WorldWideScience

Sample records for proverbially hack title

  1. Proverbi italiani nell'Europa del nord

    DEFF Research Database (Denmark)

    Toftgaard, Anders

    2014-01-01

    Castelvetro (1546-1616). Nella Biblioteca Reale di Copenaghen è conservata autografa una raccolta di proverbi da lui composta che costituisce una testimonianza preziosa per indagare come la cultura italiana fu introdotta in Danimarca in questa epoca. Il manoscritto che qui ci interessa specialmente è il GKS...... 2052 4°. Il frontespizio porta il testo seguente: Il Significato | D'Alquanti belli & vari | proverbi dell'Italica Favella, gia fatto | da G. C. M. & hoggi riscritto, & donato,in | segno di perpetua amicitia, all ecc.te | D. di legge, Il S.r Nicolò Crachio | Ambas.re del Ser.mo Re di Dania | a questa...

  2. Hacking GPS

    CERN Document Server

    Kingsley-Hughes, Kathie

    2005-01-01

    * This is the "user manual" that didn't come with any of the 30 million GPS receivers currently in use, showing readers how to modify, tweak, and hack their GPS to take it to new levels!* Crazy-cool modifications include exploiting secret keycodes, revealing hidden features, building power cords and cables, hacking the battery and antenna, protecting a GPS from impact and falls, making a screen protector, and solar-powering a GPS* Potential power users will take the function and performance of their GPS to a whole new level by hacking into the firmware and hacking into a PC connection with a GPS* Fear not! Any potentially dangerous mod (to the device) is clearly labeled, with precautions listed that should be taken* Game time! Readers can check out GPS games, check into hacking geocaching, and even use a GPS as a metal detector

  3. Proverbial Oppression of Women in Yoruba African Culture: A ...

    African Journals Online (AJOL)

    Proverbial Oppression of Women in Yoruba African Culture: A Philosophical ... and that they are indicators of discrimination against women in Yoruba culture. ... aspect in gender discourse lies in the proverbial resources of the community.

  4. SQL Hacks

    CERN Document Server

    Cumming, Andrew

    2009-01-01

    Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. SQL Hacks offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you take full advantage of the expressive power of SQL. You'll find practical techniques to address complex data manipulation problems.

  5. Hacking NIMEs

    OpenAIRE

    Hindle, Abram

    2016-01-01

    NIMEs typically focus on novelty but the cost of novelty is often to ignore other non-functional requirements and concerns such as usability or security. Digital security has probably not been a concern for performers due to the duration of their performances and lack of disrespectful hackers, known as crackers, in attendance carrying the appropriate equipment and software necessary to hack a performance. Yet many modern NIMEs could be hacked from smart-phones in the audience. The lack of sec...

  6. Hacking Around.

    Science.gov (United States)

    Zirkel, Perry A.

    1999-01-01

    Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…

  7. Attributing Hacks

    OpenAIRE

    Liu, Ziqi; Smola, Alexander J.; Soska, Kyle; Wang, Yu-Xiang; Zheng, Qinghua; Zhou, Jun

    2016-01-01

    In this paper we describe an algorithm for estimating the provenance of hacks on websites. That is, given properties of sites and the temporal occurrence of attacks, we are able to attribute individual attacks to joint causes and vulnerabilities, as well as estimating the evolution of these vulnerabilities over time. Specifically, we use hazard regression with a time-varying additive hazard function parameterized in a generalized linear form. The activation coefficients on each feature are co...

  8. Google Hacks

    CERN Document Server

    Dornfest, Rael; Calishain, Tara

    2006-01-01

    Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more usef

  9. Hacking for Dummies

    CERN Document Server

    Beaver, Kevin

    2010-01-01

    A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!. It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, data

  10. IS ETHICAL HACKING ETHICAL?

    OpenAIRE

    MUHAMMAD NUMAN ALI KHAN; DANISH JAMIL,

    2011-01-01

    This paper explores the ethics behind ethical hacking and whether there are problems that lie with this new field of work. Since ethical hacking has been a controversial subject over the past few years, the question remains of the true intentions of ethical hackers. The paper also looks at ways in which future research could be looked intoto help keep ethical hacking, ethical.

  11. Etymological aspects of idiomatic and proverbial expressions in the ...

    African Journals Online (AJOL)

    Idiomatic and proverbial expressions are important components of the oral tradition of Sesotho sa Leboa, and therefore a knowledge of the literal meaning of words as they appear in dictionaries without inclusion of their figurative meaning seems to be a shortcoming. An idiom or a proverb possesses one basic meaning, i.e. ...

  12. Freeing Speech: Proverbial Wisdom and Faith Formation as Liberation

    Science.gov (United States)

    Willhauck, Susan

    2013-01-01

    It is crucial to recover the practice of seeking and refining ways to speak of faith. Certain sayings, idioms, maxims, and proverbs constituting wisdom from various cultures help shape a faith that is liberative, particularly evident in undervalued and dominated cultures. This article examines proverbial wisdom and the patois of the street to…

  13. The Art of Hacking

    OpenAIRE

    Ommeln, Miriam; Pimenidis, Lexi

    2018-01-01

    In this position paper we will try to take up on the discussion of ethical issues and hacking. In this work we would like to show what actually happens during hacking and how hacking relates to social responsibility, directed at the benefit of our society. This discussion is necessary for legal discourses and future ethical codices. We come to the conclusion that the discussion actually resolves to aesthetic instead of ethical questions. The latter are only an artificial addendum. However, if...

  14. Hacking for a cause

    OpenAIRE

    Still, Brian

    2005-01-01

    This paper explores the concept of hacktivism, which is hacking for a political or social cause on the Internet. Generally hackers, even those hacking government–sponsored sites, have been negatively stereotyped as malicious thrill seekers or, worse yet, cyberterrorists. But increasingly there are more politically motivated hackers distancing themselves from cyberterrorism by engaging in hacktivism that is intent more upon disruption than disobedience. Certain hacktivists, in fact, have creat...

  15. Hacking Your Ride: Is Web 2.0 Creating Vulnerabilities To Surface Transportation

    Science.gov (United States)

    2016-09-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. HACKING YOUR RIDE...3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE HACKING YOUR RIDE: IS WEB 2.0 CREATING VULNERABILITIES TO SURFACE...Prescribed by ANSI Std. 239-18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public release. Distribution is unlimited. HACKING

  16. Hacking the next generation

    CERN Document Server

    Dhanjani, Nitesh; Hardin, Brett

    2009-01-01

    With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse

  17. BioHack*Kolding

    DEFF Research Database (Denmark)

    Wilde, Danielle

    Short Abstract BioHack*Kolding explores the potential of do-it-together biology to support community building in a town that lacks strong science representation, assisting participants to reflect on the bio-potential of their personal, social and political ecologies and to translate their ideas...... into action. Long Abstract Organisations that support lay people to practice bioscience alongside experts are proliferating. They enable interested people to join the global discussion on Bio Engineering by supporting them to gain the necessary knowledge and skills to do it themselves. Such organisations play...... an important role in facilitating informed debate around the biological sciences. Yet they cannot reach everyone. BioHack*Kolding asks how community-focused biology initiatives can reach people in smaller towns that lack science representation, so that they too can join the debate and ensure that its...

  18. Big Book of Windows Hacks

    CERN Document Server

    Gralla, Preston

    2008-01-01

    Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will. The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that

  19. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  20. An Analysis of Images of Contention and Violence in Dagara and Akan Proverbial Expressions

    Directory of Open Access Journals (Sweden)

    Martin Kyiileyang

    2017-04-01

    Full Text Available Proverbial expressions have typical linguistic and figurative features. These are normally captivating to the listener. The expressive culture of the Dagara and Akan societies is embellished by these proverbial expressions. Most African proverbs, express various images depicting both pleasant and unpleasant situations in life. Unpleasant language normally depicts several terrifying images particularly when threats, insults and other forms of abuse are traded vehemently. Dagara and Akan proverbs are no exceptions to this phenomenon. This paper seeks to examine images of contention and violence depicted in Akan and Dagara proverbial expressions. To achieve this, a variety of proverbs from Akan and Dagara were analysed for their meanings using Yankah’s and Honeck’s Theories. The result revealed that structurally, as with many proverbs, the Akan and Dagara proverbial expressions are pithy and terse. The most dominant images of contention and violence in these expressions expose negative values and perceptions about the people who speak these languages.

  1. Students "Hacking" School Computer Systems

    Science.gov (United States)

    Stover, Del

    2005-01-01

    This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…

  2. Techniques de hacking

    CERN Document Server

    Erickson, Jon

    2008-01-01

    Dans cet ouvrage, Jon Erickson présente les bases de la programmation en C du point de vue du hacker et dissèque plusieurs techniques de hacking, passées et actuelles, afin de comprendre comment et pourquoi elles fonctionnent. Même si vous ne savez pas programmer, ce livre vous donnera une vue complète de la programmation, de l'architecture des machines, des communications réseau et des techniques de hacking existantes. Associez ces connaissances à l'environnement Linux fourni et laissez libre cours à votre imagination. Avec ce livre vous apprendrez à : • programmer les ordinateurs en C, en assembleur et avec des scripts shell ; • inspecter les registres du processeur et la mémoire système avec un débogueur afin de comprendre précisément ce qui se passe ; Vous découvrirez comment les hackers parviennent à : • corrompre la mémoire d'un système, en utilisant les débordements de tampons et les chaînes de format, pour exécuter un code quelconque ; • surpasser les mesures de sécurit...

  3. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  4. Ethical hacking and penetration testing guide

    CERN Document Server

    Baloch, Rafay

    2014-01-01

    Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a penetration test. The book covers a wide range of tools, including Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Supplying a simple and clean explanation of how to effectively utilize these tools, it details a four-step methodology for conducting an effective penetration test or hack.Providing an accessible introduction to penetration testing and hacking, the book supplies you with a fundamental understanding of offensive security. After completing the book you will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks you through each ...

  5. "WE ARE ALL IN THE SAME BOAT NOW" PROVERBIAL RHETORIC IN THE CHURCHILL-ROOSEVELT CORRESPONDENCE

    Directory of Open Access Journals (Sweden)

    Wolfgang Mieder

    2006-06-01

    Full Text Available Both Winston S. Churchill (1874-1965 and Franklin D. Roosevelt (1 882-1945 were masters of the English language and effective orators, rallying their people through word and deed to fight as allies against the dictatorial powers during the Second World War. Their public speeches and interviews are replete with proverbs, proverbial expressions, and other phraseologisms. This is also true for their private and secretive letters, messages, memoranda, and telegrams, as can be seen from the materials that Warren F. Kimball edited in the three volumes of Churchill & Roosevelt: The Complete Correspondence (Princeton, NJ: Princeton University Press, 1984. The proverbial language, especially metaphorical texts referring to the body, animals, and the military, gives their important communications a lively and humane flavor that illustrates their deep friendship, trust, and support of each other. Frequently used as metaphorical arguments, these proverbial interjections into an otherwise factual epistolary exchange from 1933 to 1945 bear witness to the determination of these two world leaders to win the struggle for a free world.

  6. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  7. Growth Hacking a Global Community

    OpenAIRE

    Sarkkinen, Laura; Rauhala, Marita

    2015-01-01

    As technology is developing at a fast phase people are engaging in community activities more and more online, either by extending their offline social life or by creating themselves a whole new parallel life as a member of virtual community. Companies behind communities are rivaling for attention and need to come up with increasingly clever tactics to attract and engage new members. In this thesis the relatively new phenomenon of growth hacking, the use of unconventional methods in order ...

  8. Science Hack Day uses CMS data

    CERN Multimedia

    Katerina Sandoval

    2012-01-01

    Science Hack events: a new way for scientists, designers and other techno-savvy people to interact. The most recent Science Hack Day was held in San Francisco and with it the CMS collaboration found an original and simple way to present its data. Science Hack events: a new way for scientists, designers and other techno-savvy people to interact. The most recent Science Hack Day was held in San Francisco and with it the CMS collaboration found an original and simple way to present its data.   Participants in the CMS hack event. (Photo credit: Morris Mwanga.) First of all, you need to know what “hack” means. A hack is a quick solution to a problem, often the cleverest one if not the most elegant. So, a Science Hack Day is a 48-hour all-night event that brings together “hackers” to create innovative solutions to scientific problems. This year’s event was held in San Francisco from 12 to 13 November and was a huge success! It hosted around 150 s...

  9. Growth Hacking for Startups : How Growth Hacking can utilised for growing startups

    OpenAIRE

    Lee, Jin

    2016-01-01

    In the era of start-ups, many failed to put out their prototypes or products to the market due to lack of funds or experience in marketing. Growth Hacking is a tool that start-ups can benefit from if they learn what Growth Hacking is and how to implement it. The aim of this thesis is to explore what Growth Hacking is and how to implement it for the commissioner CubiCasa Oy. A couple of Growth Hacking tactics are used for CubiCasa Oy and the process of implementation and findings are rec...

  10. Hacking Europe from computer cultures to demoscenes

    CERN Document Server

    Alberts, Gerard

    2014-01-01

    This book traces the evolution of European hacker culture: chopping games in Warsaw, hacking software in Athens, chaos in Hamburg, producing demos in Turku and partying with computing in Zagreb and Amsterdam. Emphasizes the role of mischief, humor and play.

  11. Peran Polri Dalam Penanggulangan Kejahatan Hacking Terhadap Bank

    OpenAIRE

    Idha Endri Prastiono

    2009-01-01

    Cybercrime atau kejahatan dunia siber mempunyai banyak bentuk atau rupa, tetapi dari kesemua bentuk yang ada, hacking merupakan bentuk yang banyak mendapat sorotan karena selain kongres PBB X di Wina menetapkan hacking sebagai first crime, juga dilihat dari aspek teknis, hacking mempunyai kelebihan-kelebihan. Pertama, orang yang melakukan hacking sudah barang tentu dapat melakukan bentuk cybercrime yang lain karena dengan kemampuan masuk ke dalam sistem komputer dan kemudian mengacak-acak si...

  12. The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy

    CERN Document Server

    Engebretson, Patrick

    2011-01-01

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topi

  13. The first SPIE software Hack Day

    Science.gov (United States)

    Kendrew, S.; Deen, C.; Radziwill, N.; Crawford, S.; Gilbert, J.; Gully-Santiago, M.; Kubánek, P.

    2014-07-01

    We report here on the software Hack Day organised at the 2014 SPIE conference on Astronomical Telescopes and Instrumentation in Montréal. The first ever Hack Day to take place at an SPIE event, the aim of the day was to bring together developers to collaborate on innovative solutions to problems of their choice. Such events have proliferated in the technology community, providing opportunities to showcase, share and learn skills. In academic environments, these events are often also instrumental in building community beyond the limits of national borders, institutions and projects. We show examples of projects the participants worked on, and provide some lessons learned for future events.

  14. Hacking of Passwords in Windows Environment

    OpenAIRE

    C.K. GOEL; GAURAV ARYA

    2012-01-01

    Hacking is so simple! Not only the operating system‟s loop holes offers opportunities to hackers but also the applications like Skype and Google Chrome developed for the operating systems are quite attractive to hackers. In this paper I present the various ways in which the passwords like user account‟s passwords stored by the operating system or the passwords required by different applications are stored on the system and can be hacked by intended hackers. This paper presents in depth resear...

  15. Hacking Europe: From Computer Cultures to Demoscenes

    NARCIS (Netherlands)

    Alberts, G.; Oldenziel, R.

    2014-01-01

    Hacking Europe focuses on the playfulness that was at the heart of how European users appropriated microcomputers in the last quarter of the twentieth century. The essays argue that users--whether the design of the projected use of computers was detailed or still unfinished--assigned their own

  16. Ian Hacking, Learner Categories and Human Taxonomies

    Science.gov (United States)

    Davis, Andrew

    2008-01-01

    I use Ian Hacking's views to explore ways of classifying people, exploiting his distinction between indifferent kinds and interactive kinds, and his accounts of how we "make up" people. The natural kind/essentialist approach to indifferent kinds is explored in some depth. I relate this to debates in psychiatry about the existence of mental…

  17. Ethical Hacking in Information Security Curricula

    Science.gov (United States)

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  18. Cognitive Hacking and Digital Government: Digital Identity

    Directory of Open Access Journals (Sweden)

    Paul Thompson

    2004-04-01

    Full Text Available Recently the National Center for Digital Government held a workshop on "The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: cryptography, with a focus on digital signatures; secure processing/computation; and reputation systems. Most discussion at the workshop focused on issues related to authentication of users of digital government, but, as implied by the inclusion of a scenario related to ubiquitous identity theft, there was also discussion of problems related to misinformation, including cognitive hacking. Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to succeed. This paper describes cognitive hacking, suggests countermeasures, and discusses the implications of cognitive hacking for identity in digital government. In particular, spoofing of government websites and insider misuse are considered.

  19. Computer Hacking as a Social Problem

    OpenAIRE

    Alleyne, Brian

    2018-01-01

    This chapter introduces the ideas and practices of digital technology enthusiasts who fall under the umbrella of “hackers. “We will discuss how their defining activity has been constructed as a social problem and how that construction has been challenged in different ways. The chapter concludes with several policy suggestions aimed at addressing the more problematic aspects of computer hacking.

  20. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  1. Herramientas para hacking ético

    OpenAIRE

    Redondo Gil, Juan José

    2015-01-01

    The objective of this project is to describe and test the most important hacking tools available in the Kali Linux distribution. This distribution, based on UNIX, contains tools for network auditing, cracking passwords and traffic sniffing of various protocols (TCP, UDP, HTTP, SSH, ..). The hosts used to test the attacks will be based on UNIX, Windows and Android architecture. It is very important to previously study the architecture of the target (host, network) because the attacks are focus...

  2. Low Tech Hacking Street Smarts for Security Professionals

    CERN Document Server

    Wiles, Jack; Jabbusch, Jennifer; Rogers, Russ; Lowther, Sean

    2011-01-01

    Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions

  3. Hacking medical devices a review - biomed 2013.

    Science.gov (United States)

    Frenger, Paul

    2013-01-01

    Programmable, implantable and external biomedical devices (such as pacemakers, defibrillators, insulin pumps, pain management pumps, vagus nerve stimulators and others) may be vulnerable to unauthorized access, commonly referred to as “hacking”. This intrusion may lead to compromise of confidential patient data or loss of control of the device itself, which may be deadly. Risks to health from unauthorized access is in addition to hazards from faulty (“buggy”) software or circuitry. Historically, this aspect of medical device design has been underemphasized by both manufacturers and regulatory bodies until recently. However, an insulin pump was employed as a murder weapon in 2001 and successful hacking of an implantable defibrillator was demonstrated in 2008. To remedy these problems, professional groups have announced a variety of design standards and the governmental agencies of several countries have enacted device regulations. In turn, manufacturers have developed new software products and hardware circuits to assist biomedical engineering firms to improve their commercial offerings. In this paper the author discusses these issues, reviewing known problems and zero-day threats, with potential solutions. He outlines his approach to secure software and hardware challenges using the Forth language. A plausible scenario is described in which hacking of an implantable defibrillator by terrorists results in a severe national security threat to the United States.

  4. Implementasi Algoritma Pengenalan Wajah Untuk Mendeteksi Visual Hacking

    OpenAIRE

    Alexander, Luisan William; Sentinuwo, Steven; sambul, alwin

    2017-01-01

    Visual Hacking merupakan sebuah isu keamanan dan privasi data yang perlu diperhatikan saat ini, dimana visual hacking berfokus pada pencurian informasi yang terpampang pada tampilan elektronik, seperti layar monitor komputer. Isu ini dapat terjadi ketika pengguna membiarkan informasi terpampang pada layar komputer sehingga dapat dilihat oleh siapa saja. Pada penelitian ini, dibuatlah sebuah aplikasi berbasis computer vision dengan tujuan mengimplementasikan algoritma pengenalan wajah eigenfac...

  5. Detecting Hacked Twitter Accounts based on Behavioural Change

    NARCIS (Netherlands)

    Nauta, Meike; Habib, Mena Badieh; van Keulen, Maurice

    Social media accounts are valuable for hackers for spreading phishing links, malware and spam. Furthermore, some people deliberately hack an acquaintance to damage his or her image. This paper describes a classification for detecting hacked Twitter accounts. The model is mainly based on features

  6. The extent and consequences of p-hacking in science.

    Science.gov (United States)

    Head, Megan L; Holman, Luke; Lanfear, Rob; Kahn, Andrew T; Jennions, Michael D

    2015-03-01

    A focus on novel, confirmatory, and statistically significant results leads to substantial bias in the scientific literature. One type of bias, known as "p-hacking," occurs when researchers collect or select data or statistical analyses until nonsignificant results become significant. Here, we use text-mining to demonstrate that p-hacking is widespread throughout science. We then illustrate how one can test for p-hacking when performing a meta-analysis and show that, while p-hacking is probably common, its effect seems to be weak relative to the real effect sizes being measured. This result suggests that p-hacking probably does not drastically alter scientific consensuses drawn from meta-analyses.

  7. Hacking with Kali practical penetration testing techniques

    CERN Document Server

    Broad, James

    2013-01-01

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You'll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle

  8. Penegakan Hukum Kejahatan Hacking dalam Prespektif Kebijakan Hukum Pidana di Indonesia

    OpenAIRE

    -, Sugiaryo

    2013-01-01

    Hacking is a dark side of information and communication improvement bringing a very wide implication in all aspects of life, especially in close relation with enconomical crime. Hacking can be classified into two, they are usual crime-like hacking in which using information and communication technology as the supporting tools and also post internet-based hacking. In regards of such thing, then it is clearly must be considered on how does the method to enforce it. Hacking crime enforcement in ...

  9. Etymological Aspects of Idiomatic and Proverbial Expressions in the Lexicographic Development of Sesotho sa Leboa ? A Semantic Analysis*

    Directory of Open Access Journals (Sweden)

    V.M. Mojela

    2011-10-01

    Full Text Available

    Abstract: Idiomatic and proverbial expressions are important components of the oral traditionof Sesotho sa Leboa, and therefore a knowledge of the literal meaning of words as they appear indictionaries without inclusion of their figurative meaning seems to be a shortcoming. An idiom or aproverb possesses one basic meaning, i.e. the meaning to which the idiom or proverb is basicallymeant to refer, but each idiom or proverb is made up of several lexical items. Each of these lexicalitems has its own meaning, which usually differs from the figurative sense of the idiom or proverb.Even though the meaning of the words in an idiomatic or proverbial expression seems to differfrom the sense of the idiom or proverb, there is to a certain extent a relationship. It is this relationshipwhich lexicographers can assist to explain in their definitions in order to clarify both the literaland the figurative meanings of words in Sesotho sa Leboa.This article aims to stress the importance of having specialized dictionaries which will giveusers detailed etymological explanations of the meaning of idiomatic and proverbial expressions asused in Sesotho sa Leboa. The etymological analysis of the meaning of these lexical items (idiomsand proverbs will provide a better understanding of these expressions and enrich dictionarieswith detailed definitions. This will create a better understanding of the relationship between theliteral meanings of the expressions and their real (i.e. figurative meanings.

    Keywords: DIACHRONIC ANALYSIS, ETYMOLOGY, FIGURATIVE EXPRESSION, IDIOM,LEMMATIZATION, LEXICOLOGY, METAPHOR, METAPHORIC EXPRESSION, PROVERB,SYNCHRONIC ANALYSIS, TERMINOGRAPHY.

    Opsomming: Etimologiese aspekte van idiomatiese en spreekwoordelikeuitdrukkings in die leksikografiese ontwikkeling van Sesotho sa Leboa — 'nsemantiese ontleding. Idiomatiese en spreekwoordelike uitdrukkings is belangrike komponentevan die mondelinge tradisie van Sesotho sa Leboa en

  10. Hacking the quantum revolution: 1925-1975

    Science.gov (United States)

    Schweber, Silvan S.

    2015-01-01

    I argue that the quantum revolution should be seen as an Ian Hacking type of scientific revolution: a profound, longue durée, multidisciplinary process of transforming our understanding of physical nature, with deep-rooted social components from the start. The "revolution" exhibits a characteristic style of reasoning - the hierarchization of physical nature - and developed and uses a specific language - quantum field theory (QFT). It is by virtue of that language that the quantum theory has achieved some of its deepest insights into the description of the dynamics of the physical world. However, the meaning of what a quantum field theory is and what it describes has deeply altered, and one now speaks of "effective" quantum field theories. Interpreting all present day quantum field theories as but "effective" field theories sheds additional light on Phillip Anderson's assertion that "More is different". This important element is addressed in the last part of the paper.

  11. P-Hacking: A Wake-Up Call for the Scientific Community.

    Science.gov (United States)

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Salameh, Ziad

    2017-10-25

    P-hacking or data dredging involves manipulation of the research data in order to obtain a statistically significant result. The reasons behind P-hacking and the consequences of the same are discussed in the present manuscript.

  12. The need for specific penalties for hacking in criminal law.

    Science.gov (United States)

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  13. The Need for Specific Penalties for Hacking in Criminal Law

    Directory of Open Access Journals (Sweden)

    Sangkyo Oh

    2014-01-01

    Full Text Available In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA. Most experts expect that this change will put the brakes on the CFAA as a severe punishment policy, and result in a drop in controversial court decisions. In this study, we analyze the definitions and the penalties for hacking for each country and compare them with the national law and then make suggestions through more specific legislation. We expect it will reduce legal controversy and prevent excessive punishment.

  14. The Need for Specific Penalties for Hacking in Criminal Law

    OpenAIRE

    Oh, Sangkyo; Lee, Kyungho

    2014-01-01

    In spite of the fact that hacking is a widely used term, it is still not legally established. Moreover, the definition of the concept of hacking has been deployed in a wide variety of ways in national literature. This ambiguity has led to various side effects. Recently in the United States, reforms collectively known as Aaron's Law were proposed as intended amendments to the Computer Fraud and Abuse Act (CFAA). Most experts expect that this change will put the brakes on the CFAA as a severe p...

  15. Hacking and penetration testing with low power devices

    CERN Document Server

    Polstra, Philip

    2014-01-01

    Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop, from distances of a mile or more. Hacking and Penetration Testing with Low Power Devices shows how to use devices running a version of The Deck, a full-featured penetration testing and forensics Linux distribution, and can run for days or weeks on batteries due to their low power consumption. Author Philip Polstra shows how to

  16. Professional penetration testing creating and operating a formal hacking lab

    CERN Document Server

    Wilhelm, Thomas

    2009-01-01

    PART I - Setting Up. Chapter 1: Introduction. Chapter 2: Ethics and Hacking. Chapter 3: Hacking as a Career. Chapter 4: Setting up Your Lab. Chapter 5: Creating and Using PenTest Targets in Your Lab. Chapter 6: Methodologies. Chapter 7: PenTest Metrics. Chapter 8: Management of a PenTest. PART II - Running a PenTest. Chapter 9: Information Gathering. Chapter 10: Vulnerability Identification. Chapter 11: Vulnerability Verification. Chapter 12: Compromising a System and Privilege Escalation. Chapter 13: Maintaining Access. Chapter 14: Covering Your Tracks. PART III - Wrapping Everything Up. Chap

  17. Creative Nonfiction in the Classroom: Extending the Boundaries of Literary Study.

    Science.gov (United States)

    Skrebels, Paul

    The net effect of the early experiences of writing "compositions" which involved either describing the circumstances of a student's life or recounting the kinds of events encapsulated in that proverbially hack title, "What I Did on My Summer Vacation," has been a tendency for older teachers to devalue nonfiction as an object of…

  18. An introduction to hacking and crimeware a pocket guide

    CERN Document Server

    Loewengart, Victoria

    2012-01-01

    An Introduction to Hacking & Crimeware is a comprehensive guide to the most recent and the more serious threats. Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.

  19. Can a biologist fix a smartphone?-Just hack it!

    Science.gov (United States)

    Kamoun, Sophien

    2017-05-08

    Biological systems integrate multiscale processes and networks and are, therefore, viewed as difficult to dissect. However, because of the clear-cut separation between the software code (the information encoded in the genome sequence) and hardware (organism), genome editors can operate as software engineers to hack biological systems without any particularly deep understanding of the complexity of the systems.

  20. Genetic diversity of Pogonatherum paniceum (Lam.) Hack in ...

    African Journals Online (AJOL)

    Inter-simple sequence repeats markers were used to estimate the genetic diversity of Pogonatherum paniceum (Lam.) Hack. from Sichuan Province, Yunnan Province, Chongqing City and Guangxi Zhuang Autonomous Region in China. 100 primers were carried out on 22 wild populations, 14 could produce highly ...

  1. Genetic diversity of Pogonatherum paniceum (Lam.) Hack. in ...

    African Journals Online (AJOL)

    Amplified fragment length polymorphism (AFLP) markers were used to estimate the genetic diversity of Pogonatherum paniceum (Lam.) Hack. from Sichuan Province, Yunnan Province, Chongqing City and. Guangxi Zhuang autonomous Region in China. 10 primer combinations were carried out on 180 different individuals ...

  2. Less noise, more hacking: how to deploy principles from MIT's hacking medicine to accelerate health care.

    Science.gov (United States)

    DePasse, Jacqueline W; Carroll, Ryan; Ippolito, Andrea; Yost, Allison; Santorino, Data; Chu, Zen; Olson, Kristian R

    2014-07-01

    Medical technology offers enormous potential for scalable medicine--to improve the quality and access in health care while simultaneously reducing cost. However, current medical device innovation within companies often only offers incremental advances on existing products, or originates from engineers with limited knowledge of the clinical complexities. We describe how the Hacking Medicine Initiative, based at Massachusetts Institute of Technology has developed an innovative "healthcare hackathon" approach, bringing diverse teams together to rapidly validate clinical needs and develop solutions. Hackathons are based on three core principles; emphasis on a problem-based approach, cross-pollination of disciplines, and "pivoting" on or rapidly iterating on ideas. Hackathons also offer enormous potential for innovation in global health by focusing on local needs and resources as well as addressing feasibility and cultural contextualization. Although relatively new, the success of this approach is clear, as evidenced by the development of successful startup companies, pioneering product design, and the incorporation of creative people from outside traditional life science backgrounds who are working with clinicians and other scientists to create transformative innovation in health care.

  3. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times.

    Science.gov (United States)

    Delgado, Ana; Callén, Blanca

    2017-02-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, 'hacking' is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey's experimental approach to politics, we analyse hacks as 'inquiry' to see how they serve to articulate public and political action. We argue that do-it-yourself and makers' hacks are technical and political demonstrations. What do-it-yourself and makers' hacks ultimately demonstrate is that things can be done otherwise and that 'you' can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration.

  4. GROWTH HACKING PRACTICES IN A START-UP: A CASE STUDY ON THECON.RO

    OpenAIRE

    Marius GERU; Ema RUSU; Alexandru CAPATINA

    2014-01-01

    Despite the increasing awareness of content marketing tools in the academic community, the benefits of growth hacking were highlighted especially in blog posts and several e-books. This paper examines the particular features of growth hacking techniques, which differentiates it from traditional marketing. Specifically, a content analysis was conducted to identify the experts’ opinions regarding the effective use of growth hacking techniques, to detect the specific skills that a growth hacker ...

  5. Hacking's 'Between Goffman and Foucault': A Theoretical Frame for Criminology

    OpenAIRE

    Tomás Speziale

    2017-01-01

    This paper aims to analyse how Ian Hacking states the theoretical basis of his research on the classification of people. Although all his early philosophical education had been based in Foucault, it is also true that Erving Goffman’s perspective provided him with epistemological and methodological tools for understanding face-to-face relationships. Hence, all his works must be thought of as social science texts that combine the research on how the individuals are constitu...

  6. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  7. Hacking in the University: Contesting the Valorisation of Academic Labour

    Directory of Open Access Journals (Sweden)

    Joss Winn

    2013-11-01

    Full Text Available In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers were drawn to and in which they worked. I argue that hacking was originally a form of academic labour that emerged out of the intensification and valorisation of scientific research within the institutional context of the university. The reproduction of hacking as a form of academic labour took place over many decades as academics and their institutions shifted from an ideal of unproductive, communal science to a more productive, entrepreneurial approach to the production of knowledge.  A such, I view hacking as a peculiar, historically situated form of labour that arose out of the contradictions of the academy: vocation vs. profession; teaching vs. research; basic vs. applied research; research vs. development; private vs. public; war vs. peace; institutional autonomy vs. state dependence; scientific communalism vs. intellectual property.

  8. p-Curve and p-Hacking in Observational Research.

