline cellulose such as that found in cotton may be completely saccharified.

  15. Method of treating depression

    Science.gov (United States)

    Henn, Fritz [East Patchogue, NY

    2012-01-24

    Methods for treatment of depression-related mood disorders in mammals, particularly humans are disclosed. The methods of the invention include administration of compounds capable of enhancing glutamate transporter activity in the brain of mammals suffering from depression. ATP-sensitive K.sup.+ channel openers and .beta.-lactam antibiotics are used to enhance glutamate transport and to treat depression-related mood disorders and depressive symptoms.

  16. Methods of experimental physics

    CERN Document Server

    Williams, Dudley

    1962-01-01

    Methods of Experimental Physics, Volume 3: Molecular Physics focuses on molecular theory, spectroscopy, resonance, molecular beams, and electric and thermodynamic properties. The manuscript first considers the origins of molecular theory, molecular physics, and molecular spectroscopy, as well as microwave spectroscopy, electronic spectra, and Raman effect. The text then ponders on diffraction methods of molecular structure determination and resonance studies. Topics include techniques of electron, neutron, and x-ray diffraction and nuclear magnetic, nuclear quadropole, and electron spin reson

  17. The ICARE Method

    Science.gov (United States)

    Henke, Luke

    2010-01-01

    The ICARE method is a flexible, widely applicable method for systems engineers to solve problems and resolve issues in a complete and comprehensive manner. The method can be tailored by diverse users for direct application to their function (e.g. system integrators, design engineers, technical discipline leads, analysts, etc.). The clever acronym, ICARE, instills the attitude of accountability, safety, technical rigor and engagement in the problem resolution: Identify, Communicate, Assess, Report, Execute (ICARE). This method was developed through observation of Space Shuttle Propulsion Systems Engineering and Integration (PSE&I) office personnel approach in an attempt to succinctly describe the actions of an effective systems engineer. Additionally it evolved from an effort to make a broadly-defined checklist for a PSE&I worker to perform their responsibilities in an iterative and recursive manner. The National Aeronautics and Space Administration (NASA) Systems Engineering Handbook states, engineering of NASA systems requires a systematic and disciplined set of processes that are applied recursively and iteratively for the design, development, operation, maintenance, and closeout of systems throughout the life cycle of the programs and projects. ICARE is a method that can be applied within the boundaries and requirements of NASA s systems engineering set of processes to provide an elevated sense of duty and responsibility to crew and vehicle safety. The importance of a disciplined set of processes and a safety-conscious mindset increases with the complexity of the system. Moreover, the larger the system and the larger the workforce, the more important it is to encourage the usage of the ICARE method as widely as possible. According to the NASA Systems Engineering Handbook, elements of a system can include people, hardware, software, facilities, policies and documents; all things required to produce system-level results, qualities, properties, characteristics

  18. VALUATION METHODS- LITERATURE REVIEW

    Directory of Open Access Journals (Sweden)

    Dorisz Talas

    2015-07-01

    Full Text Available This paper is a theoretical overview of the often used valuation methods with the help of which the value of a firm or its equity is calculated. Many experts (including Aswath Damodaran, Guochang Zhang and CA Hozefa Natalwala classify the methods. The basic models are based on discounted cash flows. The main method uses the free cash flow for valuation, but there are some newer methods that reveal and correct the weaknesses of the traditional models. The valuation of flexibility of management can be conducted mainly with real options. This paper briefly describes the essence of the Dividend Discount Model, the Free Cash Flow Model, the benefit from using real options and the Residual Income Model. There are a few words about the Adjusted Present Value approach as well. Different models uses different premises, and an overall truth is that if the required premises are real and correct, the value will be appropriately accurate. Another important condition is that experts, analysts should choose between the models on the basis of the purpose of valuation. Thus there are no good or bad methods, only methods that fit different goals and aims. The main task is to define exactly the purpose, then to find the most appropriate valuation technique. All the methods originates from the premise that the value of an asset is the present value of its future cash flows. According to the different points of view of different techniques the resulted values can be also differed from each other. Valuation models and techniques should be adapted to the rapidly changing world, but the basic statements remain the same. On the other hand there is a need for more accurate models in order to help investors get as many information as they could. Today information is one of the most important resources and financial models should keep up with this trend.

