WorldWideScience

Sample records for schools invisible threats

  1. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  2. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  3. Gay Youth in American Public High Schools: Invisible Diversity.

    Science.gov (United States)

    Reed, Donald B.

    Gay youth enter high school with the knowledge that they are different and with the belief that heterosexuality is normal and that homosexuality is not normal. Also, gay youth enter high school with the belief that honesty and integrity are important personal values. Additionally, the gay youth enter high school without family knowledge of their…

  4. Invisible Barriers: The Loneliness of School Principals at Turkish ...

    African Journals Online (AJOL)

    Psychological insight is the notion that all participants agreed on and emphasised when asked to offer a definition of loneliness at schools. Participants also agreed on the fact that the organisational climate at Turkish schools represented the most significant reason for principals' loneliness at work. The school principals that ...

  5. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  6. Invisible Wars: Iraq, Afghanistan, and Teaching Insurgencies in Public Schools

    Science.gov (United States)

    Doyle, Christopher L.

    2012-01-01

    This author contends that contemporary issues classes no longer have currency, as standardized test results are the litmus test for education. In many schools, students are isolated from firsthand accounts and formal study of events that textbooks will one day proclaim as defining experiences of their generation. According to Doyle, schools tend…

  7. Invisible Barriers: The Loneliness of School Principals at Turkish ...

    African Journals Online (AJOL)

    x

    2016-11-10

    Nov 10, 2016 ... Department of Educational Administration, College of Education, Yildiz Technical ... The participants of the study consisted of seven elementary school principals. ..... Technical University to conduct this study, and was.

  8. Invisible Barriers: The Loneliness of School Principals at Turkish ...

    African Journals Online (AJOL)

    x

    2016-11-10

    Nov 10, 2016 ... Keywords: barriers; loneliness at work; school principals; Turkish elementary ... competencies as they face the challenges of their position (Howard & Mallory, 2008). ..... of the participants was female and six of them were.

  9. Making the Invisible Visible: Disciplinary Literacy in Secondary School Classrooms

    Science.gov (United States)

    Mac Mahon, Brendan

    2014-01-01

    In Ireland, policy on literacy now aims to expand the role that post-primary teachers of all subjects have in developing students' literacy skills. This paper draws on data from a wider research study carried out in secondary schools in 2010 and focuses on the classroom support with disciplinary literacy provided by subject teachers for students…

  10. The Visibility and Invisibility of Performance Management in Schools

    Science.gov (United States)

    Page, Damien

    2015-01-01

    This article presents findings from a study of performance management in 10 schools, five primary and five secondary. The aim was to gain a snapshot of how headteachers are interpreting and implementing the reforms to the performance and capability procedures for teachers introduced in September 2013. The findings suggest that the evaluation of…

  11. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  12. Home(lessness) in Urbanizing China: Invisible Violence and Left-Behind Children in Martial Arts Schools

    Science.gov (United States)

    Dong, Xuan

    2017-01-01

    This article examines how martial arts students retell their stories about being left behind and how they have experienced, viewed, and struggled with the invisible violence. Popularly known as the "hometown of Chinese martial arts," Dengfeng is home to 48 registered martial arts schools and more than 70,000 full-time students. Drawing…

  13. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  14. Students as Threats: Schooling inside a Youth Prison

    Science.gov (United States)

    Vélez Young-Alfaro, Morghan

    2017-01-01

    This ethnography explores incarcerated students' experiences and dynamics of identity formation inside a youth prison school. Across two years, 100 students and 50 adults were engaged. The structure, discourse, and adult-student interactions revealed a fixation on framing students as threats with a racialized undertone while also exposing the…

  15. Threats of school violence in Pennsylvania after media coverage of the Columbine High School massacre: examining the role of imitation.

    Science.gov (United States)

    Kostinsky, S; Bixler, E O; Kettl, P A

    2001-09-01

    Following the April 20, 1999, massacre at Columbine High School, Littleton, Colo, school administrators, law enforcement officials, and the media reported a rash of successive bomb threats and threats of school violence that were attributed to imitation. To establish that the clustering of threats of school violence following the Columbine massacre was initiated by imitation. A database of threats of school violence reported to the Pennsylvania Emergency Management Agency, Harrisburg, during the 50 days following the Columbine incident was examined to determine the daily frequency of threats. To determine factors that predict the occurrence of these threats, counties and school districts in which threats occurred were noted. Pennsylvania school districts reported 354 threats of school violence during the 50 days after the Columbine massacre, far exceeding the 1 or 2 threats per year estimated by school administrators before 1999. The frequency of these threats over time demonstrated a crescendo-decrescendo pattern. Fifty-six percent of the threats were made on or before day 10 after the incident, and more than one third occurred on days 8, 9, and 10. Factors that predicted the likelihood of a school's receiving a threat after the massacre included a greater proportion of white students and larger school enrollment. Successive threats of violence follow a publicized act of school violence. The media should recognize that imitation threats can occur and craft their stories accordingly.

  16. Making Invisible Histories Visible

    Science.gov (United States)

    Hanssen, Ana Maria

    2012-01-01

    This article features Omaha Public Schools' "Making Invisible Histories Visible" program, or MIHV. Omaha's schools have a low failure rate among 8th graders but a high one among high school freshmen. MIHV was created to help at-risk students "adjust to the increased demands of high school." By working alongside teachers and…

  17. Invisible Engineers

    Science.gov (United States)

    Ohashi, Hideo

    Questionnaire to ask “mention three names of scientists you know” and “three names of engineers you know” was conducted and the answers from 140 adults were analyzed. The results indicated that the image of scientists is represented by Nobel laureates and that of engineers by great inventors like Thomas Edison and industry founders like Soichiro Honda. In order to reveal the image of engineers among young generation, questionnaire was conducted for pupils in middle and high schools. Answers from 1,230 pupils were analyzed and 226 names mentioned as engineers were classified. White votes reached 60%. Engineers who are neither big inventors nor company founders collected less than 1% of named votes. Engineers are astonishingly invisible from young generation. Countermeasures are proposed.

  18. Threats of Violence in Schools: The Dallas Independent School District's Response.

    Science.gov (United States)

    Ryan-Arrendondo, Kim; Renouf, Kristin; Egyed, Carla; Doxey, Meredith; Dobbins, Maria; Sanchez, Serafin; Rakowitz, Bert

    2001-01-01

    Discusses the Dallas Public Schools' procedures for assessing the potential for violence among children who express intent to harm others. The Dallas Violence Risk Assessment (DVRA) was developed to evaluate students who have made threats of violence, and to assist school staff in determining appropriate intervention strategies. Describes the…

  19. Invisibility & Interpretation

    Directory of Open Access Journals (Sweden)

    Michael eHerzog

    2014-09-01

    Full Text Available Invisibility is often thought to occur because of the low-level limitations of the visual system. For example, it is often assumed that backward masking renders a target invisible because the visual system is simply too slow to resolve the target and the mask separately. Here, we propose an alternative explanation in which invisibility is a goal rather than a limitation and occurs naturally when making sense out of the plethora of incoming information. For example, we present evidence that (invisibility of an element can strongly depend on how it groups with other elements. Changing grouping changes visibility. In addition, we will show that features often just appear to be invisible but are in fact visible in a way the experimenter is not aware of.

  20. Invisibility Studies

    DEFF Research Database (Denmark)

    Invisibility Studies explores current changes in the relationship between what we consider visible and what invisible in different areas of contemporary culture. Contributions trace how these changes make their marks on various cultural fields and investigate the cultural significance of these de......Invisibility Studies explores current changes in the relationship between what we consider visible and what invisible in different areas of contemporary culture. Contributions trace how these changes make their marks on various cultural fields and investigate the cultural significance...... conditioned by physical and social settings that create certain possibilities for visibility and visuality, yet exclude others. The richness and complexity of this cultural framework means that no single discipline or interdisciplinary approach could capture it single-handedly. Invisibility Studies begins...

  1. Rural schools: In the middle of nowhere.The invisible cities in the world of education

    Directory of Open Access Journals (Sweden)

    Rosa Vázquez Recio

    2008-04-01

    Full Text Available This article includes some reflections about rural schools, coming from the personal and professional experience of the author. The article claims that rural schools should cease to be forgotten or underestimated and that they should be recognized as real schools. This issue is linked to the field of initial teacher training, making some considerations to be taken into account in order to promote a change in the appraisal and recognition of schools in the rural world.

  2. Leadership and Conflict in Two School Districts: "Visible" and "Invisible" Factors.

    Science.gov (United States)

    Bridgeland, William M.; Thomas, David M.

    1979-01-01

    In this study, the decision making processes of two Michigan school systems are examined with respect to issues in each community, effectiveness of school leadership, and system differences. Information is based on census data, school data, and intensive interviews with key informants. (Author/WI)

  3. Making the Invisible Visible: School Counselors Empowering Students with Disabilities through Self-Advocacy Training

    Science.gov (United States)

    Hatch, Trish; Shelton, T.; Monk, Gerald

    2009-01-01

    Professional School Counselors (PSCs) are trained to be leaders in school reform, collaborators with other educators, and advocates for all students. While PSCs provide academic, career, and personal/social interventions for the student body as part of a comprehensive school counseling program the needs of students with disabilities are often…

  4. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-12-01

    Full Text Available Abstract Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  5. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  6. The Efficacy of Choice Threats within School Accountability Systems: Results from Legislatively Induced Experiments. PEPG 05-01

    Science.gov (United States)

    West, Martin R.; Peterson, Paul E.

    2005-01-01

    Stigma and school voucher threats under a revised 2002 Florida accountability law have positive impacts on student performance. Stigma and public school choice threats under the U.S. federal accountability law, No Child Left Behind, do not have similar effects in Florida. Significant impacts of stigma, when combined with the voucher threat, are…

  7. Minority Adolescents in Ethnically Diverse Schools: Perceptions of Equal Treatment Buffer Threat Effects

    Science.gov (United States)

    Baysu, Gülseli; Celeste, Laura; Brown, Rupert; Verschueren, Karine; Phalet, Karen

    2016-01-01

    Can perceptions of equal treatment buffer the negative effects of threat on the school success of minority students? Focusing on minority adolescents from Turkish and Moroccan heritage in Belgium (M[subscript age] = 14.5; N = 735 in 47 ethnically diverse schools), multilevel mediated moderation analyses showed: (a) perceived discrimination at…

  8. Making Invisible Forces Visible

    DEFF Research Database (Denmark)

    Ratner, Helene Gad

    2013-01-01

    This paper investigates managerial tactics of visualisation when a need to know and manage employees' values and attitudes is expressed. Using the Danish public school as a case study, we explore how school managers use teachers' emotions to render visible presumably invisible information about...... their 'true' attitudes and values. The paper draws on theories of affect as well as actor-network theory to analyse three incidents where managers turn their interpretations of teachers' emotions into such information. These incidents suggest that the efforts to render employees' attitudes and values visible...