    Science.gov (United States)

    Bruns, Stephan B; Ioannidis, John P A

    2016-01-01

    The p-curve, the distribution of statistically significant p-values of published studies, has been used to make inferences on the proportion of true effects and on the presence of p-hacking in the published literature. We analyze the p-curve for observational research in the presence of p-hacking. We show by means of simulations that even with minimal omitted-variable bias (e.g., unaccounted confounding) p-curves based on true effects and p-curves based on null-effects with p-hacking cannot be reliably distinguished. We also demonstrate this problem using as practical example the evaluation of the effect of malaria prevalence on economic growth between 1960 and 1996. These findings call recent studies into question that use the p-curve to infer that most published research findings are based on true effects in the medical literature and in a wide range of disciplines. p-values in observational research may need to be empirically calibrated to be interpretable with respect to the commonly used significance threshold of 0.05. Violations of randomization in experimental studies may also result in situations where the use of p-curves is similarly unreliable.

  9. P-Hacking in Orthopaedic Literature: A Twist to the Tail.

    Science.gov (United States)

    Bin Abd Razak, Hamid Rahmatullah; Ang, Jin-Guang Ernest; Attal, Hersh; Howe, Tet-Sen; Allen, John Carson

    2016-10-19

    "P-hacking" occurs when researchers preferentially select data or statistical analyses until nonsignificant results become significant. We wanted to evaluate if the phenomenon of p-hacking was evident in orthopaedic literature. We text-mined through all articles published in three top orthopaedic journals in 2015. For anonymity, we cipher-coded the three journals. We included all studies that reported a single p value to answer their main hypothesis. These p values were then charted and frequency graphs were generated to illustrate any evidence of p-hacking. Binomial tests were employed to look for evidence of evidential value and significance of p-hacking. Frequency plots for all three journals revealed evidence of p-hacking. Binomial tests for all three journals were significant for evidence of evidential value (p hacking was significant only for one journal (p = 0.0092). P-hacking is an evolving phenomenon that threatens to jeopardize the evidence-based practice of medicine. Although our results show that there is good evidential value for orthopaedic literature published in our top journals, there is some evidence of p-hacking of which authors and readers should be wary. Copyright © 2016 by The Journal of Bone and Joint Surgery, Incorporated.

  10. Do-it-yourself biology and electronic waste hacking: A politics of demonstration in precarious times

    Science.gov (United States)

    Delgado, Ana; Callén, Blanca

    2016-01-01

    In recent years, there has been an explosion of do it yourself, maker and hacker spaces in Europe. Through makers and do-it-yourself initiatives, ‘hacking’ is moving into the everyday life of citizens. This article explores the collective and political nature of those hacks by reporting on empirical work on electronic waste and do-it-yourself biology hacking. Using Dewey’s experimental approach to politics, we analyse hacks as ‘inquiry’ to see how they serve to articulate public and political action. We argue that do-it-yourself and makers’ hacks are technical and political demonstrations. What do-it-yourself and makers’ hacks ultimately demonstrate is that things can be done otherwise and that ‘you’ can also do it. In this sense, they have a potential viral effect. The final part of the article explores some potential shortcomings of such politics of demonstration. PMID:27233296

  11. GROWTH HACKING PRACTICES IN A START-UP: A CASE STUDY ON THECON.RO

    Directory of Open Access Journals (Sweden)

    Marius GERU

    2014-06-01

    Full Text Available Despite the increasing awareness of content marketing tools in the academic community, the benefits of growth hacking were highlighted especially in blog posts and several e-books. This paper examines the particular features of growth hacking techniques, which differentiates it from traditional marketing. Specifically, a content analysis was conducted to identify the experts’ opinions regarding the effective use of growth hacking techniques, to detect the specific skills that a growth hacker must gain and to compare the tools related to this concept from both inbound and outbound marketing perspective. On the other hand, we outlined the need for development of start-ups, without spending huge amounts of money in marketing. Using a case study methodology, we examined the motivations of adopting growth hacking techniques by an Internet pure player - Thecon. Results show that the effective mix of growth hacking techniques applied by this company tends to forward more online content than its competitors.

  12. Optimised quantum hacking of superconducting nanowire single-photon detectors.

    Science.gov (United States)

    Tanner, Michael G; Makarov, Vadim; Hadfield, Robert H

    2014-03-24

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  13. Hacking point of sale payment application secrets, threats, and solutions

    CERN Document Server

    Gomzin, Slava

    2014-01-01

    Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendati

  14. Hacking Health: Bottom-up Innovation for Healthcare

    Directory of Open Access Journals (Sweden)

    Jeeshan Chowdhury

    2012-07-01

    Full Text Available Healthcare is not sustainable and still functions with outdated technology (e.g., pagers, paper records. Top-down approaches by governments and corporations have failed to deliver digital technologies to modernize healthcare. Disruptive innovation must come from the ground up by bridging the gap between front-line health experts and innovators in the latest web and mobile technology. Hacking Health is a hackathon that is focused on social innovation more than technical innovation. Our approach to improve healthcare is to pair technological innovators with healthcare experts to build realistic, human-centric solutions to front-line healthcare problems.

  15. Optimised quantum hacking of superconducting nanowire single-photon detectors

    Science.gov (United States)

    Tanner, Michael G.; Makarov, Vadim; Hadfield, Robert H.

    2014-03-01

    We explore bright-light control of superconducting nanowire single-photon detectors (SNSPDs) in the shunted configuration (a practical measure to avoid latching). In an experiment, we simulate an illumination pattern the SNSPD would receive in a typical quantum key distribution system under hacking attack. We show that it effectively blinds and controls the SNSPD. The transient blinding illumination lasts for a fraction of a microsecond and produces several deterministic fake clicks during this time. This attack does not lead to elevated timing jitter in the spoofed output pulse, and hence does not introduce significant errors. Five different SNSPD chip designs were tested. We consider possible countermeasures to this attack.

  16. The ethical hack a framework for business value penetration testing

    CERN Document Server

    Tiller, James S

    2004-01-01

    INTRODUCTIONPerspectives of ValueSECURITY AND HACKINGInformation SecuritySecurity ArchitectureHacking ImpactsTHE FRAMEWORKBusiness Planning and OperationsReconnaissanceEnumerationVulnerability AnalysisExploitationFinal AnalysisDeliverableIntegration INFORMATION SECURITY PROGRAMScope of Information Security ProgramsThe Process of Information SecurityComponent Parts of Information Security ProgramsBUSINESS PLANNING AND OPERATIONSBusiness ObjectivesSecurity PolicyPrevious Test ResultsBusiness ChallengesThe Business of SecurityReasoningOverall ExpectationsHow Deep is Deep Enough?Timing is Everythi

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 228 ... Kh M Mahrose, AI Attia, IE Ismail, DE Abou-Kassem, ME Abd El-Hack ... F Vercammen, J Brandt, L Van Brantegem, L Bosseler, R Ducatelle ... SA Khan, JH Epstein, KJ Olival, MM Hassan, MB Hossain, KBMA Rahman, ...

  18. Free-space QKD system hacking by wavelength control using an external laser.

    Science.gov (United States)

    Lee, Min Soo; Woo, Min Ki; Jung, Jisung; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2017-05-15

    We develop a way to hack free-space quantum key distribution (QKD) systems by changing the wavelength of the quantum signal laser using an external laser. Most free-space QKD systems use four distinct lasers for each polarization, thereby making the characteristics of each laser indistinguishable. We also discover a side-channel that can distinguish the lasers by using an external laser. Our hacking scheme identifies the lasers by automatically applying the external laser to each signal laser at different intensities and detecting the wavelength variation according to the amount of incident external laser power. We conduct a proof-of-principle experiment to verify the proposed hacking structure and confirm that the wavelength varies by several gigahertzes to several nanometers, depending on the intensity of the external laser. The risk of hacking is successfully proven through the experimental results. Methods for prevention are also suggested.

  19. Reanalyzing Head et al. (2015): investigating the robustness of widespread p-hacking.

    Science.gov (United States)

    Hartgerink, Chris H J

    2017-01-01

    Head et al. (2015) provided a large collection of p -values that, from their perspective, indicates widespread statistical significance seeking (i.e., p -hacking). This paper inspects this result for robustness. Theoretically, the p -value distribution should be a smooth, decreasing function, but the distribution of reported p -values shows systematically more reported p -values for .01, .02, .03, .04, and .05 than p -values reported to three decimal places, due to apparent tendencies to round p -values to two decimal places. Head et al. (2015) correctly argue that an aggregate p -value distribution could show a bump below .05 when left-skew p -hacking occurs frequently. Moreover, the elimination of p  = .045 and p  = .05, as done in the original paper, is debatable. Given that eliminating p  = .045 is a result of the need for symmetric bins and systematically more p -values are reported to two decimal places than to three decimal places, I did not exclude p  = .045 and p  = .05. I conducted Fisher's method .04 hacking remains when we look at the entire range between .04 hacking is widespread. Given the far-reaching implications of supposed widespread p -hacking throughout the sciences Head et al. (2015), it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p -hacking is found in this reanalysis, this does not mean that there is no p -hacking at all. These results nuance the conclusion by Head et al. (2015), indicating that the results are not robust and that the evidence for widespread left-skew p -hacking is ambiguous at best.

  20. iPhone Hacks Tips and Tools for Pushing the Smartest Phone to Its Limits

    CERN Document Server

    Jurick, David; Stolarz, Damien

    2009-01-01

    With iPhone Hacks, you can make your iPhone do all you'd expect of a smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators. iPhone Hacks is exactly what you need to make the most of your iPhone.

  1. Trends: Bearding the Proverbial Lion.

    Science.gov (United States)

    Greckel, Wil

    1989-01-01

    Describes the use of television commercials to teach classical music. Points out that a large number of commercials use classical selections which can serve as a starting point for introducing students to this form. Urges music educators to broaden their views and use these truncated selections to transmit our cultural heritage. (KO)

  2. Characterizing Cyberbullying among College Students: Hacking, Dirty Laundry, and Mocking

    Directory of Open Access Journals (Sweden)

    Rajitha Kota

    2014-10-01

    Full Text Available Bullying behaviors occur across the lifespan and have increasingly migrated to online platforms where they are known as cyberbullying. The purpose of this study was to explore the phenomenon of cyberbullying among college students. Participants were recruited for focus groups through purposeful sampling, including recruitment from groups traditionally at risk for bullying. Focus groups discussed views and perceptions of cyberbullying on campuses. Groups were led by a trained facilitator and were audio recorded and manually transcribed. The constant comparative approach was used to identify themes and representative quotations. The 42 participants had an average age of 19.2 (SD = 1.2, 55% were female, 83% were Caucasian. Three themes emerged from the data: (1 lack of agreement on a definition of cyberbullying, but consensus on three representative scenarios: hacking, dirty laundry and mocking; (2 concerns with translating definitions of traditional bullying to cyberbullying; (3 opinions that cyberbullying may manifest differently in college compared to younger adolescents, including increased potential for long-term effects. College students were not in agreement about a theoretical definition, but they could agree upon specific representative instances of cyberbullying.  Future studies could consider using common case examples or vignettes of cyberbullying, or creation of developmentally representative definitions by age group.

  3. Mind Invasion: Situated Affectivity and the Corporate Life Hack.

    Science.gov (United States)

    Slaby, Jan

    2016-01-01

    In view of the philosophical problems that vex the debate on situated affectivity, it can seem wise to focus on simple cases. Accordingly, theorists often single out scenarios in which an individual employs a device in order to enhance their emotional experience, or to achieve new kinds of experience altogether, such as playing an instrument, going to the movies, or sporting a fancy handbag. I argue that this narrow focus on cases that fit a "user/resource model" tends to channel attention away from more complex and also more problematic instances of situated affectivity. Among these are scenarios in which a social domain draws individuals into certain modes of affective interaction, often by way of attunement and habituation to affective styles and interaction patterns that are normative in the domain in question. This can lead to a phenomenon that is not so much "mind extension" than "mind invasion": affectivity is dynamically framed and modulated from without, often contrary to the prior orientations of the individuals in question. As an example, I discuss affective patterns prevalent in today's corporate workplace. I claim that workplace affect sometimes contributes to what is effectively a "hack" of employees' subjectivity.

  4. Integrating student feedback during "Dental Curriculum Hack-A-thon".

    Science.gov (United States)

    Saffari, Shawheen S; Frederick Lambert, R; Dang, Lucy; Pagni, Sarah; Dragan, Irina F

    2018-05-02

    The future of dental education is at crossroads. This study used the parameter of the 2016 Dental Curriculum Hack-a-Thon to assess intra- and inter-institutional agreement between student and faculty views regarding dental curriculums to determine if there is an impact in student perceptions towards dental education from before and after the event. This exploratory, cross-sectional study involved two surveys, with Survey 1 being distributed among four faculty-student pairs of the four participating dental schools answering 14 questions. Survey 2 assessed the views of 20 participating dental students through 26 questions in a pre- and post- event survey design. Descriptive statistics were used to explore differences in perceptions towards dental education across both instrument surveys. The results revealed valuable student insights regarding intra- and inter-institutional agreement relevant for the change in dental curriculum that needs to occur. Survey 2 revealed that mandatory attendance in didactic courses, electronic based examination preferences, and the preference of preclinical courses being held in the first and second years of a four-year dental curriculum were of particular importance to student participants. The results of this study indicate that exposure and participation in subjects pertaining to dental education can be influential on student preferences and opinions on how dental education should be delivered in a four-year curriculum.

  5. A Systems Approach to Healthcare Innovation Using the MIT Hacking Medicine Model.

    Science.gov (United States)

    Gubin, Tatyana A; Iyer, Hari P; Liew, Shirlene N; Sarma, Aartik; Revelos, Alex; Ribas, João; Movassaghi, Babak; Chu, Zen M; Khalid, Ayesha N; Majmudar, Maulik D; Lee, Christopher Xiang

    2017-07-26

    MIT Hacking Medicine is a student, academic, and community-led organization that uses systems-oriented "healthcare hacking" to address challenges around innovation in healthcare. The group has organized more than 80 events around the world that attract participants with diverse backgrounds. These participants are trained to address clinical needs from the perspective of multiple stakeholders and emphasize utility and implementation viability of proposed solutions. We describe the MIT Hacking Medicine model as a potential method to integrate collaboration and training in rapid innovation techniques into academic medical centers. Built upon a systems approach to healthcare innovation, the time-compressed but expertly guided nature of the events could enable more widely accessible preliminary training in systems-level innovation methodology, as well as creating a structured opportunity for interdisciplinary congregation and collaboration. Copyright © 2017 Elsevier Inc. All rights reserved.

  6. Brief communication: Possible explanation of the values of Hack's drainage basin, river length scaling exponent

    Science.gov (United States)

    Hunt, Allen G.

    2016-04-01

    Percolation theory can be used to find water flow paths of least resistance. Application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law may allow interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  7. Explanation of the values of Hack's drainage basin, river length scaling exponent

    Science.gov (United States)

    Hunt, A. G.

    2015-08-01

    Percolation theory can be used to find water flow paths of least resistance. The application of percolation theory to drainage networks allows identification of the range of exponent values that describe the tortuosity of rivers in real river networks, which is then used to generate the observed scaling between drainage basin area and channel length, a relationship known as Hack's law. Such a theoretical basis for Hack's law allows interpretation of the range of exponent values based on an assessment of the heterogeneity of the substrate.

  8. Reanalyzing Head et al. (2015: investigating the robustness of widespread p-hacking

    Directory of Open Access Journals (Sweden)

    Chris H.J. Hartgerink

    2017-03-01

    Full Text Available Head et al. (2015 provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking. This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the distribution of reported p-values shows systematically more reported p-values for .01, .02, .03, .04, and .05 than p-values reported to three decimal places, due to apparent tendencies to round p-values to two decimal places. Head et al. (2015 correctly argue that an aggregate p-value distribution could show a bump below .05 when left-skew p-hacking occurs frequently. Moreover, the elimination of p = .045 and p = .05, as done in the original paper, is debatable. Given that eliminating p = .045 is a result of the need for symmetric bins and systematically more p-values are reported to two decimal places than to three decimal places, I did not exclude p = .045 and p = .05. I conducted Fisher’s method .04 < p < .05 and reanalyzed the data by adjusting the bin selection to .03875 < p ≤ .04 versus .04875 < p ≤ .05. Results of the reanalysis indicate that no evidence for left-skew p-hacking remains when we look at the entire range between .04 < p < .05 or when we inspect the second-decimal. Taking into account reporting tendencies when selecting the bins to compare is especially important because this dataset does not allow for the recalculation of the p-values. Moreover, inspecting the bins that include two-decimal reported p-values potentially increases sensitivity if strategic rounding down of p-values as a form of p-hacking is widespread. Given the far-reaching implications of supposed widespread p-hacking throughout the sciences Head et al. (2015, it is important that these findings are robust to data analysis choices if the conclusion is to be considered unequivocal. Although no evidence of widespread left-skew p-hacking

  9. Statistics Hacks Tips & Tools for Measuring the World and Beating the Odds

    CERN Document Server

    Frey, Bruce

    2008-01-01

    Want to calculate the probability that an event will happen? Be able to spot fake data? Prove beyond doubt whether one thing causes another? Or learn to be a better gambler? You can do that and much more with 75 practical and fun hacks packed into Statistics Hacks. These cool tips, tricks, and mind-boggling solutions from the world of statistics, measurement, and research methods will not only amaze and entertain you, but will give you an advantage in several real-world situations-including business.

  10. Linux Server Hacks, 2 Tips & Tools for Connecting, Monitoring, and Troubleshooting

    CERN Document Server

    von Hagen, William

    2009-01-01

    This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative envir

  11. Reanalyzing Head et al. : Investigating the robustness of widespread p-hacking

    NARCIS (Netherlands)

    Hartgerink, C.H.J.

    2017-01-01

    Head et al. (2015) provided a large collection of p-values that, from their perspective, indicates widespread statistical significance seeking (i.e., p-hacking). This paper inspects this result for robustness. Theoretically, the p-value distribution should be a smooth, decreasing function, but the

  12. Connected Learning in the Library as a Product of Hacking, Making, Social Diversity and Messiness

    Science.gov (United States)

    Bilandzic, Mark

    2016-01-01

    Learning is most effective when intrinsically motivated through personal interest, and situated in a supportive socio-cultural context. This paper reports on findings from a study that explored implications for design of interactive learning environments through 18 months of ethnographic observations of people's interactions at "Hack The…

  13. Second generation bioethanol production from Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.

    Science.gov (United States)

    Danilo Scordia; Salvatore L. Consentino; Thomas W. Jeffries

    2010-01-01

    Saccharum (Saccharum spontaneum L. ssp. aegyptiacum (Willd.) Hack.), is a rapidly growing, wide ranging high-yield perennial, suitable for second generation bioethanol production. This study evaluated oxalic acid as a pretreatment for bioconversion. Overall sugar yields, sugar degradation products, enzymatic glucan hydrolysis and ethanol production were studied as...

  14. "Hacking at Our Very Roots": Rearticulating White Racial Identity within the Context of Teacher Education

    Science.gov (United States)

    Aveling, Nado

    2006-01-01

    When teaching about race and racism and how we as "Whites" are implicated in the discursive practices that sustain racism, we are indeed "hacking at the very roots" of the ways in which students have conceptualized their identity in terms of being non-racialized and at the same time non-racist. In this paper I focus on the challenges and…

  15. Variations in Tectonic Activities of the Central and Southwestern Foothills, Taiwan, Inferred from River Hack Profiles

    Directory of Open Access Journals (Sweden)

    Yen-Chieh Chen

    2006-01-01

    Full Text Available A longitudinal profile of a river under static equilibrium shows no degradation or aggradation and can be ideally described as a straight line on a semi-logarithmic graph. This type of profile is called a “Hack profile”. If a river runs across uprising active structure systems, its Hack profile becomes convex. Accumulated tectonic strain varies positively with the intensity of the upwarping in Hack-profile convexity. In this paper, we compare curvature changes in Hack profiles of a series of rivers running through faults in the central and southwestern Foothills of Taiwan. Longitudinal profiles of these rivers were derived from two versions of topographic maps (1904 and 1985 and recent DTM data (2000. Prior to comparisons, we calibrated the 1904 topographic map, named “Taiwan Bautu”, by “offsetting” horizontal coordinates north and westward approximately 440 m and then “linear transforming” the elevation values. The Tungtzchiau fault of the central Foothills has remained inactive since 1935. Here relatively high uplift activity near the Wu River is indicated by significantly convex Hack profiles. This strain accumulation can be attributed to a lack of small magnitude earthquakes along the fault over the past 70 years. In the southwestern Foothills, relatively high uplift activity of similar intensity to the central Foothills is indicted near the Neocho River. Significant profiles with concave segments below the ideal graded profiles, at the lower reaches of rivers where continuous small magnitude strain release events have occurred, can only be found along the Sandieh, Neocho and Bazhang rivers in the southwestern Foothills. All these findings indicate that fault systems in the central Foothills tend to be locked and these faults could yield large earthquakes similar to the Chi-Chi event.

  16. Browse Title Index

    African Journals Online (AJOL)

    2004): Special Issue 2004, Differential production of immune parameters by mouse strains ... agglutination and complement fixation tests in the field diagnosis ... List All Titles · Free To Read Titles This Journal is Open Access.

  17. Title IX Resource Guide

    Science.gov (United States)

    Office for Civil Rights, US Department of Education, 2015

    2015-01-01

    Title IX of the Education Amendments of 1972 (Title IX) prohibits discrimination based on sex in education programs and activities in federally funded schools at all levels. If any part of a school district or college receives any Federal funds for any purpose, all of the operations of the district or college are covered by Title IX. The essence…

  18. P.S. I love you...and other growth hacking strategies used by disruptive tech start-ups : A case study on the relevance and enactment of growth hacking by Sweden's tech start-ups

    OpenAIRE

    Bergendal, Taghrid Sara

    2017-01-01

    Disruption innovation theory has been the zeitgeist for building globally disruptive tech companies since 1997. One decade later, disruptive tech start-ups are moving away from traditional marketing strategies in favour of growth hacking. There is a seemingly growing consensus by online tech experts, tech entrepreneurs, advisors and investors, that suggests that growth hacking is becoming increasingly important practice for disruption based tech start-ups. Furthermore, Sweden is becoming the ...

  19. Forty Years of Movie Hacking: Considering the Potential Implications of the Popular Media Representation of Computer Hackers from 1968 to 2008

    OpenAIRE

    Gordon, Damian

    2010-01-01

    Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis techniq...

  20. Concepts, Diagnosis and the History of Medicine: Historicising Ian Hacking and Munchausen Syndrome.

    Science.gov (United States)

    Millard, Chris

    2017-08-01

    Concepts used by historians are as historical as the diagnoses or categories that are studied. The example of Munchausen syndrome (deceptive presentation of illness in order to adopt the 'sick role') is used to explore this. Like most psychiatric diagnoses, Munchausen syndrome is not thought applicable across time by social historians of medicine. It is historically specific, drawing upon twentieth-century anthropology and sociology to explain motivation through desire for the 'sick role'. Ian Hacking's concepts of 'making up people' and 'looping effects' are regularly utilised outside of the context in which they are formed. However, this context is precisely the same anthropological and sociological insight used to explain Munchausen syndrome. It remains correct to resist the projection of Munchausen syndrome into the past. However, it seems inconsistent to use Hacking's concepts to describe identity formation before the twentieth century as they are given meaning by an identical context.

  1. Little River revisited - thirty-five years after Hack and Goodlett

    Science.gov (United States)

    Osterkamp, W.R.; Hupp, C.R.; Schening, M.R.

    1995-01-01

    In possibly the first detailed study to relate geomorphology, vegetation, and hydrology at a watershed scale, Hack and Goodlett (1960) documented variation in the eastern forest with topographic positions of cove, side slope, and nose. The study also described effects on landforms and vegetation of a catastrophic flood that occurred in June, 1949. Field investigations, conducted nearly four decades later, review selected parts of the study by Hack and Goodlett (1960). Replicate data provide a basis to evaluate their interpretations, to document geomorphic change since the 1949 flood, and to identify vegetation change in uplands and bottomlands. Results suggest that change to hillslope landforms has been minor since 1949, but that changes have occurred, seemingly during flow events of 1952, 1955 and 1985. Change in areal extent of forest types was not detected. Change in the relative abundances of dominant species may have resulted from 20th century fire suppression. -from Authors

  2. Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model

    OpenAIRE

    Heerden , Renier ,; Pieterse , Heloise; Irwin , Barry

    2012-01-01

    Part 4: Section 3: ICT for Peace and War; International audience; This paper presents eight of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The...

  3. Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags

    OpenAIRE

    Bermejo, Carlos; Hui, Pan

    2017-01-01

    Nowadays privacy in the connected world is a big user's concern. The ubiquity of mobile devices permits billions of users browse the web at anytime, anywhere. Near Field Communication (NFC) appeared as a seamlessly and simply communication protocol between devices. Commercial services such as Android Pay, and Apple Pay offer contactless payment methods that are spreading in more and more scenarios. However, we take risks while using NFC on Android devices, we can be hacked, and our privacy ca...

  4. Governance responses to hacking in the banking sector of South Africa : an exploratory study

    OpenAIRE

    2013-01-01

    D.Comm. (Auditing) Organisations today are critically dependent on IT to enable business operations and ensure competitiveness in a growing international marketplace. At the same time, IT also introduces significant risks, such as hacking. The board of directors is ultimately responsible for mitigating IT risk as a component of business risk. This task is included in its corporate governance responsibilities, which, in the South African context, is underpinned by the King Code of Corporate...

  5. The value of Growth Hacking. Business development manual for Emi-Rent Properties

    OpenAIRE

    Elezovic, Velimir

    2017-01-01

    This thesis was commissioned by Emi-Rent Properties, a real estate company based in Bel-grade, Serbia. The main objective of this thesis is to help determine the value of growth hack-er marketing for the case company’s newly commissioned marketing campaign. Secondary objective of this thesis is to present practical advice on the implementation of a successful marketing campaign with strong international aspects. The thesis will cover major marketing concepts and provide an alternative view by...

  6. Science Hack Day: an opportunity for public engagement, art/science mash-ups, and inspiration

    Science.gov (United States)

    Bellis, Matthew

    2013-04-01

    The idea of a Science Hack Day (http://sciencehackday.com/) is to put non-scientists (designers, web developers, artists, interested enthusiasts) in a room with scientists and some good ideas, and see what science-themed project they can create in a weekend (about 24 hours of real hacking). The motto of the organizers is ``Get Excited and Make Things with Science!'' I have participated in several of these events including the first one held in the United State in Palo Alto in 2010 and as a remote advisor to participants in Nairobi, Kenya. To these events I have brought particle physics data from both the BaBar and the CMS (Compact Muon Solenoid) experiments, data from the CoGeNT dark matter direct-detection experiment, and my expertise and enthusiasm. The experience has been transformative for me as both a scientist and a science advocate. This talk will recount my experiences with Science Hack Day events in general and detail some projects that have come out of these days, including the Particle Physics Wind Chime (http://www.mattbellis.com/windchime/) and the Standard Model of Cocktail Physics (http://www.physicsdavid.net/2012/11/standard-model-of-cocktail-physics/). Opportunities for other scientists to take part in similar events will be discussed.

  7. Cloud amount/frequency, NITRATE and other data from PORT HACKING 50M, STORM BAY and other platforms from 1989-01-04 to 1990-12-05 (NODC Accession 9300100)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Ocean Serial data in this accession was collected as part of Global Ocean Data Archeaology and Rescue (GODAR) project from ships PORT HACKING 100M, PORT HACKING...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 229 ... Browse Title Index ... Issue, Title. Vol 14, No 2 ... Vol 15, No 1 (2017), Qualitative and quantitative methods of suicide research in old age, Abstract PDF ... Vol 11, No 2 (2013), Simple Algorithm in the Management of Fetal ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 488 ... African Journal of Paediatric Surgery. ... Ileocecal valve atresia: Introduction of a new surgical approach ... Vol 4, No 1 (2007), Isolated Bilateral Macrostomia: Case Series and ... Vol 9, No 2 (2012), Laparoscopic inguinal hernia repair in ... List All Titles · Free To Read Titles This Journal is Open Access.

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 601 - 650 of 788 ... Browse Title Index ... Issue, Title ... Vol 14, No 1 (2006), Social science research: a critique of quantitative and qualitative methods ... Vol 18, No 1 (2010), Stress among part-time business students: a study in a Ghanaian ...

  11. Title to mining properties

    International Nuclear Information System (INIS)

    Crouch, K.M.

    1976-01-01

    The requirements of the law which must be met in order to create title to an unpatented mining claim and the procedures which should be followed when an attempt is made to determine the title to the claim is acceptable are reviewed

  12. Browse Title Index

    African Journals Online (AJOL)

    1986), University Engineering Education and Training in Nigeria: Development, ... Vol 29, No 1 (2010), Use of Energy Method to Simulate the ... of Optimal Rational Composition of Titles Producible from Nigerian Clays ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 194 ... Journal Home > Advanced Search > Browse Title Index ... Vol 14, No 1 (2000), A functional categoriality of adjectives in ... Vol 1, No 1 (1987), Alienation and affirmation: The humanistic vision of Bessie Head, Abstract PDF.

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 879 ... South African Journal of Higher Education. ... Browse Title Index ... in a USA school setting: Merging transition theory with a narrative approach, Abstract ... Citation analysis of theses and dissertations submitted at the ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 601 - 650 of 879 ... South African Journal of Higher Education. ... Browse Title Index .... The challenge of thesis supervision in an art university, Abstract ... No 2 (2004), Robert Sternberg's mental self-government theory and its contribution to ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 533 ... Southern African Linguistics and Applied Language Studies. ... Issue, Title ... Vol 34, No 1 (2016), Book Review: Qualitative-Quantitative Analyses of .... The complex consonants of simple CV-syllables in Zezuru, Abstract.

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 346 ... Journal Home > Advanced Search > Browse Title Index ... and hygiene promotion services in Rungwe district, Tanzania, Abstract .... as seen in NIgerian teaching hospital: pattern and a simple classification, Abstract.

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 437 ... Journal Home > Advanced Search > Browse Title Index ... prospects and realistic strategies to its implementation in Nigeria\\'s Institute of ... and Communication Technology (ICT) in information dissemination, Abstract.

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 901 - 950 of 1355 ... Journal of Applied Sciences and Environmental Management. ... Journal Home > Advanced Search > Browse Title Index .... Vol 22, No 2 (2018), Performance evaluation of a locally fabricated sawdust fired oven for ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 301 - 350 of 788 ... Journal Home > Advanced Search > Browse Title Index ... Vol 26, No 1 (2018), Gender differentials in the perception of .... Vol 25, No 1 (2017), Impact of total quality management on students' academic performance in ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 465 ... Journal Home > Advanced Search > Browse Title Index ... and twinning data of an igbo kindred during the Nigerian Civil War, Abstract ... on laboratory estimations with special reference to clinical chemistry, Abstract.

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 1260 ... Journal Home > Advanced Search > Browse Title Index ... Consumption of ammonia-nitrogen by aob in immobilized batch culture, Abstract PDF .... Vol 9, No 3S (2017): Special Issue, Design an automatic temperature ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 294 ... Journal Home > Advanced Search > Browse Title Index. Log in or .... S Edwards, M Hlongwane, J Thwala, N Robinson ... Vol 16, No 1 (2017), Infancy of internet cafe: The substitute of ubuntu-padare pedagogy, Abstract.

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 130 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... using the technological pedagogical content knowledge(TPACK) framework, Abstract PDF ... Tamara N. Hrin, Dušica D. Milenković, Mirjana D. Segedinac.

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 278 ... Journal Home > Advanced Search > Browse Title Index ... drie paradigmas beskou: 'n eenheid, of 'n veelheid van perspektiewe? ... Vol 45, No 1 (2011), Genre pedagogy in the mediation of socially-situated literacies ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 551 - 600 of 879 ... Journal Home > Advanced Search > Browse Title Index ... A James, E Ralfe, L van Laren, N Ngcobo ... 1 (2011), Recognition of prior learning in promoting lifelong learning: A pedagogy of hope or a shattering of dreams?

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 451 - 500 of 533 ... Journal Home > Advanced Search > Browse Title Index .... for past tense forms in Northern Sotho: verb stems with final 'm' and 'n', Abstract ... in an academic writing class: Implications for a dialogic pedagogy, Abstract.

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 183 ... Journal Home > Advanced Search > Browse Title Index ... Vol 61 (2017), New interventions and sustainable solutions: .... Vol 35 (2011), Resurgence of tribal levies: Double taxation for the rural poor, Abstract PDF.

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 736 ... Journal Home > Advanced Search > Browse Title Index ... Vol 5 (2008), A Contagious Malady: The Human Quest for Truth through Religion, Abstract ... A Study of Politeness Strategies Used by the National University of ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 414 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... of an algebraic function for the permutation of truth table columns, Abstract ... appraisal and productivity levels in selected Nigerian universities, Abstract.