  19. The lod score method.

    Science.gov (United States)

    Rice, J P; Saccone, N L; Corbett, J

    2001-01-01

    The lod score method originated in a seminal article by Newton Morton in 1955. The method is broadly concerned with issues of power and the posterior probability of linkage, ensuring that a reported linkage has a high probability of being a true linkage. In addition, the method is sequential, so that pedigrees or lod curves may be combined from published reports to pool data for analysis. This approach has been remarkably successful for 50 years in identifying disease genes for Mendelian disorders. After discussing these issues, we consider the situation for complex disorders, where the maximum lod score (MLS) statistic shares some of the advantages of the traditional lod score approach but is limited by unknown power and the lack of sharing of the primary data needed to optimally combine analytic results. We may still learn from the lod score method as we explore new methods in molecular biology and genetic analysis to utilize the complete human DNA sequence and the cataloging of all human genes.

  20. Advances in iterative methods

    International Nuclear Information System (INIS)

    Beauwens, B.; Arkuszewski, J.; Boryszewicz, M.

    1981-01-01

    Results obtained in the field of linear iterative methods within the Coordinated Research Program on Transport Theory and Advanced Reactor Calculations are summarized. The general convergence theory of linear iterative methods is essentially based on the properties of nonnegative operators on ordered normed spaces. The following aspects of this theory have been improved: new comparison theorems for regular splittings, generalization of the notions of M- and H-matrices, new interpretations of classical convergence theorems for positive-definite operators. The estimation of asymptotic convergence rates was developed with two purposes: the analysis of model problems and the optimization of relaxation parameters. In the framework of factorization iterative methods, model problem analysis is needed to investigate whether the increased computational complexity of higher-order methods does not offset their increased asymptotic convergence rates, as well as to appreciate the effect of standard relaxation techniques (polynomial relaxation). On the other hand, the optimal use of factorization iterative methods requires the development of adequate relaxation techniques and their optimization. The relative performances of a few possibilities have been explored for model problems. Presently, the best results have been obtained with optimal diagonal-Chebyshev relaxation

  1. Independent random sampling methods

    CERN Document Server

    Martino, Luca; Míguez, Joaquín

    2018-01-01

    This book systematically addresses the design and analysis of efficient techniques for independent random sampling. Both general-purpose approaches, which can be used to generate samples from arbitrary probability distributions, and tailored techniques, designed to efficiently address common real-world practical problems, are introduced and discussed in detail. In turn, the monograph presents fundamental results and methodologies in the field, elaborating and developing them into the latest techniques. The theory and methods are illustrated with a varied collection of examples, which are discussed in detail in the text and supplemented with ready-to-run computer code. The main problem addressed in the book is how to generate independent random samples from an arbitrary probability distribution with the weakest possible constraints or assumptions in a form suitable for practical implementation. The authors review the fundamental results and methods in the field, address the latest methods, and emphasize the li...

  2. Grid generation methods

    CERN Document Server

    Liseikin, Vladimir D

    2017-01-01

    This new edition provides a description of current developments relating to grid methods, grid codes, and their applications to actual problems. Grid generation methods are indispensable for the numerical solution of differential equations. Adaptive grid-mapping techniques, in particular, are the main focus and represent a promising tool to deal with systems with singularities. This 3rd edition includes three new chapters on numerical implementations (10), control of grid properties (11), and applications to mechanical, fluid, and plasma related problems (13). Also the other chapters have been updated including new topics, such as curvatures of discrete surfaces (3). Concise descriptions of hybrid mesh generation, drag and sweeping methods, parallel algorithms for mesh generation have been included too. This new edition addresses a broad range of readers: students, researchers, and practitioners in applied mathematics, mechanics, engineering, physics and other areas of applications.

  3. Bayesian methods in reliability

    Science.gov (United States)

    Sander, P.; Badoux, R.

    1991-11-01

    The present proceedings from a course on Bayesian methods in reliability encompasses Bayesian statistical methods and their computational implementation, models for analyzing censored data from nonrepairable systems, the traits of repairable systems and growth models, the use of expert judgment, and a review of the problem of forecasting software reliability. Specific issues addressed include the use of Bayesian methods to estimate the leak rate of a gas pipeline, approximate analyses under great prior uncertainty, reliability estimation techniques, and a nonhomogeneous Poisson process. Also addressed are the calibration sets and seed variables of expert judgment systems for risk assessment, experimental illustrations of the use of expert judgment for reliability testing, and analyses of the predictive quality of software-reliability growth models such as the Weibull order statistics.