  9. Strengthening "Giving Voice to Values" in business schools by reconsidering the "invisible hand" metaphor

    OpenAIRE

    Painter-Morland, M; Slegers, R

    2017-01-01

    The main contention of this paper is that our ability to embed a consideration of values into business school curricula is hampered by certain normative parameters that our students have when entering the classroom. If we don't understand the processes of valuation that underpin our students' reasoning, our ethics teaching will inevitably miss its mark. In this paper, we analyze one of the most prevalent metaphors that underpin moral arguments about business, and reveal the beliefs and assump...

  10. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  11. Invisible wounds: corporal punishment in British schools as a form of ritual.

    Science.gov (United States)

    Benthall, J

    1991-01-01

    This article examines a presumed historical association between corporal punishment and the British "ruling class," taking as data the elaborate forms of beating practiced at a well-known English fee-paying boarding school in the 1950s and here documented in detail. Analogies with other forms of ritual studied by anthropologists are considered, as well as the psychosexual dynamics of beating for both officiants and victims. The paper argues that ritual corporal punishment must be seen in retrospect as a clear case of child abuse that is both physical and sexual. Such rituals of authority, though virtually abolished in Britain, may well exist in a different form in present day residential institutions for children in some Third World countries that have borrowed from now outdated European practices.

  12. Stereotype Threat Effects on African American Children in an Urban Elementary School

    Science.gov (United States)

    Wasserberg, Martin J.

    2014-01-01

    This study investigated whether a diagnostic testing condition leads to stereotype threat effects for African American children (n = 198) at an urban elementary school. Results indicated that presenting a reading test as diagnostic of abilities hindered the performance of African American children aware of racial stereotypes but not of those…

  13. Threat Perception Bias and Anxiety among Chinese School Children and Adolescents

    Science.gov (United States)

    Lu, Weili; Daleiden, Eric; Lu, Shou-En

    2007-01-01

    This study evaluated the relationship between threat perception bias and anxiety among children and adolescents in China. A sample of 1,004 elementary, middle and high school students aged 9 to 19 years listened to stories containing themes of generalized anxiety, social anxiety and separation anxiety in either an ambiguous or non-ambiguous…

  14. Making the Invisible Visible: Negotiating (In)Visibility and Transparency for LGBT Issues in Education

    Science.gov (United States)

    Reilly, Cole

    2007-01-01

    Historically, schooling has been a point of contention and restless agitation for many lesbian, gay, bisexual, and transgender (LGBT) individuals in North America who may feel trapped in prisons of invisibility. Traditionally, queer people's existence in educational settings has been denied or made invisible, not just physically (in school…

  15. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  16. The Invisible Boy

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony; Jensen, Iben

    , the participants agreed that all students in their class are part of the community. Following the participants, a good class community is when ‘you do lots of things together’. However, as the interview progressed (after eight minutes), it became apparent that at least one student was isolated and stood outside...... the participant’s definition of ‘good community’. It seemed almost as if they had forgotten a particular student in the class, until a question refreshed their collective memory. Participants suddenly became aware that there is at least one student in their class who does not participate in any joint activities......, either in or outside school. The question about how a group of students can collectively forget that one student is isolated in the class must be raised. The aim of this thinking note is to explore the mechanisms around social stigma and attempt to shed more light on the issue surrounding the ‘invisible...

  17. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  18. Deaf/LGBTQ Intersectional Invisibility in Schools: The Lived Experiences of Deaf Lesbian Students of Color at a School for the Deaf

    Science.gov (United States)

    Dunne, Courtney M.

    2013-01-01

    Historically, American society has had conflicting views on the nature and nurture of Deaf people and Lesbian, Gay, Bisexual, Transgender, Queer (LGBTQ) people. In the context of majority cultures and societies in history, the reality of Deaf and LGBTQ people's lives has often been summarized in general terms such as invisibility and oppression.…

  19. Stricter School Soda Limits Offered: Facing Lawsuit Threat, Beverage Industry Vows to Curb High-Calorie Drinks

    Science.gov (United States)

    Samuels, Christina A.

    2006-01-01

    The soft-drink industry vowed to voluntarily curb selling sugary sodas and other high-calorie beverages in schools, a move that was taken under threat of litigation by critics who see the industry as a prime culprit in a national obesity crisis. The promise offered no guarantee that schools would go along with the restrictions, though many…

  20. In/visible Punctuation

    Science.gov (United States)

    Lennard, John

    2011-01-01

    This article offers two approaches to the question of "invisible punctuation," theoretical and critical. The first is a taxonomy of modes of punctuational invisibility, identifying "denial, repression, habituation, error" and "absence." Each is briefly discussed and some relations with technologies of reading are considered. The second considers…

  1. Invisibility and interpretation.

    Science.gov (United States)

    Herzog, Michael H; Hermens, Frouke; Oğmen, Haluk

    2014-01-01

    Invisibility is often thought to occur because of the low-level limitations of the visual system. For example, it is often assumed that backward masking renders a target invisible because the visual system is simply too slow to resolve the target and the mask separately. Here, we propose an alternative explanation in which invisibility is a goal rather than a limitation and occurs naturally when making sense out of the plethora of incoming information. For example, we present evidence that (in)visibility of an element can strongly depend on how it groups with other elements. Changing grouping changes visibility. In addition, we will show that features often just appear to be invisible but are in fact visible in a way the experimenter is not aware of.

  2. Invisible Display in Aluminum

    DEFF Research Database (Denmark)

    Prichystal, Jan Phuklin; Hansen, Hans Nørgaard; Bladt, Henrik Henriksen

    2005-01-01

    Bang & Olufsen a/s has been working with ideas for invisible integration of displays in metal surfaces. Invisible integration of information displays traditionally has been possible by placing displays behind transparent or semitransparent materials such as plastic or glass. The wish for an integ......Bang & Olufsen a/s has been working with ideas for invisible integration of displays in metal surfaces. Invisible integration of information displays traditionally has been possible by placing displays behind transparent or semitransparent materials such as plastic or glass. The wish...... for an integrated display in a metal surface is often ruled by design and functionality of a product. The integration of displays in metal surfaces requires metal removal in order to clear the area of the display to some extent. The idea behind an invisible display in Aluminum concerns the processing of a metal...

  3. Stereotype Threat? Male and Female Students in Advanced High School Courses

    Science.gov (United States)

    Corra, Mamadi

    Propositions of stereotype threat theory imply that the social consequences of academic distinction in advanced quantitative areas (such as math and the physical sciences) for women may promote the under representation of female students in advanced quantitative academic courses. The hypothesis that female students will be underrepresented in advanced quantitative (honors and advanced placement math and physical science) courses is tested using academic performance and enrollment data for high school students in a "Student/Parent Informed Choice" (open registration) school district in North Carolina. Results show female students to be overrepresented in both advanced verbal/writing intensive (honors and advanced placement English, foreign language, and social science) and advanced quantitative (honors and advanced placement math and physical science) courses compared to their proportion of the student body. More surprisingly, results also indicate female students (compared to male students) to be overrepresented in advanced courses compared to their proportion of high-performing students. Furthermore, as with patterns observed at the district level, additional analysis of enrollment data for the entire state reveals similar results. Taken together, the findings call into question the prevailing presumption that female students continue to be underrepresented in math and physical science courses. Instead, the changing social context within which females and males experience schooling may provide an explanation for the findings.

  4. Performing Belonging, celebrating invisibility?

    DEFF Research Database (Denmark)

    Juul, Kristine

    2014-01-01

    Serbian migrants living transnational lives consciously or unconsciously move between visibility and invisibility in their performance of migrant success stories. A case in point are public festivals, performed to make visible migrants’ successful inclusion in Danish society, i.e. celebrating...... invisibility. Meanwhile, other celebrations are consciously relegated to the invisible confines of the Serbian homeland. This article analyses celebrations in Denmark and in Serbia and shows how visible displays of ethnicity and difference tend to turn into easily palatable heritage versions of Serbian culture...... when performed in a Danish context. In turn, the visibility acquired through celebrations of migrants’ belonging in their homeland is inclined to render invisible those who did not take part in the migration experience....

  5. Invisible and scrutinized bodies

    Directory of Open Access Journals (Sweden)

    Léopold Lambert

    2015-03-01

    Full Text Available The following text will attempt to demonstrate that both processes that aim at making bodies either invisible or, on the contrary, hyper-visible operates through the same mechanisms of a productive politics of visibility.

  6. Invisible magnetic sensors

    Science.gov (United States)

    Mach-Batlle, Rosa; Navau, Carles; Sanchez, Alvaro

    2018-04-01

    Sensing magnetic fields is essential in many applications in biomedicine, transportation, or smart cities. The distortion magnetic sensors create in response to the field they are detecting may hinder their use, for example, in applications requiring dense packaging of sensors or accurately shaped field distributions. For sensing electromagnetic waves, cloaking shells that reduce the scattering of sensors have been introduced. However, the problem of making a magnetic sensor undetectable remains unsolved. Here, we present a general strategy on how to make a sensor magnetically invisible while keeping its ability to sense. The sensor is rendered undetectable by surrounding it with a spherical shell having a tailored magnetic permeability. Our method can be applied to arbitrary shaped magnetic sensors in arbitrary magnetic fields. The invisibility can be made exact when the sensor is spherical and the probed field is uniform. A metasurface composed of superconducting pieces is presented as a practical realization of the ideal invisibility shell.

  7. The Invisible Cinema

    NARCIS (Netherlands)

    Hanich, Julian; Fossati, Giovanna; van den Oever, Annie

    The Invisible Cinema was an experimental movie theater designed by an experimental filmmaker. Devised by the Austrian avantgardist Peter Kubelka, it served as the first place of exhibition for the Anthology Film Archives in New York. Apart from the screen (and some exit signs and aisle lights

  8. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  9. The Invisibility of Steam

    Science.gov (United States)

    Greenslade, Thomas B., Jr.