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 879 ... Journal Home > Advanced Search > Browse Title Index ... Vol 20, No 4 (2006), Assessing academic potential for university admission: ... Vol 16, No 2 (2002), Book Review: Rethinking truth by Higgs, P & Smith, J, Details.

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 165 ... Journal Home > Advanced Search > Browse Title Index ... Vol 43 (2011), Assessment of the Learning Commons takeoff at the University of ... the archive of South Africa's Truth and Reconciliation Commission, Abstract.

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 644 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... Ethics review n international health research: quality assurance or bureaucratic nightmare? Details ... Audit of Management of Open Fractures, Details PDF.

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 651 - 700 of 1199 ... Issue, Title ... Vol 5, No 1 (2011), Motivation, an Essential Ingredient for Optimal Performance in Emerging Markets, Abstract PDF ... Vol 3, No 5 (2009), Multinational transfer pricing and international taxation: what, why, ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 153 ... Issue, Title. Vol 9, No 2 (2006):, Effects of efficient water utilisation on water resources development in Swaziland under climate change, Abstract .... Ethical, Indigenous and Socio-Economic Perspectives, Abstract.

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 98 ... Journal Home > Advanced Search > Browse Title Index ... model for the continued professionalisation of student affairs in Africa, Abstract PDF ... Vol 2, No 2 (2014), Book Review: How College Affects Students, A Third decade ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 76 ... Journal Home > Advanced Search > Browse Title Index ... Vol 4, No 1 (2011), Automation of AutoCAD for Detailing of Reinforced .... Vol 10, No 1 (2017), Housing data base for sustainable housing provision, Abstract PDF.

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 147 ... Journal Home > Advanced Search > Browse Title Index .... Library (TEEAL) Database among faculty members in Federal University, ... Vol 5, No 2 (2014), Effects of corporate culture on the implementation of automation in ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 41 of 41 ... Issue, Title ... Vol 1, No 3 (2004): Special Edition, Assessment of the quality and reserves of Bat ... Vol 1, No 1 (1997), Bovine dermatophilosis in Zambia: epidemiology, socio-economic impacts and future perspectives, Abstract.

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 701 - 750 of 808 ... Issue, Title ... Vol 58, No 2 (2010), Short Communicaton: The socio-economic impact of helminth infections and the ... Vol 62 (2014): Special Edition, Special edition summarizing the scientific discourse which took place ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 351 - 391 of 391 ... Issue, Title ... Vol 2, No 3 (1999): Special Edition, The efficacy of low volume application of roundup ... Vol 1, No 1 (1998), The relationships among National Socio-Economic Indicators and Child Health Statistics, Abstract.

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 531 ... Journal Home > Advanced Search > Browse Title Index ... thermal conductivity and viscosity in a flat plate solar collector, Abstract PDF .... similarity method in unsteady two-dimensional MHD boundary layer on the body ...

  3. Hacking multitude’ and Big Data: Some insights from the Turkish ‘digital coup’

    Directory of Open Access Journals (Sweden)

    Paolo Cardullo

    2015-04-01

    Full Text Available The paper presents my first findings and reflections on how ordinary people may opportunistically and unpredictably respond to Internet censorship and tracking. I try to capture this process with the concept of ‘hacking multitude'. Working on a case study of the Turkish government's block of the social media platform Twitter (March 2014, I argue that during systemic data choke-points, a multitude of users might acquire a certain degree of reflexivity over ubiquitous software of advanced techno-capitalism. Resisting naïve parallels between urban streets and virtual global streets, the article draws on Fuller's ‘media ecologies' to make sense of complex and dynamic interactions between processes and materialities, strategies of communication and mundane practices. Such a dense space is mostly invisible to network and traffic analysis, although it comes alive under the magnifying lens of digital ethnography. As the Turkish government tried to stop protesters on both the urban and the Twitter spheres, alternative material configurations and new hybrid formations and practices emerged. I try to bring this process alive following the traces – that is, a combination of digital data and materialities – of a social space between the protest for Twitter access, the ‘digital coup' and the interactions that this situation determined. In the final section, I briefly explore two research trajectories which can further develop my initial formulation of a ‘hacking multitude'. I argue that a generalisation of hacking/multitude is problematic for the political, cultural or economic processes more directly associated with Big Data.

  4. Obtaining plant Miscanthus sacchariflorus (Maxim. Hack and Miscanthus sinensis Andersson in vitro culture by indirect morphogenesis

    Directory of Open Access Journals (Sweden)

    С. М. Гонтаренко

    2017-03-01

    Full Text Available Purpose. To obtain Miscanthus sacchariflorus (Maxim. Hack and Miscanthus sinensis Andersson in vitro culture by indirect morphogenesis. Methods. Biotechnological procedures, mathematical and statistical analyses. Results. Composition of nutrient medium was developed intended for induction of callusogenesis from Miscanthus seeds with a poor germination and viability of seedlings – Murashige and Skoog (MS medium was modified for the amount of macroelements (half-dose that was supplemented with amino acids (300 mg/l of glutamic acid, 50 mg/l of aspartic acid, 5 mg/l of tyrosine, 3 mg/l of arginine, 2 mg/l of hydroxyproline and plant growth regulators [2,5 mg/l of 2.4D (2.4-Dichlorophenoxyacetic acid, 0,6 mg/l of BAP (6-Benzyl-aminopurine and 0,3 mg/l of ABA (Abscisic acid]. Composition of nutrient medium was developed for regeneration of microplants from callus – agar MS medium was modified for the amount of macroelements (half-dose supplemented with vitamins: 10 mg/l of thiaminum, 1,0 mg/l of pyridoxine, 1,0 mg/l of nicotinic acid (by White, 1,0 mg/l of ascorbic acid, 250 mg/l of glutamic acid, 2,0 mg/l of BAP, 0,3 mg/l of NAA (Naphthaleneacetic acid. On this medium, 100% regeneration of M. sacchariflorus (Maxim. Hack and 50% regeneration of M. sinensis Andersson was obtained. Due to media modification aimed at initiating callusogenesis and microplants regeneration, reproduction factor of M. sinensis was increased 20 times at the average, M. sacchariflorus – 35–40 times. Conclusions. Plants of M. sacchariflorus (Maxim. Hack and M. sinensis Andersson were obtained in vitro culture by initiation of callusogenes and microplants regeneration from the Miscanthus seeds with poor germination and viability on nutrient media of certain composition.

  5. Macroscopic and stereomicroscopic comparison of hacking trauma of bones before and after carbonization.

    Science.gov (United States)

    Alunni, Véronique; Nogueira, Luísa; Quatrehomme, Gérald

    2018-03-01

    This experimental study examined lesions produced by a hatchet on pig femurs before and after carbonization. A total of 30 lesions were produced and analyzed using stereomicroscopy and then reexamined after carbonization. Not only was the sharp-blunt mechanism of the hacking trauma (V-shape, regularity of one edge, irregularity of the other edge, upraising, lateral pushing back, fossae dug laterally to the edge) still recognizable after carbonization; in some instances, the carbonization actually enhanced the features observed. Carbonization also did not significantly alter the measurements of the lesions. Carbonization tends to alter the structure of the bone especially in areas weakened by the blunt trauma.

  6. Upconversion-based receivers for quantum hacking-resistant quantum key distribution

    Science.gov (United States)

    Jain, Nitin; Kanter, Gregory S.

    2016-07-01

    We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.

  7. Progress on white papers from the Demographic Hack Session at WiA IV

    Science.gov (United States)

    Norman, Dara J.; WiA IV Demographics Hack Session Attendees.

    2018-06-01

    At the Women in Astronomy IV meeting in June 2017, a number of white papers were started as part of the Demographic Hack session. Several of these white papers are intended for submission to the Decadal Survey on topics including, ‘Providing a Timely Review of Input Demographics to Advisory Committees’, and ‘Tying Research Funding to Progress in Inclusion’. In my talk, I will review the content of these white papers and the progress that has been made in writing them. Interested session attendees are encouraged ‘endorse’ the papers by becoming signatories.

  8. Hacking web intelligence open source intelligence and web reconnaissance concepts and techniques

    CERN Document Server

    Chauhan, Sudhanshu

    2015-01-01

    Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach

  9. Between Freedom and Constraint: ROM Hacking of Pokémon Games

    OpenAIRE

    Barnabé, Fanny

    2018-01-01

    This paper aims to study a creative practice widespread in video game cultures: “ROM hacking”. By examining with the tools of rhetoric a defined corpus of ROM hacks derived from 『Pokémon』 games, the presentation will show that the formal construction of these derivative works demonstrates less a free or subversive transformation than a fairly strict respect for the original games’ conventions. By reproducing the structure of official 『Pokémon 』games, these fan productions become mirrors revea...

  10. Metal accumulation in the greentail prawn, Metapenaeus bennettae, in Sydney and Port Hacking estuaries, Australia.

    Science.gov (United States)

    Lewtas, K L M; Birch, G F; Foster-Thorpe, C

    2014-01-01

    Metal concentrations of the inshore greentail prawn, Metapenaeus bennettae, and surface sediments from locations within Sydney estuary and Port Hacking (Australia) were assessed for bioaccumulation and contamination. The current study aimed to assess metal concentrations in prawn tissue (tail muscle, exoskeleton, hepatopancreas and gills), relate whole body prawn tissue metal concentrations to sediment metal concentrations and animal size, as well as assess prawn consumption as a risk to human health. Metal concentrations were highest in sediment and prawns from contaminated locations (Iron Cove, Hen and Chicken Bay and Lane Cove) in Sydney estuary compared with the reference estuary (Port Hacking). Concentrations in sediments varied considerably between sites and between metals (As, Cd, Cr, Cu, Ni, Pb and Zn), and although concentrations exceeded Interim Sediment Quality Guideline-Low values, metals (As, Cd, Cr, Cu, Ni, Pb and Zn) were below Australian National Health and Medical Research Council human consumption guidelines in prawn tail muscle tissue. Metal concentrations in prawn tail muscle tissue were significantly different (p ≤ 0.05) amongst locations for Pb, Zn and Cd, and metal concentrations were generally highest in gills tissue, followed by the hepatopancreas, exoskeleton and tail muscle. The exoskeleton contained the highest Sr concentration; the hepatopancreas contained the highest As, Cu and Mo concentrations; and the gills contained the highest Al, Cr, Fe and Pb concentrations. Concentrations of Pb, As and Sr were significantly different (p ≤ 0.05) between size groups amongst locations.

  11. Quantum key distribution with hacking countermeasures and long term field trial.

    Science.gov (United States)

    Dixon, A R; Dynes, J F; Lucamarini, M; Fröhlich, B; Sharpe, A W; Plews, A; Tam, W; Yuan, Z L; Tanizawa, Y; Sato, H; Kawamura, S; Fujiwara, M; Sasaki, M; Shields, A J

    2017-05-16

    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered.

  12. A consistent framework for Horton regression statistics that leads to a modified Hack's law

    Science.gov (United States)

    Furey, P.R.; Troutman, B.M.

    2008-01-01

    A statistical framework is introduced that resolves important problems with the interpretation and use of traditional Horton regression statistics. The framework is based on a univariate regression model that leads to an alternative expression for Horton ratio, connects Horton regression statistics to distributional simple scaling, and improves the accuracy in estimating Horton plot parameters. The model is used to examine data for drainage area A and mainstream length L from two groups of basins located in different physiographic settings. Results show that confidence intervals for the Horton plot regression statistics are quite wide. Nonetheless, an analysis of covariance shows that regression intercepts, but not regression slopes, can be used to distinguish between basin groups. The univariate model is generalized to include n > 1 dependent variables. For the case where the dependent variables represent ln A and ln L, the generalized model performs somewhat better at distinguishing between basin groups than two separate univariate models. The generalized model leads to a modification of Hack's law where L depends on both A and Strahler order ??. Data show that ?? plays a statistically significant role in the modified Hack's law expression. ?? 2008 Elsevier B.V.

  13. Deep learning quick reference useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

    CERN Document Server

    Bernico, Michael

    2018-01-01

    This book is a practical guide to applying deep neural networks including MLPs, CNNs, LSTMs, and more in Keras and TensorFlow. Packed with useful hacks to solve real-world challenges along with the supported math and theory around each topic, this book will be a quick reference for training and optimize your deep neural networks.

  14. P-hacking in academic research : a critical review of the job strain model and of the association between night work and breast cancer in women

    OpenAIRE

    Ingre, Michael

    2017-01-01

    P-hacking can be described as a more or less deliberate, explorative approach to data analysis with a flexible/opportunistic search space and the reporting of primarily statistically significant findings. This leads to inflated type-1 error rates and to bias in reported estimates in the scientific literature. This thesis aims to describe how p-hacking can be manifested in academic research and to illustrate how bias due to p-hacking is expected to affect the veracity of published findings usi...

  15. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 25, No 2 (2005), Yam-based farm practices and nematode problems in stored yams (Dioscorea spp.) in Ghana, Abstract PDF. CK Kwoseh, RA Plowright, J Bridge, R Asiedu. Vol 27, No 2 (2007), Yield, irrigation production efficiency and economic returns of broccoli under variable drip irrigation and lateral ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 68 of 68 ... Issue, Title. Vol 12, No 1-2 (2009), Sécurité et ordre politique au Cameroun : entre dynamiques internes et connexions internationales, Abstract PDF. BEP Chantal. Vol 6, No 1-2 (2003), Self-Determination, Nationalism, Development and Pan-Africanism Stuck on the Runway: Are Intellectuals to be Blamed ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 551 - 600 of 1463 ... Issue, Title. Vol 15, No 2 (2015), Evaluation of the diagnostic performance and operational characteristics of four rapid immunochromatographic syphilis tests in Burkina Faso, Abstract PDF. FY Bocoum, H Ouedraogo, G Tarnagda, A Kiba, S Tiendrebeogo, F Bationo, B Liestman, S Diagbouga, ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 351 - 400 of 400 ... Issue, Title. Vol 9, No 1 (2010), Soft tissue sarcoma of the thigh: Need for angiography in the developing, Abstract PDF. IA Adigun, GA Rahman, KO Ogundipe. Vol 3, No 1 (2004), Spectrum of rheumatic heart disease in Zaria, Northern Nigeria, Abstract. SS Danbauchi, MA Alhassan, SO David, ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 183 ... Issue, Title. Vol 62 (2017), #SchoolsOnFire: Criminal justice responses to protests that impede the right to basic education, Abstract PDF. Ann Skelton, Martin Nsibirwa. Vol 45 (2013), 'Pale Face'/'Pointy Face: SA Criminology in Denial, Abstract PDF. S Henkeman. Vol 59 (2017), Aluta continua: Police ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 14 of 14 ... Issue, Title. Vol 2, No 1 (2009), Auditory and Respiratory Health Disorders Among Workers in an Iron and Steel Factory, Abstract. GM Abdel – Rasoul, OAE Mahrous, ME Abou Salem, MA Al-Batanony, HK Allam. Vol 2, No 1 (2009), Effect of An Educational Program About Medical Waste Management on ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 391 ... Journal Home > Advanced Search > Browse Title Index ... Efficacy of four Rodenticides on the Ghanaian Market, Abstract ... Vol 2, No 1 (2000):, Determination of some wear elements in used car engine oil and oil filter ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 490 ... Issue, Title. Vol 6, No 2 (2010), Knowledge and patterns of use of highly active antiretroviral therapies in HIV management at Abuja, Nigeria, Abstract. Jill I Okpalugo, US Inyang, K Ibrahim, F Anita, Chinwe V Ukwe, NC Aguwa. Vol 5, No 4 (2009), Knowledge and utilization of the acts in two major ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 9951 - 10000 of 11090 ... Issue, Title. Vol 10, No 36 (2011), Study of heavy metals bioaccumulation in the process of vermicomposting, Abstract PDF. MM Aleagha, G Ebadi. Vol 10, No 45 (2011), Study of malondialdehyde (MDA) content, superoxide dismutase (SOD) and glutathione peroxidase (GSH-Px) activities in ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 412 ... Issue, Title. Vol 32, No 2 (2013), Seinsverständnis and meaning in Heidegger, Abstract. Rafael Winkler. Vol 21, No 3 (2002), A defense of peace as a human right, Abstract. Patrick Hayden. Vol 26, No 2 (2007), A Kantian stance on teleology in biology, Abstract. AA Cohen. Vol 30, No 1 (2011), A Likely ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 328 ... Issue, Title. Vol 7, No 1 (2003), Sexual Harassment in Academia in Nigeria: How Real? Details PDF. Olugbenga Jelil Ladebo. Vol 8, No 2 (2004), Shaping the internet for match-making/dating: a challenge for the contemporary Nigerian family institution, Abstract PDF. Wale Adesina. Vol 6, No 1 (2002) ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 73 of 73 ... Journal Home > Advanced Search > Browse Title Index ... Vol 13 (2006), The ageing eye” functional changes from cradle to gray: A ... Vol 12 (2005), The evaluation of vision in children using monocular vision acuity and ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 22, No 2 (2008), Voltammetric determination of heparin based on its interaction with malachite green, Abstract PDF. Xueliang Niu, Weili Zhang, Na Zhao, Wei Sun. Vol 22, No 2 (2008), Voltammetric determination of l-cysteic acid on a 1-[4-(ferrocenyl-ethynyl)phenyl]-1-ethanone modified carbon paste ...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 577 ... Issue, Title. Vol 20, No 2 (2003), Emergency Contraception: A Global Overview of Knowledge, Attitudes and Practices Among Providers, Abstract PDF. Deborah Haggai. Vol 23 (2006):, Emergency laparotomy for peripartum haemorrhage in Bida North Central Nigeria, Abstract PDF. Sunny Abiodun O ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 11090 ... Issue, Title. Vol 12, No 49 (2013), In vitro regeneration of selected Kenyan papaya (Carica papaya L.) lines through shoot tip culture, Abstract PDF. Naomi Nzilani Mumo, Fredah Karambu Rimberia, George Edward Mamati, Agnes Wanjiru Kihurani. Vol 7, No 12 (2008), In vitro regeneration of Turkish ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 221 ... Issue, Title ... Vol 38 (2010), Soft drink consumption of Grade 4 and Grade 7 learners in the Wynberg area, City of Cape Town, South .... Vol 42 (2014), The meaning of food for obese men: a qualitative study, Abstract PDF.

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1215 ... Journal Home > Advanced Search > Browse Title Index. Log in or ... Vol 12, No 1 (2018), Analysis of the effects of frequent strikes on academic performance of students in universities in Nigeria: Edo State as a focal point, Abstract PDF ... Vol 6, No 1 (2012), Appraisal as a Determinant for Adequate ...

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 20 of 20 ... Issue, Title. Vol 9, No 2 (2000), Age dependent changes in the hypothalamic amino acid neurotransmitters in response to nicotine, Abstract. NM Radwan, NA Ahmed, YAM Aly. Vol 9, No 2 (2000), Autoantibodies, ocular and auditory changes in patients with vitiligo, Abstract. AE Fathia, EA Nagwa, ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 76 of 76 ... Issue, Title. Vol 6, No 1 (2013), Integrating Sustainability into the Real Estate Valuation Process: A Nigerian Perspective, Abstract PDF. G K Babawale, B A Oyalowo. Vol 5, No 1 (2012), Internalising internationa valuation standards: Relevance and applicability issues in the Nigerian context, Abstract PDF.

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 201 ... Issue, Title. Vol 12, No 1 (2006), Conservative management of cervical ectopic pregnancy: case report, Abstract PDF. TD Naidoo, MR Ramogale, J Moodley. Vol 18, No 2 (2012), Contraceptive use and associated factors among South African youth (18 - 24 years): A population-based survey, Abstract ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 183 of 183 ... Issue, Title. Vol 9, No 1 (2004), Socio-economic constraints affecting youths involvement in national economic development, Abstract. Josephine U Nwagwu. Vol 12, No 2 (2007), Stabilizing Potential Of Cement-Fly Ash Mixture On Expansive Clay Soil, Abstract. OO Amu, AB Fajobi, SO Afekhuai. Vol 11 ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 76 ... Issue, Title. Vol 16, No 2 (2006), A profile of the theatre procedures in paediatrict ophthalmic practice, Abstract. E O Onwasigwe. Vol 15, No 2 (2005), Abdominal cocoon, Abstract. Abdulrasheed K Adesunkanmi, Tajudeen A Badmus, Olukayode Ogundoyin, Akinwumi B Ogunrombi. Vol 18, No 1 (2008) ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 647 ... Issue, Title. Vol 13, No 2 (2010), 'N toekomstige perspektief op grondwetlike stabiliteit, Abstract PDF. F.W de Klerk. Vol 18, No 5 (2015), Cloete murray and Another v Firstrand bank ltd t/a Wesbank [2015] ZASCA 39A, Abstract PDF. M Laubscher. Vol 15, No 5 (2012), Cave Pecuniam: Lawyers as ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 15 of 15 ... Issue, Title. Vol 1, No 1 (2008), Assessment Of Ophthalmic Patients' Satisfaction In Owo, Abstract. CO Omolase, CO Fadamiro, BO Omolase, AS Aina, EO Omolade. Vol 3, No 1 (2010), Case Report: Strongyloides stercoralis coinfection in a Nigerian with HIV. Abstract. A.A Oyekunle, R.A.A Bolarinwa, O.A ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 15 of 15 ... Issue, Title. Vol 1, No 1 (2007), An Action Five Strategy For Bridging The Gender Gap In Academic Research Activities In African Universities. The Case of Nigeria, Abstract PDF. DN Okorie, OG Agabi, CM Uche. Vol 1, No 1 (2007), Book Review: Confronting sexual harassment in Ghanaian Universities ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 93 ... Issue, Title. Vol 5 (2013), A cost-effective Geographic Information Systems for Transportation (GIS-T) application for traffic congestion analyses in the Developing World, Abstract PDF. E Agyemang. Vol 3 (2011), A Historical and Gendered Perspective on HIV / AIDS in Botswana, Abstract PDF. J Hesselberg ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 327 ... Issue, Title. Vol 10, No 4 (2016), Omphalocoeles: A decade in review, Abstract PDF. S Singh, A Madaree. Vol 2, No 4 (2008), Ortner syndrome, Abstract PDF. E Meyer, NE Jones, LJ Zühlke. Vol 10, No 3 (2016), Outcome of children admitted to a general highcare unit in a regional hospital in the ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 814 ... Issue, Title. Vol 21, No 2 (2016), A 10 years trend of peptic ulcer disease and other gastrointestinal disorders in northern Uganda, Abstract PDF. T.R. Okello, D.M. Ogwang, I Pecorella. Vol 21, No 2 (2016), A 2-years description of traumatic brain injury admissions in Tikur Anbessa Specialized Hospital ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 301 - 350 of 577 ... Issue, Title. Vol 32, No 2 (2015), Late arrival in hospital during labour: any correlation with materno-foetal outcome? The state specialist hospital, Asubiaro, Osogbo Experience. Abstract PDF. OO Awolola. Vol 30, No 2 (2013), Late Reproductive Effects of Cancer Treatment in Young People, Abstract ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 319 ... Issue, Title. Vol 23, No 2 (2016), Carica papaya juice enhanced in-vitro cell proliferation better than freeze-dried PBS extract using scratch assay, Abstract. A.B. Nafiu, E Abdulaziz, M.T. Rahman. Vol 23, No 2 (2016), A comparative study of the ownership and utilization of insecticide treated nets in ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 52 ... Issue, Title. Vol 15 (2000), Ammi analysis of maize yield trials in South-Western Nigeria, Abstract. SR Ajibade, BA Ogunbodede. Vol 20 (2006), Association of yield with some agronomic characters in potatoes in a cool mid-altitude location, Abstract. CO Amadi, EE Ene Obong. Vol 20 (2006), Casein (CSN3) ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 240 of 240 ... Issue, Title. Vol 8, No 4 (2005), Status equipment in primary health centres of Tafa Lga, North Central Nigeria, Abstract. MN Sambo, I Lewis, K Sabitu. Vol 10, No 1 (2007), Stroke at a tertiary medical institution in Northern Nigeria: Patients\\' profile and predictors of outcome, Abstract. KW Wahab, MU ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 249 ... Issue, Title. Vol 10, No 1 (2010), Ye Shakoch Chilot (the court of the sheikhs): A traditional institution of conflict resolution in Oromiya zone of Amhara regional state, Ethiopia, Abstract PDF. M Zeleke. Vol 15, No 3 (2015), A comparative analysis of the Post- Arab Spring National Dialogues in Tunisia and ...

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 670 ... Issue, Title. Vol 9, No 2 (2012), Business Planning and the Economic Growth of Small and Medium Scale Enterprises in Nigeria, Abstract. Egbe Aneozeng A, Ejoh Ndifon Ojong, Obo Ekpenyong Bassey. Vol 11, No 2 (2014), Calabar Humaphors: An Analysis of Selected Jokes in Nigerian Stand Up ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 107 of 107 ... Issue, Title. Vol 6, No 1 (2017), The Ophthalmic status manifestations of nutritional and lifestyle disorders of men in a peri urban community in Ghana, Abstract PDF. F. Vuvor, M. Steiner-Asiedu, F.K. Saalia. Vol 2, No 1 (2013), Thyroid Disorders in Accra, Ghana: A Retrospective Histopathological Study ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 165 ... Issue, Title. Vol 30 (2005), Digitisation projects at the University of Cape Town Libraries, Abstract. Janine Dunlop, Lesley Hart. Vol 24 (2002), DISA: an African Perspective on Digital Technology, Abstract. Michele Pickover, Dale Peters. Vol 30 (2005), Doing it right – or are we? Basic principles in the ...

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 251 ... Issue, Title. Vol 55 (2014), 20 Years of democracy: Transforming the public service, Abstract. A Ruiters. Vol 63 (2016), Zemk' iinkomo magwala ndini! Wake up! The cows are being stolen! Abstract. Sipho Pityana. Vol 56 (2014), A layperson's guide to Nene's budget statement, Abstract. B Turok.

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 1007 ... Issue, Title. Vol 11, No 1 (1997), (+)-Floribundone 3 from the pods of Senna septemtrionalis, Details PDF. Gizachew Alemayehu, Bekuretsion Woldeyesus, Berhanu M Abegaz. Vol 14, No 1 (2000), 11α-Hydroxy muzigadiolide, a novel drimane sesquiterpene from the stem bark of warburgia ugandensis ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 356 ... Issue, Title. Vol 27, No 3 (2014), A desire for weight loss in season increases disordered eating behaviour risk and energy deficiency in athletes, Abstract PDF. HH Wright, R Ford, CR Botha. Vol 29, No 3 (2016), A review of infant and young child feeding practice in hospital and the home in KwaZulu-Natal ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 66 ... Issue, Title. Vol 48, No 1-2 (2015), A hierarchical modeling of information seeking behavior of school teachers in rural areas of Nigeria, Abstract. Manir Abdullahi Kamba. Vol 49, No 1-2 (2016), Access to electronic information resources by students of federal college of education in south east Nigeria ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 683 ... Issue, Title. Vol 54, No 1 (2006), Bovine tuberculosis survey in urban and peri urban dairy farms in coastal humid region of Tanga, Tanzania, Abstract. ES Swai, G Shirima, S Bwanga, W Moshy. Vol 60, No 3 (2012), Browsing capacity and nutritive value of indigenous browses in a tropical Coastal ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 387 ... Issue, Title. Vol 15, No 2 (2015), Introduction to Christian philosophy, Abstract. Charles Ogundu Nnaji. Vol 8, No 2 (2006), Is Quantum Mechanics a Complete Theory?: A Philosophical Defense of Einstein's Position, Abstract. U O Egbai. Vol 10, No 1 (2007), Jesus in Africa, Abstract. FF Edet. Vol 10, No ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 98 of 98 ... Issue, Title. Vol 4, No 1 (2016), First-year seminar intervention: Enhancing firstyear mathematics performance at the University of Johannesburg, Abstract PDF. Melanie Jacobs, Estherna Pretorius. Vol 5, No 2 (2017), From Inky Pinky Ponky to Improving Student Understanding in Assessment: Exploring the ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 167 of 167 ... Issue, Title ... Vol 2, No 2 (2013), Women and the Leadership Paradigm: Bridging the Workplace Gender-Gap in Nigeria, Abstract PDF ... Vol 5, No 2 (2016), Women's participation and gender issues in local governance ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 110 ... Issue, Title. Vol 10, No 1 (2003), Incidence and Determinants of Child Labour in Nigeria: Implications for Poverty Alleviation, Abstract. Benjamin Chiedozie Okpukpara, Ngozi Odurukwu. Vol 20, No 1 (2013), Inflation and capacity utilisation in Nigeria's manufacturing sector, Abstract. OA Ishola. Vol 19, No ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 367 ... Issue, Title. Vol 43 (2014), Some interlingual communicative challenges for foreign African interpreters in South African courtrooms, Abstract PDF. SE Usadolo, E Kotze. Vol 29 (1996), South Africa's new language policy in the context of the organisation for African unity's language plan of action for ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 89 ... Issue, Title ... of two-phased approaches to load balancing in cloud computing, Abstract ... Vol 19, No 1 (2012), Assessing Network Services and Security in ... Vol 23, No 1 (2016), Cloud model construct for transaction-based ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 198 ... Issue, Title ... Vol 13, No 1 (2015), Biometric Enhancement of Home and Office Security to Reduce Assassinations in Nigeria, Abstract PDF ... Vol 9, No 1 (2013), Cloud Computing: Key to IT Development in West Africa ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 198 of 198 ... Issue, Title ... scheme for QoS and energy conservation in cloud computing, Abstract PDF ... Vol 9, No 1 (2013), Performance and Security Evaluation of ... Vol 18, No 1 (2017), Reducing capital flight through local cloud ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 652 ... Journal Home > Advanced Search > Browse Title Index ... Vol 18, No 7 (2015), Introduction to virtual property: Lex virtualis ipsa ... Vol 17, No 1 (2014), Legal challenges relating to the commercial use of outer space, with ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 170 of 170 ... Issue, Title. Vol 20, No 2 (2004), The Impact of Mine Closures on Rural Population Dynamics: The Case of Zhombe in Kwekwe District, Midlands Province, Zimbabwe, Abstract. Crescentia Madebwe. Vol 29, No 1 (2013), The Influence of Organisational Culture and Job Satisfaction on Intentions to ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 263 ... Issue, Title. Vol 1, No 2 (2002), Effect of Light and Darkness on Packed Cell Volume in the Rat, Abstract. A. A. OSINUBI, F. I. DURU, C. C. NORONHA, A. O. OKANLAWON. Vol 4, No 1 (2005), Effect of Marijuana Smoking on Blood Chemistry and Serum Biogenic Amines Concentrations in Humans ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 751 - 800 of 846 ... Journal Home > Advanced Search > Browse Title Index ... Vol 9, No 3S (2017): Special Issue, The effect of torrefaction on oil palm ... core competency skills of IRBM tax auditors towards their performance, Abstract PDF ... of exchange rates behavior in Malaysia by using NATREX model, Abstract PDF.

  8. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 38, No 1 (2004), Book Review: Unexpected Voices – Theory, Practice and Identity in the Writing Classroom. Abstract. Charly Dyers. Vol 38, No 1 (2004), Book Review: Shelley Angelil-Carter: Stolen Language? Plagiarism in Writing. Abstract. Elizabeth de Kadt. Vol 37, No 1 (2003), Book Review: The Green ...

  9. Browse Title Index - AJOL

    African Journals Online (AJOL)

    Items 501 - 508 of 508 ... Issue, Title. Vol 33, No 2 (2011), Visuele stereotipering van sportvroue in die sportmedia, Abstract. M Brandt, A Carstens. Vol 30, No 1 (2008), Volunteers\\' perceptions of benefits derived from volunteering: an empirical study, Abstract. J Surujlal, M Dhurup. Vol 33, No 1 (2011), Was the Conconi test ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 108 of 108 ... Issue, Title. Vol 8, No 2 (2016), The status and challenges of clinical informatics development in South Africa, Abstract PDF. Abayomi Kehinde Owolabi, Thokozani Patrick Mhlongo, Neil Evans. Vol 4, No 1 (2012), The stuttering implementation of language policies in the South African education system ...

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 100 ... Issue, Title. Vol 28 (2013): Special Issue, Occurrence of Cryptosporidium and Giardia in domestic animals in peri-urban communities of Kafue district, Zambia, Abstract. J Siwila, IGK Phiri, HI Enemark, M Nchito, A Olsen. Vol 26, No 1 (2009), Occurrence of foot and mouth disease serotypes in Tanzania: A ...