  4. Energy methods in dynamics

    CERN Document Server

    Le, Khanh Chau

    2012-01-01

    The above examples should make clear the necessity of understanding the mechanism of vibrations and waves in order to control them in an optimal way. However vibrations and waves are governed by differential equations which require, as a rule, rather complicated mathematical methods for their analysis. The aim of this textbook is to help students acquire both a good grasp of the first principles from which the governing equations can be derived, and the adequate mathematical methods for their solving. Its distinctive features, as seen from the title, lie in the systematic and intensive use of Hamilton's variational principle and its generalizations for deriving the governing equations of conservative and dissipative mechanical systems, and also in providing the direct variational-asymptotic analysis, whenever available, of the energy and dissipation for the solution of these equations. It will be demonstrated that many well-known methods in dynamics like those of Lindstedt-Poincare, Bogoliubov-Mitropolsky, Ko...

  5. Nuclear methods for tribology

    International Nuclear Information System (INIS)

    Racolta, P.M.

    1994-01-01

    The tribological field of activity is mainly concerned with the relative movement of different machine components, friction and wear phenomena and their dependence upon lubrication. Tribological studies on friction and wear processes are important because they lead to significant parameter-improvements of engineering tools and machinery components. A review of fundamental aspects of both friction and wear phenomena is presented. A number of radioindicator-based methods have been known for almost four decades, differing mainly with respect to the mode of introducing the radio-indicators into the machine part to be studied. All these methods briefly presented in this paper are based on the measurement of the activity of wear products and therefore require high activity levels of the part. For this reason, such determinations can be carried out only in special laboratories and under conditions which do not usually agree with the conditions of actual use. What is required is a sensitive, fast method allowing the determination of wear under any operating conditions, without the necessity of stopping and disassembling the machine. The above mentioned requirements are the features that have made the Thin Layer Activation technique (TLA) the most widely used method applied in wear and corrosion studies in the last two decades. The TLA principle, taking in account that wear and corrosion processes are characterised by a loss of material, consists in an ion beam irradiation of a well defined volume of a machine part subjected to wear. The radioactivity level changes can usually be measured by gamma-ray spectroscopy methods. A review of both main TLA fields of application in major laboratories abroad and of those performed at the U-120 cyclotron of I.P.N.E.-Bucharest together with the existing trends to extend other nuclear analytical methods to tribological studies is presented as well. (author). 25 refs., 6 figs., 2 tabs

  6. Methods for pretreating biomass

    Science.gov (United States)

    Balan, Venkatesh; Dale, Bruce E; Chundawat, Shishir; Sousa, Leonardo

    2017-05-09

    A method for pretreating biomass is provided, which includes, in a reactor, allowing gaseous ammonia to condense on the biomass and react with water present in the biomass to produce pretreated biomass, wherein reactivity of polysaccharides in the biomass is increased during subsequent biological conversion as compared to the reactivity of polysaccharides in biomass which has not been pretreated. A method for pretreating biomass with a liquid ammonia and recovering the liquid ammonia is also provided. Related systems which include a biochemical or biofuel production facility are also disclosed.

  7. Exploring Monte Carlo methods

    CERN Document Server

    Dunn, William L

    2012-01-01

    Exploring Monte Carlo Methods is a basic text that describes the numerical methods that have come to be known as "Monte Carlo." The book treats the subject generically through the first eight chapters and, thus, should be of use to anyone who wants to learn to use Monte Carlo. The next two chapters focus on applications in nuclear engineering, which are illustrative of uses in other fields. Five appendices are included, which provide useful information on probability distributions, general-purpose Monte Carlo codes for radiation transport, and other matters. The famous "Buffon's needle proble

  8. Research on teaching methods.

    Science.gov (United States)