    2014-01-01

    Almost everyone "knows" that steam is visible. After all, one can see the cloud of white issuing from the spout of a boiling tea kettle. In reality, steam is the gaseous phase of water and is invisible. What you see is light scattered from the tiny droplets of water that are the result of the condensation of the steam as its temperature…

  10. The Psychosocial Experience of High School Girls Highly Susceptible to Stereotype Threat: A Phenomenological Study

    Science.gov (United States)

    Picho, Katherine

    2016-01-01

    The author used phenomenology to explore the subjective experience of ninth-grade girls susceptible to mathematics-related stereotype threat in their authentic learning environments. The sample constituted students categorized as either having low or high susceptibility to stereotype threat (SST) enrolled in Honors mathematics classes at an urban…

  11. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  12. Exploring the academic invisible web

    OpenAIRE

    Lewandowski, Dirk

    2006-01-01

    The Invisible Web is often discussed in the academic context, where its contents (mainly in the form of databases) are of great importance. But this discussion is mainly based on some seminal research done by Sherman and Price (2001) and Bergman (2001), respectively. We focus on the types of Invisible Web content relevant for academics and the improvements made by search engines to deal with these content types. In addition, we question the volume of the Invisible Web as stated by Bergman. Ou...

  13. Exploring the academic invisible web

    OpenAIRE

    Lewandowski, Dirk; Mayr, Philipp

    2006-01-01

    Purpose: To provide a critical review of Bergman’s 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We define the Academic Invisible Web as consisting of all databases and collections relevant to academia but not searchable by the general-purpose internet search engines. Indexing this part of the Invisible Web is central to scientific search engines. We provide an overview of approaches followed thus far. Design/methodol...

  14. Mechanically Invisible Polymer Coatings

    DEFF Research Database (Denmark)

    2014-01-01

    phase comprises particles, said particles comprising a filler material and an encapsulating coating of a second polymeric material, wherein the backbones of the first and second polymeric materials are the same. The composition may be used in electroactive polymers (EAPs) in order to obtain mechanically......The present invention relates to a composition comprising encapsulated particles in a polymeric material. The composition comprises a continuous phase and a discontinuous phase incorporated therein, wherein the continuous phase comprises a first polymeric material and wherein the discontinuous...... invisible polymer coatings....

  15. Transformation optics and invisibility cloaks

    DEFF Research Database (Denmark)

    Qiu, Min; Yan, Min; Yan, Wei

    2008-01-01

    In this paper, we briefly summarize the theory of transformation optics and introduce its application in achieving perfect invisibility cloaking. In particular, we theoretically show how the task of realizing cylindrical invisibility cloaks can be eased by using either structural approximation...

  16. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  17. Leaking and Death-Threats by Students: A Study in German Schools

    Science.gov (United States)

    Bondü, Rebecca; Scheithauer, Herbert

    2014-01-01

    Leaking comprises observable behavior or statements that signal intentions of committing a violent offense and is considered an important warning sign for school shootings. School staff who are confronted with leaking have to assess its seriousness and react appropriately--a difficult task, because knowledge about leaking is sparse. The present…

  18. ''Invisible'' axion detectors

    International Nuclear Information System (INIS)

    Sikivie, P.

    1985-01-01

    A brief review is given of various ideas which have been put forth to detect ''invisible'' axions, i.e., axions with f/sub a/ between 3 x 10 7 GeV and 2 x 10 12 GeV. These experiments would attempt to detect the axions which constitute the halo of our galaxy or axions which are emitted by our sun; or they would attempt to detect the force mediated by virtual axions. Various relevant axion parameters are given as f/sub a/. Among the experiments described are: galactic axion detector using a cavity; ''spin coupled'' axion detection; axion to photon conversion in an inhomogeneous static magnetic field; and macroscopic forces mediated by axions. 27 refs

  19. Cloaks with multiple invisible regions

    International Nuclear Information System (INIS)

    Luo, Yang; Zhu, Shouzheng; He, Lianxing; Wang, Yu

    2011-01-01

    This paper proposes a general method of extending the effective invisible regions for both the shell-like interior cloak and the complementary media exterior cloak, without affecting their original cloaking regions. The proposed method is based on layered spatial mapping instead of the intact mapping. Certain interior or exterior invisible regions can be obtained by properly using a compressed or folded transformation in each space layer. Therefore, the proposal enables the as-designed cloaks to provide multiple invisible regions of different types simultaneously. Thus objects can be hidden in the interior cavity and/or in the exterior space, or even be embedded between the cloaking shells

  20. Making the Invisible Visible: A Methodological and a Substantive Issue

    Science.gov (United States)

    Dagley, Valerie

    2004-01-01

    This article discusses the issue of "making the invisible visible" from a methodological and a substantive viewpoint. The ideas emerged from a doctoral research study into individual target setting with middle ability students in an English secondary school. The students involved had been identified by assessments as "average"…

  1. Visible Voices: Literacy Identity and the Invisible Homeless

    Science.gov (United States)

    Juchniewicz, Melissa M.

    2012-01-01

    Despite calls for increased awareness of and sensitivity to diverse students and their in- and out-of-school literacies, the "invisible homeless"--those who often decline to self-identify--receive inadequate scholarly attention. They are often individuals who fear the stigma associated with homelessness as they navigate workplace, academic, and…

  2. Mood Symptoms and Emotional Responsiveness to Threat in School-Aged Children

    Science.gov (United States)

    Borelli, Jessica L.; Sbarra, David A.; Crowley, Michael J.; Mayes, Linda C.

    2011-01-01

    Clinical accounts of depression underscore its relation to negative emotional experiences; yet few empirical studies examine emotional experiences in adults with depression, with even less work on depression and emotion in children. Using a nonclinical sample of school-aged children (n = 89) ages 8 to 12, this study evaluated whether greater mood…

  3. Leading under Sanction: Principals' Perceptions of Threat Rigidity, Efficacy, and Leadership in Underperforming Schools

    Science.gov (United States)

    Daly, Alan J.; Der-Martirosian, Claudia; Ong-Dean, Colin; Park, Vicki; Wishard-Guerra, Alison

    2011-01-01

    No Child Left Behind (NCLB) was passed to ensure that 100 percent of students would be proficient by 2014. Progress toward that goal is measured annually and results suggest that while some schools improve, increasing numbers are identified as in need of improvement (INI) and are subject to sanctions. We examined perceived levels of threat…

  4. INVISIBLE MURDERER: NEONATAL TETANUS

    Directory of Open Access Journals (Sweden)

    Yonca SONMEZ

    2006-06-01

    Full Text Available Neonatal tetanus (NNT has been secondary in the whole world in the death list of diseases which can be protected by the help of vaccine. It’s an important community health problem in the less-developed countries in which pre-birth care services are limited, assisting a mother at childbirth by uneducated people in dirty atmosphere and the immunity against tetanus is not enough. Studies have shown that minor part of the cases have been expressed in most of the countries. Because of that NNT have been called as “silent/invisible murderer”. In Turkey, in the year of 2003 it has been seen 15 cases, and 12 of them have been resulted in death. The methods which will be applied to carry out the elimination of NNT are; the vaccination of pregnant women with at least two doses tetanus toxoid and providing clean birth conditions for all of the pregnant women. However, in Turkey the proportion of the women who have two doses of tetanus vaccine is 41%. To eliminate NNT in our country, all the pregnant women must be attained, the ones who are attained must be presented with qualified pre-birth care service which also includes tetanus immunity and the births must be carried out under healty conditions. As smallpox and polio eradication, NNT elimination will also be accomplished by self-sacrificing works of personnel in primary health care. [TAF Prev Med Bull 2006; 5(3.000: 229-233

  5. The ''invisible'' radioactive scale

    International Nuclear Information System (INIS)

    Bjoernstad, T.; Ramsoey, T.

    1999-04-01

    Production and up-concentration of naturally occurring radioactive material (NORM) in the petroleum industry has attracted steadily increasing attention during the last 15 years. Most production engineers today associate this radioactivity with precipitates (scales) and sludges in production tubing, pumps, valves, separators, settling tanks etc., wherever water is being transported or treated. 226 Ra and 228 Ra are the most well known radioactive constituents in scale. Surprisingly little known is the radioactive contamination by 210 Pb and progeny 210 Bi and 210 Po. These are found in combination with 226 Ra in ordinary scale, often in layer of non-radioactive metallic lead in water transportation systems, but also in pure gas and condensate handling systems ''unsupported'' by 226 Ra, but due to transportation and decay of the noble gas 222 Rn in NG/LNG. This latter contamination may be rather thin, in some cases virtually invisible. When, in addition, the radiation energies are low enough for not being detectable on the equipment outer surface, its existence has for most people in the industry been a secret. The report discusses transportation and deposition mechanisms, detection methods and provides some examples of measured results from the North Sea on equipment sent for maintenance. It is concluded that a regular measurement program for this type of contamination should be mandatory under all dismantling processes of transportation and fluid handling equipment for fluids and gases offshore and onshore

  6. The Invisible Web

    CERN Multimedia

    Katarina Anthony

    2010-01-01

    There is an invisible web beneath CERN that keeps the entire system going. It often goes unnoticed, yet is responsible for transmitting the vast amounts of data produced at CERN: the optical fibre network.   CERN’s 35,000 km of optical fibres are also used to synchronise the accelerators, take measurements of the beams and to send controls to the LHC. The network is maintained by a team of seven specialists working in the Cabling and Optical Fibres Section of the Engineering Department, while another eight specialists are responsible for copper control and direct current (DC) power cabling (412,000 cables at CERN). Although their work is essential to keep the LHC running, their record-breaking developments often go unspoken. In a recent seminar held on 14 October, the Optical Fibre team had the opportunity to present their exceptional work with radiation-resistant optical fibres. Daniel Ricci at the CCC optical fibre “starpoint”, which serves the LHC installation...

  7. Invisible Colleges: A Literature Review

    Directory of Open Access Journals (Sweden)

    Rassoul Zavaraqi

    2010-09-01

    Full Text Available Generation and consumption of information are among the functions unique to higher education. Scholarly communication plays an essential role in this process to such a degree that some consider it as being the cornerstone of science. Thus it could be said that no education could be realized without communication. Scientometrists analyze and assess formal scientific communications by studying the level of citation of such scientific outputs as books, journals and etc. Nevertheless, there is a special type of communication that lacks any external manifestation such as citations. Informal learning and education are indebted to such communication. This kind of informal communication for generating knowledge leads to an informal association among the scholars, which is called as "The invisible college". There are various definitions and interpretations concerning an invisible college. According to Price’s opinion, an invisible college is comprised of over a hundred colleagues that are engaged in communication with one another. He believed that members in such an association are reasonably in touch with and could consult and influence one another. The present paper, by reacquainting with the concept of invisible college, would review the role of informal links in the production of knowledge and higher education system, various assessment methods and critical notes, as well as the impact of modern ICT tools on the concept of invisible college.

  8. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  9. Involved, Invisible, Ignored: The Experiences of Lesbian, Gay, Bisexual and Transgender Parents and Their Children in Our Nation's K-12 Schools

    Science.gov (United States)

    Kosciw, Joseph G.; Diaz, Elizabeth M.