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 801 - 850 of 11090 ... Issue, Title. Vol 10, No 61 (2011), Analysis of chemical constituents in medicinal plants of selected districts of Pakhtoonkhwa, Pakistan, Abstract PDF. I Hussain, R Ullah, J Khan, N Khan, M Zahoor, N Ullah, MuR Khattak, FA Khan, A Baseer, M Khurram. Vol 10, No 77 (2011), Analysis of chloroplast ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 501 - 550 of 670 ... Issue, Title. Vol 11, No 4 (2014), Strategies for Fostering Creativity Among Business Education Graduates in Nigeria, Abstract. BO Nwosu, KE Ojo. Vol 13, No 1 (2015) ... Vol 10, No 1 (2013), The Challenges Facing Accounting Education: The Nigerian Experience, Abstract. OR Okolie. Vol 5 (2008), The ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 198 ... Issue, Title ... Vol 7, No 1 (2013), Enterprise Cloud Adoption: Leveraging on the Business ... Load Balancing And Job Scheduling In Cloud Computing ... Vol 13, No 1 (2015), ICT-Based Framework for Improved Food Security in Nigeria ... Vol 5, No 1 (2012), IT-Based Solutions to the Electoral System in ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1117 ... Journal Home > Advanced Search > Browse Title Index ... Vol 13, No 3 (2007):, an edu-ethical perspecitve on the nature of truth: case studies in elite ... 2009: September: Supplement, An empirical study of university ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 20, No 1 (2015), Assessment of iron status among preschool children (6 to 59 months) with and without malaria in Western Province, Kenya, Abstract. I Kisiangani, C Mbakaya, A Makokha, D Magu. Vol 20, No 1 (2015), Assessment of iron status among preschool children (6 to 59 months) with and without ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 232 ... Issue, Title. Vol 5 (2003), Pre-School Education for a Democratic Society: Identifying Views of Stakeholders in Tanzania, Abstract. Willy LM Komba, Satoki T Mahenge, Gadi Koda. Vol 13, No 2 (2012), Process of Assuring Quality in Counselling at the National Open University of Nigeria: A Critique ...

  18. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 1732 ... Journal Home > Advanced Search > Browse Title Index ... Vol 10, No 3 (2007), An Audit Of Perioperative Cardiac Arrest At ... Vol 11, No 4 (2008), An Audit Of Rejected Repeated X-ray Films As A Quality Assurance ...

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 1038 ... Issue, Title. Vol 31, No 2 (2009), Assessing the utility of a continuous, underway fish egg sampler (CUFES) for sampling zooplankton, Abstract. S Sono, CL Moloney, CD van der Lingen. Vol 38, No 4 (2016), Assessing trophic adaptability is critical for understanding the response of predatory fishes to ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 101 ... Issue, Title. Vol 3, No 4 (2014), Chlamydia trachomatis IgG antibodies seroprevalence among students in two tertiary institutions in Anambra state, Nigeria: a comparative study, Abstract PDF. CB Duru, FE Emele, ED Adinma, CO Ifeadike, KA Uwakwe, AO Oluboyo, BO Oluboyo, C Abejegah. Vol 2, No 1 ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 367 ... Issue, Title. Vol 42 (2013), Nursing the Cure: A Phonetic Analysis of /ʊə/ in South African English, Abstract PDF. I Bekker. Vol 1 (1980), Nuwe ontwikkelings binne chomsky se teorle van kerngrammatika, Abstract PDF. J Maartens. Vol 42 (2013), Obligatory Reflexivity in a Minimalist Grammar of ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 651 - 700 of 1007 ... Issue, Title. Vol 4, No 1 (1990), Kinetics of oxidation of β-diimihe macrocyclic complexes and accessibility of six-coordinate copper(III) complexes generated by electrochemical oxidation of copper(II) complexes, Abstract PDF. Mohamed A. Khalifa. Vol 14, No 2 (2000), Kinetics of periodate oxidation of ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 1020 ... Issue, Title ... Vol 48, No 2 (2006), Barriers to HIV Care and Treatment by Doctors: A review of the literature. ... Vol 48, No 5 (2006), Breast cancer – early detection and screening in South African women from the ...

  4. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 23, No 2 (2011), Dynamique foliaire et croissance du maïs: Application du modèle «STICS» en conditions tropicales en RD-Congo, Abstract PDF. MM Lufuluabo, RV Kizungu, KK Nkongolo. Vol 18, No 1 (2006), Dynamique spatio-temporelle des populations d\\'Altises Podagrica spp. (Coleoptera ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 251 - 300 of 2005 ... Issue, Title. Vol 92, No 4 (2015), Blood Pressure and Obesity Index Assessment in a Typical Urban Slum in Enugu, Nigeria, Abstract. GI Ahaneku, CU Osuji, OC Oguejiofor, BC Anisiuba, VO Ikeh, JE Ahaneku. Vol 80, No 10 (2003):, Blood pressure control in a population where antihypertensives are ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 661 ... Journal Home > Advanced Search > Browse Title Index. Log in or Register to get access to full text downloads. .... A El-Mahdy, B Bolduc, J Upadhyay, R Shoukr, A Khoury. Vol 19, No 1 (2013), Factors affecting lower calyceal stone clearance after Extracorporeal shock wave lithotripsy, Abstract PDF.

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 985 ... Journal Home > Advanced Search > Browse Title Index ... Vol 17 (2010), Alternating Direction Implicit Finite Difference Time Domain Acoustic Wave Algorithm, Abstract. E Ikata .... Vol 17 (2010), Analytic derivation of the wave profile and phase speed of sixth order Stokes waves in deep water, Abstract.

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 286 ... Issue, Title. Vol 2, No 3-4 (2008), Impact of fire wood collection on trees species diversity in Bauchi state, Nigeria, Abstract. A Nura, A Ibrahim, I Mohammed, U Haruna. Vol 5, No 3 (2011), Impact of national special program for food security in Abia State, nigeria, Abstract. CO Emerole. Vol 5, No 1 (2011) ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 351 - 400 of 979 ... Issue, Title. Vol 45, No 9 (2003), Erectile dysfunction: A GP's guide to clinical assessment, Abstract PDF. PJ Harden. Vol 47, No 4 (2005), Ethical Issues in Family Practice: My Culture – Right or Wrong? Abstract PDF. GA Ogunbanjo, D Knapp van Bogaert. Vol 59, No 3 (2017), Ethical issues with ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 301 - 350 of 745 ... Issue, Title. Vol 9, No 3 (1999), Frequency And Outcome In AIDS Patients In A University Teaching Hospital – A Five Year Review, Abstract. SA Ogun, OO Adelowo, AEA ... Vol 18, No 2 (2008), Good cllinical practice in clinical drug trials - What you need to know, Abstract. K Soyebi, Y Abosede, HAB ...

  11. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 217 ... Browse Title Index. Journal Home > Advanced ... Vol 13, No 1 (2016), Access to specialized surgical care, Abstract PDF. H Saidi ... Vol 9, No 2 (2012), Clinical Assessment of the Palmaris Longus – Accuracy of common tests, Abstract PDF ... Vol 11, No 2 (2014), Clinical trials in Surgery, Abstract PDF.

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 633 ... Issue, Title. Vol 19, No 1 (2009), Delays in Tuberculosis Treatment and Associated Factors in Jimma Zone, Southwest Ethiopia, Abstract PDF. Ayalew Tegegn, Meseret Yazachew. Vol 26, No 1 (2016), Delivery Site Preferences and Associated Factors among Married Women of Child Bearing Age in ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 4119 ... Issue, Title. Vol 86, No 2 (1996), A re-evaluation of isotope screening for skeletal metastases in nodenegative breast cancer, Abstract PDF. C.A. Gudgeon, I.D. Werner, D.M. Dent. Vol 104, No 6 (2014), A reflection on the South African Medical Association – past, present and future, Abstract PDF.

  14. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 1006 ... Issue, Title. Vol 49, No 8 (2007), Clinical approach to a patient with abnormal uterine bleeding, Abstract PDF. B G Lindeque. Vol 57, No 5 (2015), Clinical evidence in the management of swimmer's ear, Abstract PDF. Andre Marais. Vol 50, No 1 (2008), Clinical features of Systemic Lupus ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 701 - 750 of 1010 ... Issue, Title. Vol 6, No 2 (1998), Performance et stabilité de rendement des génotypes de patate douce dans divers environnements à l'est du Congo, Abstract. P Phemba, T Mutombo, N B Lutaladio, E E Carey. Vol 22 (2014): Supplement, Performance of Artemia shell-free embryos, Moina micrura and ...

  16. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 17 (2005), A. C. conduction behaviour in amorphous WO3/CEO2 thin film, Abstract. B Yagoubi, C A Hogarth, A Boukorrt. Vol 16 (2003), A lossless image compression algorithm using variable block size segmentation, Abstract. Z Brahimi, K A Saadi, N Baraka. Vol 15 (2003), Analysis method of wavelet ...

  17. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 97 of 97 ... Journal Home > Advanced Search > Browse Title Index ... Vol 20, No 2 (2008), Research Note: Anthropometric data of the foot of ... Vol 26, No 1 (2014), Validation of the Automation Attitude Questionnaire for Airline Pilots ...

  18. Titles of Midas

    Directory of Open Access Journals (Sweden)

    G. L. Huxley

    2001-09-01

    Full Text Available The Phrygian inscription on the tomb at Yazılıkaya (8th century gives Midas the titles wanax and lawagtas, paralled in Mycenaean, and there were strong connections between his dynasty and Greek Aeolis.

  19. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 333 ... Issue, Title. Vol 15, No 1 (2016), Irrigation potential of Inuakpa in Odukpani local government of Cross river using Kostiakov model, Abstract PDF. B.O. Unuigbe, K.I. Ofem, N.R.B. Antigha. Vol 2, No 2 (2003), LABOUR USE IN SMALL-SCALE YAM PRODUCTION IN QUA'AN PAN LOCAL GOVERNMENT ...

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 644 ... Issue, Title. Vol 19, No 2 (2007), A qualitative study of medical student socialization in Malawi\\'s College of Medicine: Clincal crisis and beyond, Abstract PDF. C Wendland, C Bandawe. Vol 19, No 2 (2007), A qualitative study of medical student socialization in Malawi\\'s College of Medicine: Preclinical ...

  1. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 13, No 2 (2013), Using Mindfulness as a Teaching Aid for Phenomenology, Abstract PDF. IR Owen. Vol 8, No 1 (2008), Were Nietzsche's Cardinal Ideas – Delusions? Abstract PDF. Eva M Cybulska. Vol 12, No 1 (2012), What did you learn in school today? Abstract PDF. Carina Henriksson. Vol 5, No 1 (2005) ...

  2. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 265 ... Issue, Title. Vol 35, No 2 (2008), Choice of place for childbirth: prevalence and correlates of utilization of health facilities in Chongwe district, Zambia, Abstract PDF. AN Hazemba, S Siziya. Vol 43, No 1 (2016), Clinical and Radiological Features of Multiple Myeloma Patients at the University Teaching ...

  3. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 88, No 8 (1998), New birth and death registration forms - a foundation for the future, a challenge for health workers? Abstract PDF. Debbie Bradshaw, Danuta Kielkowski, Freddy Sitas. Vol 83, No 3 (1993), New estimates of infant and child mortality for blacks in South Africa, 1968-1979, Abstract PDF.

  4. Browse Title Index

    African Journals Online (AJOL)

    Items 151 - 200 of 643 ... Issue, Title. Vol 18, No 2 (2015), Contraceptive Knowledge and Compliance with Guidelines for Providing Contraceptive Services by Patent Medicine Vendors In Ibadan North Local Government Area, Nigeria, Abstract PDF. OO Ajayi, AJ Ajuwon. Vol 16, No 2 (2013), Coping Strategy for Food Security ...

  5. Browse Title Index

    African Journals Online (AJOL)

    Items 851 - 900 of 1006 ... Issue, Title. Vol 54, No 2 (2012), The effect of the introduction of a standard monitoring protocol on the investigations performed on the metabolic control of type 2 diabetes at Addington Hospital Medical Outpatients Department, Durban, South Africa, Abstract PDF. JM Gill, A Ross, F Pirie, ...

  6. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 8, No 2 (2016): Supplement, Using operative models (ICF and CBR) within an interprofessional context to address community needs, Abstract PDF. A Rhoda, F Waggie, G.C. Filies, J.M. Frantz. Vol 2, No 1 (2010), Using portfolios to assess professional competence and development in medical laboratory ...

  7. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 412 ... Issue, Title. Vol 30, No 3 (2011) ... Transferring the principle of double effect from war to business, Abstract. G. J. Rossouw ... Vol 22, No 2 (2003), Can more business ethics teaching halt corruption in companies? Abstract.

  8. Browse Title Index

    African Journals Online (AJOL)

    Items 101 - 150 of 155 ... Issue, Title. Vol 12 (2012), Political Dissent and Autonomy in Wum Local Government, Southern (West) Cameroons, 1957 – 1968, Abstract. TP Mbeum. Vol 9 (2009), Post-Emancipation Slave Commerce: Increasing Child Slave Trafficking and Women's Agency in Late Nineteenth-century Ghana ...

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 451 - 500 of 581 ... Issue, Title. Vol 30, No 1 (2016), Risky sexual behaviour and associated factors among students of Debre Tabor University, Northwest Ethiopia: a cross-sectional study, Abstract PDF. Awoke Derbie, Mekonnen Assefa, Daniel Mekonnen, Fantahun Biadglegne. Vol 28, No 1 (2014), Road traffic accident: ...

  10. Browse Title Index

    African Journals Online (AJOL)

    Items 451 - 500 of 1346 ... Issue, Title. Vol 32, No 1 (2015), Fire and the dynamics of two unpalatable grass species (Cymbopogon pospischilii and Elionurus muticus) in a semi-arid climate, Abstract. Hennie A Snyman. Vol 8, No 1 (1973), Fire as a method of controlling macchia (Fynos) vegetation on the Amathole Mountains of ...

  11. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 43, No 2 (2006), Review: "'n Wonderlike geweld. Jeugherinneringe", By Elsa Joubert (2005), Abstract PDF. Henriette Roos. Vol 53, No 1 (2016), Review: Breyten Breytenbach, A Monologue in Two Voices, Abstract PDF. Andy Carolin. Vol 53, No 1 (2016), Review: The Shadow of the Hummingbird, Abstract ...

  12. Browse Title Index

    African Journals Online (AJOL)

    Items 51 - 100 of 103 ... Issue, Title ... SE Edusah, E Osei-Tutu ... Vol 6, No 2 (2016), Interrelationships among unemployment, inflation and economic growth in Nigeria, Abstract .... Vol 4, No 3 (2014): Special Edition, Socio-cultural Issues for ...

  13. Browse Title Index

    African Journals Online (AJOL)

    Items 4351 - 4386 of 4386 ... Issue, Title. Vol 107, No 6 (2017), When students become patients: TB disease among medical undergraduates in Cape Town, South Africa, Abstract PDF. H van der Westhuizen, A Dramowski. Vol 106, No 4 (2016), Where do children die and what are the causes? Under-5 deaths in the Metro West ...

  14. Browse Title Index

    African Journals Online (AJOL)

    Issue, Title. Vol 10, No 2 (2014), Sorindeia warneckei Engl. (Anacardiaceae), une espèce multi-usagère de la dépression de la Lama au Togo, Abstract PDF. A Akodewou, S Akpavi, M Dourma, K Batawila, KB Amegnaglo, W Atakpama, K Akpagama. Vol 10, No 1 (2014), Sterculia setigera Del.: influence de quelques ...

  15. Browse Title Index

    African Journals Online (AJOL)

    Items 1 - 50 of 126 ... Issue, Title. Vol 8, No 2 (2016), 2010 FIFA World Cup stadium investment: Does the post-event usage justify the expenditure? Abstract PDF. Luke Humphrey, Gavin Fraser. Vol 6, No 1 (2014), 7Implication of mergers and acquisitions on stock returns before and during the 2007–2009 credit crunch: An ...

  16. Hacking Culture.

    Science.gov (United States)

    Vigh, Pia

    The paper presents the model behind net2art, a joint Nordic project of creating a platform for Nordic net art. The projects background and scope, organization, impact and experiences, funding structures, and copyright issues are covered. The paper argues that museums do not have a natural role in the distribution of net art (i.e., art that is made…

  17. Hacking on decoy-state quantum key distribution system with partial phase randomization

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-01

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  18. Hacking on decoy-state quantum key distribution system with partial phase randomization.

    Science.gov (United States)

    Sun, Shi-Hai; Jiang, Mu-Sheng; Ma, Xiang-Chun; Li, Chun-Yan; Liang, Lin-Mei

    2014-04-23

    Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.

  19. Book Review: Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E

    Directory of Open Access Journals (Sweden)

    Joshua Bartolomie

    2013-09-01

    Full Text Available Wilhelm, T. (2013. Professional Penetration Testing: Creating and Learning in a Hacking Lab 2E. Waltham, MA: Syngress, 464 pages, ISBN-10: 1597499935; ISBN-13: 978-1597499934, US$79.99Reviewed by Joshua Bartolomie, CISSP, CEECS, CFCE, DFCP, CRISC, CSMOrganizations often strive for proactive information security programs in an effort to limit occurrence and impact of security breaches. However, traditional security programs run the risk of being unable to provide adequate insight and proactive awareness into real attack vectors that may exist within their organizations. With attack methods and efforts becoming increasingly aggressive, and effective, organizations must take equally assertive measures to protect their critical information and assets. Penetration testing is one of those tools that is often misunderstood, overlooked, and undervalued. A true adversary would not hesitate to exploit every potential to gain entry or cause a disruption to their target.(see PDF for full review

  20. Comparison of macroscopic and microscopic (stereomicroscopy and scanning electron microscopy) features of bone lesions due to hatchet hacking trauma.

    Science.gov (United States)

    Nogueira, Luísa; Quatrehomme, Gérald; Bertrand, Marie-France; Rallon, Christophe; Ceinos, Romain; du Jardin, Philippe; Adalian, Pascal; Alunni, Véronique

    2017-03-01

    This experimental study examined the lesions produced by a hatchet on human bones (tibiae). A total of 30 lesions were produced and examined macroscopically (naked eye) and by stereomicroscopy. 13 of them were also analyzed using scanning electron microscopy. The general shape of the lesion, both edges, both walls, the kerf floor and the extremities were described. The length and maximum width of the lesions were also recorded. The microscopic analysis of the lesions led to the description of a sharp-blunt mechanism. Specific criteria were identified (lateral pushing back, fragmentation of the upraising, fossa dug laterally to the edge and vertical striae) enabling the forensic expert to conclude that a hacking instrument was used. These criteria are easily identifiable using scanning electron microscopy, but can also be observed with stereomicroscopy. Overall, lateral pushing back and vertical striae visible using stereomicroscopy and scanning electron microscopy signal the use of a hacking tool.

  1. Generating randomised virtualised scenarios for ethical hacking and computer security education: SecGen implementation and deployment

    OpenAIRE

    Schreuders, ZC; Ardern, L

    2015-01-01

    Computer security students benefit from having hands-on experience with hacking tools and with access to vulnerable systems that they can attack and defend. However, vulnerable VMs are static; once they have been exploited by a student there is no repeatable challenge as the vulnerable boxes never change. A new novel solution, SecGen, has been created and deployed. SecGen solves the issue by creating vulnerable machines with randomised vulnerabilities and services, with constraints that ensur...

  2. Problems in using p-curve analysis and text-mining to detect rate of p-hacking and evidential value.

    Science.gov (United States)

    Bishop, Dorothy V M; Thompson, Paul A

    2016-01-01

    Background. The p-curve is a plot of the distribution of p-values reported in a set of scientific studies. Comparisons between ranges of p-values have been used to evaluate fields of research in terms of the extent to which studies have genuine evidential value, and the extent to which they suffer from bias in the selection of variables and analyses for publication, p-hacking. Methods. p-hacking can take various forms. Here we used R code to simulate the use of ghost variables, where an experimenter gathers data on several dependent variables but reports only those with statistically significant effects. We also examined a text-mined dataset used by Head et al. (2015) and assessed its suitability for investigating p-hacking. Results. We show that when there is ghost p-hacking, the shape of the p-curve depends on whether dependent variables are intercorrelated. For uncorrelated variables, simulated p-hacked data do not give the "p-hacking bump" just below .05 that is regarded as evidence of p-hacking, though there is a negative skew when simulated variables are inter-correlated. The way p-curves vary according to features of underlying data poses problems when automated text mining is used to detect p-values in heterogeneous sets of published papers. Conclusions. The absence of a bump in the p-curve is not indicative of lack of p-hacking. Furthermore, while studies with evidential value will usually generate a right-skewed p-curve, we cannot treat a right-skewed p-curve as an indicator of the extent of evidential value, unless we have a model specific to the type of p-values entered into the analysis. We conclude that it is not feasible to use the p-curve to estimate the extent of p-hacking and evidential value unless there is considerable control over the type of data entered into the analysis. In particular, p-hacking with ghost variables is likely to be missed.

  3. The walking-induced transient hack concept is valid & relies on a transient early-exercise hypoxemia.

    Directory of Open Access Journals (Sweden)

    Antoine Bruneau

    Full Text Available Decreased arterial oxygen pressure obtained at peak exercise is strong evidence of walking-induced hypoxemia, assuming that the lower pressure occurs just before exercise is stopped. Using empirical predefined models and transcutaneous oximetry, we have shown that some patients reporting exercise intolerance show a minimal value at the onset of walking and a post-exercise overshoot. These changes are referred to as transcutaneous "walking-induced transient hacks".In 245 patients, walking-induced transcutaneous oxygen pressure changes in the chest were analyzed using observer-independent clustering techniques. Clustering classes were compared to the profile types previously proposed with the cross-correlation technique. The classifications of patients according to both approaches were compared using kappa statistics. In 10 patients showing a hack on transcutaneous oximetry, we analyzed the results of direct iterative arterial sampling recorded during a new walking treadmill test.Clustering analysis resulted in 4 classes that closely fit the 4 most frequently proposed empirical models (cross-correlation coefficients: 0.93 to 0.97. The kappa between the two classifications was 0.865. In 10 patients showing transcutaneous hacks, the minimal direct arterial oxygen pressure value occurred at exercise onset, and these patients exhibited a recovery overshoot reaching a maximum at two minutes of recovery, confirming the walking-induced transient hypoxemia.In patients reporting exercise intolerance, transcutaneous oximetry could help to detect walking-induced transient hypoxemia, while peak-exercise arterial oximetry might be normal.

  4. Morpho-anatomical structure of the leaves of Festuca trachyphylla (Hack. Krajina in the ecological aspect

    Directory of Open Access Journals (Sweden)

    Agnieszka Dąbrowska

    2012-03-01

    Full Text Available Festuca trachyphylla(Hack. Krajina is a morphologically variable species common in warm and dry habitats in various communities: xerothermic grasslands, dry meadows, sand dunes, scrub and well-lighted forest. The aim of this study was to determine the limits of morphological and anatomical trait variability of F. rachyphylla leaves. The study was conducted in 24 sub-populations (N-432 individuals in the Lublin Upland, southeastern Poland. Plants in two localities were investigated: in calcium carbonate-rich xerothermic grasslands and on sand dunes. Variability of the F. trachyphylla leaf blades was demonstrated to be dependent on thehabitat type. The following morphological and anatomical traits: the length of the leaf, width of the cauline leaf, number of ribs in theleaf, length of the cauline leaf, length of hair in the leaf, colour of the leaf, hairiness of the upper part leaf, cross-section of the leaf, and distribution of the sclerenchymatous tissue in the leaf blade exhibited high variability.

  5. Hacking the Cell: Network Intrusion and Exploitation by Adenovirus E1A.

    Science.gov (United States)

    King, Cason R; Zhang, Ali; Tessier, Tanner M; Gameiro, Steven F; Mymryk, Joe S

    2018-05-01

    As obligate intracellular parasites, viruses are dependent on their infected hosts for survival. Consequently, viruses are under enormous selective pressure to utilize available cellular components and processes to their own advantage. As most, if not all, cellular activities are regulated at some level via protein interactions, host protein interaction networks are particularly vulnerable to viral exploitation. Indeed, viral proteins frequently target highly connected "hub" proteins to "hack" the cellular network, defining the molecular basis for viral control over the host. This widespread and successful strategy of network intrusion and exploitation has evolved convergently among numerous genetically distinct viruses as a result of the endless evolutionary arms race between pathogens and hosts. Here we examine the means by which a particularly well-connected viral hub protein, human adenovirus E1A, compromises and exploits the vulnerabilities of eukaryotic protein interaction networks. Importantly, these interactions identify critical regulatory hubs in the human proteome and help define the molecular basis of their function. Copyright © 2018 King et al.

  6. Reproductive hacking. A male seminal protein acts through intact reproductive pathways in female Drosophila.

    Science.gov (United States)

    Rubinstein, C Dustin; Wolfner, Mariana F

    2014-01-01

    Seminal proteins are critical for reproductive success in all animals that have been studied. Although seminal proteins have been identified in many taxa, and female reproductive responses to receipt of these proteins have been documented in several, little is understood about the mechanisms by which seminal proteins affect female reproductive physiology. To explore this topic, we investigated how a Drosophila seminal protein, ovulin, increases ovulation rate in mated females. Ovulation is a relatively simple physiological process, with known female regulators: previous studies have shown that ovulation rate is promoted by the neuromodulator octopamine (OA) in D. melanogaster and other insects. We found that ovulin stimulates ovulation by increasing OA signaling in the female. This finding supports a model in which a male seminal protein acts through "hacking" a well-conserved, regulatory system females use to adjust reproductive output, rather than acting downstream of female mechanisms of control or in parallel pathways altogether. We also discuss similarities between 2 forms of intersexual control of behavior through chemical communication: seminal proteins and pheromones.

  7. Outcomes From AAS Hack Day at the 227th AAS Meeting

    Science.gov (United States)

    Kohler, Susanna

    2016-01-01

    Editors Note:This is a final post from the 227th AAS Meeting in Kissimmee, FL. This special summary of AAS Hack Day, a meeting of AAS members to collaboratively work on various small projects, was written by Meredith Rawls (@Merrdiff) and was originally posted on astrobites.com.As the 227thAmerican Astronomical Society meeting drew to a close (see highlights from Day 1, Day 2, Day 3, and Day 4), a group of at least 50 attendees spent Day 4working on small projects fondly called hacks. Thanks to sponsorship from LSST and Northrup Grumman, the industrious hackers werewell-caffeinated and fed so we could devote time and energy toworking in groups on one-day projects.TheHack Day beganat 10am with pitches. Anybody with a project idea was welcome to briefly speak and try to convince others to work with them. Only someideas panned out, but the enthusiasm was palpable. Its not every day you get a full room of astronomers and affiliates eager to spend hours working on fun and useful projects to benefit the community.#hackAAS is getting underway! #aas227 pic.twitter.com/yX7jlOnSCK James R A Davenport (@jradavenport) January 8, 2016Here is a rundown of what we accomplished. Pretty impressive for a single day! Many thanks to fellow astrobiter Erika Nesvold (now at Carnegie DTM; @erikanesvold) whose hack was live-documenting all the other hacks. Her tweets as @astrobites appeared with the #hackaas hashtag, and her notes made this recap post infinitely easier to write.Interested in joining the fun? Sign up for Hack Day at the 2017 JanuaryAAS meeting (its free with meeting registration), and consider applying for the .Astronomy conference this summer.Towards Optimal Session Scheduling:Adrian Price-Whelan (Columbia), David Hogg (NYU), and Scott Idem (AAS) began writing a program to take all submitted abstracts to a conference like AAS and sort them using keywords to avoid scheduling similar talks in parallel sessions. Its impossible to make everyone happy, but minimizing conflicts

  8. The inherent weaknesses in industrial control systems devices; hacking and defending SCADA systems

    Science.gov (United States)

    Bianco, Louis J.

    The North American Electric Reliability Corporation (NERC) is about to enforce their NERC Critical Infrastructure Protection (CIP) Version Five and Six requirements on July 1st 2016. The NERC CIP requirements are a set of cyber security standards designed to protect cyber assets essential the reliable operation of the electric grid. The new Version Five and Six requirements are a major revision to the Version Three (currently enforced) requirements. The new requirements also bring substations into scope alongside Energy Control Centers. When the Version Five requirements were originally drafted they were vague, causing in depth discussions throughout the industry. The ramifications of these requirements has made owners look at their systems in depth, questioning how much money it will take to meet these requirements. Some owners saw backing down from routable networks to non-routable as a means to save money as they would be held to less requirements within the standards. Some owners saw removing routable connections as a proper security move. The purpose of this research was to uncover the inherent weaknesses in Industrial Control Systems (ICS) devices; to show how ICS devices can be hacked and figure out potential protections for these Critical Infrastructure devices. In addition, this research also aimed to validate the decision to move from External Routable connectivity to Non-Routable connectivity, as a security measure and not as a means of savings. The results reveal in order to ultimately protect Industrial Control Systems they must be removed from the Internet and all bi-directional external routable connections must be removed. Furthermore; non-routable serial connections should be utilized, and these non-routable serial connections should be encrypted on different layers of the OSI model. The research concluded that most weaknesses in SCADA systems are due to the inherent weaknesses in ICS devices and because of these weaknesses, human intervention is

  9. Trunk muscle activation in the back and hack squat at the same relative loads.

    Science.gov (United States)

    Clark, David R; Lambert, Michael I; Hunter, Angus M

    2017-07-12

    The hack squat (HS) is likely to produce a greater 1 repetition maximum (1RM) compared to the back squat (BS). This can be attributed to the support of the trunk during the HS compared to no support during BS. This support however, may compromise trunk muscle activation (TMA), therefore producing different training adaptations. Accordingly, the purpose of this study was to compare 1RM in BS and HS and TMA at 4 relative loads, 65, 75, 85 and 95% of maximal system mass. Ten males completed 3 test sessions:1) BS and HS 1RM, 2) HS & BS neuromuscular test familiarization, and, 3) Neuromuscular test for 3 reps at 4 loads for BS and HS. BS TMA was significantly greater (p<0.05) than HS for all muscles and phases except rectus abdominus in concentric phase. TMA increased (p<0.05) with load in all muscles for both exercises and phases apart from lumbar sacral erector spinae in HS eccentric phase. Mean HS 1RM and submaximal loads were significantly (p<0.0001) higher than the equivalent BS loads. Duration of the eccentric phase was higher (p<0.01) in HS than BS but not different in concentric phase. Duration increased significantly (p<0.01) with load in both exercises and both phases. Despite higher absolute tests loads in HS, TMA was higher in BS. TMA is sensitive to load in both exercises. BS is more effective than HS in activating the muscles of the trunk and therefore arguably more effective in developing trunk strength and stability for dynamic athletic performance.

  10. Modification of Hack Saw Blade Support 'REMOR 400' from the Length of 650 mm to 450 mm

    International Nuclear Information System (INIS)

    Sagino, Abdul-Hafid

    2005-01-01

    REMOR 400 type is the hack saw machine for cutting large work piece. The capacity of cutting is 310 mm diameter. The length of the blade is 650 mm (26 inches). For cutting small work piece (≤ 150 mm), the use of this blade is not efficient because the blade is relatively expensive. To solve this problem, the modification of the blade support is performed so that REMOR 400 machine can use the blade of 450 mm which is cheaper and easier to find in the market. (author)

  11. Sobre la existencia de la ley de Hack en las cuencas hidrográficas de Colombia.

    OpenAIRE

    Mantilla Gutiérrez, Ricardo; Mesa Sánchez, Óscar José; Poveda Jaramillo, Germán

    2000-01-01

    En este trabajo se presenta una caracterización geomorfométrica de las cuencas hidrográficas de Colombia, en términos de un estudio detallado de la relación potencial encontrada por J. T. Hack [3], entre la longitud del cauce principal y el área de la cuenca, que busca determinar una explicación del exponente que se obtiene con datos muestrales para tal relación potencial. Nuestros resultados sugieren que en 1000 cuencas Colombianas, el exponente anómalo de Kack puede explicarse en término...

  12. En torno a la construcción social de la locura: Ian Hacking y la historia cultural de la psiquiatría

    OpenAIRE

    Huertas, Rafael

    2011-01-01

    El objetivo de este trabajo es analizar la contribución del filósofo de la ciencia Ian Hacking a la historia cultural de la psiquiatría. Partiendo de conceptos propuestos por el autor, como "enfermedad mental transitoria" o "inventar/construir gente", se reflexiona en torno a la construcción socio-cultural de la enfermedad mental. Se examinan y discuten los dos estudios de caso propuestos por Hacking: la fuga disociativa y la personalidad múltiple, identificando las fortalezas y debilidades d...

  13. 32 CFR 644.62 - Title evidence.

    Science.gov (United States)

    2010-07-01

    ... HANDBOOK Acquisition Procurement of Title Evidence, Title Clearance, and Closings § 644.62 Title evidence... and their charter to issue the same. They must also be financially sound and be willing and able to...

  14. Region 7 Title V facilities

    Data.gov (United States)

    U.S. Environmental Protection Agency — This web map shows the Region 7 Title V facilities (Clean Air Act major sources), any Class I areas within 300 km of R7 States, and any Tribal areas within 50 miles...