    Oermann, M H

    1990-01-01

    Research on teaching methods in nursing education was categorized into studies on media, CAI, and other nontraditional instructional strategies. While the research differed, some generalizations may be made from the findings. Multimedia, whether it is used for individual or group instruction, is at least as effective as traditional instruction (lecture and lecture-discussion) in promoting cognitive learning, retention of knowledge, and performance. Further study is needed to identify variables that may influence learning and retention. While learner attitudes toward mediated instruction tended to be positive, investigators failed to control for the effect of novelty. Control over intervening variables was lacking in the majority of studies as well. Research indicated that CAI is as effective as other teaching methods in terms of knowledge gain and retention. Attitudes toward CAI tended to be favorable, with similar problems in measurement as those evidenced in studies of media. Chang (1986) also recommends that future research examine the impact of computer-video interactive instruction on students, faculty, and settings. Research is needed on experimental teaching methods, strategies for teaching problem solving and clinical judgment, and ways of improving the traditional lecture and discussion. Limited research in these areas makes generalizations impossible. There is a particular need for research on how to teach students the diagnostic reasoning process and encourage critical thinking, both in terms of appropriate teaching methods and the way in which those strategies should be used. It is interesting that few researchers studied lecture and lecture-discussion except as comparable teaching methods for research on other strategies. Additional research questions may be generated on lecture and discussion in relation to promoting concept learning, an understanding of nursing and other theories, transfer of knowledge, and development of cognitive skills. Few

  9. Carbon 14 dating method

    International Nuclear Information System (INIS)

    Fortin, Ph.

    2000-01-01

    This document gives a first introduction to 14 C dating as it is put into practice at the radiocarbon dating centre of Claude-Bernard university (Lyon-1 univ., Villeurbanne, France): general considerations and recalls of nuclear physics; the 14 C dating method; the initial standard activity; the isotopic fractioning; the measurement of samples activity; the liquid-scintillation counters; the calibration and correction of 14 C dates; the preparation of samples; the benzene synthesis; the current applications of the method. (J.S.)

  10. Methods of Multivariate Analysis

    CERN Document Server

    Rencher, Alvin C

    2012-01-01

    Praise for the Second Edition "This book is a systematic, well-written, well-organized text on multivariate analysis packed with intuition and insight . . . There is much practical wisdom in this book that is hard to find elsewhere."-IIE Transactions Filled with new and timely content, Methods of Multivariate Analysis, Third Edition provides examples and exercises based on more than sixty real data sets from a wide variety of scientific fields. It takes a "methods" approach to the subject, placing an emphasis on how students and practitioners can employ multivariate analysis in real-life sit

  11. Tautomerism methods and theories

    CERN Document Server

    Antonov, Liudmil

    2013-01-01

    Covering the gap between basic textbooks and over-specialized scientific publications, this is the first reference available to describe this interdisciplinary topic for PhD students and scientists starting in the field. The result is an introductory description providing suitable practical examples of the basic methods used to study tautomeric processes, as well as the theories describing the tautomerism and proton transfer phenomena. It also includes different spectroscopic methods for examining tautomerism, such as UV-VIs, time-resolved fluorescence spectroscopy, and NMR spectrosc

  12. Speeding Fermat's factoring method

    Science.gov (United States)

    McKee, James

    A factoring method is presented which, heuristically, splits composite n in O(n^{1/4+epsilon}) steps. There are two ideas: an integer approximation to sqrt(q/p) provides an O(n^{1/2+epsilon}) algorithm in which n is represented as the difference of two rational squares; observing that if a prime m divides a square, then m^2 divides that square, a heuristic speed-up to O(n^{1/4+epsilon}) steps is achieved. The method is well-suited for use with small computers: the storage required is negligible, and one never needs to work with numbers larger than n itself.

  13. High frequency asymptotic methods

    International Nuclear Information System (INIS)

    Bouche, D.; Dessarce, R.; Gay, J.; Vermersch, S.

    1991-01-01

    The asymptotic methods allow us to compute the interaction of high frequency electromagnetic waves with structures. After an outline of their foundations with emphasis on the geometrical theory of diffraction, it is shown how to use these methods to evaluate the radar cross section (RCS) of complex tri-dimensional objects of great size compared to the wave-length. The different stages in simulating phenomena which contribute to the RCS are reviewed: physical theory of diffraction, multiple interactions computed by shooting rays, research for creeping rays. (author). 7 refs., 6 figs., 3 insets

  14. Practical methods of optimization

    CERN Document Server

    Fletcher, R

    2013-01-01

    Fully describes optimization methods that are currently most valuable in solving real-life problems. Since optimization has applications in almost every branch of science and technology, the text emphasizes their practical aspects in conjunction with the heuristics useful in making them perform more reliably and efficiently. To this end, it presents comparative numerical studies to give readers a feel for possibile applications and to illustrate the problems in assessing evidence. Also provides theoretical background which provides insights into how methods are derived. This edition offers rev

  15. Electrorheological fluids and methods

    Science.gov (United States)

    Green, Peter F.; McIntyre, Ernest C.