    2008-01-01

    Current estimates indicate that there are more than 7 million lesbian, gay, bisexual and transgender (LGBT) parents with school-age children in the United States, yet little is known about the experiences of this growing number of LGBT-headed families in schools across the country. In order to fill this crucial gap in our knowledge of LGBT issues…

  10. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  11. It's About Making Surfaces Invisible

    Indian Academy of Sciences (India)

    It's About Making Surfaces Invisible ... light is reflected from the surface between two media. The in- tensity of ... The reflection from each new interface and the combined reflec- .... Let us see the requirements of a material for a good stamp. The.

  12. Dangerous Activities within an Invisible Playground: A Study of Emergent Male Football Play and Teachers' Perspectives of Outdoor Free Play in the Early Years of Primary School

    Science.gov (United States)

    Jarvis, Pam

    2007-01-01

    This research was carried out during a study which focused upon the rough and tumble play of children in the early years department of a suburban primary school in northern England. The child sample's playtime activities were ethnographically observed over a period of 18 calendar months, during which time interviews were also carried out with the…

  13. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  14. How to observe the invisible

    International Nuclear Information System (INIS)

    Destefanis, G.; Peyret, O.; Darier, P.

    2000-01-01

    The observation of events and objects by images resulted from the detection of invisible radiation (infrared, X and gamma ray) emitted from these objects, is now more possible. This is mainly due to the progress in the microelectronics and semiconductors devices. With these advanced devices, it is possible to manufacture cameras with TV display size image and high resolution, which have many applications in military, medical and industrial sectors. (author)

  15. Why Information Literacy Is Invisible

    OpenAIRE

    William Badke

    2011-01-01

    Despite the many information literacy programs on higher education campuses, the literature of information literacy and the concept of information literacy as a viable academic subject remain hidden to most professors and academic administrators. Information literacy is invisible to academia because it is misunderstood, academic administrators have not put it on their institutions' agendas, the literature of information literacy remains in the library silo, there is a false belief that infor...

  16. Retrospectives: Ethics and the Invisible Hand

    OpenAIRE

    Jerry Evensky

    1993-01-01

    As modern economists, we use Adam Smith's "invisible hand" metaphor confident that we all know what it means in our discourse: it reflects our admiration for the elegant and smooth functioning of the market system as a coordinator of autonomous individual choices in an interdependent world. But in Adam Smith's moral philosophy, the invisible hand has a much broader responsibility: if individuals are to enjoy the fruits of a classical liberal society, the invisible hand must not only coordinat...

  17. In seach of the invisible (audiences)

    DEFF Research Database (Denmark)

    Hartley, Jannie Møller

    The paper shows need to distinguish between: ignored audiences (invisible in the literature, in our case very young children and ) and post-communist audiences Literally or actual invisible (online lurking and unintended) audiences the unintended or lurking audiences are invisible in a two-fold way...... : both as cases of study, but also as actual audiences. a lack of historical contextualization in the studies...

  18. Energy Awareness Displays - Making the Invisible Visible

    NARCIS (Netherlands)

    Börner, Dirk

    2011-01-01

    Börner, D. (2011). Energy Awareness Displays - Making the Invisible Visible. Presentation given at the Startbijeenkomst SURFnet Innovatieregeling Duurzaamheid & ICT. May, 13, 2011, Utrecht, The Netherlands.

  19. Strategic analyses in nursing schools: attracting, educating, and graduating more nursing students: part I--strengths, weaknesses, opportunities, and threats analysis.

    Science.gov (United States)

    Crow, Stephen M; Hartman, Sandra J; Mahesh, Sathiadev; McLendon, Christy L; Henson, Steve W; Jacques, Paul

    2008-01-01

    The shortage of nurses in the United States remains a persistent problem. Faced with this reality, nursing programs in colleges and universities continue to struggle to expand enrollment levels to meet the spiraling demand. This research uses familiar tools in strategic management: the strengths, weaknesses, opportunities, and threats (SWOT) analysis and stakeholder analysis as initial steps to draw more students to the profession of nursing. In a 2-round modified Delphi survey, chief administrators of schools of nursing identify the main SWOT of schools of nursing and the important internal and external stakeholders that influence nursing school success. The authors of the research suggest ways to use that knowledge to increase the enrollment level of nursing students. Part I of this research focuses on the SWOT analyses.

  20. Confronting Invisibility: Early Childhood Pre-Service Teachers' Beliefs toward Homeless Children

    Science.gov (United States)

    Kim, Jinhee

    2013-01-01

    Children make up half of the homeless population in the US, and of those, almost 50 percent are under age six. Homeless children face many different challenges in school. These children and their families have been invisible in school due to the indifference and stereotypes about them. This article focuses on early childhood pre-service teachers'…

  1. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  2. Invisible Higgs and Dark Matter

    DEFF Research Database (Denmark)

    Heikinheimo, Matti; Tuominen, Kimmo; Virkajärvi, Jussi Tuomas

    2012-01-01

    We investigate the possibility that a massive weakly interacting fermion simultaneously provides for a dominant component of the dark matter relic density and an invisible decay width of the Higgs boson at the LHC. As a concrete model realizing such dynamics we consider the minimal walking...... technicolor, although our results apply more generally. Taking into account the constraints from the electroweak precision measurements and current direct searches for dark matter particles, we find that such scenario is heavily constrained, and large portions of the parameter space are excluded....

  3. Culture, Context and Stereotype Threat: A Comparative Analysis of Young Ugandan Women in Coed and Single-Sex Schools

    Science.gov (United States)

    Picho, Katherine; Stephens, Jason M.

    2012-01-01

    Stereotype threat (ST) has been linked to under performance and academic disidentification among girls in mathematics and science as well as African Americans in academics. However, it is still unclear whether ST and its negative effects extend to non-Western cultures. The authors explored the effects of ST on Ugandan females in coed and…

  4. Why Information Literacy Is Invisible

    Directory of Open Access Journals (Sweden)

    William Badke

    2011-03-01

    Full Text Available Despite the many information literacy programs on higher education campuses, the literature of information literacy and the concept of information literacy as a viable academic subject remain hidden to most professors and academic administrators. Information literacy is invisible to academia because it is misunderstood, academic administrators have not put it on their institutions' agendas, the literature of information literacy remains in the library silo, there is a false belief that information literacy is acquired only by experience, there is a false assumption that technological ability is the same as information literacy, faculty culture makes information literacy less significant than other educational pursuits, faculty have a limited perception of the ability of librarians. and accrediting bodies have not yet advanced information literacy to a viable position in higher education. The new information age demands that these barriers be overcome and information literacy take a prominent place within the academic experience.

  5. Geometry and light the science of invisibility

    CERN Document Server

    Leonhardt, Ulf

    2010-01-01

    The science of invisibility combines two of physics' greatest concepts: Einstein's general relativity and Maxwell's principles of electromagnetism. Recent years have witnessed major breakthroughs in the area, and the authors of this volume - Ulf Leonhardt and Thomas Philbin of Scotland's University of St. Andrews - have been active in the transformation of invisibility from fiction into science. Their work on designing invisibility devices is based on modern metamaterials, inspired by Fermat's principle, analogies between mechanics and optics, and the geometry of curved space. Suitable for gra

  6. Broadband invisibility by non-Euclidean cloaking.

    Science.gov (United States)

    Leonhardt, Ulf; Tyc, Tomás

    2009-01-02

    Invisibility and negative refraction are both applications of transformation optics where the material of a device performs a coordinate transformation for electromagnetic fields. The device creates the illusion that light propagates through empty flat space, whereas in physical space, light is bent around a hidden interior or seems to run backward in space or time. All of the previous proposals for invisibility require materials with extreme properties. Here we show that transformation optics of a curved, non-Euclidean space (such as the surface of a virtual sphere) relax these requirements and can lead to invisibility in a broad band of the spectrum.

  7. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  8. Eagle-i: Making Invisible Resources, Visible

    Science.gov (United States)

    Haendel, M.; Wilson, M.; Torniai, C.; Segerdell, E.; Shaffer, C.; Frost, R.; Bourges, D.; Brownstein, J.; McInnerney, K.

    2010-01-01

    RP-134 The eagle-i Consortium – Dartmouth College, Harvard Medical School, Jackson State University, Morehouse School of Medicine, Montana State University, Oregon Health and Science University (OHSU), the University of Alaska, the University of Hawaii, and the University of Puerto Rico – aims to make invisible resources for scientific research visible by developing a searchable network of resource repositories at research institutions nationwide. Now in early development, it is hoped that the system will scale beyond the consortium at the end of the two-year pilot. Data Model & Ontology: The eagle-i ontology development team at the OHSU Library is generating the data model and ontologies necessary for resource indexing and querying. Our indexing system will enable cores and research labs to represent resources within a defined vocabulary, leading to more effective searches and better linkage between data types. This effort is being guided by active discussions within the ontology community (http://RRontology.tk) bringing together relevant preexisting ontologies in a logical framework. The goal of these discussions is to provide context for interoperability and domain-wide standards for resource types used throughout biomedical research. Research community feedback is welcomed. Architecture Development, led by a team at Harvard, includes four main components: tools for data collection, management and curation; an institutional resource repository; a federated network; and a central search application. Each participating institution will populate and manage their repository locally, using data collection and curation tools. To help improve search performance, data tools will support the semi-automatic annotation of resources. A central search application will use a federated protocol to broadcast queries to all repositories and display aggregated results. The search application will leverage the eagle-i ontologies to help guide users to valid queries via auto

  9. Social Class (In)Visibility and the Professional Experiences of Middle-Class Novice Teachers

    Science.gov (United States)

    Hall, David; Jones, Lisa

    2013-01-01

    This article focuses upon the classed and early professional experiences of middle-class novice teachers in England experiencing and contemplating working in schools serving socio-economically disadvantaged communities. Through an examination of the visibility and invisibility of social class in education set within an increasingly unequal and…

  10. From Nonradiating Sources to Directionally Invisible Objects

    Science.gov (United States)

    Hurwitz, Elisa

    The goal of this dissertation is to extend the understanding of invisible objects, in particular nonradiating sources and directional nonscattering scatterers. First, variations of null-field nonradiating sources are derived from Maxwell's equations. Next, it is shown how to design a nonscattering scatterer by applying the boundary conditions for nonradiating sources to the scalar wave equation, referred to here as the "field cloak method". This technique is used to demonstrate directionally invisible scatterers for an incident field with one direction of incidence, and the influence of symmetry on the directionality is explored. This technique, when applied to the scalar wave equation, is extended to show that a directionally invisible object may be invisible for multiple directions of incidence simultaneously. This opens the door to the creation of optically switchable, directionally invisible objects which could be implemented in couplers and other novel optical devices. Next, a version of the "field cloak method" is extended to the Maxwell's electro-magnetic vector equations, allowing more flexibility in the variety of directionally invisible objects that can be designed. This thesis concludes with examples of such objects and future applications.