  15. Title V Permitting Statistics Inventory

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Title V Permitting Statistics Inventory contains measured and estimated nationwide statistical data, consisting of counts of permitted sources, types of permits...

  16. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    Directory of Open Access Journals (Sweden)

    Mehri Mowlaie

    2016-01-01

    Full Text Available Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597 junior and senior high school students (boys and girls in academic year 2014-2015 in Ardabil, Iran. 380 subjects were selected as the study sample by multistage cluster sampling. The instruments for data collection in this research were addiction to internet questionnaire, Iranian adolescent's risk-taking scale and the researcher-made tendency to chat and hacking questionnaire. The data were analyzed by SPSS-22 software using correlation coefficient and simultaneous regression analysis. Results: The results showed a significantly positive correlation between addiction to internet and sexual behavior, tendency toward opposite sex, aggression, chatting and hacking (P<0.001, but there was no significant relationship between addiction to internet and alcohol. Conclusion: The results of the present study showed that addiction to internet was able to significantly predict sexual behavior, tendency toward opposite sex, aggression, chatting and hacking.

  17. National Ignition Facility Title II Design Plan

    International Nuclear Information System (INIS)

    Kumpan, S

    1997-01-01

    This National Ignition Facility (NIF) Title II Design Plan defines the work to be performed by the NIF Project Team between November 1996, when the U.S. Department of Energy (DOE) reviewed Title I design and authorized the initiation of Title H design and specific long-lead procurements, and September 1998, when Title 11 design will be completed

  18. Hacking for astronomy: can 3D printers and open-hardware enable low-cost sub-/millimeter instrumentation?

    Science.gov (United States)

    Ferkinhoff, Carl

    2014-07-01

    There have been several exciting developments in the technologies commonly used n in the hardware hacking community. Advances in low cost additive-manufacturing processes (i.e. 3D-printers) and the development of openhardware projects, which have produced inexpensive and easily programmable micro-controllers and micro-computers (i.e. Arduino and Raspberry Pi) have opened a new door for individuals seeking to make their own devices. Here we describe the potential for these technologies to reduce costs in construction and development of submillimeter/millimeter astronomical instrumentation. Specifically we have begun a program to measure the optical properties of the custom plastics used in 3D-printers as well as the printer accuracy and resolution to assess the feasibility of directly printing sub- /millimeter transmissive optics. We will also discuss low cost designs for cryogenic temperature measurement and control utilizing Arduino and Raspberry Pi.

  19. INIS: Authority List for Journal Titles

    International Nuclear Information System (INIS)

    1992-01-01

    This is the nineteenth revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). It lists 10,797 journal titles which have contained articles within the scope of INIS. The purpose of this Authority List is to provide descriptive cataloguers with a standard abbreviation for journal titles and to assist users of INIS products with a tool for verifying the full title of a journal. A journal, or periodical, is generally published within a defined, fixed interval between issues, which usually has more than one issue a year, and which usually includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as Annual Review of Nuclear Science are included. Series titles as, for example the McGraw-Hill Series in Nuclear Engineering, are not included in this Authority. Entries: Each entry consists of: - the full journal title (highlighted); - the abbreviated title; - ISSN, if available; - CODEN, if available; - additional information related to the journal title. Arrangement: In Part I, the full journal titles are grouped by country or international organization name and ordered alphabetically, followed by the ISSN, the CODEN in square brackets if available, and then the abbreviated title. The abbreviated title is based on the rules of ISO 4: Documentation - International Code for the Abbreviation of Titles of Periodicals. The abbreviations of the words are taken from the ISDS List of Periodical Title Word Abbreviation. In Part II, the order of the citations is reversed: the abbreviated journal titles are arranged alphabetically, followed by country code. Then the full journal titles are followed by the country of publication, and if available, ISSN and CODEN. Additional Information: There is important information related to the journal titles which are fundamental for tracing the history of the title and the present status. They are listed below and are entered whenever applicable: - Ceased publication; - Superseded by

  20. TITLE

    Directory of Open Access Journals (Sweden)

    Nisha K. M

    2016-01-01

    Full Text Available The new millennium is seen as an epoch of entrepreneurship with entrepreneurs perceiving novel opportunities, organizing resources, undertaking risks to pursue their goals in establishing innovative ventures for scaling new horizons. Women entrepreneurs have the potency to confront numerous challenges, such as creating equity, equilibrium, ensuring sustainable and inclusive socio economic development in divergent economies, by seizing tremendous business opportunities in the contemporary commercial world. Kerala, the southern State of India, is experiencing an economic renovation through technological transformation and, in particular, through the growth of women oriented Micro, Small and Medium Enterprises (MSMEs. The study aims to; identify the growth trends of women’s entrepreneurship in the micro enterprises of Kerala; examine whether women’s entrepreneurial activities significantly vary across the form of women owned enterprises, type of organization and nature of activity; and also explore the prospects and challenges faced by women entrepreneurs through micro entrepreneurial activities. Research methodology involves the application of descriptive quantitative analysis on the secondary data primarily collected from the database of Directorate of Industries and District Industries Centre for a period of 7 years extending from 2007-08 to 2013-14. Findings reveal that MSMEs spawn better income distribution, by operating in heterogeneous areas of the economy with limited capital and creating more employment opportunities, thereby reducing poverty and inequalities. The trend analysis reflects an escalation in the number of enterprises, investments, profits and employment opportunities generated especially through micro enterprises of women. They play a crucial role in the economy in terms of creating self employment and generating employment opportunities for others. A paradigm shift is seen in the role of women’s entrepreneurship in terms of innovation, attitudes, leadership qualities, competitiveness, entrepreneurial skill and absorbing new entrants to the job market, empowering marginalized women.

  1. TITLE

    Directory of Open Access Journals (Sweden)

    Abdolhamid Papzan

    2013-01-01

    Full Text Available This study investigated entrepreneurial intention among graduate students of USM Engineering Campus. Applying the Theory of Planned Behavior (TPB; Ajzen, we examined the empirical model of entrepreneurial intention determinants. Although research has been conducted in entrepreneurial intention, limited study has been done among Iranian graduate students who are studying abroad. This research aims to fill this gap using Entrepreneurial Intention Questionnaire (EIQ, version 3.1. Accordingly, a survey study was applied and Iranian graduate students of the USM Engineering Campus were studied using the census method. The authors propose an empirical model and tested its reliability and validity using structural equation modeling. Data was analyzed using Spss16 and Amos18 software. Results revealed that the level of knowledge about business sources of assistance for entrepreneurs in addition to components of the TPB, affected entrepreneurial intention. Empirical model ‘s goodness of fit indices indicated good model fit x2=1.047, df=2, probability 0.592; NFI= 0.981; CFI= 1.000; RMSEA=0.000. It seems that current empirical model could be a guide for future research on this important topic.

  2. One Coin has Two Sides: A Comparative Appraisal of New York Times and China Daily’s News Coverage of Alleged Internet Hacking

    Directory of Open Access Journals (Sweden)

    Wenyu Liu

    2015-04-01

    Full Text Available There is always some debate as to whether news reporting is objective and emotionless. Under the guidance of engagement system, a sub-system of Appraisal Theory, concerning the conveyance of ideology, the present study attempts to make a comparative study of different ideological attitudes by news coverage in New York Times and China Daily’s (English version on alleged internet hacking. The findings suggest that similar distributions of engagement resources in the news reports are adopted when engaged in an ideological attitude. Additionally, China Daily and New York Times hold different attitudes to Internet hacking. The attitude by China Daily changes before and after Snowden Event, while New York Times remains the same.

  3. Análisis filosófico de la construcción social de la escuela: claves críticas a partir de Ian Hacking

    Directory of Open Access Journals (Sweden)

    José PENALVA BUITRAGO

    2009-01-01

    Full Text Available RESUMEN: Este artículo ofrece un análisis filosófico de la idea de la construcción social de la escuela. Tomando como punto de partida algunas de las claves críticas que I. Hacking señala respecto del constructivismo, el autor ensaya una nueva ruta de análisis, no explorada por Hacking: el análisis del constructivismo social en los procesos educativos y en las instituciones educativas. Con ello se intenta poner de relieve cuestiones teóricas de fondo –principalmente de carácter ontológico– acerca de las cuales la comunidad pedagógica ha prestado escasa atención. El análisis se desarrolla en cuatro pasos: en primer lugar, se ofrecen las ideas de Hacking más relevantes al respecto; después, se expone una síntesis de la posición dominante acerca de la construcción social de la escuela. Seguidamente, se analizan los aspectos ontológicos implicados en tal idea, y, por último, se extraen las consecuencias educativas.ABSTRACT: This paper offers a philosophical analysis of the idea of the social construction of School. Taking as a standpoint some critical questions which I. Hacking proposed regarding constructivism, the author examines a new route, not explored by Hacking, i.e., the analysis of social constructivism in educational processes and educational institutions. In this way we expect to throw light on certain deep theoretical questions –of an ontological nature, mainly– to which the educational community has paid little attention. The analysis follows four steps: first, it describes Hacking’s most important ideas in this regard; second, it synthesises the dominant stance concerning the social construction of School. Third, it examines the ontological assumptions of this idea, and, finally, describes some educational consequences.SOMMAIRE: Cet article offre une analyse philosophique de la structure sociale des écoles. L’auteur, à partir de quelques idées critiques signalées par I. Hacking à propos du

  4. 24 CFR 202.12 - Title II.

    Science.gov (United States)

    2010-04-01

    ... INSTITUTIONS AND MORTGAGEES Title I and Title II Specific Requirements § 202.12 Title II. (a) Tiered pricing—(1... rate up to two percentage points under the mortgagee's customary lending practices must be based on... after accounting for the value of servicing rights generated by making the loan and other income to the...

  5. Does 'hacking' surface type affect equine forelimb foot placement, movement symmetry or hoof impact deceleration during ridden walk and trot exercise?

    Science.gov (United States)

    Barstow, A; Bailey, J; Campbell, J; Harris, C; Weller, R; Pfau, T

    2018-04-17

    Both pleasure and competition horses regularly exercise on surfaces such as tarmac, gravel and turf during 'hacking'. Despite this, there is limited evidence relating to the effect of these surfaces upon foot-surface interaction. To investigate forelimb foot placement, hoof vibration and movement symmetry in pleasure horses on three commonly encountered hacking surfaces. Quantitative gait study in a convenience sample. Six horses regularly partaking in hacking exercise were ridden in walk and trot on all surfaces. Horses were equipped with one hoof-mounted, accelerometer and four body-mounted inertial measurement units (IMUs) to measure foot impact and movement symmetry. High-speed (400 FPS) video footage of foot-placement was acquired (dorsal, palmar, lateral views). Foot-impact and movement symmetry were analysed with a mixed effects model and Bowker symmetry tests for foot-placement analysis. Vibration power and frequency parameters increase as perceived surface firmness increases from grass, to gravel, to tarmac (P≤0.001). Vibration power parameters were consistently greater at trot compared with walk (P≤0.001), but the same was not true for vibration frequency (P≥0.2). Greatest movement asymmetry was recorded during grass surface trotting. No significant difference in foot-placement was detected between the three surfaces. This was a field study using three commonly encountered hacking surfaces. Surface properties change easily with water content and temperature fluctuations so care must be taken when considering other similar surfaces, especially at different times of the year. Six leisure horses were used so the results may not be representative of horses of all types. Vibration parameters generally increase as perceived surface firmness increases. Increasing speed alters vibration power but not frequency. Further investigations are required to determine the role that this may play in the development of musculoskeletal disease in horses. © 2018 EVJ

  6. Efficacy of ‘hack and squirt’ application of imazapyr, triclopyr, and glyphosate to control the invasive tree species Chinese tallowtree

    Science.gov (United States)

    Charles A. Gresham

    2010-01-01

    In May 2005, 12 plots approximately 21 by 27 m each were established on the exterior bank of a dredge spoil area in Georgetown, SC. The tree cover was primarily Chinese tallowtree, but there were also live oak trees in each plot. Also in May 2005, Chinese tallowtree s (d.b.h. > 2.4 cm) in three randomly selected plots received a ‘hack and squirt’ application of...

  7. The relationship between addiction to internet and adolescence’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking

    OpenAIRE

    Mehri Mowlaie; Setareh Jani

    2016-01-01

    Background: Given the importance of adolescent period and impact of internet and virtual communication tools on high risk behaviors, this research was conducted to examine the relationship between addiction to internet and adolescent’s tendency toward opposite sex, sexual behaviors, alcohol, aggression, chatting and hacking. Methods: The population of this study included all (n=40597) junior and senior high school students (boys and girls) in academic year 2014-2015 in Ardabil, Iran. 38...

  8. 42 CFR 476.86 - Correlation of Title XI functions with Title XVIII functions.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 4 2010-10-01 2010-10-01 false Correlation of Title XI functions with Title XVIII functions. 476.86 Section 476.86 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF...) Qio Review Functions § 476.86 Correlation of Title XI functions with Title XVIII functions. (a...

  9. APLICAÇÃO DO ÍNDICE DE HACK (SL A UM TRECHO DO RIO ZÊZERE, PORTUGAL

    Directory of Open Access Journals (Sweden)

    Daniel Vieira Souza

    2011-11-01

    Full Text Available Os perfis longitudinais de rios são sensíveis a movimentações tectônicas causando alterações no nível de base. Devido a isto, verifica-se incisão fluvial a montante de compartimentos abatidos e agradação a jusante de compartimentos levantados. Os canais fl uviais são dinâmicos e se modificam através da incisão e da agradação periódicas, o estudo destes processos reveste-se de grande importância na compreensão das alterações do relevo. A formação de vales encaixados com perfis típicos em V, ou o aparecimento de trechos de agradação pode ter origem em causas tectônicas, ou outras. Hack (1973 propôs um índice (stream-gradient index para detectar estas alterações em cursos fluviais, decorrentes de mudanças no substrato geológico, aporte de carga, ou tectonismo. O stream-gradient index, ou simplesmente índice SL, relação declive (slope vs. comprimento do curso (length. O presente trabalho objetiva identificar rupturas de declive, num trecho do rio Zêzere, afluente do rio Tejo. O rio Zêzere corre num vale encaixado no interior da Cordilheira Central Portuguesa. Para identificar as roturas de declive utilizou-se o perfil longitudinal, índice de Hack, SL (slope VS. Lenght. Como resultado foi possível detectar locais onde sofreram abatimentos tectônicos, principalmente entre Pedrógão e Bogas de Baixo, foi possível também observar a influência de processos de erosão diferencial e de soleiras Quartzíticas de Farjão a Sarzedas na regularização dos processos tectônicos a montante daqueles níveis de base locais.

  10. INIS: Authority list for journal titles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-03-01

    This is the twenty-ninth revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). It lists the titles of 12 990 journals which have contained articles within the scope of INIS. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the reader to find titles easily, the list is divided into two parts. In Part I, the full journal titles are grouped by country or international organization responsible for coverage and ordered alphabetically. In Part II, the full journal titles of all countries or international organizations are arranged alphabetically. The country name or the international organization name responsible for coverage of the journal title to INIS is entered in parentheses. Journal titles marked with an asterisk are regularly scanned by INIS. Titles that have been identified by INIS Centres as 'Key Journals' are marked with the hash sign.

  11. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2003-01-01

    This is the twenty-ninth revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). It lists the titles of 12 990 journals which have contained articles within the scope of INIS. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the reader to find titles easily, the list is divided into two parts. In Part I, the full journal titles are grouped by country or international organization responsible for coverage and ordered alphabetically. In Part II, the full journal titles of all countries or international organizations are arranged alphabetically. The country name or the international organization name responsible for coverage of the journal title to INIS is entered in parentheses. Journal titles marked with an asterisk are regularly scanned by INIS. Titles that have been identified by INIS Centres as 'Key Journals' are marked with the hash sign

  12. Using hacked point and shoot cameras for time-lapse snow cover monitoring in an Alpine valley

    Science.gov (United States)

    Weijs, S. V.; Diebold, M.; Mutzner, R.; Golay, J. R.; Parlange, M. B.

    2012-04-01

    In Alpine environments, monitoring snow cover is essential get insight in the hydrological processes and water balance. Although measurement techniques based on LIDAR are available, their cost is often a restricting factor. In this research, an experiment was done using a distributed array of cheap consumer cameras to get insight in the spatio-temporal evolution of snowpack. Two experiments are planned. The first involves the measurement of eolic snow transport around a hill, to validate a snow saltation model. The second monitors the snowmelt during the melting season, which can then be combined with data from a wireless network of meteorological stations and discharge measurements at the outlet of the catchment. The poster describes the hardware and software setup, based on an external timer circuit and CHDK, the Canon Hack Development Kit. This latter is a flexible and developing software package, released under a GPL license. It was developed by hackers that reverse engineered the firmware of the camera and added extra functionality such as raw image output, more full control of the camera, external trigger and motion detection, and scripting. These features make it a great tool for geosciences. Possible other applications involve aerial stereo photography, monitoring vegetation response. We are interested in sharing experiences and brainstorming about new applications. Bring your camera!

  13. Hacking and securing the AR.Drone 2.0 quadcopter: investigations for improving the security of a toy

    Science.gov (United States)

    Pleban, Johann-Sebastian; Band, Ricardo; Creutzburg, Reiner

    2014-02-01

    In this article we describe the security problems of the Parrot AR.Drone 2.0 quadcopter. Due to the fact that it is promoted as a toy with low acquisition costs, it may end up being used by many individuals which makes it a target for harmful attacks. In addition, the videostream of the drone could be of interest for a potential attacker due to its ability of revealing confidential information. Therefore, we will perform a security threat analysis on this particular drone. We will set the focus mainly on obvious security vulnerabilities like the unencrypted Wi-Fi connection or the user management of the GNU/Linux operating system which runs on the drone. We will show how the drone can be hacked in order to hijack the AR.Drone 2.0. Our aim is to sensitize the end-user of AR.Drones by describing the security vulnerabilities and to show how the AR.Drone 2.0 could be secured from unauthorized access. We will provide instructions to secure the drones Wi-Fi connection and its operation with the official Smartphone App and third party PC software.

  14. Sécurité informatique ethical hacking : apprendre l'attaque pour mieux se défendre

    CERN Document Server

    ACISSI

    2009-01-01

    Ce livre sur la sécurité informatique (et le ethical hacking) s'adresse à tout utilisateur d'ordinateur sensibilisé au concept de la sécurité informatique. Il a pour objectif d'initier le lecteur aux techniques des attaquants pour lui apprendre comment se défendre. ACISSI (Audit, Conseil, Installation et Sécurisation des Systèmes d'Information) est une association à but non lucratif qui forme et conseille, depuis plusieurs années, sur les enjeux de la sécurité informatique. Les auteurs de ce livre sont bien sûr membres actifs de l'association, chacun détenteur d'une spécialité, et forment une équipe de personnes de conviction qui se donnent pour mission de rendre la sécurité informatique accessible à tous : ""apprendre l'attaque pour mieux se défendre"" est leur adage. Hackers blancs dans l'âme, ils ouvrent au lecteur les portes de la connaissance underground. Aperçu de la table des matières : Introduction et Définitions - La méthodologie d'une attaque - Le Social Engineering - Les ...

  15. Land Titles and Rice Production in Vietnam

    DEFF Research Database (Denmark)

    Van Den Broeck, Katleen; Newman, Carol; Tarp, Finn

    In most of the empirical literature on land titling, the household is regarded as unitary, and land rights are found to have ambiguous effects on land allocation, investment and productivity. Using data from 12 provinces in Vietnam, we diversify land titles, and show in a household fixed effects...... analysis of plot level rice yields that land titles are indeed important. Only exclusively held titles have the expected positive effects, and the positive effect on yields is found in male headed households. Furthermore, a household level rice yield function reveals that exclusive user rights...... are inefficiency decreasing, while jointly held user rights have no efficiency effects. Finally, once the gender of the head of household is controlled for, exclusively held female titles have a greater positive effect on the efficiency of the household than that of male held titles...

  16. 24 CFR 200.61 - Title.

    Science.gov (United States)

    2010-04-01

    ... Commissioner. (c) Endorsement of the credit instrument for insurance shall evidence the acceptability of title... GENERAL INTRODUCTION TO FHA PROGRAMS Requirements for Application, Commitment, and Endorsement Generally...

  17. Comparing the characteristics of highly cited titles and highly alted titles

    Energy Technology Data Exchange (ETDEWEB)

    Didegah, F.; Bowman, T.D.; Bowman, S.; Hartley, J.

    2016-07-01

    This study examines differences in the types of titles for articles that show high altmetric activity (highly alted articles) versus highly cited articles. This work expands on previous research on document titles in combination with a grounded theory approach to develop a codebook in which articles were manually coded based on 11 characteristics. The results show that there are differences and similarities in titles across many of the examined characteristics; highly cited titles and highly mentioned titles on Wikipedia have some similar characteristics such as they have the the highest percentage of substantive words; in addition, there are no or very few titles referencing outside or with humor/lightness on both platforms. Twitter and Facebook also showed some similarities having the highest percentage of humorous/light titles and lowest percentage of substantive words in their titles. (Author)

  18. Getting to one from title 10 + title 32 unity of effort in the homeland

    OpenAIRE

    Prosch, Caroline Ross.

    2011-01-01

    CHDS State/Local Approved for public release; distribution is unlimited This thesis bridges the knowledge gap between Title 10 Active Duty and Title 32 National Guard in order to breakdown cultural barriers and reach unity of effort for response operations in the homeland. Regrettably, a unified response was missing among Title 10 Active Duty and Title 32 National Guard members following Hurricane Katrina. Since then, initiatives based in doctrine, statutes and formal recommendations...

  19. How property title impacts urban consolidation

    DEFF Research Database (Denmark)

    Easthope, Hazel; Warnken, Jan; Sherry, Cathy

    2014-01-01

    Continuing urbanisation is triggering an increase in multi-titled housing internationally. This trend has given rise to a substantial research interest in the social consequences of higher density living. Little enquiry, however, has been directed to examining how property title subdivisions gene...

  20. 31 CFR 505.01 - Short title.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Short title. 505.01 Section 505.01 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... CERTAIN MERCHANDISE BETWEEN FOREIGN COUNTRIES § 505.01 Short title. The regulations in this part may be...

  1. 33 CFR 401.1 - Short title.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Short title. 401.1 Section 401.1 Navigation and Navigable Waters SAINT LAWRENCE SEAWAY DEVELOPMENT CORPORATION, DEPARTMENT OF TRANSPORTATION SEAWAY REGULATIONS AND RULES Regulations § 401.1 Short title. These regulations may be cited as the...

  2. 18 CFR 415.1 - Short title.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Short title. 415.1 Section 415.1 Conservation of Power and Water Resources DELAWARE RIVER BASIN COMMISSION ADMINISTRATIVE MANUAL BASIN REGULATIONS-FLOOD PLAIN REGULATIONS Generally § 415.1 Short title. This part shall be known...

  3. 25 CFR 151.13 - Title examination.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Title examination. 151.13 Section 151.13 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR LAND AND WATER LAND ACQUISITIONS § 151.13 Title examination. If the Secretary determines that he will approve a request for the acquisition of land from...

  4. Student Achievement in Title I Schools

    Science.gov (United States)

    Diaz, Abby T.

    2017-01-01

    This researcher seeks to answer the following question: How did two elementary Title I schools, identified as "high performing" on the first Smarter Balanced assessment, address elements of Maslow's hierarchy of needs when developing school-wide initiatives to enhance student achievement? Many students in Title I schools face barriers to…

  5. Land Titles and Rice Production in Vietnam

    DEFF Research Database (Denmark)

    Van Den Broeck, Katleen; Newman, Carol; Tarp, Finn

    analysis of plot level rice yields that land titles are indeed important. Only exclusively held titles have the expected positive effects, and the positive effect on yields is found in male headed households. Furthermore, a household level rice yield function reveals that exclusive user rights...

  6. 24 CFR 202.11 - Title I.

    Science.gov (United States)

    2010-04-01

    ... in 24 CFR 25.5. Civil money penalties may be imposed against Title I lenders and mortgagees pursuant... unacceptable risk to the Department; or (iv) Transfer of a Title I loan to a party that does not have a valid...

  7. Growth and physiological responses of two phenotypically distinct accessions of centipedegrass (Eremochloa ophiuroides (Munro) Hack.) to salt stress.

    Science.gov (United States)

    Li, JianJian; Ma, Jingjing; Guo, Hailin; Zong, Junqin; Chen, Jingbo; Wang, Yi; Li, Dandan; Li, Ling; Wang, Jingjing; Liu, Jianxiu

    2018-05-01

    Salinity is one of the major abiotic environmental stress factors affecting plant growth and development. Centipedegrass (Eremochloa ophiuroides [Munro)] Hack.) is an important warm-season turfgrass species with low turf maintenance requirements, but is sensitive to salinity stress. To explore salt tolerant germplasms in centipedegrass and better understand the growth and physiological responses of centipedegrass to salinity, we conducted anatomic observation and phytochemical quantification, examined growth parameters, and investigated photosynthetic machinery and antioxidant system in two phenotypically distinct centipedegrass accessions under NaCl salt stress. The morphophenotypical difference of the stems in the two accessions mainly depends on whether or not a thickened epidermal horny layer with purple colour was formed, which was caused by anthocyanin accumulation in the tissue. Successive salinity treatment was found to result in an inhibition of leaf growth, a marked decrease in photosynthesis, chlorophyll contents, and the maximal photochemical efficiency of PSII (Fv/Fm). Under the same treatment, purple-stem accession (E092) showed a lower degree of inhibition or decrease than green-stem one (E092-1). With the exception of malondialdehyde level, both proline content and antioxidant enzymes were upregulated to a greater extent in E092 following exposure to salinity condition. Meanwhile, significant enhancements of anthocyanin accumulation and total protein synthesis were detected in E092 after salt treatment, but not in E092-1. These results demonstrated that E092 favor better accumulation of anthocyanins under salinity condition, which contribute to salt tolerance by adjusting physiological functions and osmotic balance, and better maintenance of high turf quality. Hence, genetic phenotype can be utilized as a key indicator in E. ophiuroides breeding for salt-tolerance. Copyright © 2018. Published by Elsevier Masson SAS.

  8. 6. Analisis Implementasi Cyber Security Di Uni Eropa: Studi Kasus Carbon Credits Hacking Dalam European Union Emission Trading Scheme (EU ETS) Tahun 2010-2013

    OpenAIRE

    Aisya, Naila Sukma; Putranti, Ika Riswanti; Wahyudi, Fendy Eko

    2017-01-01

    Since the last two decades in the 20th century, the European Union (EU) has presented itself as a leader in climate change issues. The leadership manifested in the formation of the European Union Emission Trading Scheme (EU ETS) as an effort to fulfill the commitments of the Kyoto Protocol to reduce emissions in the region. But the existence of the EU ETS has been challenged by the emergence of carbon credits hacking case in some national registration systems in the EU ETS. This study discuss...

  9. p-hacking by post hoc selection with multiple opportunities: Detectability by skewness test?: Comment on Simonsohn, Nelson, and Simmons (2014).

    Science.gov (United States)

    Ulrich, Rolf; Miller, Jeff

    2015-12-01

    Simonsohn, Nelson, and Simmons (2014) have suggested a novel test to detect p-hacking in research, that is, when researchers report excessive rates of "significant effects" that are truly false positives. Although this test is very useful for identifying true effects in some cases, it fails to identify false positives in several situations when researchers conduct multiple statistical tests (e.g., reporting the most significant result). In these cases, p-curves are right-skewed, thereby mimicking the existence of real effects even if no effect is actually present. (c) 2015 APA, all rights reserved).

  10. Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software

    Directory of Open Access Journals (Sweden)

    Ariel Giannone

    2017-01-01

    Full Text Available Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.

  11. Investigación en Progreso: Método de Inclusión de Hacking Ético en el Proceso de Testing de Software

    OpenAIRE

    Ariel Giannone

    2017-01-01

    Debido al crecimiento exponencial de Internet y a que las organizaciones poseen cada vez mas información, se hace imprescindible bloquear y eliminar todas las intrusiones posibles. Gracias al hacking ético es posible detectar y corregir algunas de las vulnerabilidades antes que el sistema salga a la luz. Con el fin de mejorar este proceso se intentan incluir estas técnicas y métodos en el proceso tradicional de testing de software dentro de las organizaciones.

  12. 24 CFR 203.385 - Types of satisfactory title evidence.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Types of satisfactory title... Title Waivers § 203.385 Types of satisfactory title evidence. The following types of title evidence shall be satisfactory to the Commissioner: (a) Fee or owner's title policy. A fee or owner's policy of...

  13. Quarterly title list for the period ending June 1980

    International Nuclear Information System (INIS)

    1980-01-01

    The title list contains: a) 17 titles and abstracts of laboratory reports, b) 36 titles of publications (32 with abstracts), c) 13 titles of articles submitted for publication (12 with abstracts), and d) 72 titles of lectures (52 with abstracts.) (GG) [de

  14. 275 Proverbial Space and the Dialectics of Place and Displacement ...

    African Journals Online (AJOL)

    User

    2012-01-24

    . The current paper examines Adeniran's attempt at creating a large ... father's reasoning for sending her to relatives on their return to Nigeria is ― ... past, in memories of childhood, which is the only basis for a perdu, the home.

  15. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2005-01-01

    This is the 31st revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13,104 journal titles, 2,078 regularly scanned journals and 561 key journals. It was last updated in February 2005. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part III, all journals that are regularly scanned by INIS Centers are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part IV, all journals that are regularly scanned by INIS Centers are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part V, all journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part VI, all journals are sorted alphabetically under their title. The name of the

  16. INIS: Authority list for journal titles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-03-01

    This is the 31st revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13,104 journal titles, 2,078 regularly scanned journals and 561 key journals. It was last updated in February 2005. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part III, all journals that are regularly scanned by INIS Centers are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part IV, all journals that are regularly scanned by INIS Centers are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part V, all journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part VI, all journals are sorted alphabetically under their title. The name of the

  17. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2006-01-01

    This is the 32nd revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13,231 journal titles, 2,125 regularly scanned journals and 555 key journals. It was last updated in February 2006. The purpose of this report is to provide descriptive cataloguers with a standard entry for the full title of a journal. In addition to the full journal title, the ISSN (International Standard Serial Number), administered by the ISSN International Centre, Paris, France, and/or CODEN, assigned by Chemical Abstracts Service, USA, are given in this manual. In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part III, all journals that are regularly scanned by INIS Centres are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part IV, all journals that are regularly scanned by INIS Centres are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. In Part V, all journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. In Part VI, all journals are sorted alphabetically under their title. The name of the

  18. 20 CFR 404.535 - How much will we withhold from your title VIII and title XVI benefits to recover a title II...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How much will we withhold from your title... Officer § 404.535 How much will we withhold from your title VIII and title XVI benefits to recover a title II overpayment? (a) If past-due benefits are payable to you, we will withhold the lesser of the...

  19. 12 CFR 5.42 - Corporate title.

    Science.gov (United States)

    2010-01-01

    ... 18 U.S.C. 709, regarding false advertising and the misuse of names to indicate a Federal agency, and... the appropriate district office if it changes its corporate title. The notice must contain the old and...

  20. Code of Federal Regulations Title 21

    Data.gov (United States)

    U.S. Department of Health & Human Services — This database contains the most recent revision from the Government Printing Office (GPO) of the Code of Federal Regulations (CFR) Title 21 - Food and Drugs.

  1. The Need for Conciliation under Title VII

    Science.gov (United States)

    Pollard, William E.

    1975-01-01

    The AFL-CIO is committed to the task of eliminating discrimination and injustice in the workplace and is making efforts to expand the Equal Employment Opportunity Commission's conciliation efforts under Title Seven. (MW)

  2. Service Locator - Family Planning Title X

    Data.gov (United States)

    U.S. Department of Health & Human Services — This locator tool will help you find Title X family planning centers that provide high quality and cost-effective family planning and related preventive health...

  3. Performance of the Hack's Impairment Index Score: A Novel Tool to Assess Impairment from Alcohol in Emergency Department Patients.