    2015-06-02

    Electrorheological fluids and methods include changes in liquid-like materials that can flow like milk and subsequently form solid-like structures under applied electric fields; e.g., about 1 kV/mm. Such fluids can be used in various ways as smart suspensions, including uses in automotive, defense, and civil engineering applications. Electrorheological fluids and methods include one or more polar molecule substituted polyhedral silsesquioxanes (e.g., sulfonated polyhedral silsesquioxanes) and one or more oils (e.g., silicone oil), where the fluid can be subjected to an electric field.

  16. Method of sterilization

    International Nuclear Information System (INIS)

    Peel, J.L.; Waites, W.M.

    1981-01-01

    A method of sterilisation of food packaging is described which comprises treating microorganisms with an ultraviolet irradiated solution of hydrogen peroxide to render the microorganisms non-viable. The wavelength of ultraviolet radiation used is wholly or predominantly below 325 nm and the concentration of the hydrogen peroxide is no greater than 10% by weight. The method is applicable to a wide variety of microorganisms including moulds, yeasts, bacteria, viruses and protozoa and finds particular application in the destruction of spore-forming bacteria, especially those which are dairy contaminants. (U.K.)

  17. Unorthodox theoretical methods

    Energy Technology Data Exchange (ETDEWEB)

    Nedd, Sean [Iowa State Univ., Ames, IA (United States)

    2012-01-01

    The use of the ReaxFF force field to correlate with NMR mobilities of amine catalytic substituents on a mesoporous silica nanosphere surface is considered. The interfacing of the ReaxFF force field within the Surface Integrated Molecular Orbital/Molecular Mechanics (SIMOMM) method, in order to replicate earlier SIMOMM published data and to compare with the ReaxFF data, is discussed. The development of a new correlation consistent Composite Approach (ccCA) is presented, which incorporates the completely renormalized coupled cluster method with singles, doubles and non-iterative triples corrections towards the determination of heats of formations and reaction pathways which contain biradical species.

  18. Monte Carlo methods

    Directory of Open Access Journals (Sweden)

    Bardenet Rémi

    2013-07-01

    Full Text Available Bayesian inference often requires integrating some function with respect to a posterior distribution. Monte Carlo methods are sampling algorithms that allow to compute these integrals numerically when they are not analytically tractable. We review here the basic principles and the most common Monte Carlo algorithms, among which rejection sampling, importance sampling and Monte Carlo Markov chain (MCMC methods. We give intuition on the theoretical justification of the algorithms as well as practical advice, trying to relate both. We discuss the application of Monte Carlo in experimental physics, and point to landmarks in the literature for the curious reader.

  19. The SPH homogeneization method

    International Nuclear Information System (INIS)

    Kavenoky, Alain

    1978-01-01

    The homogeneization of a uniform lattice is a rather well understood topic while difficult problems arise if the lattice becomes irregular. The SPH homogeneization method is an attempt to generate homogeneized cross sections for an irregular lattice. Section 1 summarizes the treatment of an isolated cylindrical cell with an entering surface current (in one velocity theory); Section 2 is devoted to the extension of the SPH method to assembly problems. Finally Section 3 presents the generalisation to general multigroup problems. Numerical results are obtained for a PXR rod bundle assembly in Section 4

  20. Splines and variational methods

    CERN Document Server

    Prenter, P M

    2008-01-01

    One of the clearest available introductions to variational methods, this text requires only a minimal background in calculus and linear algebra. Its self-contained treatment explains the application of theoretic notions to the kinds of physical problems that engineers regularly encounter. The text's first half concerns approximation theoretic notions, exploring the theory and computation of one- and two-dimensional polynomial and other spline functions. Later chapters examine variational methods in the solution of operator equations, focusing on boundary value problems in one and two dimension