  11. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  12. Invisible the dangerous allure of the unseen

    CERN Document Server

    Ball, Philip

    2015-01-01

    If you could be invisible, what would you do? The chances are that it would have something to do with power, wealth or sex. Perhaps all three. But there's no need to feel guilty. Impulses like these have always been at the heart of our fascination with invisibility: it points to realms beyond our senses, serves as a receptacle for fears and dreams, and hints at worlds where other rules apply. Invisibility is a mighty power and a terrible curse, a sexual promise, a spiritual condition. This is a history of humanity's turbulent relationship with the invisible. It takes on the myths and morals of Plato, the occult obsessions of the Middle Ages, the trickeries and illusions of stage magic, the auras and ethers of Victorian physics, military strategies to camouflage armies and ships and the discovery of invisibly small worlds. From the medieval to the cutting-edge, fairy tales to telecommunications, from beliefs about the supernatural to the discovery of dark energy, Philip Ball reveals the universe of the invi...

  13. Cuidados invisibles: ¿son suficientemente reconocidos?

    Directory of Open Access Journals (Sweden)

    Rosanna de la Rosa Eduardo

    Full Text Available Los cuidados invisibles son un elemento central y fundamental de la práctica de la Enfermería y son la base de su identidad profesional. La Enfermería ha sufrido un importante y positivo proceso de profesionalización en los últimos 150 años, sin embargo, los cuidados invisibles siguen siendo poco reconocidos, a pesar de su importancia en la recuperación y en la calidad de vida de los usuarios. En este trabajo se analizan brevemente las grandes transformaciones sociales actuales que obligan a replantearse la necesidad de visibilizar los cuidados invisibles, se plantean interrogantes clave para abordar esta discusión y se proponen una serie de acciones concretas para avanzar en este reconocimiento.

  14. Thermal imitators with single directional invisibility

    Science.gov (United States)

    Wang, Ruizhe; Xu, Liujun; Huang, Jiping

    2017-12-01

    Thermal metamaterials have been intensively studied during the past years to achieve the long-standing dream of invisibility, illusion, and other inconceivable thermal phenomena. However, many thermal metamaterials can only exhibit omnidirectional thermal response, which take on the distinct feature of geometrical isotropy. In this work, we theoretically design and experimentally fabricate a pair of thermal imitators by applying geometrical anisotropy provided by elliptical/ellipsoidal particles and layered structures. This pair of thermal imitators possesses thermal invisibility in one direction, while having thermal opacity in other directions. This work may open a gate in designing direction-dependent thermal metamaterials.

  15. The Treatment of Smith's Invisible Hand

    Science.gov (United States)

    Wight, Jonathan B.

    2007-01-01

    Adam Smith used the metaphor of an invisible hand to represent the instincts of human nature that direct behavior. Moderated by self-control and guided by proper institutional incentives, actions grounded in instincts can be shown to generate a beneficial social order even if not intended. Smith's concept, however, has been diluted and distorted…

  16. A feeling of being (in)visible

    DEFF Research Database (Denmark)

    Damsgaard, Janne Brammer; Bastrup, Lene; Norlyk, Annelise

    Abstract PhD Day 2015 The illness trajectory of spine fusion patients. A feeling of being (in)visible Background Research shows that being a back patient is associated with great personal cost, and that back patients who undergo so-called spine fusion often experience particularly long...

  17. Invisible marker based augmented reality system

    Science.gov (United States)

    Park, Hanhoon; Park, Jong-Il

    2005-07-01

    Augmented reality (AR) has recently gained significant attention. The previous AR techniques usually need a fiducial marker with known geometry or objects of which the structure can be easily estimated such as cube. Placing a marker in the workspace of the user can be intrusive. To overcome this limitation, we present an AR system using invisible markers which are created/drawn with an infrared (IR) fluorescent pen. Two cameras are used: an IR camera and a visible camera, which are positioned in each side of a cold mirror so that their optical centers coincide with each other. We track the invisible markers using IR camera and visualize AR in the view of visible camera. Additional algorithms are employed for the system to have a reliable performance in the cluttered background. Experimental results are given to demonstrate the viability of the proposed system. As an application of the proposed system, the invisible marker can act as a Vision-Based Identity and Geometry (VBIG) tag, which can significantly extend the functionality of RFID. The invisible tag is the same as RFID in that it is not perceivable while more powerful in that the tag information can be presented to the user by direct projection using a mobile projector or by visualizing AR on the screen of mobile PDA.

  18. The 'Invisible' Metal Particles in Catalysis

    NARCIS (Netherlands)

    Koningsberger, D.C.; Diaz-Moreno, S.; Muñoz-Paez, A.

    1997-01-01

    An easy, reliable and straightforward method to determine the sizes of small metal particles in supported metal catalyst which are invisible for most techniques (chemisorption, XRD, HRTEM) is presented. The technique we consider more appropriate is EXAFS, because it detects metal metal bonds even

  19. Axions: on the way to invisibility

    International Nuclear Information System (INIS)

    Girardi, G.

    1982-01-01

    We present a survey of the theoretical motivation which lead to the axion and we summarize its properties. A brief account of the experimental situation is given, which in addition to cosmological constraints imposes to the axion the way of invisibility in Grand Unified Theories

  20. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  1. Witnessing violence: making the invisible visible.

    Science.gov (United States)

    Holton, J K

    1995-01-01

    In his novel of Black life circa the 1950s, Invisible Man, Ralph Ellison laid bare the wasteful, destructive societal consequences of racism. At the close of the 20th century, we are faced with the phenomenon of another social problem, likewise unresolved and likely to haunt us similarly: urban violence. Following Ellison's example, this paper seeks to explore the impact of violence's stark invisibility by discussing a research strategy that better explains the terrifying phenomenon of violence. In order to comprehend the totality of violence, macro- and micro-level variables have to be introduced into the research design and measured over time. Therefore, research might best address violence if it was designed to include variables of poverty and racism, and was more inclusive of research from a broader range of scientific disciplines.

  2. Digital/Commercial (In)visibility

    DEFF Research Database (Denmark)

    Leander, Anna

    2017-01-01

    an argument demonstrating specifically how digital and commercial logics characterize the aesthetic, circulatory, and infrastructuring practices re-producing the regime of (in)visibility. It shows that digital/commercial logics are at the heart of the combinatorial marketing of multiple, contradictory images......This article explores one aspect of digital politics, the politics of videos and more spe- cifically of DAESH recruitment videos. It proposes a practice theoretical approach to the politics of DAESH recruitment videos focused on the re-production of regimes of (in)visibility. The article develops...... on the internet. The theoretical and political cost of overlooking these digital and commercial characteristics of DAESH visibility practices are high. It perpetuates misconceptions of how the videos work and what their politics are and it reinforces the digital Orientalism/Occidentalism in which...

  3. Heidegger’s phenomenology of the invisible

    Directory of Open Access Journals (Sweden)

    Andrzej SERAFIN

    2016-12-01

    Full Text Available Martin Heidegger has retrospectively characterized his philosophy as “phenomenology of the invisible”. This paradoxical formula suggests that the aim of his thinking was to examine the origin of the phenomena. Furthermore, Heidegger has also stated that his philosophy is ultimately motivated by a theological interest, namely the question of God’s absence. Following the guiding thread of those remarks, this essay analyzes the essential traits of Heidegger’s thought by interpreting them as an attempt to develop a phenomenology of the invisible. Heidegger’s attitude towards physics and metaphysics, his theory of truth, his reading of Aristotle, his concept of Dasein, his understanding of nothingness are all situated within the problematic context of the relation between the invisible and the revealed. Heidegger’s thought is thereby posited at the point of intersection of phenomenology, ontology, and theology.

  4. Invisible excess of sense in social interaction

    Czech Academy of Sciences Publication Activity Database

    Koubová, Alice

    Roč. 5, September /article 1081 (2014), s. 1-11 ISSN 1664-1078 R&D Projects: GA ČR GAP401/10/1164 Institutional support: RVO:67985955 Keywords : participatory sense-making * enactive theory * Merleau-Ponty * invisibility * opacity * (Inter)acting with the inner partner * performativity * dramaturgical analysis Subject RIV: AA - Philosophy ; Religion Impact factor: 2.560, year: 2014 http://journal.frontiersin.org/Journal/10.3389/fpsyg.2014.01081/abstract

  5. From Invisibility to Transparency: Identifying the Implications

    Directory of Open Access Journals (Sweden)

    Nancy J. Turner

    2008-12-01

    Full Text Available This paper explores the need for a broader and more inclusive approach to decisions about land and resources, one that recognizes the legitimacy of cultural values and traditional knowledge in environmental decision making and policy. Invisible losses are those not widely recognized or accounted for in decisions about resource planning and decision making in resource- and land-use negotiations precisely because they involve considerations that tend to be ignored by managers and scientists or because they are often indirect or cumulative, resulting from a complex, often cumulative series of events, decisions, choices, or policies. First Nations communities in western North America have experienced many such losses that, together, have resulted in a decline in the overall resilience of individuals and communities. We have identified eight types invisible losses that are often overlapping and cumulative: cultural/lifestyle losses, loss of identity, health losses, loss of self-determination and influence, emotional and psychological losses, loss of order in the world, knowledge losses, and indirect economic losses and lost opportunities. To render such invisible losses more transparent, which represents the first step in developing a more positive and equitable basis for decision making and negotiations around land and resources, we recommend six processes: focusing on what matters to the people affected, describing what matters in meaningful ways, making a place for these concerns in decision making, evaluating future losses and gains from a historical baseline, recognizing culturally derived values as relevant, and creating better alternatives for decision making so that invisible losses will be diminished or eliminated in the future.

  6. Through the Wormhole: Tracking Invisible MPLS Tunnels

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2017-01-01

    For years, Internet topology research has been conducted through active measurement. For instance, CAIDA builds router level topologies on top of IP level traces obtained with traceroute. The resulting graphs contain a significant amount of nodes with a very large degree, often exceeding the actual number of interfaces of a router. Although this property may result from inaccurate alias resolution, we believe that opaque MPLS clouds made of invisible tunnels are the main cause. Using Layer-2...