    Science.gov (United States)

    Hack, Jason B; Goldlust, Eric J; Ferrante, Dennis; Zink, Brian J

    2017-10-01

    Over 35 million alcohol-impaired (AI) patients are cared for in emergency departments (EDs) annually. Emergency physicians are charged with ensuring AI patients' safety by identifying resolution of alcohol-induced impairment. The most common standard evaluation is an extemporized clinical examination, as ethanol levels are not reliable or predictive of clinical symptoms. There is no standard assessment of ED AI patients. The objective was to evaluate a novel standardized ED assessment of alcohol impairment, Hack's Impairment Index (HII score), in a busy urban ED. A retrospective chart review was performed for all AI patients seen in our busy urban ED over 24 months. Trained nurses evaluated AI patients with both "usual" and HII score every 2 hours. Patients were stratified by frequency of visits for AI during this time: high (≥ 6), medium (2-5), and low (1). Within each category, comparisons were made between HII scores, measured ethanol levels, and usual nursing assessment of AI. Changes in HII scores over time were also evaluated. A total of 8,074 visits from 3,219 unique patients were eligible for study, including 7,973 (98.7%) with ethanol levels, 5,061 (62.7%) with complete HII scores, and 3,646 (45.2%) with health care provider assessments. Correlations between HII scores and ethanol levels were poor (Pearson's R 2  = 0.09, 0.09, and 0.17 for high-, medium-, and low-frequency strata). HII scores were excellent at discriminating nursing assessment of AI, while ethanol levels were less effective. Omitting extrema, HII scores fell consistently an average 0.062 points per hour, throughout patients' visits. The HII score applied a quantitative, objective assessment of alcohol impairment. HII scores were superior to ethanol levels as an objective clinical measure of impairment. The HII declines in a reasonably predictable manner over time, with serial evaluations corresponding well with health care provider evaluations. © 2017 by the Society for Academic

  4. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2008-01-01

    This is the 34th revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13 538 journal titles, 2 106 regularly scanned journals and 613 key journals. It was last updated in February 2008. A journal - or periodical - is a continuing publication issued in a succession of discrete parts, usually bearing numbering and/or chronological designations and intended to be continued indefinitely. It is generally published within a defined, fixed interval between issues and normally appears more than once per year. It includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as the Annual Review of Nuclear Science are included, but series titles such as the McGraw-Hill Series in Nuclear Engineering are not. The purpose of this document is to provide descriptive cataloguers with standard elements to include in bibliographic level 'S' of the INIS record. These elements include field (tag) 229 (Full Journal Title), 320 (ISSN) and 321 (CODEN). The full journal title is mandatory, and either the ISSN or the CODEN must be included (both may appear). Instructions on how to use this and other elements of the INIS record format are found in INIS: Guide to Bibliographic Description (IAEA-INIS-1). In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: - In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. - In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. - In Part III, all journals that are regularly scanned by

  5. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2009-01-01

    This is the 35th revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13 750 journal titles, 1 965 regularly scanned journals and 593 key journals. It was last updated in March 2009. A journal - or periodical - is a continuing publication issued in a succession of discrete parts, usually bearing numbering and/or chronological designations and intended to be continued indefinitely. It is generally published within a defined, fixed interval between issues and normally appears more than once per year. It includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as the Annual Review of Nuclear Science are included, but series titles such as the McGraw-Hill Series in Nuclear Engineering are not. The purpose of this document is to provide descriptive cataloguers with standard elements to include in bibliographic level 'S' of the INIS record. These elements include field (tag) 229 (Full Journal Title), 320 (ISSN) and 321 (CODEN). The full journal title is mandatory, and either the ISSN or the CODEN must be included (both may appear). Instructions on how to use this and other elements of the INIS record format are found in INIS: Guide to Bibliographic Description (IAEA-INIS-1). In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: - In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. - In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. - In Part III, all journals that are regularly scanned by the

  6. INIS: Authority list for journal titles

    International Nuclear Information System (INIS)

    2007-01-01

    This is the 33rd revision of the INIS: Authority List for Journal Titles (IAEA-INIS-11). This list is published annually and includes the titles of all journals which have contained articles submitted to INIS at the time of publication. The current list contains 13 396 journal titles, 2 170 regularly scanned journals and 578 key journals. It was last updated in February 2007. A journal - or periodical - is a continuing publication issued in a succession of discrete parts, usually bearing numbering and/or chronological designations and intended to be continued indefinitely. It is generally published within a defined, fixed interval between issues and normally appears more than once per year. It includes a mixture of articles, letters, summaries, etc. Within this definition, annuals such as the Annual Review of Nuclear Science are included, but series titles such as the McGraw-Hill Series in Nuclear Engineering are not. The purpose of this document is to provide descriptive cataloguers with standard elements to include in bibliographic level 'S' of the INIS record. These elements include field (tag) 229 (Full Journal Title), 320 (ISSN) and 321 (CODEN). The full journal title is mandatory, and either the ISSN or the CODEN must be included (both may appear). Instructions on how to use this and other elements of the INIS record format are found in INIS: Guide to Bibliographic Description (IAEA-INIS-1). In order to help the user find titles easily, the list is arranged in six parts, followed by summary statistics: - In Part I, all key journals are grouped under the name of the country or international organization responsible for their input in INIS, then sorted alphabetically under their title. - In Part II, all key journals are sorted alphabetically under their title. The name of the country or international organization responsible for their input in INIS is entered in parentheses within the body of the entry. - In Part III, all journals that are regularly scanned by

  7. 7 CFR 1927.55 - Title clearance services.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS TITLE CLEARANCE AND LOAN CLOSING Real Estate Title Clearance and Loan Closing § 1927.55 Title clearance services. (a) Responsibilities of closing agents. Services to be provided to the agency and the borrower by a closing agent in connection with the transaction vary depending on whether a title insurance...

  8. Title of the paper goes here second line

    Indian Academy of Sciences (India)

    %%Please download if these packages are not included %%in your local TeX distribution %%txfonts,balance,textcase,float %% \\begin{document} %%paper title %%For line breaks, \\\\ can be used within title \\title{Title of the paper goes here\\\\ second line} %%author names are separated by comma (,) %%use \\and before ...

  9. Roadmap Through Title XX. Financing Services for Children Through Title XX and Other Programs: Manual 5.

    Science.gov (United States)

    Copeland, William C.; Iversen, Iver A.

    This manual, part of a Hecht Institute four-manual series entitled Financing Children's Services Through Title XX and Related Programs, teaches what Title XX regulations are, what they mean, and what actions and procedures are commanded by them. The first section covers the necessity of rule systems, the characteristics of a good rule system and…

  10. Title List of documents made publicly available

    International Nuclear Information System (INIS)

    1982-07-01

    The Title List of Documents Made Publicly Available is a monthly publication. It contains descriptions of the information received and generated by the US Nuclear Regulatory Commission (NRC). This information includes: (1) docketed material associated with civilian nuclear power plants and other uses of radioactive materials and (2) nondocketed material received and generated by NRC pertinent to its role as a regulatory agency. As used here, docketed does not refer to Court dockets; it refers to the system by which NRC maintains its regulatory records. This series of documents is indexed by a Personal Author Index, a Corporate Source Index, and a Report Number Index. The docketed information contained in the Title List includes the information formerly issued through the Department of Energy publication Power Reactor Docket Information, last published in January 1979. Microfiche of the docketed information listed in the Title List is available for sale on a subscription basis from the National Technical Information Service (NTIS)

  11. Title List of documents made publicly available

    International Nuclear Information System (INIS)

    1982-06-01

    The Title List of Documents Made Publicly Available is a monthly publication. It contains descriptions of the information received and generated by the US Nuclear Regulatory Commission (NRC). This information includes: (1) docketed material associated with civilian nuclear power plants and other uses of radioactive materials and (2) nondocketed material received and generated by NRC pertinent to its role as a regulatory agency. As used here, docketed does not refer to Court dockets; it refers to the system by which NRC maintains its regulatory records. This series of documents is indexed by a Personal Author Index, a Corporate Source Index, and a Report Number Index. The docketed information contained in the Title List includes the information formerly issued throught the Department of Energy publication Power Reactor Docket Information, last published in January 1979. Microfiche of the docketed information listed in the Title List is available for sale on a subscription basis from the National Technical Information Service (NTIS)

  12. Making and hacking

    NARCIS (Netherlands)

    Richterich, Annika; Wenz, Karin

    2017-01-01

    Digital Culture & Society is a refereed, international journal, fostering discussion about how digital technologies, platforms and applications reconfigure daily lives and practices. It offers a forum for inquiries into digital media theory, methodologies, and socio-technological developments. The

  13. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    Among the artists on the contemporary Danish scene of computer music and sound art the musician and composer Goodiepal (Gæoudjiparl van den Dobbelsteen or Parl Kristian Bjørn Vester) is by no comparison the most controversial and provocative. This statement is applicable whether we meet him as mu...

  14. Hacking the Matrix.

    Science.gov (United States)

    Czerwinski, Michael; Spence, Jason R

    2017-01-05

    Recently in Nature, Gjorevski et al. (2016) describe a fully defined synthetic hydrogel that mimics the extracellular matrix to support in vitro growth of intestinal stem cells and organoids. The hydrogel allows exquisite control over the chemical and physical in vitro niche and enables identification of regulatory properties of the matrix. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. P-hacking.

    Science.gov (United States)

    Raj, A Thirumal; Patil, Shankargouda; Sarode, Sachin; Sarode, Gargi

    2017-08-01

    Due to increasing rate of research articles getting published in recent times, medical science is evolving very fast. Open access policies of the journals make information easily available to the stakeholders for building future research proposal. Blindly having faith in whatever is published in the literature is detrimental for science; however, it is hard to find out the correctness of the data analysis.

  16. Provoking, disturbing, hacking

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh

    2013-01-01

    The article is a discussion of works by two Danish composers who both, with self-constructed instruments challenge computer music both as genre, the understanding and use of conventional technology and the relation to history. At first glance, the use of the homemade instruments appears as a comm...

  17. Hacking the hospital environment

    DEFF Research Database (Denmark)

    Boisen, Kirsten A; Boisen, Anne Bank; Thomsen, Stine Legarth

    2017-01-01

    BACKGROUND: There is a need for youth-friendly hospital environments as the ward environment may affect both patient satisfaction and health outcomes. OBJECTIVE: To involve young people in designing youth-friendly ward environment. METHODS: We arranged a design competition lasting 42 h (Hackathon...

  18. Who's Hacking Whom?

    DEFF Research Database (Denmark)

    Ridgway, Renée

    2017-01-01

    What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today.......What can you do with a Tor exploit? The article discusses an ethical dilemma for security researchers, a surreptitious game of federal investigators, and the state of online anonymity today....

  19. Smart Home Hacking

    OpenAIRE

    Kodra, Suela

    2016-01-01

    Smart Home is an intelligent home equipped with devices and communications systems that enables the residents to connect and control their home appliances and systems. This technology has changed the way a consumer interacts with his home, enabling more control and convenience. Another advantage of this technology is the positive impact it has on savings on energy and other resources. However, despite the consumer's excitement about smart home, security and privacy have shown to be the strong...

  20. #HackLibSchool

    Directory of Open Access Journals (Sweden)

    Micah Vandegrift

    2010-10-01

    Full Text Available In the Library with the Lead Pipe welcomes guest poster Micah Vandegrift. Micah is a graduate student in Library and Information Studies at Florida State University. He currently lives in Brooklyn, NY, and is interning at the Brooklyn Public Library. Micah’s education has focused on 20th century American culture, digital media and the humanities and [...

  1. Flow: Cut and Hack

    Directory of Open Access Journals (Sweden)

    Bárbara Sainza Fraga

    2016-11-01

    Full Text Available Time without sequence, vertiginous processing and acceleration of circulation are some of the features of the informationalist paradigm in the network system. The microelectronics and the genetic engineering are writing the code of our societies. The emergence of a synchronic bio-cultural dimension can make us think about organic and fluid forms of writing, molecular, forms of writing that replicate and propagate, parasitic, fertile... for what?

  2. Hacking y ciberdelito

    OpenAIRE

    Giménez Solano, Vicente Miguel

    2011-01-01

    Investigar el delito desde cualquier perspectiva es una tarea compleja; de eso no hay duda. Las dificultades que surgen al tratar de aplicar el método científico a la Delincuencia Transnacional y al Crimen Organizado en buena parte ya fueron establecidas en estudios anteriores, pero enfrentar este tipo de delincuencia a todo nivel es la tarea a la que se ve avocada le Ministerio Público por mandato constitucional y por disposición legal. Ahora bien el fenómeno descrito en los últimos tiemp...

  3. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  4. Better P-curves: Making P-curve analysis more robust to errors, fraud, and ambitious P-hacking, a Reply to Ulrich and Miller (2015).

    Science.gov (United States)

    Simonsohn, Uri; Simmons, Joseph P; Nelson, Leif D

    2015-12-01

    When studies examine true effects, they generate right-skewed p-curves, distributions of statistically significant results with more low (.01 s) than high (.04 s) p values. What else can cause a right-skewed p-curve? First, we consider the possibility that researchers report only the smallest significant p value (as conjectured by Ulrich & Miller, 2015), concluding that it is a very uncommon problem. We then consider more common problems, including (a) p-curvers selecting the wrong p values, (b) fake data, (c) honest errors, and (d) ambitiously p-hacked (beyond p < .05) results. We evaluate the impact of these common problems on the validity of p-curve analysis, and provide practical solutions that substantially increase its robustness. (c) 2015 APA, all rights reserved).

  5. Quarterly title list for the period ending September 1976

    International Nuclear Information System (INIS)

    1976-01-01

    The title list of the Max-Planck-Institut fuer Plasmaphysik and the Projektgruppe fuer Laserforschung of the MPG is concerned with the period from July until September 1976, and it contains: a) 12 titles and abstracts of laboratory reports, b) 37 titles of publications (30 abstracts), c) 20 titles of articles submitted for publication (16 abstracts), and d) 25 titles of lectures (12 abstracts). (GG) [de

  6. Energy Information Data Base: serial titles

    International Nuclear Information System (INIS)

    1980-06-01

    The Department of Energy Technical Information Center (TIC) is responsible for creating bibliographic data bases that are used in the announcement and retrieval of publications dealing with all phases of energy. The TIC interactive information processing system makes use of a number of computerized authorities so that consistency can be maintained and indexes can be produced. One such authority is the Energy Information Data Base: Serial Titles. This authority contains the full and abbreviated journal title, country of publication, CODEN, and certain codes. This revision replaces previous revisions of this document

  7. Title list of documents made publicly available

    International Nuclear Information System (INIS)

    1991-01-01

    The Title List of Documents Made Publicly Available is a monthly publication. It contains descriptions of the information received and generated by the US Nuclear Regulatory Commission (NRC). This information includes docketed material associated with civilian nuclear power plants and other uses of radioactive materials and nondocketed material received and generated by NRC pertinent to its role as a regulatory agency. This series of documents is indexed by a Personal Author Index, a Corporate Source Index, and a Report Number Index. The docketed information contained in the Title List includes the information formerly issued though the Department of Energy publication Power Reactor Docket Information, last published in January 1979

  8. Inadvertent P-hacking among trials and systematic reviews of the effect of progestogens in pregnancy? A systematic review and meta-analysis.

    Science.gov (United States)

    Prior, M; Hibberd, R; Asemota, N; Thornton, J G

    2017-06-01

    Progestogens have been evaluated in numerous trials and meta-analyses, many of which concluded they were effective. However, two large trials PROMISE and OPPTIMUM have recently concluded that progesterone was ineffective. This raises the possibility that earlier studies and reviews had been biased by either selective publication or selective choice of outcomes, so called "P-hacking". To compare the findings all progestogen trials and systematic reviews with those of trials with pre-registered primary outcomes which avoided selective outcome reporting. Search of PubMed, the Cochrane Library and trial registries. Registration PROSPERO CRD42016035303. Systematic reviews of randomised trials comparing progestogen with placebo in pregnancy and the individual trials included in those reviews. The subset of trials reporting a pre-registered primary outcome were compared with the totality of trials and reviews. For reviews all outcomes were included. For individual trials all outcomes reported in the systematic reviews were included. For the comparison group we recorded the registered primary outcome from trials that were either registered before they started, or registered during the recruitment phase and also double blind. Nineteen of twenty-nine meta-analyses concluded that progestogens were effective. Twenty-two trials reported their pre-registered primary outcomes. There was no effect of progesterone on primary registered dichotomous outcome RR 1.00 (95% CI 0.94-1.07). Only one of the 22 showed a nominally statistically significant benefit. When evaluated in registered double-blind trials with analysis restricted to predefined primary outcomes, progestational agents in pregnancy are ineffective. Progestogens to prevent pregnancy loss, an example of P-hacking. © 2017 Royal College of Obstetricians and Gynaecologists.

  9. 20 CFR 408.931 - How much will we withhold from your title II and title XVI benefits to recover a title VIII...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How much will we withhold from your title II... and Overpayments Adjustment of Title II Benefits § 408.931 How much will we withhold from your title...-due benefits. (b)(1) We will collect the overpayment from current monthly benefits due in a month...

  10. Factors Influencing Title VII Bilingual Program Institutionalization.

    Science.gov (United States)

    Lewis, Gerald R.; And Others

    1985-01-01

    This study of the primary restraining and driving forces that influence Title VII bilingual education programs found the external environment, the local community, to be the main factor influencing institutionalization and self-renewal. The internal environment--the local school, and the local school's organization or central office, school board,…

  11. What Difference Does a Title Make

    DEFF Research Database (Denmark)

    Balle, Søren Hattesen

    out by Gerard Genette, by naming and “designat[ing] it as precisely as possible and without too much risk of confusion” (Genette, 1997). In accordance with its title the poem thus represents the discourse of a newsreader neutrally reporting the events of war scenario. However, each section of the poem...

  12. 76 FR 60593 - Title VI; Proposed Circular

    Science.gov (United States)

    2011-09-29

    ..., several of them related to ambiguous language in the existing Circular. The proposed Circular reorganizes... regional entity, and inclusive of public and private entities. This term is used exclusively in Chapter IV... revisions to the Title VI Circular. The section that addresses the existing requirement for a Language...

  13. Browse Title Index - African Journals Online

    African Journals Online (AJOL)

    Items 801 - 850 of 1006 ... Issue, Title. Vol 59, No 4 (2017), Spatial patterns and determinants of fertility levels among women of childbearing age in Nigeria, Abstract PDF. Oluwayemisi O. Alaba, Olusanya E. Olubusoye, J.O. Olaomi. Vol 55, No 1 (2013), Spirit(ed) away: preventing foetal alcohol syndrome with motivational ...

  14. 36 CFR 254.15 - Title standards.

    Science.gov (United States)

    2010-07-01

    ...) Conveyances of lands from the United States are made by patent, quitclaim deed, or deed and without express or implied warranties, except as to hazardous substances pursuant to § 254.3 of this subpart. (c) Title... of the existing use(s) authorized under the terms of the grant, permit, easement, or lease. The non...

  15. Providing Transparency to the Title IX Process

    Science.gov (United States)

    Hartle, Terry

    2017-01-01

    When U.S. Secretary of Education Betsy DeVos announced Sept. 7, 2017, that her department would revisit how Title IX rules are enforced with respect to campus sexual assault, she said the first step would be a "transparent notice and comment process" to replace the 2011 "guidance" (and follow up 2014 guidance) that has been…

  16. Software Development Framework For Electronic Land Titles ...

    African Journals Online (AJOL)

    Record keeping is a fundamental activity of public administration. Land Titles management in Nigeria, by virtue of the Land use act 1990, is one of the functions of government. Most of the records hitherto used in managing the records of lands are documented on paper. We carried out an investigation into the suitability of ...

  17. Browse Title Index - African Journals Online

    African Journals Online (AJOL)

    Items 151 - 200 of 771 ... Issue, Title. Vol 33, No 4 (2013), Community-researcher liaisons: the Pathways to Resilience Project Advisory Panel, Abstract PDF. LC Theron. Vol 37, No 3 (2017), Comparing the achievement goal orientation of mathematics learners with and without attention-deficit hyperactivity disorder, Abstract ...

  18. 24 CFR 203.386 - Coverage of title evidence.

    Science.gov (United States)

    2010-04-01

    ... SINGLE FAMILY MORTGAGE INSURANCE Contract Rights and Obligations Property Title Transfers and Title... the public records, there are not, at such date, any outstanding prior liens, including any past-due...

  19. 14 CFR 1245.109 - Assignment of title to NASA.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Assignment of title to NASA. 1245.109... INTELLECTUAL PROPERTY RIGHTS Patent Waiver Regulations § 1245.109 Assignment of title to NASA. (a) The instrument of waiver set forth in § 1245.115(c) shall be voided by NASA with respect to the domestic title to...

  20. Title IX: With New Opportunities, Girls' Interest Rises

    Science.gov (United States)

    Toporek, Bryan

    2012-01-01

    On June 23, 1972, President Richard M. Nixon signed into law Title IX of the Education Amendments of 1972, which prohibits gender discrimination in any federally financed education program or activity. Title IX is far-reaching, but the law is most often associated with school and college athletics. Title IX allows schools to prove their athletic…

  1. Exploring New Directions: Title I in the Year 2000.

    Science.gov (United States)

    Puma, Michael J.; Drury, Darrel W.

    This report takes stock of the present Title I program, identifies the most promising approaches to educating the nation's disadvantaged children, and offers guidance to policymakers seeking to improve Title I's effectiveness. The report draws upon hundreds of studies, evaluations, and other documents, and details the evolution of the Title I…

  2. 40 CFR 300.220 - Related Title III issues.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Related Title III issues. 300.220 Section 300.220 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SUPERFUND, EMERGENCY... PLAN Planning and Preparedness § 300.220 Related Title III issues. Other related Title III requirements...

  3. Formulating the Right Title for a Research Article.

    Science.gov (United States)

    Bavdekar, Sandeep B

    2016-02-01

    Title is an important part of the article. It condenses article content in a few words and captures readers' attention. A good title for a research article is the one which, on its own, is able to introduce the research work to the fullest extent, but in a concise manner. Writing scientific titles that are informative and attractive is a challenging task. This communication describes the importance of titles and the methods of creating appropriate titles for research papers. © Journal of the Association of Physicians of India 2011.

  4. Title list of documents made publicly available

    International Nuclear Information System (INIS)

    1979-12-01

    This monthly publication contains descriptions of the information received and generated by the US Nuclear Regulatory Commission (NRC). This information includes docketed material associated with civilian nuclear power plants and other uses of radioactive materials, and nondocketed material received and generated by NRC pertinent to its role as a regulatory agency. This series of documents is indexed by a Personal Author Index, a Corporate Source Index, and a Report Number Index. The docketed information includes the inforation formerly issued through the Department of Energy's Technical Information Center under the title Power Reactor Docket Information (PRDI) and, in addition, information received or generated on other uses of radioactive materials

  5. Title list of documents made publicly available

    International Nuclear Information System (INIS)

    1994-06-01

    The Title List of Documents Made Publicly Available is a monthly publication. It contains descriptions of the information received and generated by the US Nuclear Regulatory Commission (NRC). This information includes (1) docketed material associated with civilian nuclear power plants and other uses of radioactive materials and (2) nondocketed material received and generated by NRC pertinent to its role as a regulatory agency. As used here, docketed does not refer to Court dockets; it refers to the system by which NRC maintains its regulatory records. This series of documents is indexed by a Personal Author Index, a Corporate Source Index, and a Report Number Index

  6. Title list of documents made publicly available

    International Nuclear Information System (INIS)

    1982-03-01

    The Title List of Documents Made Publicly Available is a monthly publication. It contains descriptions of the information received and generated by the US Nuclear Regulatory Commission (NRC). This information includes (1) docketed material associated with civilian nuclear power plants and other uses of radioactive materials and (2) nondocketed material received and generated by NRC pertinent to its role as a regulatory agency. As used here, docketed does not refer to Court dockets; it refers to the system by which NRC maintains its regulatory records. This series of documents is indexed by a Personal Author Index, a Corporate Source Index, and a Report Number Index

  7. Wisconsin Public Service, Weston Generating Station; Petition to Object to Issuance of Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database.

  8. Tennessee Valley Authority, Paradise Fossil Plant; Petition to Object to Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database.

  9. Tennessee Valley Authority, Paradise Fossil Plant; Order Responding Petition to Object to Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database.

  10. 20 CFR 416.573 - How much will we withhold from your title II and title VIII benefits to recover a title XVI...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How much will we withhold from your title II... Payment of Benefits, Overpayments, and Underpayments § 416.573 How much will we withhold from your title...-due benefits. (b)(1) We will collect the overpayment from current monthly benefits due in a month by...

  11. Title XX and CETA. A Coordination Guide for Title XX Administrators.

    Science.gov (United States)

    Urban Management Consultants of San Francisco, Inc., CA.

    Written for the social service (Title XX) administrator at the State or sub-State level, this guide is intended to serve four major purposes: (1) Provide selected insights into what the Comprehensive Employment and Training Act (CETA) is and how it works; (2) point out potential areas for coordination which, from study or field experience, hold…

  12. Citation Oil and Gas Corporation... Title V Applicability Determination

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  13. Transgenic Centipedegrass (Eremochloa ophiuroides [Munro] Hack. Overexpressing S-Adenosylmethionine Decarboxylase (SAMDC Gene for Improved Cold Tolerance Through Involvement of H2O2 and NO Signaling

    Directory of Open Access Journals (Sweden)

    Jianhao Luo

    2017-09-01

    Full Text Available Centipedegrass (Eremochloa ophiuroides [Munro] Hack. is an important warm-season turfgrass species. Transgenic centipedgrass plants overexpressing S-adenosylmethionine decarboxylase from bermudagrass (CdSAMDC1 that was induced in response to cold were generated in this study. Higher levels of CdSAMDC1 transcript and sperimidine (Spd and spermin (Spm concentrations and enhanced freezing and chilling tolerance were observed in transgenic plants as compared with the wild type (WT. Transgenic plants had higher levels of polyamine oxidase (PAO activity and H2O2 than WT, which were blocked by pretreatment with methylglyoxal bis (guanylhydrazone or MGBG, inhibitor of SAMDC, indicating that the increased PAO and H2O2 were a result of expression of CdSAMDC1. In addition, transgenic plants had higher levels of nitrate reductase (NR activity and nitric oxide (NO concentration. The increased NR activity were blocked by pretreatment with MGBG and ascorbic acid (AsA, scavenger of H2O2, while the increased NO level was blocked by MGBG, AsA, and inhibitors of NR, indicating that the enhanced NR-derived NO was dependent upon H2O2, as a result of expression CdSAMDC1. Elevated superoxide dismutase (SOD and catalase (CAT activities were observed in transgenic plants than in WT, which were blocked by pretreatment with MGBG, AsA, inhibitors of NR and scavenger of NO, indicating that the increased activities of SOD and CAT depends on expression of CdSAMDC1, H2O2, and NR-derived NO. Our results suggest that the elevated cold tolerance was associated with PAO catalyzed production of H2O2, which in turn led to NR-derived NO production and induced antioxidant enzyme activities in transgenic plants.

  14. Transgenic Centipedegrass (Eremochloa ophiuroides [Munro] Hack.) Overexpressing S-Adenosylmethionine Decarboxylase (SAMDC) Gene for Improved Cold Tolerance Through Involvement of H2O2 and NO Signaling.

    Science.gov (United States)

    Luo, Jianhao; Liu, Mingxi; Zhang, Chendong; Zhang, Peipei; Chen, Jingjing; Guo, Zhenfei; Lu, Shaoyun

    2017-01-01

    Centipedegrass ( Eremochloa ophiuroides [Munro] Hack.) is an important warm-season turfgrass species. Transgenic centipedgrass plants overexpressing S-adenosylmethionine decarboxylase from bermudagrass ( CdSAMDC1 ) that was induced in response to cold were generated in this study. Higher levels of CdSAMDC1 transcript and sperimidine (Spd) and spermin (Spm) concentrations and enhanced freezing and chilling tolerance were observed in transgenic plants as compared with the wild type (WT). Transgenic plants had higher levels of polyamine oxidase (PAO) activity and H 2 O 2 than WT, which were blocked by pretreatment with methylglyoxal bis (guanylhydrazone) or MGBG, inhibitor of SAMDC, indicating that the increased PAO and H 2 O 2 were a result of expression of CdSAMDC1 . In addition, transgenic plants had higher levels of nitrate reductase (NR) activity and nitric oxide (NO) concentration. The increased NR activity were blocked by pretreatment with MGBG and ascorbic acid (AsA), scavenger of H 2 O 2 , while the increased NO level was blocked by MGBG, AsA, and inhibitors of NR, indicating that the enhanced NR-derived NO was dependent upon H 2 O 2 , as a result of expression CdSAMDC1 . Elevated superoxide dismutase (SOD) and catalase (CAT) activities were observed in transgenic plants than in WT, which were blocked by pretreatment with MGBG, AsA, inhibitors of NR and scavenger of NO, indicating that the increased activities of SOD and CAT depends on expression of CdSAMDC1 , H 2 O 2 , and NR-derived NO. Our results suggest that the elevated cold tolerance was associated with PAO catalyzed production of H 2 O 2 , which in turn led to NR-derived NO production and induced antioxidant enzyme activities in transgenic plants.

  15. Regeneração de espécies arbóreas sob a influência de Merostachys multiramea Hack. (Poaceae em uma floresta subtropical Regeneration of tree species influenced by Merostachys multiramea Hack. (Poaceae in a subtropical forest

    Directory of Open Access Journals (Sweden)

    Suzana Cyrino dos Santos

    2012-03-01

    Full Text Available A ocorrência de bambúseas é comum em muitas fisionomias florestais, sendo que a elevada abundância destas espécies pode interagir com a regeneração de espécies arbóreas. Foi avaliada a regeneração de espécies arbóreas e de Merostachys multiramea Hack. em uma área de transição entre Floresta Ombrófila Mista e Floresta Estacional no Sul do Brasil e comparada a estrutura de regeneração da área entre dois e quatro anos após floração, frutificação e morte de M. multiramea. Foram alocadas 25 unidades amostrais de 100 m² dispostas de forma aleatória, onde foram amostrados todos os colmos vivos de M. multiramea e indivíduos regenerantes de espécies arbóreas > 30 cm de altura e com perímetro à altura do peito The occurrence of bamboo species is common in several forest physiognomies, and the high abundance of these species may affect the regeneration of other ones. We evaluated both tree species and Merostachys multiramea Hack. recruitment in a transition area between mixed Araucaria rain forest and seasonal semideciduous forests in southern Brazil. We compared the regeneration structure of the areas evaluated two and four years after flowering, fruiting and death of M. multiramea. We randomly distributed 25 100 m² sampling units, and surveyed all living culms of M. multiramea and tree saplings. We sampled 4,372 living bamboos and 2,918 tree saplings, belonging to 32 plant families and 75 species. Most species were classified as zoochorous and canopy light-demanding. On the other hand, plant abundance revealed a greater contribution of autochorous, understory and shade-tolerant trees. M. multiramea density was higher over the four years after the reproductive event (p<0.05, with taller culms (p<0.01, but with the same mean number of culms (p=0.46. A NPMANOVA revealed significant differences in composition and abundance between surveys, with higher similarity among samplings two years after the reproductive event of M

  16. The ties that bind: what's in a title?

    Science.gov (United States)

    Neuhaus, Susan J

    2018-03-01

    Many Australian and New Zealand surgeons use the title 'Mister' rather than 'Doctor', a practice dating back to traditions established over 600 years ago. The Royal Australasian College of Surgeons is currently undergoing a period of critical self-reflection, embodied by its 'Respect' campaign. Active measures to embrace diversity and encourage women into surgery are underway. This paper reviews the historical basis to the use of gendered titles and their current use amongst fellows. De-identified demographic data from the college register of active fellows was searched by self-identified title, country or state, and gender. Data were further reviewed by surgical sub-specialty and year of fellowship. The college dataset suggests that there is significant variance in the preference for gendered titles, determined predominantly by geography rather than specialty. The highest use of gendered titles (by male and female surgeons) was in Victoria/Tasmania (58% male, 22% female) and New Zealand (81% male, 17% female). By contrast, only 2% of female surgeons in other states elected a gendered title (Miss/Mrs/Ms). Surgery is the only profession that continues to use gendered titles. As the College of Surgeons moves towards greater equity and diversity, consideration should be given to phasing out the use of gendered titles, which serve to divide rather than unite our profession. © 2017 Royal Australasian College of Surgeons.

  17. 24 CFR 232.595 - Eligibility of title.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Title § 232.595 Eligibility of title. In order for the property which is to be...

  18. Title IX--Beyond Compliance to Personal Commitment and Leadership

    Science.gov (United States)

    Peterson, Barbara

    1976-01-01

    In order to move beyond legal compliance to real equality of opportunity, every educational leader must develop some systematic means of extending his or her personal knowledge and skills with respect to Title IX. Provides a check list for self evaluation of educational leaders and a guide for developing an implementation plan for Title IX.…

  19. Comprehensive Social Service Programs for Handicapped Citizens through Title XX.

    Science.gov (United States)

    Roten, Shelby Jean

    Reviewed are present and potential services and social programs for handicapped children in Mississippi through purchase of service contracts under Title XX of the Social Security Act. Sections cover the following topics: background and purpose of Title XX which gives states greater control over social service programs, planning state supported…

  20. Pocketguide to Title XX: Social Services to Children & Youth.

    Science.gov (United States)

    Mueller, Candace

    This brief guide to Title XX contains the following chapter headings: (1) Historical Overview of the Social Services Program, (2) The Provisions of Title XX at a Glance, (3) Implications for Services to Children and Youth, (4) The Planning Process, (5) Publication of the Proposed Plan and the Public Comment Period, (6) After the Final Plan is…

  1. A License for Bias: Sex Discrimination, Schools, and Title IX.

    Science.gov (United States)

    Morse, Susan Ed.