  7. Challenged assumptions and invisible effects

    DEFF Research Database (Denmark)

    Wimmelmann, Camilla Lawaetz; Vitus, Kathrine; Jervelund, Signe Smith

    2017-01-01

    for the implementation—different from the assumed conditions—not only challenge the implementation of the intervention but also potentially produce unanticipated yet valuable effects. Research implications – Newly arrived immigrants represent a hugely diverse and heterogeneous group of people with differing values......Purpose – The objective of this study was to examine any unanticipated effects of an educational intervention among newly arrived adult immigrants attending a language school in Denmark. Methodology – A qualitative case study was conducted including interviews with nine informants, observations....... In particular, the assumed (power) relations inherent in immigrant-oriented educational health interventions, in which immigrants are in a novice position, are challenged, as the immigrants are experienced adults (and parents) in regard to healthcare. The paper proposes that such unexpected conditions...

  8. Design, implementation, and extension of thermal invisibility cloaks

    Science.gov (United States)

    Zhang, Youming; Xu, Hongyi; Zhang, Baile

    2015-05-01

    A thermal invisibility cloak, as inspired by optical invisibility cloaks, is a device which can steer the conductive heat flux around an isolated object without changing the ambient temperature distribution so that the object can be "invisible" to external thermal environment. While designs of thermal invisibility cloaks inherit previous theories from optical cloaks, the uniqueness of heat diffusion leads to more achievable implementations. Thermal invisibility cloaks, as well as the variations including thermal concentrator, rotator, and illusion devices, have potentials to be applied in thermal management, sensing and imaging applications. Here, we review the current knowledge of thermal invisibility cloaks in terms of their design and implementation in cloaking studies, and their extension as other functional devices.

  9. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  10. Inverse problems, invisibility, and artificial wormholes

    International Nuclear Information System (INIS)

    Greenleaf, A; Kurylev, Y; Lassas, M; Uhlmann, G

    2008-01-01

    We will describe recent theoretical and experimental progress on making objects invisible to electromagnetic waves. Maxwell's equations have transformation laws that allow for design of electromagnetic parameters that would steer light around a hidden region, returning it to its original path on the far side. Not only would observers be unaware of the contents of the hidden region, they would not even be aware that something was hidden. The object would have no shadow. New advances in metamaterials have given some experimental evidence that this indeed can be made possible at certain frequencies

  11. Electromagnetic Invisibility of Elliptic Cylinder Cloaks

    International Nuclear Information System (INIS)

    Kan, Yao; Chao, Li; Fang, Li

    2008-01-01

    Structures with unique electromagnetic properties are designed based on the approach of spatial coordinate transformations of Maxwell's equations. This approach is applied to scheme out invisible elliptic cylinder cloaks, which provide more feasibility for cloaking arbitrarily shaped objects. The transformation expressions for the anisotropic material parameters and the field distribution are derived. The cloaking performances of ideal and lossy elliptic cylinder cloaks are investigated by finite element simulations. It is found that the cloaking performance will degrade in the forward direction with increasing loss. (fundamental areas of phenomenology (including applications))

  12. Ortodoncia estética invisible

    OpenAIRE

    Chávez Sevillano, Manuel Gustavo; Soldevilla Galarza, Luciano

    2014-01-01

    El adulto suele ofrecer resistencia a los convencionales tratamientos ortodóncicos, debido a la necesidad de llevar brackets visibles, tanto metálicos como estéticos de porcelana. El concepto de Ortodoncia Estética Invisible u Ortodoncia Lingual cubre las expectativas de este tipo de pacientes. La técnica multibrackets con aparatología lingual tiene aproximadamente 25 años de desarrollo y con la experiencia de los casos tratados, se ha llegado a la concepción de una técnica completamente prot...

  13. L'invisible invité

    OpenAIRE

    Frémy, Anne

    2012-01-01

    Tiré du site Internet de Onestar Press: ""They’re a kind of cabin or hut, very basic and awkwardly assembled, wedged into the space of the balcony between the guardrail and the wall of the building.The vertical sides are made of plywood, canvas or tarp, and are topped by a vegetal roofing that is more or less dry, more or less green, threaded with palm wattle. These huts are opaque and seem to communicate with apartments…" Excerpt from L’Invisible invité by Anne Frémy, english by Bruce Bender...

  14. (In)Visible Hand(s)

    OpenAIRE

    Predrag Zima

    2007-01-01

    In this paper, the author discusses the regulatory role of the state and legal norms, in market economy, especially in so-called transition countries. Legal policy, and other questions of the state and free market economy are here closely connected, because the state must ensure with legal norms that economic processes are not interrupted: only the state can establish the legal basis for a market economy. The free market’s invisible hand is acting in questions such as: what is to be produced,...

  15. Electromagnetic Detection of a Perfect Invisibility Cloak

    International Nuclear Information System (INIS)

    Zhang Baile; Wu, Bae-Ian

    2009-01-01

    A perfect invisibility cloak is commonly believed to be undetectable from electromagnetic (EM) detection because it is equivalent to a curved but empty EM space created from coordinate transformation. Based on the intrinsic asymmetry of coordinate transformation applied to motions of photons and charges, we propose a method to detect this curved EM space by shooting a fast-moving charged particle through it. A broadband radiation generated in this process makes a cloak visible. Our method is the only known EM mechanism so far to detect an ideal perfect cloak (curved EM space) within its working band.

  16. Mujeres invisibles en el Perú

    OpenAIRE

    Sköld, Luz Marina

    2007-01-01

    En el Perú, actualmente existen aproximadamente un millón de personas que no tienen un documento de identidad y no figuran en los registros del Estado. Son consideradas personas invisibles porque no existen le-galmente. De acuerdo a estudios realizados, este grupo de personas tiene un rostro específico; se trata de una población pobre, rural y principal-mente de mujeres. El 53% de las mujeres indocumentadas residen en el área rural. Las causas que originan la indocumentación son varias, entre...

  17. The invisible accounting side of ERP systems

    Directory of Open Access Journals (Sweden)

    Iliyan Dimitrov

    2017-12-01

    Full Text Available ERP (Enterprise Resource planning systems are widely used in many organizations, including companies in Bulgaria. Depending of the point of view statistical results of their implementation in recent years are contradictory (Infostat, 2017, (Eurostat, 2017. This paper reveals an overview of researchers and practitioners’ interpretations, who express opinion for an essence and advantages of adopting ERP systems. In academic and professional discussions one potential benefit stays invisible. The purpose of this publication is to provide new sight of essence and potential benefits which are given with ERP implementation. Some advantages of ERP systems are discussed. Some aspects of the links between ERP systems, management accounting and financial accounting are described.

  18. Learning or Lurking?: Tracking the "Invisible" Online Student.

    Science.gov (United States)

    Beaudoin, Michael F.

    2002-01-01

    This case study of inactive, or invisible, students enrolled in an online graduate course identifies how much time is spent in course-related activity, what the reasons are for students' invisibility, and if their preferred learning styles influence online behavior. Preliminary analysis of grades indicate that grades are better for high-visibility…

  19. Search for invisibly decaying Higgs boson at Large Hadron Collider

    Indian Academy of Sciences (India)

    In several scenarios of Beyond Standard Model physics, the invisible decay mode of the Higgs boson is an interesting possibility. The search strategy for an invisible Higgs boson at the Large Hadron Collider (LHC), using weak boson fusion process, has been studied in detail, by taking into account all possible ...

  20. Invisible Web and Academic Research: A Partnership for Quality

    Science.gov (United States)

    Alyami, Huda Y.; Assiri, Eman A.

    2018-01-01

    The present study aims to identify the most significant roles of the invisible web in improving academic research and the main obstacles and challenges facing the use of the invisible web in improving academic research from the perspective of academics in Saudi universities. The descriptive analytical approach was utilized in this study. It…

  1. LE PÈRE INVISIBLE ET SILENCIEUX CHEZ GISÈLE FOURNIER (The Invisible and Silent Father by Gisèle Fournier

    Directory of Open Access Journals (Sweden)

    Julie Crohas Commans

    2015-06-01

    Full Text Available The game of visible and invisible led by the paternal character in the novel Non-dits (2000 of Gisèle Fournier betrays the threat which presses on the story of a family torn by the secrets of the past. The father keeps out of the oppressive closed world he is sentenced to, using silence. Far from losing him, this attitude allows him to be marked out. And actually in the slow succession of the novel’s monologues, his image and his presence persist even after his suicide. The look of both character and reader is thus headed towards this paternal figure. Once narrativized, this vision allows us to question the contemporary illness which affects the transmission.

  2. Freedom, invisibility, and community: a qualitative study of self-identification with asexuality.

    Science.gov (United States)

    MacNeela, Pádraig; Murphy, Aisling

    2015-04-01

    A significant body of research is now emerging on the subjective meaning of asexuality. This study explored how self-identification as asexual is managed, both as a threat to the self-concept and a source of personal meaning. A total of 66 self-identified asexuals were recruited from an asexuality internet community and responded to open-ended questions on an online survey. Of these, 31 participants identified as female, 15 as male, 18 gave a different label such as genderqueer or androgynous, and two did not provide information on gender. A thematic analysis of the transcripts resulted in three themes. Socially, asexuality attracted denial and resistance due to incompatibility with heteronormative societal expectations. Despite the threat to self-integrity arising from asexuality being socially rejected, it was typically assimilated as a valued and meaningful orientation on an intra-personal level, aided by information and support from the online community. A second level of threat to self arose whereby other self-identifications, especially gender, had to be reconciled with a non-sexual persona. The accommodation made to other elements of the self was reflected in complex sub-identities. The findings were interpreted using identity process theory to understand how threats arising from self-identifying as asexual are managed. Although asexuality emerges as an orientation to sexuality that can be reconciled with the self, its invisibility or outright rejection in society constitute an on-going challenge.

  3. Stereotype Threat, Identification with Academics, and Withdrawal from School: Why the Most Successful Students of Colour Might Be Most Likely to Withdraw

    Science.gov (United States)

    Osborne, Jason W.; Walker, Christopher

    2006-01-01

    Claude Steeles' stereotype threat hypothesis posits that when there are negative stereotypes about the intellectual capacity of certain (stigmatised) groups, members of that group suffer aversive consequences; group members who are most strongly identified with the stigmatised domain in question (e.g., intellectual or academic ability) are those…

  4. ADAM SMITH: THE INVISIBLE HAND OR CONFIDENCE

    Directory of Open Access Journals (Sweden)

    Fernando Luis, Gache

    2010-01-01

    Full Text Available In 1776 Adam Smith raised the matter that an invisible hand was the one which moved the markets to obtain its efficiency. Despite in the present paper we are going to raise the hypothesis, that this invisible hand is in fact the confidence that each person feels when he is going to do business. That in addition it is unique, because it is different from the confidence of the others and that is a variable nonlinear that essentially is ligatured to respective personal histories. For that we are going to take as its bases the paper by Leopoldo Abadía (2009, with respect to the financial economy crisis that happened in 2007-2008, to evidence the form in which confidence operates. Therefore the contribution that we hope to do with this paper is to emphasize that, the level of confidence of the different actors, is the one which really moves the markets, (therefore the economy and that the crisis of the subprime mortgages is a confidence crisis at world-wide level.