    This report discusses non-sports-related Title IX complaints filed with the Department of Education's Office for Civil Rights (OCR) from 1993-1997. Its purpose is to dispel the popular belief that Title IX is a sports-equity law and to determine the effectiveness of the legislation. The document examines the kinds of complaints filed, the status…

  2. 8 ỌZỌ TITLE: THE IGBOMAN'S ARISTOCRATIC INSTITUTION ...

    African Journals Online (AJOL)

    But money may not be the problem of all the people who are yet to take titles. Some may not like ... Stage One: Payment - In this, the intending ọzọ title holder pays a little sum of money to the alliance group in ..... Orji, M. O. (1999). The History ...

  3. Alternative Teacher Preparation Programs. Title II News You Can Use

    Science.gov (United States)

    Office of Postsecondary Education, US Department of Education, 2015

    2015-01-01

    Title II of the "Higher Education Act of 1965" ("HEA"), as amended in 2008 by the "Higher Education Opportunity Act," requires states to report annually on key elements of their teacher preparation programs and requirements for initial teacher credentialing, kindergarten through 12th grade. "Title II News You Can…

  4. 24 CFR 234.65 - Nature of title.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Nature of title. 234.65 Section 234.65 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... OWNERSHIP MORTGAGE INSURANCE Eligibility Requirements-Individually Owned Units § 234.65 Nature of title. A...

  5. 24 CFR 1710.209 - Title and land use.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Title and land use. 1710.209... § 1710.209 Title and land use. (a) General information. (1) State whether the developer has reserved the... recording, submit a map which has been prepared to scale and which shows the proposed division of the land...

  6. The History, Uses, and Abuses of Title IX. 2016 Bulletin

    Science.gov (United States)

    American Association of University Professors, 2016

    2016-01-01

    This report, an evaluation of the history and current uses of Title IX, is the result of a joint effort by a subcommittee that included members of the AAUP's Committee A on Academic Freedom and Tenure and the Committee on Women in the Academic Profession. The report identifies tensions between current interpretations of Title IX and the academic…

  7. The Translation of Films: Sub-Titling versus Dubbing

    Science.gov (United States)

    Voge, Hans

    1977-01-01

    A study of film translation. Well-documented opinions are given on the advantages and disadvantages of both dubbing and sub-titling. One of the tentative conclusions is that sub-titling is to be preferred because it preserves the original dialogue and allows the audience verying degrees of comprehension. A bibliography is provided. (AMH)

  8. Delay and probability discounting among payday and title loan recipients.

    Science.gov (United States)

    Mahoney, Colin T; Lawyer, Steven R

    2016-04-01

    Payday and title loans are short-term loans associated with significant economic impact. Behavioral theories of impulsive choice may provide insight into behavioral processes that underlie the propensity to take out payday and title loans. Adults between the ages of 18 and 30 recruited from the community completed delay and probability discounting tasks for hypothetical money as well as measures of substance use. Patterns of discounting were characterized using a hyperbolic decay model and area under the curve. Participants who took out a payday and/or title loan in the past (n=41) exhibited more impulsive choice patterns on the delay discounting task than did those who did not (n=255). Substance use mediated this relationship between payday and title loan retention and delay discounting. These findings suggest potentially important relationships between payday/title loan borrowing, substance use, and delay discounting. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Registry of Mineral and Petroleum Titles

    Energy Technology Data Exchange (ETDEWEB)

    Maclellan, I. M.; Kaizer, J. L.; McCulloch, P. D.; Ratcliffe, R.; Wenning, A. S. [Nova Scotia Dept. of Natural Resources, Halifax, NS (Canada)

    2000-07-01

    Activities of the Nova Scotia Registry of Mineral and Petroleum Titles are described, including statistical information about staking and mining activity in the province during 1999. In terms of activities, the Registry receives applications and issues licenses and leases for mineral and petroleum rights, receives statements of exploration expenditures and assessment reports that pertain to renewal of licenses and leases, maintains maps showing the disposition of lands under license or lease, and maintains a system of prospector registration. In addition, the Registry processes applications for underground gas storage rights and treasure trove rights and maintains a database of information concerning production and employment in Nova Scotia mines and quarries. At the end 1999 there were 230,660 hectares under exploration licence. Exploration expenditures, including engineering, economic and feasibility studies during 1999 totalled $4.2 million, mostly by junior mining companies searching for industrial mineral commodities. Mining activity during 1999 generated revenues of $340 million. Coal production dropped by 25 per cent, due mainly to the closure of the Phalen Mine. Gypsum production was up to 7.9 million tonnes; shipments of cement, barite and clay products also increased during 1999; salt production remained unchanged from 1998 with 842,000 tonnes. Production of construction aggregates totalled 10.6 million tonnes, down slightly from the year before. Mineral industry employment was roughly 2,500 persons, down by 24 per cent from 1998 levels, due primarily to the closure of the Phalen Mine.

  10. Inscribing Authority: Female Title Bearers in Jewish Inscriptions

    Directory of Open Access Journals (Sweden)

    Carrie Duncan

    2012-02-01

    Full Text Available This paper investigates representations of gender in the material culture of the ancient synagogue. The pertinent data are numerous dedicatory and funerary inscriptions linking individual Jews, men and women, with titles seemingly associated with leadership in Late Antique synagogues (ca. 200–600 CE. Bernadette Brooten’s influential 1982 monograph argued against the prevailing tendency to characterize these titles as indications of power, authority, and responsibility when associated with men but as meaningless flattery when applied to women. She suggests that synagogue titles denote power, authority and responsibility on all title bearers equally, both men and women. I question the continued utility of proffering female title-holders as enumerable examples of powerful women rescued from their forgotten place in history. Using theoretical insights developed by historians Elizabeth Clark and Gabrielle Spiegel, this paper will engage a comparative analysis with the work of Riet van Bremen and Saba Mahmood to develop new methods of conceptualizing women’s authority in early Jewish communities. I propose that viewing women’s synagogue titles as culturally constructed representations allows for a fruitful inquiry into how women’s titles were used by male-dominated synagogue communities in their self-articulation and public presentation of Judaism.

  11. Hacking the thylakoid proton motive force for improved photosynthesis: modulating ion flux rates that control proton motive force partitioning into Δψ and ΔpH.

    Science.gov (United States)

    Davis, Geoffry A; Rutherford, A William; Kramer, David M

    2017-09-26

    There is considerable interest in improving plant productivity by altering the dynamic responses of photosynthesis in tune with natural conditions. This is exemplified by the 'energy-dependent' form of non-photochemical quenching ( q E ), the formation and decay of which can be considerably slower than natural light fluctuations, limiting photochemical yield. In addition, we recently reported that rapidly fluctuating light can produce field recombination-induced photodamage (FRIP), where large spikes in electric field across the thylakoid membrane (Δ ψ ) induce photosystem II recombination reactions that produce damaging singlet oxygen ( 1 O 2 ). Both q E and FRIP are directly linked to the thylakoid proton motive force ( pmf ), and in particular, the slow kinetics of partitioning pmf into its ΔpH and Δ ψ components. Using a series of computational simulations, we explored the possibility of 'hacking' pmf partitioning as a target for improving photosynthesis. Under a range of illumination conditions, increasing the rate of counter-ion fluxes across the thylakoid membrane should lead to more rapid dissipation of Δ ψ and formation of ΔpH. This would result in increased rates for the formation and decay of q E while resulting in a more rapid decline in the amplitudes of Δ ψ -spikes and decreasing 1 O 2 production. These results suggest that ion fluxes may be a viable target for plant breeding or engineering. However, these changes also induce transient, but substantial mismatches in the ATP : NADPH output ratio as well as in the osmotic balance between the lumen and stroma, either of which may explain why evolution has not already accelerated thylakoid ion fluxes. Overall, though the model is simplified, it recapitulates many of the responses seen in vivo , while spotlighting critical aspects of the complex interactions between pmf components and photosynthetic processes. By making the programme available, we hope to enable the community of photosynthesis

  12. Statistics On Title II Direct Payments To Claimant Representatives

    Data.gov (United States)

    Social Security Administration — Every person has the right to be represented by an attorney or other representative while pursuing a claim or other rights. This dataset contains data around Title...

  13. 32 CFR 644.63 - Contracting for title evidence.

    Science.gov (United States)

    2010-07-01

    ... law and the State canons of legal ethics prohibit attorneys from engaging in competitive bidding for..., with the concurrence of the Chief Counsel or his designee. (c) Forms to be used. When purchasing title...

  14. Constructing a unitary title regime for the European Patent System

    NARCIS (Netherlands)

    Rodriguez, V.F.

    2011-01-01

    The European Patent System without any unitary title allows Member States to retain institutional arrangements within their borders and to prevent any moves to delegate responsibility outside the national sphere. This intergovernmental patent regime suffers from fragmentation due to national

  15. WORLD TITLE BOXING: FROM EARLY BEGINNINGS TO THE FIRST BELL

    Directory of Open Access Journals (Sweden)

    Marc Ramsay

    2009-11-01

    Full Text Available There is scant literature where applied sport scientists have considered first hand experiences preparing professional boxers for world title bouts. The present submission reflects more than 10 years of applied experience working with professional boxers, residing in Canada. What follows is a composite of sequential steps that ownership and coaching staff of one Canadian management group have tried leading up to more than 20 world title bout experiences. The strategies proposed have been built progressively over time, and what follows is a general overview of a more detailed pre-bout structure from shortly in advance of a world title bout offer to the moment when the athlete enters the ring to perform. We propose that an effective structure is founded upon detailed a priori preparation, tactical decisions throughout bout preparation, and a thorough understanding by the athlete of what he will encounter during the title bout

  16. Legal Forum: Title IX: Does It Apply to Employees?

    Science.gov (United States)

    McCarthy, Martha

    1981-01-01

    Briefly reviews a number of Federal court cases that have dealt with Title IX, considering the issue of whether the 1974 regulations prohibiting sex discrimination in employment practices accurately reflect the intent of the 1972 law. (GC)

  17. Energy information data base. Serial titles, February 1978--June 1979

    International Nuclear Information System (INIS)

    1979-06-01

    This supplement contains changes and additions to TID-4579-R10 (the authority list for serial titles used by TIC), and is intended to be used with that publication. Supplements are cumulative until another revision is issued

  18. What is the title of a Web page? A study of Webography practice

    Directory of Open Access Journals (Sweden)

    Timothy C. Craven

    2002-01-01

    Full Text Available Few style guides recommend a specific source for citing the title of a Web page that is not a duplicate of a printed format. Sixteen Web bibliographies were analyzed for uses of two different recommended sources: (1 the tagged title; (2 the title as it would appear to be from viewing the beginning of the page in the browser (apparent title. In all sixteen, the proportion of tagged titles was much less than that of apparent titles, and only rarely did the bibliography title match the tagged title and not the apparent title. Convenience of copying may partly explain the preference for the apparent title. Contrary to expectation, correlation between proportion of valid links in a bibliography and proportion of accurately reproduced apparent titles was slightly negative.

  19. Bluetooth Hacking: A Case Study

    Directory of Open Access Journals (Sweden)

    Dennis Browning

    2009-06-01

    Full Text Available This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.

  20. Hacking Our Brains for Learning

    Directory of Open Access Journals (Sweden)

    Alex Tillas

    2018-05-01

    Full Text Available Observational learning is ubiquitous. We very often observe and pick up information about how others behave and subsequently replicate similar behaviours in one way or another. Focusing on observational learning, I investigate human imitation, the mechanisms that underpin it as well as the processes that complement it, in order to assess its contribution to learning and education. Furthermore, I construe emotion as a scaffold for observational learning and bring together evidence about its influence on selective attention. Finally, I flesh out possible ways in which the insights about the role of imitation in learning could help design a more effective and equally rewarding learning environment. Specifically, I suggest that perhaps the simplest and most effective way to foster learning via promoting imitation is through letting learners of various ages co-exist. The benefits of learning in a mixed-age group are assessed.

  1. Growth Hacking, Dünyayı İşgal Eden Büyüklere Karşı Bir Kurtuluş Savaşı Olabilir mi?

    OpenAIRE

    FETTAHLIOĞLU, H. Seçil; AKDEMİR, Mehmet Alper

    2016-01-01

    Bilgi ekonomisinin etkisinin hissedildiği günümüz ortamında, internetin pazarlama üzerindeki rolü hızla artmaktadır. Dijital pazarlama, içerik pazarlaması, online pazarlama gibi bir çok başlık altında toplanabilecek olan; bilgi teknolojileri vasıtasıyla pazarlama faaliyetlerini ifade eden kavramlar “Growth Hacking (Büyüme Korsanlığı)” ile birlikte anılmaktadır. Büyüme korsanlığı, genellikle online girişimlerin, hızlı bir şekilde dijital pazarlama ve yazılım araçları vasıtasıyla büyütülmesi iç...

  2. Aboriginal Determination: Native Title Claims and Barriers to Recognition

    Directory of Open Access Journals (Sweden)

    Zia Akhtar

    2011-09-01

    Full Text Available The Australian government has proposed a referendum in 2012 to decide the constitutional status of its indigenous people. There is at present no mechanism to define the indigenous people as a domestic or foreign entity of the Commonwealth. This is an important issue because other settler governments have developed a framework to implement their relationship with the native people. As a result, it is difficult prove title to land that has been abrogated by the deeds of the settlers. In Mabo v Queensland (2,the Commonwealth government was found to have breached its fiduciary duty to the Aboriginal peoples. The judgment led to the Native Title Act 1993 that established the process of asserting native rights that were held to coexist with pastoral ownership. The promulgation of the Native Title Amendment Act 1998 reversed this process and augmented the powers of non-native landlords by providing the device to extinguish native rights. In Western Australia v Ward, a mining lease was held to have precedence over native title that was adjudged to be part of a bundle of rights. In implementing the Native Title Act the issue turns on the determination of the ties to land/ sea that the government allows to the Aboriginal peoples. The judgment in Harrington-Smith on behalf of the Wongatha People v Western Australia indicates that title can be excluded on procedural grounds and that there was an incompatibility between the claims of the Aboriginal peoples and the settlers’ claims. The road map towards a more effective regime of proving title can be achieved if the Aboriginal peoples are granted recognition as a nation in the Constitution and a treaty is signed with them.

  3. 27 CFR 46.205 - Guidelines to determine title to articles in transit.

    Science.gov (United States)

    2010-04-01

    ... title to articles in transit. 46.205 Section 46.205 Alcohol, Tobacco Products and Firearms ALCOHOL AND... determine title to articles in transit. The dealer may use the following guidelines to establish who holds title to articles in transit. (a) If State law mandates the change in title, then no agreement or...

  4. 76 FR 79065 - Recordkeeping and Reporting Requirements Under Title VII, the ADA and GINA

    Science.gov (United States)

    2011-12-21

    ... Reporting Requirements Under Title VII, the ADA and GINA CFR Correction In Title 29 of the Code of Federal... title VII or section 107 of the ADA'' and add in their place the words ``section 709(c) of title VII, section 107 of the ADA, or section 207(a) of GINA'' wherever they appear in the following sections...

  5. Native title contestation in Western Australia's Pilbara region

    Directory of Open Access Journals (Sweden)

    Paul Cleary

    2014-12-01

    Full Text Available The rights afforded to Indigenous Australians under the Native Title Act 1993 (NTA are very limited and allow for undue coercion by corporate interests, contrary to the claims of many prominent authors in this field. Unlike the Commonwealth’s first land rights law, Aboriginal Lands Rights (Northern Territory Act 1976 (ALRA , the NTA does not offer a right of veto to Aboriginal parties; instead, they have a right to negotiate with developers, which has in practice meant very little leverage in negotiations for native title parties. And unlike ALRA, developers can deal with any Indigenous corporation, rather than land councils. These two factors have encouraged opportunistic conduct by some developers and led to vexatious litigation designed to break the resistance of native title parties, as demonstrated by the experience of Aboriginal corporations in the iron ore-rich Pilbara region of Western Australia.

  6. Variation in job titles within the nursing workforce.

    Science.gov (United States)

    Leary, Alison; Maclaine, Katrina; Trevatt, Paul; Radford, Mark; Punshon, Geoffrey

    2017-12-01

    The work of specialist nursing has been under scrutiny for many years in the UK due to a perception that it is not cost-effective. A common issue is the lack of consistency of job titles, which causes confusion to the public, employing organisations, colleagues and commissioners of services. Lack of consistency has implications for the wider perception of advanced specialist practice in the worldwide community and the workforce more generally. This study aims to understand the variation in job titles in the UK population. A pre-existing data set of accrued studies into the work of nurses working in specialisms was mined for insight (N = 17,960). This study used knowledge discovery through data and descriptive statistics to perform secondary analysis. Mining these data revealed 595 job titles in use in 17,960 specialist posts once the specialism had been removed. The most commonly used titles were Clinical Nurse Specialist, Nurse Specialist/Specialist Nurse, Advanced Nurse Practitioner and Nurse Practitioner. There were three other primary groupings. These were variants with a specialist or technical prefix of suffix, for example Nurse Endoscopist, variants of seniority such as trainee, senior nurse for [specialism] or variants of function such as Nurse Prescriber. The clustering was driven primarily by pay band. A total of 323 posts were recorded as holding titles such as Advanced Nurse Practitioner or Specialist Nurse who were not registered with the Nursing & Midwifery Council. In this data set, there is a large array of titles, which appear to have little relationship with other factors like education. This is confusing to the public, employers and those commissioning services. It also demonstrates that the previous assumptions by Council for Healthcare Regulatory Excellence that advanced practice labels are associated with career progression are unsound and should be addressed by the regulator. © 2017 John Wiley & Sons Ltd.

  7. The Contrastive analysis of the translation of English film titles into Lithuanian and Russian

    OpenAIRE

    Šidiškytė, Daiva; Tamulaitienė, Daiva

    2013-01-01

    Titles are most important in terms of information they carry about the text, the film, radio programme, etc. Translation of titles is a challenging task that is fulfilled by employing specific translation methods. The aim of the theoretical part of this article is to present the problem of title translation into the target language, to give an overview of major translation theories and methods used in the translation of film titles and titles in general. The practical analysis in the article ...

  8. When astrophysics meets lay and specialized audiences: titles in popular and scientific papers

    OpenAIRE

    Alcaraz Ariza, María Ángeles; Méndez Alcaraz, David Israel

    2016-01-01

    In this study we carry out a comparative analysis between titles of research papers published in the most authoritative specialized European and US-based astrophysics journals written in English and titles of articles on astrophysics published in Scientific American Magazine, the most prestigious English-written journal in the divulgation of science. We specifically address issues related to three linguistic variables: title length, title lexical density and title type. Our main results show ...

  9. Leadership Styles of Principals in Successful Title I Elementary Schools

    Science.gov (United States)

    Gonzales, Cameron

    2016-01-01

    The problem addressed in the dissertation is the relationship between high poverty and low academic achievement that persists in spite of efforts to change it. In one Western state, a small proportion of the schools that are eligible for Title I funds, a measure of poverty, have achieved recognition for high student achievement. The recognition,…

  10. Modernizing insecurity: the land titling project in Honduras.

    NARCIS (Netherlands)

    Jansen, K.; Roquas, E.

    1998-01-01

    The Honduran land titling project (the Proyecto de Titulación de Tierra para los Pequeños Productores), initiated in 1982, was intended to enhance security in land rights, to facilitate credit and to improve agricultural productivity. This study explores how the project has operated in one village,

  11. Title of the paper goes here second line

    Indian Academy of Sciences (India)

    Title of the paper goes here second line. AUTHOR11, AUTHOR21 and AUTHOR32,*. 1 Department of P, University X. 2 Department of Q, University Z. Abstract. Abstract text goes here. Abstract text goes here. Abstract text goes here. Abstract text goes here. Abstract text goes here. Abstract text goes here. Abstract text goes ...

  12. Text Analysis of Chemistry Thesis and Dissertation Titles

    Science.gov (United States)

    Scalfani, Vincent F.

    2017-01-01

    Programmatic text analysis can be used to understand patterns and reveal trends in data that would otherwise be difficult or impossible to uncover with manual coding methods. This work uses programmatic text analysis, specifically term frequency counts, to study nearly 10,000 chemistry thesis and dissertation titles from 1911-2015. The thesis and…

  13. 29 CFR 541.2 - Job titles insufficient.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Job titles insufficient. 541.2 Section 541.2 Labor Regulations Relating to Labor (Continued) WAGE AND HOUR DIVISION, DEPARTMENT OF LABOR REGULATIONS DEFINING AND DELIMITING THE EXEMPTIONS FOR EXECUTIVE, ADMINISTRATIVE, PROFESSIONAL, COMPUTER AND OUTSIDE SALES EMPLOYEES...

  14. Using Title XX to Serve Children and Youth.

    Science.gov (United States)

    Twiname, John D.; And Others

    With the passage in early 1975 of the social service amendments to the Social Security Act, referred to as Title XX, a major new opportunity to serve children and youth has emerged. Seizing the opportunity will be largely dependent on the well-prepared presentation of a case for the needs of young people by dedicated advocates in every state.…

  15. A Comprehensive Child Development Program; Title XX, Final Report.

    Science.gov (United States)

    Whatley, Juanita T.

    This booklet describes the Comprehensive Child Day Care Program for the Atlanta Public School System, a Title XX Program. This program provided day care services for children of clients in various categories. The program goals for 1975-76 were geared toward providing comprehensive day care to encompass social services to the family and…

  16. Statistics and Title VII Proof: Prima Facie Case and Rebuttal.

    Science.gov (United States)

    Whitten, David

    1978-01-01

    The method and means by which statistics can raise a prima facie case of Title VII violation are analyzed. A standard is identified that can be applied to determine whether a statistical disparity is sufficient to shift the burden to the employer to rebut a prima facie case of discrimination. (LBH)

  17. LJ Best of 2009 Business Books: 32 Titles

    Science.gov (United States)

    Cords, Sarah Statz

    2010-01-01

    It should come as no surprise that a large share of this year's business books focus squarely on the 2008-09 financial crisis and security-backed mortgage implosion. Investing books followed the trend as either alarmist titles advocating selling stocks, or books urging readers to take advantage of this time to buy undervalued investments. An…

  18. Title IX and Sexual Harassment of Student Athletes.

    Science.gov (United States)

    Wolohan, John T.

    1995-01-01

    This article reviews what constitutes sexual harassment in sports by examining Title IX of the Education Amendments of 1972 and the effect it has had on charges of sexual harrassment in educational institutions. Athletic administrators are provided with strategies and recommendations to help schools and athletic departments develop sexual…

  19. Native title claim puts Roxby in fluid situation

    International Nuclear Information System (INIS)

    Hine, M.

    1993-01-01

    Aboriginal land rights and water supply have long been issues raised in relation to the Olympic Dam Mine at Roxby Downs. Now a native title claim has revealed the vulnerability of the water supply. The author reports that the mine's owner, Western Mining Corporation, has to confront issues it has inflamed by favouring one interest group claiming to represent Aboriginal interests 8 refs

  20. Title IV Indian Education Program Evaluation, 1985-86.

    Science.gov (United States)

    Albuquerque Public Schools, NM. Planning, Research and Accountability.

    Public schools in Albuquerque, New Mexico, used a Title IV Part A grant to assist American Indian elementary and secondary school students in receiving passing grades and improving school-related behaviors. Canoncito Navajo Reservation, the Isleta Pueblo, and urban Indian students in Albuquerque participated in the program. Personnel consisted of…

  1. Quarterly title list for the period ending June 1975

    International Nuclear Information System (INIS)

    1975-01-01

    A list of the laboratory reports issued the publications made, the articles submitted for publication as well as the lectures held are dealt with. Abstracts of the works are to a large extent included with the titles. (GG/LH) [de

  2. 29 CFR 452.7 - Bill of Rights, title I.

    Science.gov (United States)

    2010-07-01

    ... STANDARDS GENERAL STATEMENT CONCERNING THE ELECTION PROVISIONS OF THE LABOR-MANAGEMENT REPORTING AND... against Improper Disciplinary Action”) are related to the rights pertaining to elections. Direct enforcement of title I rights, as such, is limited to civil suit in a district court of the United States by...

  3. Lire des titres (Deuxieme partie) (Reading Titles [Part Two]).

    Science.gov (United States)

    Goldenstein, Jean-Pierre

    1985-01-01

    Classroom activities involving the semantics of novels' titles can also be used for studying historical or cultural information, playing word games, or learning more about the authors. Older or contemporary works can be used, and several print sources are available for ideas and relevant facts. (MSE)

  4. Counselor Education and Title IX: Current Perceptions and Questions

    Science.gov (United States)

    Welfare, Laura E.; Wagstaff, Jennifer; Haynes, Jenna R.

    2017-01-01

    This national survey of counselor educator perceptions of the Title IX requirement to report student disclosures of gender-based discrimination revealed the need for greater clarity about faculty strategies for serving counseling program students while upholding the federal law. The authors describe the recent expansion of the requirements and…

  5. Adjusted Poverty Measures and the Distribution of Title I Aid: Does Title I Really Make the Rich States Richer?

    Science.gov (United States)

    Baker, Bruce D.; Taylor, Lori; Levin, Jesse; Chambers, Jay; Blankenship, Charles

    2013-01-01

    Federal and state governments in the United States make extensive use of student poverty rates in compensatory aid programs like Title I. Unfortunately, the measures of student poverty that drive funding allocations under such programs are biased because they fail to reflect geographic differences in the cost of living. In this study, we construct…

  6. Evaluation Report, District 24, Queens. Title I District Umbrella and Title I Open Enrollment Educational Services for Disadvantaged Pupils.

    Science.gov (United States)

    New York Univ., NY. Center for Field Research and School Services.

    During the 1971-1972 school year, the regular educational programs in District 24 were supplemented with special educational services funded under Title I of the 1965 Elementary and Secondary Education Act. This evaluation report treats the several programs funded under the following headings: Pre-Kindergarten Program, Strengthened Early Childhood…

  7. 77 FR 30173 - Amendment of Americans With Disabilities Act Title II and Title III Regulations To Extend...

    Science.gov (United States)

    2012-05-21

    ... accommodations, there were some comments from title II entities. Organizations representing the hotel industry and individual owners and operators of hotels and campgrounds provided the largest number of comments..., provides state and local governments with flexibility to use other means such as acquisition or redesign of...

  8. 76 FR 38209 - Meeting of the Department of Justice's (DOJ's) National Motor Vehicle Title Information System...

    Science.gov (United States)

    2011-06-29

    ... Department of Justice's (DOJ's) National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... announcement of a meeting of DOJ's National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... FURTHER INFORMATION CONTACT: Alissa Huntoon, Designated Federal Employee (DFE), Bureau of Justice...

  9. 77 FR 44673 - Meeting of the Department of Justice National Motor Vehicle Title Information System Federal...

    Science.gov (United States)

    2012-07-30

    ... Department of Justice National Motor Vehicle Title Information System Federal Advisory Committee AGENCY... a meeting of Department of Justice's (DOJ's) National Motor Vehicle Title Information System (NMVTIS...., Washington, DC 20531. FOR FURTHER INFORMATION CONTACT: Todd Brighton, Designated Federal Employee (DFE...

  10. Leading the Proverbial Thirsty Horse to Water: ESL Learners’ Experience with Language Learning Contracts

    Directory of Open Access Journals (Sweden)

    Normah Ismail

    2012-12-01

    Full Text Available There is agreement among language educators that the process of language teaching and learning should aim to develop autonomous language learners. While the advantages of autonomy seem to be quite obvious, fostering autonomy in practice can prove to be difficult for some language learners. This paper describes the use of learning contracts as a strategy for enhancing learner autonomy among a group of ESL learners in a Malaysian university. Through learners’ account of their experiences with the contracts, the study concludes that the learning contract has potential use for language learning and that learners’ positive learning experience remains the key to the success of any endeavour seeking to promote learner autonomy. The paper ends with some implications for teachers and learners who wish to use the contracts as a strategy for language teaching and learning.

  11. Structured feedback on students' concept maps: the proverbial path to learning?

    Science.gov (United States)

    Joseph, Conran; Conradsson, David; Nilsson Wikmar, Lena; Rowe, Michael

    2017-05-25

    Good conceptual knowledge is an essential requirement for health professions students, in that they are required to apply concepts learned in the classroom to a variety of different contexts. However, the use of traditional methods of assessment limits the educator's ability to correct students' conceptual knowledge prior to altering the educational context. Concept mapping (CM) is an educational tool for evaluating conceptual knowledge, but little is known about its use in facilitating the development of richer knowledge frameworks. In addition, structured feedback has the potential to develop good conceptual knowledge. The purpose of this study was to use Kinchin's criteria to assess the impact of structured feedback on the graphical complexity of CM's by observing the development of richer knowledge frameworks. Fifty-eight physiotherapy students created CM's targeting the integration of two knowledge domains within a case-based teaching paradigm. Each student received one round of structured feedback that addressed correction, reinforcement, forensic diagnosis, benchmarking, and longitudinal development on their CM's prior to the final submission. The concept maps were categorized according to Kinchin's criteria as either Spoke, Chain or Net representations, and then evaluated against defined traits of meaningful learning. The inter-rater reliability of categorizing CM's was good. Pre-feedback CM's were predominantly Chain structures (57%), with Net structures appearing least often. There was a significant reduction of the basic Spoke- structured CMs (P = 0.002) and a significant increase of Net-structured maps (P student development.

  12. Rama in the royal title of the Hungarian kings

    Directory of Open Access Journals (Sweden)

    Živković Tibor D.

    2004-01-01

    Full Text Available The region (župa of Rama was enlisted in the official title of the Hungarian kings around 1138, as it is known from an official document. The exact answer to the question under which circumstances it happened has never been reached. It is most probable that Rama was not just other name for Bosnia as it was proposed in historiography, neither was a part of Bosnia conquered by military action of the Hungarian king around 1135. Having in mind that Rama was a part of the principality of Raška during the Early Middle Ages, it is quite possible that Rama became part of the official title of the Hungarian kings through some direct connections between ruling families of Hungary and Raška. The most probable answer could be reached through the examination of these relations. Namely, a daughter of Raška's župan, Uroš I, Helena, was married to the Hungarian crown prince Bela in 1129, when Rama was, most probably, part of Helena's dowry. When the crown prince became king of Hungary in 1131, Rama was included in his royal title. Later on during the Middle Ages Rama became part of Bosnia giving ground to the Hungarian kings to claim whole Bosnia as their heritage. .

  13. Comparing Unique Title Coverage of Web of Science and Scopus in Earth and Atmospheric Sciences

    Science.gov (United States)

    Barnett, Philip; Lascar, Claudia

    2012-01-01

    The current journal titles in earth and atmospheric sciences, that are unique to each of two databases, Web of Science and Scopus, were identified using different methods. Comparing by subject category shows that Scopus has hundreds of unique titles, and Web of Science just 16. The titles unique to each database have low SCImago Journal Rank…

  14. 7 CFR 1927.53 - Costs of title clearance and closing of transactions.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 12 2010-01-01 2010-01-01 false Costs of title clearance and closing of transactions... and Loan Closing § 1927.53 Costs of title clearance and closing of transactions. The borrower or the... payment of all costs of title clearance and closing of the transaction and will arrange for payment before...

  15. Parents Ask about Title I = Los padres preguntan del Titulo I.

    Science.gov (United States)

    RMC Research Corp., Portsmouth, NH.

    Title I, the largest federal aid program for elementary, middle, and high schools, is introduced in this publication, which includes both English and Spanish versions. Through Title I, the Federal government gives money to school districts around the country based on the number of low-income families in each district. Each district uses Title I…

  16. A Study of HTML Title Tag Creation Behavior of Academic Web Sites

    Science.gov (United States)

    Noruzi, Alireza

    2007-01-01

    The HTML title tag information should identify and describe exactly what a Web page contains. This paper analyzes the "Title element" and raises a significant question: "Why is the title tag important?" Search engines base search results and page rankings on certain criteria. Among the most important criteria is the presence of the search keywords…

  17. Title XX: Social Services in Your State. A Child Advocate's Handbook for Action.

    Science.gov (United States)

    Children's Defense Fund, Washington, DC.

    This booklet is a guide for those wishing to route Title XX money into the community programs for children. Part I discusses ways for child advocates to participate in four key stages of the Title XX planning process in their state: planning proposals, raising the 25% non-federal share of the funds required by Title XX, and publishing proposed and…

  18. 24 CFR 1710.109 - Title to the property and land use.