  5. Invisible Axions and Large-Radius Compactifications

    CERN Document Server

    Dienes, Keith R.; Gherghetta, Tony; Dienes, Keith R.; Dudas, Emilian; Gherghetta, Tony

    2000-01-01

    We study some of the novel effects that arise when the QCD axion is placed in the ``bulk'' of large extra spacetime dimensions. First, we find that the mass of the axion can become independent of the energy scale associated with the breaking of the Peccei-Quinn symmetry. This implies that the mass of the axion can be adjusted independently of its couplings to ordinary matter, thereby providing a new method of rendering the axion invisible. Second, we discuss the new phenomenon of laboratory axion oscillations (analogous to neutrino oscillations), and show that these oscillations cause laboratory axions to ``decohere'' extremely rapidly as a result of Kaluza-Klein mixing. This decoherence may also be a contributing factor to axion invisibility. Third, we discuss the role of Kaluza-Klein axions in axion-mediated processes and decays, and propose several experimental tests of the higher-dimensional nature of the axion. Finally, we show that under certain circumstances, the presence of an infinite tower of Kaluza...

  6. L’ICÔNE : L’IMAGE ET L’INVISIBLE (Icon: The Image and the Invisible

    Directory of Open Access Journals (Sweden)

    Veronica Cibotaru

    2015-06-01

    Full Text Available An icon is part of the visible world, moreover, of things that are visible in a second degree. It is not only a sensitive thing, but a sensitive image of a sensitive entity. As an eikon, it is located in a platonic sense among the lowest degree of the doxa, and within the lowest degree of the scale of being. However it is not a simple sensitive and illusory representation of God, such as one criticized from a Kantian point of view. The profound sense of an icon lies in its opening towards the invisible. An icon tries to capture the invisible. How is this meeting point of the visible and the invisible entangled? Can an icon really allow us to “see” the invisible or is it only a profanation of the invisible? It is my aim to analyze those questions in the following article.

  7. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  8. Invisible Support: Effects on the Provider's Positive and Negative Affect.

    Science.gov (United States)

    König, Claudia; Stadler, Gertraud; Knoll, Nina; Ochsner, Sibylle; Hornung, Rainer; Scholz, Urte

    2016-07-01

    Social support that goes unnoticed by receivers (i.e. invisible support) seems to be most beneficial for the receivers' well-being. The providers' well-being, however, has been neglected so far. This study examines how invisible support is related to the providers' well-being and whether this association is dependent on the providers' relationship satisfaction. Overall, 97 non-smoking partners of smokers who were about to quit smoking were examined. Invisible support was assessed dyadically: partners' reports on smoking-specific provided social support together with smokers' reports on received support were assessed at baseline. Partners' relationship satisfaction was also assessed at baseline. Partners' positive and negative affect were measured at baseline and six-week follow-up. No main effects of invisible instrumental or emotional support occurred. However, partners' relationship satisfaction moderated the association between invisible instrumental support and change in partners' negative and positive affect: For partners with lower relationship satisfaction more invisible instrumental support was related to increased negative affect and decreased positive affect, whereas for partners with higher relationship satisfaction the inverse effects occurred. The study's results emphasise that invisible instrumental support might have emotional costs for the providers. Relationship satisfaction seems to serve as a protective factor. © 2016 The International Association of Applied Psychology.

  9. Invisible players: a family systems model.

    Science.gov (United States)

    Hellstedt, Jon

    2005-10-01

    This article attempts to demonstrate that the family is a key player in the athlete's development and performance, sometimes invisible, but often all too visible. The practice of clinical sport psychology is enriched by a family-based orientation to the assessment and treatment of athletes. Creating a workable family system is a challenge for parents. They have many difficult decisions to make, and are often without support and direction in making those choices. Sport psychiatrists and psychologists can be helpful to parents as well as athletes by using family-based assessments and treatment interventions that provide education, challenge, and support as they negotiate the tasks and transitions in the family life cycle.

  10. Visibility and Invisibility: the Work of Women

    Directory of Open Access Journals (Sweden)

    Patricia Alejandra Collado

    2009-01-01

    Full Text Available The crisis of employment, combined with theories about the end of work, place labor at the center of the agenda. Given this situation, it is found that debates around labor in general (its productive and reproductive spheres, its relation with employment and the visible and invisible forms of conducting work have been approached by one of the most neglected traditions of social thinking: feminism. Feminist thinkers have questioned the meaning of work and non-work in relation to the constant increase of the participation of women in the labor market. Although feminist proposals have different levels of analysis and emphasis, it is necessary to return to their unique production, in order to unveil the situation of greater exploitation and oppression, of workers in general and in particular of women. This situation is facilitated by the apparent “invisibilization” or by the loss of the centrality of labor.

  11. Invisibility cloak with image projection capability.

    Science.gov (United States)

    Banerjee, Debasish; Ji, Chengang; Iizuka, Hideo

    2016-12-13

    Investigations of invisibility cloaks have been led by rigorous theories and such cloak structures, in general, require extreme material parameters. Consequently, it is challenging to realize them, particularly in the full visible region. Due to the insensitivity of human eyes to the polarization and phase of light, cloaking a large object in the full visible region has been recently realized by a simplified theory. Here, we experimentally demonstrate a device concept where a large object can be concealed in a cloak structure and at the same time any images can be projected through it by utilizing a distinctively different approach; the cloaking via one polarization and the image projection via the other orthogonal polarization. Our device structure consists of commercially available optical components such as polarizers and mirrors, and therefore, provides a significant further step towards practical application scenarios such as transparent devices and see-through displays.

  12. Invisible Violence or from Ecstasy to Pain?

    Directory of Open Access Journals (Sweden)

    Lourdes Fernández Rius

    2008-01-01

    Full Text Available The values and roles for each gender are not socially recognized in an impartial way. It is a cultural construction that seeks, relying on the differences and, on a dichotomous hierarchy and power, to establish an inequality that reinforces the supremacy of masculinity as a value. In patriarchal culture – as a trend – men tend to be the most violent, and women to have a behavior of dependence and docility. Therefore the coupling relationships associated with fantasies of love are a space of power and are constantly harassed by experiences of servitude and domination. Difference – hierarchy – inequality – discrimination – violence, invisible feedback circuit that culture reedits daily and which expresses itself from psychological form to extreme damages primarily toward women on the amorous relationship.

  13. Thermal invisibility based on scattering cancellation and mantle cloaking

    KAUST Repository

    Farhat, Mohamed; Chen, P.-Y.; Bagci, Hakan; Amra, C.; Guenneau, S.; Alù , A.

    2015-01-01

    We theoretically and numerically analyze thermal invisibility based on the concept of scattering cancellation and mantle cloaking. We show that a small object can be made completely invisible to heat diffusion waves, by tailoring the heat conductivity of the spherical shell enclosing the object. This means that the thermal scattering from the object is suppressed, and the heat flow outside the object and the cloak made of these spherical shells behaves as if the object is not present. Thermal invisibility may open new vistas in hiding hot spots in infrared thermography, military furtivity, and electronics heating reduction.

  14. Thermal invisibility based on scattering cancellation and mantle cloaking

    KAUST Repository

    Farhat, Mohamed

    2015-04-30

    We theoretically and numerically analyze thermal invisibility based on the concept of scattering cancellation and mantle cloaking. We show that a small object can be made completely invisible to heat diffusion waves, by tailoring the heat conductivity of the spherical shell enclosing the object. This means that the thermal scattering from the object is suppressed, and the heat flow outside the object and the cloak made of these spherical shells behaves as if the object is not present. Thermal invisibility may open new vistas in hiding hot spots in infrared thermography, military furtivity, and electronics heating reduction.

  15. (In)visible threats? The third-person effect in perceptions of the influence of Facebook.

    Science.gov (United States)

    Paradise, Angela; Sullivan, Meghan

    2012-01-01

    The popularity of Facebook has generated numerous discussions on the individual-level effects of social networking. However, we know very little about people's perceptions of the effects of the most popular social networking site, Facebook. The current investigation reports the findings from a survey designed to help us better understand young people's estimates of the perceived negative effects of Facebook use on themselves and others in regard to three outcome categories: (1) personal relationships, (2) future employment opportunities, and (3) privacy. Congruent with Davidson's third-person effect theory, respondents, when asked about the three outcome categories, believed that the use of Facebook had a larger negative impact on others (e.g., "your closest friends," "younger people," "people in your Facebook network of friends," and "Facebook users in general") than on themselves. Overall, results were inconclusive when it came to the link between the third-person perceptual gap and support for enhanced regulation of Facebook. Implications and limitations of this research are discussed.

  16. Human trafficking in hotels: an 'invisible' threat for a vulnerable industry

    OpenAIRE

    Paraskevas, Alexandros; Brookes, Maureen

    2018-01-01

    Purpose: To identify and analyse the hotel sector's vulnerabilities that human traffickers exploit in order to use hotels as conduits for trafficking in human beings (THB).\\ud Design/methodology/approach: Using the MAVUS framework of sector vulnerability analysis, the study adopted a qualitative approach employing environmental scanning and semi-structured key stakeholder interviews in three European countries: UK, Finland and Romania.\\ud Findings: The study identifies the types of THB occurr...

  17. Invisible Threat In Sport Bag: Esophageal Obstruction Due To Aminoacid Tablets

    Directory of Open Access Journals (Sweden)

    Erhan Dedeoglu

    2013-10-01

    Full Text Available Although esophageal foreign bodies are mostly encountered in children, they also continue to constitute a life threatening problem in adults. Because of severe complications possibly to occur, esophageal foreign bodies should be extracted as soon as the diagnosis is made. A 30 year-old male patient who had a sense of blockage in the throat after taking two amino acid tablets and who was admitted to our emergency room and was discussed in this case report. In endoscopy performed with the initial diagnosis of esophageal foreign body, two attached tablets which completely obstruct lower lumen were removed immediately below the upper esophageal sphincter. In recent years, we wanted to share this case in order to express that increasing amino acid tablet usage will lead to serious complications.

  18. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  19. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  20. Integration of Federal Bureau of Investigation and United States Secret Service/Department of Education Threat Assessment Models into a Conceptual Framework for Prevention of School Violence

    Science.gov (United States)

    Augustyniak, Kristine M.