    Science.gov (United States)

    2010-04-01

    ... under the authority of title IV of the Intergovernmental Cooperation Act of 1968.) ... title to property generally has the right to own, use and enjoy the property. A contract to buy a lot... affect your title.” “Here we will discuss the sales contract you will sign and the deed you will receive...

  19. 75 FR 70254 - PSD and Title V Permitting Guidance for Greenhouse Gases

    Science.gov (United States)

    2010-11-17

    ... Guidance for Greenhouse Gases AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of availability..., ``PSD and Title V Permitting Guidance for Greenhouse Gases'' on its significant guidance Internet Web... guidance titled, ``PSD and Title V Permitting Guidance for Greenhouse Gases.'' This document has been...

  20. 75 FR 23306 - Establishment of Advisory Committee on the National Motor Vehicle Title Information System

    Science.gov (United States)

    2010-05-03

    ... Advisory Committee on the National Motor Vehicle Title Information System AGENCY: Office of Justice Programs (OJP), Justice. ACTION: Notice of establishment of the National Motor Vehicle Title Information System (NMVTIS) Advisory Board. SUMMARY: Pursuant to the National Motor Vehicle Title Information System...

  1. 76 FR 31892 - Recordkeeping and Reporting Requirements Under Title VII, the ADA, and GINA

    Science.gov (United States)

    2011-06-02

    ... Requirements Under Title VII, the ADA, and GINA AGENCY: Equal Employment Opportunity Commission. ACTION: Notice... Civil Rights Act of 1964 (Title VII) and the Americans with Disabilities Act (ADA) to entities covered... the same record retention requirements under GINA that are imposed under Title VII and the ADA, i.e...

  2. 48 CFR 32.503-15 - Application of Government title terms.

    Science.gov (United States)

    2010-10-01

    ... Application of Government title terms. (a) Property to which the Government obtains title by operation of the... Property; and (2) The termination clauses at 52.249, for termination inventory. (c) The contractor may sell... the scrap disposition. (d) When the title to materials or other inventories is vested in the...

  3. Une Unite Discursive Restreinte: le Titre (A Restricted Discourse Unit: The Title).

    Science.gov (United States)

    Vigner, Gerard

    1980-01-01

    Describes the functions, specific uses, syntactic structure, and typographical characteristics of titles, discussing examples from newspapers, books, films, and scientific journals. Analysis of the semantic relationship between title and text is followed by the description of various instructional techniques for the production of titles and the…

  4. Solid Waste Operations Complex W-113, Detail Design Report (Title II). Volume 1: Title II design report

    International Nuclear Information System (INIS)

    1995-09-01

    The Solid Waste Retrieval Facility--Phase 1 (Project W113) will provide the infrastructure and the facility required to retrieve from Trench 04, Burial ground 4C, contact handled (CH) drums and boxes at a rate that supports all retrieved TRU waste batching, treatment, storage, and disposal plans. This includes (1) operations related equipment and facilities, viz., a weather enclosure for the trench, retrieval equipment, weighing, venting, obtaining gas samples, overpacking, NDE, NDA, shipment of waste and (2) operations support related facilities, viz., a general office building, a retrieval staff change facility, and infrastructure upgrades such as supply and routing of water, sewer, electrical power, fire protection, roads, and telecommunication. Title I design for the operations related equipment and facilities was performed by Raytheon/BNFL, and that for the operations support related facilities including infrastructure upgrade was performed by KEH. These two scopes were combined into an integrated W113 Title II scope that was performed by Raytheon/BNFL. Volume 1 provides a comprehensive narrative description of the proposed facility and systems, the basis for each of the systems design, and the engineering assessments that were performed to support the technical basis of the Title II design. The intent of the system description presented is to provide WHC an understanding of the facilities and equipment provided and the A/E's perspective on how these systems will operate

  5. Title V Workforce Development in the Era of Health Transformation.

    Science.gov (United States)

    Margolis, Lewis; Mullenix, Amy; Apostolico, Alexsandra A; Fehrenbach, Lacy M; Cilenti, Dorothy

    2017-11-01

    Purpose The National Maternal and Child Health Workforce Development Center at UNC Chapel Hill (the Center), funded by the Maternal and Child Health Bureau, provides Title V state/jurisdiction leaders and staff and partners from other sectors with opportunities to develop skills in quality improvement, systems mapping and analysis, change management, and strategies to enhance access to care to leverage and implement health transformation opportunities to improve the health of women and children. Description Since 2013, the Center has utilized a variety of learning platforms to reach state and jurisdiction Title V leaders. In the intensive training program, new skills and knowledge are applied to a state-driven health transformation project and include distance-based learning opportunities, multi-day, in-person training and/or onsite consultation, as well as individualized coaching to develop workforce skills. Assessment The first intensive cohort of eight states reported enhanced skills in the core areas of quality improvement, systems mapping and analysis, change management, and strategies to enhance access to care which guided changes at state system and policy levels. In addition, teams reported new and/or enhanced partnerships with many sectors, thereby leveraging Title V resources to increase its impact. Conclusion The Center's provision of core workforce skills and application to state-defined goals has enabled states to undertake projects and challenges that not only have a positive impact on population health, but also encourage collaborative, productive partnerships that were once found to be challenging-creating a workforce capable of advancing the health and wellbeing of women and children.

  6. Are Shorter Article Titles More Attractive for Citations? Cross-sectional Study of 22 Scientific Journals

    Science.gov (United States)

    Habibzadeh, Farrokh; Yadollahie, Mahboobeh

    2010-01-01

    Aim To investigate the correlation between the length of the title of a scientific article and the number of citations it receives, in view of the common editorial call for shorter titles. Methods Title and the number of citations to all articles published in 2005 in 22 arbitrarily chosen English-language journals (n = 9031) were retrieved from citation database Scopus. The 2008 journal impact factors of these 22 journals were also retrieved from Thomson Reuters’ Journal Citation Report (JCR). Assuming the article title length as the independent variable, and the number of citations to the article as the dependent variable, a linear regression model was applied. Results The slope of the regression line for some journals (n = 6, when titles were measured in characters but 7 when titles were measured in words) was negative – none was significantly different from 0. The overall slope for all journals was 0.140 (when titles were measured in characters) and 0.778 (when titles were measured in words), significantly different from 0 (P articles with longer titles received more citations – Spearman ρ = 0.266 – when titles were measured in characters, and ρ = 0.244 when titles were measured in words (P 10 and for 2 out of 14 journals with impact factor <10 (P < 0.001, Fisher exact test). Conclusion Longer titles seem to be associated with higher citation rates. This association is more pronounced for journals with high impact factors. Editors who insist on brief and concise titles should perhaps update the guidelines for authors of their journals and have more flexibility regarding the length of the title. PMID:20401960

  7. 20 CFR 411.552 - What effect will the subsequent entitlement to title II benefits have on EN payments for title...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...

  8. What makes a ‘good’ title and (how) does it matter for citations? A review and general model of article title attributes in management science

    NARCIS (Netherlands)

    Balachandran Nair, L.; Gibbert, Michael

    2016-01-01

    What makes a “good” title for an article, i.e. one which might attract citations in the academic community? Answers to this question are manifold, though inconclusive across disciplines. In an attempt to provide cohesion, we integrate significant title characteristics from previous studies across

  9. Wisconsin Public Service - Weston Generating Station; Order Denying in Part and Granting in Part a Petition for Objection to the Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database.

  10. The SNS target station preliminary Title I shielding analyses

    International Nuclear Information System (INIS)

    Johnson, J.O.; Santoro, R.T.; Lillie, R.A.; Barnes, J.M.; McNeilly, G.S.

    2000-01-01

    The Department of Energy (DOE) has given the Spallation Neutron Source (SNS) project approval to begin Title I design of the proposed facility to be built at Oak Ridge National Laboratory (ORNL). During the conceptual design phase of the SNS project, the target station bulk-biological shield was characterized and the activation of the major targets station components was calculated. Shielding requirements were assessed with respect to weight, space, and dose-rate constraints for operating, shut-down, and accident conditions utilizing the SNS shield design criteria, DOE Order 5480.25, and requirements specified in 10 CFR 835. Since completion of the conceptual design phase, there have been major design changes to the target station as a result of the initial shielding and activation analyses, modifications brought about due to engineering concerns, and feedback from numerous external review committees. These design changes have impacted the results of the conceptual design analyses, and consequently, have required a re-investigation of the new design. Furthermore, the conceptual design shielding analysis did not address many of the details associated with the engineering design of the target station. In this paper, some of the proposed SNS target station preliminary Title I shielding design analyses will be presented. The SNS facility (with emphasis on the target station), shielding design requirements, calculational strategy, and source terms used in the analyses will be described. Preliminary results and conclusions, along with recommendations for additional analyses, will also be presented. (author)

  11. Usability evaluation of user interface of thesis title review system

    Science.gov (United States)

    Tri, Y.; Erna, A.; Gellysa, U.

    2018-03-01

    Presentation of programs with user interface that can be accessed online through the website of course greatly provide user benefits. User can easily access the program they need. There are usability values that serve as a benchmark for the success of a user accessible program, ie efficiency, effectiveness, and convenience. These usability values also determine the development of the program for the better use. Therefore, on the review title thesis program that will be implemented in STT Dumai was measured usability evaluation. It aims to see which sides are not yet perfect and need to be improved to improve the performance and utilization of the program. Usability evaluation was measured by using smartPLS software. Database used was the result of respondent questionnaires that include questions about the experience when they used program. The result of a review of thesis title program implemented in STT Dumai has an efficiency value of 22.615, the effectiveness of 20.612, and satisfaction of 33.177.

  12. Public titles of clinical trials should have ethics review.

    Science.gov (United States)

    Saenz, Carla; Reveiz, Ludovic; Tisdale, John F

    2015-09-01

    A key aspect to guarantee that research with human subjects is ethical is being overlooked. Ethics review committees invest great effort examining the informed consent documents of research protocols to ensure that potential participants can provide consent validly and are not deluded into thinking that the experimental intervention they may sign up for is already known to be therapeutic. However, these efforts to avoid what is called the "therapeutic misconception" might be in vain if the title with which the studies are being introduced to the potential participants escapes ethics review. Research participants might be deceived by clinical trials entitled "novel therapy" when the point of the trial is precisely to find out whether the intervention at stake is therapeutic or not. Providing potential research participants with such misleading information hampers their ability to make informed decisions. The well-established scrutiny that ethics review committees exercise with regard to consent forms is limited if the registration of clinical trials, for which a public title is chosen, constitutes a process that is independent from the ethics review. In this article, we examine this problem, assess recent measures to integrate clinical trial registration with ethics review processes, and provide specific recommendations to solve the problem and ultimately enhance the accountability, transparency, and ethics of research with human subjects. Copyright © 2015 Pan American Health Organization. Published by Elsevier Inc. All rights reserved.

  13. Developing a virtual community for health sciences library book selection: Doody's Core Titles.

    Science.gov (United States)

    Shedlock, James; Walton, Linda J

    2006-01-01

    The purpose of this article is to describe Doody's Core Titles in the Health Sciences as a new selection guide and a virtual community based on an effective use of online systems and to describe its potential impact on library collection development. The setting is the availability of health sciences selection guides. Participants include Doody Enterprise staff, Doody's Library Board of Advisors, content specialists, and library selectors. Resources include the online system used to create Doody's Core Titles along with references to complementary databases. Doody's Core Titles is described and discussed in relation to the literature of selection guides, especially in comparison to the Brandon/Hill selected lists that were published from 1965 to 2003. Doody's Core Titles seeks to fill the vacuum created when the Brandon/Hill lists ceased publication. Doody's Core Titles is a unique selection guide based on its method of creating an online community of experts to identify and score a core list of titles in 119 health sciences specialties and disciplines. The result is a new selection guide, now available annually, that will aid health sciences librarians in identifying core titles for local collections. Doody's Core Titles organizes the evaluation of core titles that are identified and recommended by content specialists associated with Doody's Book Review Service and library selectors. A scoring mechanism is used to create the selection of core titles, similar to the star rating system employed in other Doody Enterprise products and services.

  14. Privacidad y periodismo : el escándalo Murdoch sobre escuchas telefónicas en News of the World = Privacy and journalism: Murdoch´s scandal on phone hacking in Newsof the World

    Directory of Open Access Journals (Sweden)

    Cristina Pauner Chulvi

    2013-09-01

    Full Text Available La regulación de la prensa británica se halla en pleno proceso de reforma a raíz del descubrimiento en julio de 2011 del mayor escándalo de escuchas ilegales practicadas por los periodistas del tabloide News of the World. Este hallazgo ha puesto al descubierto una compleja red de conexiones entre la prensa, la policía y los políticos en Reino Unido. Tras varios meses de investigación, el Informe Leveson sobre la cultura, prácticas y ética de la prensa presenta numerosas propuestas para someter a la prensa a un nuevo mecanismo de autorregulación más independiente y garantista que comprometa a una práctica ética del periodismo así como para asegurar los derechos de las personas objeto de información en los medios. The regulation of the British press is undergoing a major process of reform after the biggest scandal of phone hacking carried out by journalists from the tabloid News of the World broke in July 2011. This finding has uncovered a complex network of connections among the press, the police and politicians in the UK. After several months of investigation, the Leveson Inquiry into the culture, practices and ethics of the press has made numerous proposals in order for the press to be covered by a new independent self— regulatory regime leading to the ethical practice of journalism and guaranteeing the rights of persons who draw the attention of the media.

  15. Elmo Bumpy Torus proof of principle, Phase II: Title 1 report. Volume VII. Cryogenic system

    International Nuclear Information System (INIS)

    Poteat, T.J.

    1982-01-01

    This document, Volume VII EBT-P Cryogenic System Title I Design Report, describes the system that resulted from the Title I Preliminary Design effort. It is a self-contained document that can be read apart from the other Volumes comprising the EBT-P Title I Report. This document is a contract deliverable item and provides the detail necessary to support the Cryogenic System design contained in the EBT-P Baseline Design Data Book

  16. 29 CFR 1604.8 - Relationship of title VII to the Equal Pay Act.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Relationship of title VII to the Equal Pay Act. 1604.8... GUIDELINES ON DISCRIMINATION BECAUSE OF SEX § 1604.8 Relationship of title VII to the Equal Pay Act. (a) The... based on the Equal Pay Act may be raised in a proceeding under title VII. (c) Where such a defense is...

  17. 39 CFR 211.1 - Disposition of former title 39, U.S.C.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Disposition of former title 39, U.S.C. 211.1... REGULATIONS § 211.1 Disposition of former title 39, U.S.C. Except as otherwise continued in effect as postal regulations, all provisions of former title 39, U.S.C., which were continued in effect as regulations of the...

  18. Article title misstates the role of pavement sealers.

    Science.gov (United States)

    O'Reilly, Kirk

    2014-08-01

    The claim made in the title of Witter et al. (2014) "Coal-tar-based sealcoated pavement: A major PAH source to urban stream sediments" is not supported by the data presented. The author's use of Pearson correlation coefficients is insufficient to indicate causation. The application of spatial analysis and principle component analysis did not include sealer specific inputs, so provides no basis for the claim. To test the hypothesis that sealers are a source of PAHs in the stream studied, EPA's Chemical Mass Balance (CMB) source evaluation model was applied to Witter's sediment data. CMB found an excellent fit (R(2) > 0.999) between measured and modeled PAH concentrations when sealers were not included as a potential source. This finding does not support Witter et al. (2014) claim that sealers are a major source of PAHs. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Petition to Object to the GCC Dacotah Portland Cement Title V Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  20. Straight Delegation Issues Concerning Sections 111 and 112 Requirements and Title V

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  1. Petition Requesting That the Administrator Object to the Title V Permit for JP Pulliam Power Plant

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  2. Response to Petition for EPA to Object to Cash Creek Generation Station's Title V Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  3. NYPIRG Petition to Object to Yeshiva University's Albert Einstein College of Medicane Title V Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  4. Honeywell Engines, Systems and Services, Phoenix, Arizona, Petition to Object to Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  5. Matrix of Title V-Related And Air Grant-Eligible Activities

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  6. SSA Unified Measurement System (SUMS) Title XVI Post-Eligibility Operational Data Store (PEODS)

    Data.gov (United States)

    Social Security Administration — Current store for information on post entitlement claims for title 16 for redeterminations and limited issues. Also includes information from Starz and Stripes field...

  7. Periodic Monitoring in Title V Permits for Turbines Subject to NSPS Subpart GG

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  8. Petition Requesting the Administrator Object to Title V Permit for Duke Energy Progress's Richmond County Turbines

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  9. Pacific Custom Materials, Petition to Object to Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  10. Salt River Project San Tan Generating Station, Petition to Object to Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  11. Definition of Regulated Pollutant for Particulate Matter for Purposes of Title V

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  12. Incorporation of Startup, Shutdown, and Malfunction Plans into Source's Title V Permits

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  13. Petition to have the Administrator Object to Weyerhaeuser - Barnesville Wood Products Title V Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  14. Petition to Object to the Xcel Energy, Hayden Station, Hayden Colorado, Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  15. Petition to Object to the TVA Paradise Fossil Plant, Drakesboro, Kentucky, Title V Operating Permit

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Petition Database available at www2.epa.gov/title-v-operating-permits/title-v-petition-database. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  16. Title V Applicability Issues Related to the Cincinnati/Northern Kentucky International Airport

    Science.gov (United States)

    This document may be of assistance in applying the Title V air operating permit regulations. This document is part of the Title V Policy and Guidance Database available at www2.epa.gov/title-v-operating-permits/title-v-operating-permit-policy-and-guidance-document-index. Some documents in the database are a scanned or retyped version of a paper photocopy of the original. Although we have taken considerable effort to quality assure the documents, some may contain typographical errors. Contact the office that issued the document if you need a copy of the original.

  17. A Place on the Team: The Triumph and Tragedy of Title IX

    Science.gov (United States)

    Suggs, Welch

    2006-01-01

    "A Place on the Team" is the inside story of how Title IX revolutionized American sports. The federal law guaranteeing women's rights in education, Title IX opened gymnasiums and playing fields to millions of young women previously locked out. Journalist Welch Suggs chronicles both the law's successes and failures-the exciting…

  18. 20 CFR 410.561c - Defeat the purpose of title IV.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Defeat the purpose of title IV. 410.561c Section 410.561c Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE HEALTH AND SAFETY..., accident, and health insurance including premiums for supplementary medical insurance benefits under title...

  19. Why, What and Where To? Title IX, Educational Amendment of 1972.

    Science.gov (United States)

    Perry-Miller, Mitzi

    Three years after Title IX of the Education Amendments of 1972 became law, the U. S. Department of Health, Education, and Welfare provided regulations for the implementation of Title IX. This report reviews the implications of these regulations as well as several of the court cases in which discrimination on the basis of sex has been declared…

  20. Beliefs and Behaviors of Elementary Principals of Successful Title I Schools

    Science.gov (United States)

    Blount, Margie

    2014-01-01

    This qualitative phenomenological research study used narrative inquiry to investigate the behaviors and beliefs of eight Texas principals in high achieving Title I elementary schools. Participant interviews were analyzed using Creswell (2007) six-step method for analyzing phenomenological studies. Findings suggested that successful Title I…

  1. 23 CFR 505.17 - Applicability of Title 23, U.S. Code.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Applicability of Title 23, U.S. Code. 505.17 Section 505... INFRASTRUCTURE MANAGEMENT PROJECTS OF NATIONAL AND REGIONAL SIGNIFICANCE EVALUATION AND RATING § 505.17 Applicability of Title 23, U.S. Code. Funds made available to carry out this section shall be available for...

  2. 32 CFR 644.67 - Approval of Title by the Attorney General.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Approval of Title by the Attorney General. 644.67... § 644.67 Approval of Title by the Attorney General. (a) General. Section 355 of the Revised Statutes of... delegated to the Department of the Army, subject to the supervision and review of the Attorney General...

  3. Abbreviated Title of the Artwork in the System of Signs by Ch. Peirce

    Directory of Open Access Journals (Sweden)

    Grigoriy Valeryevich Tokarev

    2015-09-01

    Full Text Available The article is devoted to the semiotic aspect of the functioning of the abbreviated title of the postmodern artwork. The authors analyze the relationship of title-sign to the object which it replaces. The title is considered from the perspective of three main features peculiar of the sign in accordance with the Charles S. Peirce's theory. This fact allows us to conclude that, being a sign, the abbreviated title replaces a literary text, which is also expressed in symbolic form of the author's knowledge of reality. In this aspect the title becomes the metasign of its text. It is shown that in this connection, decoding and interpretation process take place in two stages – before reading the text and in the process of its reading and interpretation. It is alleged that the result of the interpretation of the title depends on the reader's competence which is determined by their individual literary scope, as well as by the skills of productive work with the text. On the basis of the classification of signs created by Charles Pierce, it was found that the abbreviated title has a complex semiotic nature combining the features of indexicality, conventionality, and iconicity, the latter of which may be present only in the abbreviated title.

  4. Not Second-Class: Title IX, Equity, and Girls' High School Sports

    Science.gov (United States)

    Stader, David L.; Surface, Jeanne L.

    2014-01-01

    Title IX is designed to protect students from discrimination based on sex in any educational institution that receives financial assistance. This article focuses on Title IX as it applies to high school athletic programs by considering the trial of a high school district in California. A federal court found considerable inequalities between boys…

  5. 78 FR 35179 - Negotiated Rulemaking Committee, Negotiator Nominations and Schedule of Committee Meetings-Title...

    Science.gov (United States)

    2013-06-12

    ... title IV Federal Student Aid programs; regulations designed to prevent fraud; State authorization for... Against Women Reauthorization Act of 2013 to the campus safety and security reporting requirements in the... regulations designed to prevent fraud and otherwise ensure proper use of title IV Federal Student Aid program...

  6. Title II, Part A: Don't Scrap It, Don't Dilute It, Fix It

    Science.gov (United States)

    Coggshall, Jane G.

    2015-01-01

    The Issue: Washington is taking a close look at Title II, Part A (Title IIA) of the Elementary and Secondary Education Act (ESEA) as Congress debates reauthorization. The program sends roughly $2.5 billion a year to all states and nearly all districts to "(1) increase student academic achievement through strategies such as improving teacher…

  7. 28 CFR 42.405 - Public dissemination of title VI information.

    Science.gov (United States)

    2010-07-01

    ... Federally Assisted Programs § 42.405 Public dissemination of title VI information. (a) Federal agencies... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Public dissemination of title VI information. 42.405 Section 42.405 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION; EQUAL...

  8. THE DEMAND FOR PRIVATE PROPERTY RIGHTS: LAND TITLING, CREDIT, AND AGRICULTURAL PRODUCTIVITY IN MEXICO

    OpenAIRE

    Johnson, Nancy L.

    1998-01-01

    Land titles can increase agricultural productivity by increasing access to collateralized credit. However, increased credit use depends on the assumption that farmers face asset-based credit rationing. This assumption is tested using data from Mexico's voluntary land titling program. The results do not support the existence of widespread credit rationing.

  9. Title IV compliance strategies and the incidence of co-pollutants and synergistic pollution controls

    International Nuclear Information System (INIS)

    South, D.W.; Bailey, K.A.

    1993-01-01

    Title 4 of the Clean Air Act Amendments (CAAA) of 1990 (Pub.L. 101-549) authorizes a system of tradeable SO 2 allowances in order to reduce Utility SO 2 emissions in a cost-effective manner. The CAAA also expanded and strengthened regulation of urban ozone nonattainment (Title 1), air toxics (Title 3) and utility NO x emissions (Title 4). Implementation of the requirements of each of these titles will force the utility industry to incur additional control expenditures. Utilities also face the potential for regulation of CO 2 emissions within the next decade, and increased regulation and reclassification of high volume combustion wastes, i.e., scrubber sludge, fly ash and bottom ash. Unfortunately for the utility industry, many of the issues in Titles 1, 3, 4 and other regulations have not been resolved, even though utility Phase 1 compliance planning has begun. This paper will examine compliance conflicts and synergies resulting from utility compliance with Title IV SO 2 requirements. The fundamental question addressed is: what multi-media effects are introduced and what opportunities exist through utility compliance with Title 4-SO 2 . Several issues will be addressed including: (1) the potential impact of non-SO 2 regulation on utility compliance and compliance costs, (2) the flexibility of utility SO 2 compliance options, (3) the synergies and co-pollutant effects associated with particular compliance options, (4) the impact of the timing and uncertainty of the various rules on utility compliance choice

  10. School Library Resources, Textbooks, and Other Instructional Materials: Title II, ESEA. Second Annual Report, 1967.

    Science.gov (United States)

    Office of Education (DHEW), Washington, DC.

    The second annual compilation and analysis of data on Title II of the Elementary and Secondary Education Act (ESEA Title II), this report describes how the 50 states, the District of Columbia, Guam, Puerto Rico, the Trust Territory of the Pacific Islands, the Virgin Islands, and the Department of the Interior (for children and teachers in schools…

  11. Should title lengths really adhere to the American Psychological Association's twelve word limit?

    Science.gov (United States)

    Hallock, Robert M; Dillner, Kari M

    2016-04-01

    The publication manual for the American Psychological Association (APA) suggests that title lengths do not exceed 12 words, yet journals do not prevent longer titles. Here, we examined title lengths in APA journals to see how many exceeded the APA's suggested limit. First, we conducted a systematic analysis of 235 articles in the current issues of 23 APA journals. A total of 52% of titles were more than 12 words long. Second, we examined articles from APA journals that were at least 50 years old to examine whether title lengths have changed over time. Our results suggested that the average title lengths have indeed increased with time. One of 2 courses should be taken. Perhaps science is becoming more complex that longer titles are needed in order to convey the primary message to the reader. If this is the case, then the APA's word limit should be increased. On the other hand, however, maybe editor and reviewers should try to enforce the current word limit to force writers to be succinct. Either way, editors should make their preferences clear so that the trend for longer titles does not continue unchecked. (c) 2016 APA, all rights reserved).

  12. 78 FR 51747 - Meeting of the Department of Justice's (DOJ's) National Motor Vehicle Title Information System...

    Science.gov (United States)

    2013-08-21

    ... Department of Justice's (DOJ's) National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... announcement of a meeting of DOJ's National Motor Vehicle Title Information System (NMVTIS) Federal Advisory.... FOR FURTHER INFORMATION CONTACT: Todd Brighton, Designated Federal Employee (DFE), Bureau of Justice...

  13. 76 FR 8778 - Meeting of the Department of Justice's (DOJ's) National Motor Vehicle Title Information System...

    Science.gov (United States)

    2011-02-15

    ... Department of Justice's (DOJ's) National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... announcement of a meeting of DOJ's National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... 7th Street, NW., Washington, DC 20531; Phone: (202) 305-1661. FOR FURTHER INFORMATION CONTACT: Alissa...

  14. 76 FR 57013 - Recordkeeping and Reporting Requirements Under Title VII, the ADA, and GINA

    Science.gov (United States)

    2011-09-15

    ... EQUAL EMPLOYMENT OPPORTUNITY COMMISSION 29 CFR Part 1602 RIN 3046-AA89 Recordkeeping and Reporting Requirements Under Title VII, the ADA, and GINA AGENCY: Equal Employment Opportunity Commission. ACTION... under title VII, the ADA, and GINA. (76 FR 31892, June 2, 2011). No requests to present oral testimony...

  15. 75 FR 31815 - Meeting of the Department of Justice's (DOJ's) National Motor Vehicle Title Information System...

    Science.gov (United States)

    2010-06-04

    ... Department of Justice's (DOJ's) National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... announcement of a meeting of DOJ's National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... 7th Street, NW., Washington, DC 20531; Phone: (202) 305-1661. FOR FURTHER INFORMATION CONTACT: Alissa...

  16. 77 FR 10573 - Meeting of the Department of Justice's (DOJ's) National Motor Vehicle Title Information System...

    Science.gov (United States)

    2012-02-22

    ... Department of Justice's (DOJ's) National Motor Vehicle Title Information System (NMVTIS) Federal Advisory... announcement of a meeting of DOJ's National Motor Vehicle Title Information System (NMVTIS) Federal Advisory.... FOR FURTHER INFORMATION CONTACT: Todd Brighton, Designated Federal Employee (DFE), Bureau of Justice...

  17. Relationships between nutrition-related knowledge, self-efficacy, and behavior for fifth grade students attending Title I and non-Title I schools.

    Science.gov (United States)

    Hall, Elisha; Chai, Weiwen; Albrecht, Julie A

    2016-01-01

    The Social Cognitive Theory (SCT) is a widely used theory for nutrition education programming. Better understanding the relationships between knowledge, self-efficacy, and behavior among children of various income levels can help to form and improve nutrition programs, particularly for socioeconomically disadvantaged youth. The purpose of this study was to determine the relationships between knowledge, self-efficacy, and behavior among fifth grade students attending Title I (≥40% of students receiving free or reduced school meals) and non-Title I schools (students receiving free or reduced school meals). A validated survey was completed by 55 fifth grade students from Title I and 122 from non-Title I schools. Differences in knowledge, self-efficacy, and behavior scores between groups were assessed using t test and adjusted for variations between participating schools. Regression analysis was used to determine the relationships between knowledge, self-efficacy, and behavior. In adjusted models, the Title I group had significantly lower scores on several knowledge items and summary knowledge (P = 0.04). The Title I group had significantly lower scores on several behavior variables including intakes of fruits (P = 0.02), vegetables (P = 0.0005), whole grains (P = 0.0003), and lean protein (P = 0.047), physical activity (P = 0.002) and summary behavior (P = 0.001). However the Title I group scored higher on self-efficacy for meal planning (P = 0.04) and choosing healthy snacks (P = 0.036). Both self-efficacy (β = 0.70, P knowledge (β = 0.35, P = 0.002) strongly predicted behavior; however, only self-efficacy remained significant in the Title I group (self-efficacy, β = 0.82, P = 0.0003; knowledge, β = 0.11, P = 0.59). Results demonstrate disparities in nutrition knowledge and behavior outcomes between students surveyed from Title I and non-Title I schools, suggesting more resources may be necessary for lower income populations

  18. Title I conceptual design for Pit 6 landfill closure at Lawrence Livermore National Laboratory Site 300

    International Nuclear Information System (INIS)

    MacDonnell, B.A.; Obenauf, K.S.

    1996-08-01

    The objective of this design project is to evaluate and prepare design and construction documents for a closure cover cap for the Pit 6 Landfill located at Lawrence Livermore National Laboratory Site 300. This submittal constitutes the Title I Design (Conceptual Design) for the closure cover of the Pit 6 Landfill. A Title I Design is generally 30 percent of the design effort. Title H Design takes the design to 100 percent complete. Comments and edits to this Title I Design will be addressed in the Title II design submittal. Contents of this report are as follows: project background; design issues and engineering approach; design drawings; calculation packages; construction specifications outline; and construction quality assurance plan outline

  19. Follow the Money: School Spending from Title I to Adult Earnings

    Directory of Open Access Journals (Sweden)

    Rucker C. Johnson

    2015-12-01

    Full Text Available Title I funding has been the largest federal program of K–12 education for the past fifty years, the objective being to eliminate the educational disadvantage associated with poverty. I provide new evidence on the long-term effects of school spending from Title I on children's educational and adult economic outcomes. To study effects of Title I, I link school district spending and administrative data on Title I funding to nationally representative data on children born between 1950 and 1977 and followed through 2011. Models include controls for birth cohort and school district fixed effects, childhood family–neighborhood characteristics, and other policies. I find that increases in Title I funding are significantly related to increases in educational attainment, high school graduation rates, higher earnings and work hours, reductions in grade repetition, school suspension or expulsion, incarceration, and reductions in the annual incidence of poverty in adulthood; effects on educational outcomes are more pronounced for poor children.

  20. Norplant's high cost may prohibit use in Title 10 clinics.

    Science.gov (United States)

    1991-04-01

    The article discusses the prohibitive cost of Norplant for the Title 10 low-income population served in public family planning clinics in the U.S. It is argued that it's unfair for U.S. users to pay $350 to Wyeth- Ayerst when another pharmaceutical company provides developing countries with Norplant at a cost of $14 - 23. Although the public sector and private foundations funded the development, it was explained that the company needs to recoup the investment in training and education. Medicaid and third party payers such as insurance companies will reimburse for the higher price, but if the public sector price is lowered, then the company would not make a profit and everyone would have argued for the reimbursement at the lower cost. It was suggested that a boycott of American Home Products, Wyeth-Ayerst's parent company, be made. Public family planning providers who are particularly low in funding reflect that their budget of $30,000 would only provide 85 users, and identified in this circumstance by drug abusers and multiple pregnancy women, and the need for teenagers remains unfulfilled. Another remarked that the client population served is 4700 with $54,000 in funding, which is already accounted for. The general trend of comments was that for low income women the cost is to high.