    2005-01-01

    Professionals entered the 21st century with a heightened call to address school safety. Though notable contributions have been made to insure peaceful school communities through a wide range of primary and secondary prevention programs, research suggests that these programs are often an insufficient response to students who are at increased risk…

  1. Making the invisible visible: gender, data, and evidence for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-11-30

    Nov 30, 2017 ... ... research projects play a critical role in reducing the invisibility gap. Thinking about gender and the related social categorizations such as class, ability, age, nation, and race when designing data collection and analysis tools ...

  2. The spatial practices of school administrative clerks: making space ...

    African Journals Online (AJOL)

    The spatial practices of school administrative clerks: making space for ... their invisible, largely taken-for-granted roles in a school's everyday functioning. This main aim of this article is to make their everyday practices and contributions visible, ...

  3. The invisible hand: regulation of RHO GTPases by RHOGDIs

    OpenAIRE

    Garcia-Mata, Rafael; Boulter, Etienne; Burridge, Keith

    2011-01-01

    The 'invisible hand' is a term originally coined by Adam Smith in the Theory of Moral Sentiments to describe the forces of self-interest, competition, and supply and demand that regulate the resources in society. This metaphor continues to be used by economists to describe the self-regulating nature of a market economy. The same metaphor can be used to describe the RHO-specific guanine nucleotide dissociation inhibitor (RHOGDI) family, which operates in the background, as an invisible hand, u...

  4. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  5. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  6. Arbitrarily elliptical-cylindrical invisible cloaking

    International Nuclear Information System (INIS)

    Jiang Weixiang; Cui Tiejun; Yu Guanxia; Lin Xianqi; Cheng Qiang; Chin, J Y

    2008-01-01

    Based on the idea of coordinate transformation (Pendry, Schurig and Smith 2006 Science 312 1780), arbitrarily elliptical-cylindrical cloaks are proposed and designed. The elliptical cloak, which is composed of inhomogeneous anisotropic metamaterials in an elliptical-shell region, will deflect incoming electromagnetic (EM) waves and guide them to propagate around the inner elliptical region. Such EM waves will return to their original propagation directions without distorting the waves outside the elliptical cloak. General formulations of the inhomogeneous and anisotropic permittivity and permeability tensors are derived for arbitrarily elliptical axis ratio k, which can also be used for the circular cloak when k = 1. Hence the elliptical cloaks can make a large range of objects invisible, from round objects (when k approaches 1) to long and thin objects (when k is either very large or very small). We also show that the material parameters in elliptical cloaking are singular at only two points, instead of on the whole inner circle for circular cloaking, which are much easier to be realized in actual applications. Full-wave simulations are given to validate the arbitrarily elliptical cloaking

  7. Invisible gold in Colombian auriferous soils

    Energy Technology Data Exchange (ETDEWEB)

    Bustos Rodriguez, H., E-mail: hbustos@ut.edu.co; Oyola Lozano, D.; Rojas Martinez, Y. A. [Universidad del Tolima, Departamento de Fisica (Colombia); Perez Alcazar, G. A. [Universidad del Valle, Departamento de Fisica (Colombia); Balogh, A. G. [Darmstadt University of Technology, Institute of Materials Science (Germany)

    2005-11-15

    Optic microscopy, X-ray diffraction (XRD), Moessbauer spectroscopy (MS), Electron microprobe analysis (EPMA) and secondary ions mass spectroscopy (SIMS) were used to study Colombian auriferous soils. The auriferous samples, collected from El Diamante mine, located in Guachavez-Narino (Colombia), were prepared by means of polished thin sections and polished sections for EPMA and SIMS. Petrography analysis was made using an optical microscope with a vision camera, registering the presence, in different percentages, of the following phases: pyrite, quartz, arsenopyrite, sphalerite, chalcopyrite and galena. By XRD analysis, the same phases were detected and their respective cell parameters calculated. By MS, the presence of two types of pyrite was detected and the hyperfine parameters are: {delta}{sub 1} = 0.280 {+-} 0.01 mm/s and {Delta}Q{sub 1} = 0.642 {+-} 0.01 mm/s, {delta}{sub 2} = 0.379 {+-} 0.01 mm/s and {Delta}Q{sub 2} = 0.613 {+-} 0.01 mm/s. For two of the samples MS detected also the arsenopyrite and chalcopyrite presence. The mean composition of the detected gold regions, established by EPMA, indicated 73% Au and 27% Ag (electrum type). Multiple regions of approximately 200 x 200 {mu}m of area in each mineral sample were analyzed by SIMS registering the presence of 'invisible gold' associated mainly with the pyrite and occasionally with the arsenopyrite.

  8. Visible propagation from invisible exogenous cueing.

    Science.gov (United States)

    Lin, Zhicheng; Murray, Scott O

    2013-09-20

    Perception and performance is affected not just by what we see but also by what we do not see-inputs that escape our awareness. While conscious processing and unconscious processing have been assumed to be separate and independent, here we report the propagation of unconscious exogenous cueing as determined by conscious motion perception. In a paradigm combining masked exogenous cueing and apparent motion, we show that, when an onset cue was rendered invisible, the unconscious exogenous cueing effect traveled, manifesting at uncued locations (4° apart) in accordance with conscious perception of visual motion; the effect diminished when the cue-to-target distance was 8° apart. In contrast, conscious exogenous cueing manifested in both distances. Further evidence reveals that the unconscious and conscious nonretinotopic effects could not be explained by an attentional gradient, nor by bottom-up, energy-based motion mechanisms, but rather they were subserved by top-down, tracking-based motion mechanisms. We thus term these effects mobile cueing. Taken together, unconscious mobile cueing effects (a) demonstrate a previously unknown degree of flexibility of unconscious exogenous attention; (b) embody a simultaneous dissociation and association of attention and consciousness, in which exogenous attention can occur without cue awareness ("dissociation"), yet at the same time its effect is contingent on conscious motion tracking ("association"); and (c) underscore the interaction of conscious and unconscious processing, providing evidence for an unconscious effect that is not automatic but controlled.

  9. Invisible cities? Urban issues in Oceania

    Directory of Open Access Journals (Sweden)

    Dorothée Dussy

    2016-08-01

    Full Text Available Why have cities stayed for so long an invisible object for the anthropology of Oceania? What is it to be an urban Pacific islander? What are the fields of interest of the anthropologists working in urban Oceania? Drawing on a review of urban research lead during the last decades in the Pacific archipelagos, this article aims at unfolding these different questions. We will evoke how anthropologists’ attraction for the authentic, the rural world and small indigenous communities have for long prevented any close look at the contemporary urban world. Urban cities are recent and have been created by colonisation; they are made of various populations of migrants whose trajectories have been molded by colonisation and globalization. The study of these recent cities associate various issues such as creolization, informal economy, periurbanisation, circular migration, relations between expatriates and indigenous people, and contemporary uses of tradition or “custom”. Eventually, the paper concludes with the will to claim the right for the anthropology of urban Oceania to find its place among the discipline, among the vast collection of studies evoking the rural and so-called traditional worlds of the region.

  10. Invisible gold in Colombian auriferous soils

    International Nuclear Information System (INIS)

    Bustos Rodriguez, H.; Oyola Lozano, D.; Rojas Martinez, Y. A.; Perez Alcazar, G. A.; Balogh, A. G.

    2005-01-01

    Optic microscopy, X-ray diffraction (XRD), Moessbauer spectroscopy (MS), Electron microprobe analysis (EPMA) and secondary ions mass spectroscopy (SIMS) were used to study Colombian auriferous soils. The auriferous samples, collected from El Diamante mine, located in Guachavez-Narino (Colombia), were prepared by means of polished thin sections and polished sections for EPMA and SIMS. Petrography analysis was made using an optical microscope with a vision camera, registering the presence, in different percentages, of the following phases: pyrite, quartz, arsenopyrite, sphalerite, chalcopyrite and galena. By XRD analysis, the same phases were detected and their respective cell parameters calculated. By MS, the presence of two types of pyrite was detected and the hyperfine parameters are: δ 1 = 0.280 ± 0.01 mm/s and ΔQ 1 = 0.642 ± 0.01 mm/s, δ 2 = 0.379 ± 0.01 mm/s and ΔQ 2 = 0.613 ± 0.01 mm/s. For two of the samples MS detected also the arsenopyrite and chalcopyrite presence. The mean composition of the detected gold regions, established by EPMA, indicated 73% Au and 27% Ag (electrum type). Multiple regions of approximately 200 x 200 μm of area in each mineral sample were analyzed by SIMS registering the presence of 'invisible gold' associated mainly with the pyrite and occasionally with the arsenopyrite.

  11. Broadband unidirectional invisibility for airborne sound

    Science.gov (United States)

    Kan, Weiwei; Guo, Mengping; Shen, Zhonghua

    2018-05-01

    We present a metafluid-based broadband cloak capable of guiding acoustic waves around obstacles along given directions while maintaining the wavefront undisturbed. The required parameter distribution of the proposed cloak is derived by coordinate transformation and practically implemented by employing the acoustic metafluid formed with periodically arranged slabs in acoustic chambers. The method for independently modulating the effective mass density and bulk modulus of the metafluid is developed by tuning the geometry parameters and the temperature of the acoustic chamber in a specific process. By virtue of this free-modulated method, the range of realizable effective parameters is substantially broadened, and the acoustic impedance of the anisotropic structures can be well matched to the background. The performance of the designed structure is quantitatively evaluated in the frequency range of 3-4 kHz by the averaged invisibility factor. The results show that the proposed cloak is effective in manipulating the acoustic field along the given direction and suppressing the wave scattering from the hidden object.

  12. A newly identified group of adolescents at "invisible" risk for psychopathology and suicidal behavior: findings from the SEYLE study.

    Science.gov (United States)

    Carli, Vladimir; Hoven, Christina W; Wasserman, Camilla; Chiesa, Flaminia; Guffanti, Guia; Sarchiapone, Marco; Apter, Alan; Balazs, Judit; Brunner, Romuald; Corcoran, Paul; Cosman, Doina; Haring, Christian; Iosue, Miriam; Kaess, Michael; Kahn, Jean Pierre; Keeley, Helen; Postuvan, Vita; Saiz, Pilar; Varnik, Airi; Wasserman, Danuta

    2014-02-01

    This study explored the prevalence of risk behaviors (excessive alcohol use, illegal drug use, heavy smoking, reduced sleep, overweight, underweight, sedentary behavior, high use of Internet/TV/videogames for reasons not related to school or work, and truancy), and their association with psychopathology and self-destructive behaviors, in a sample of 12,395 adolescents recruited in randomly selected schools across 11 European countries. Latent class analysis identified three groups of adolescents: a low-risk group (57.8%) including pupils with low or very low frequency of risk behaviors; a high-risk group (13.2%) including pupils who scored high on all risk behaviors, and a third group ("invisible" risk, 29%) including pupils who were positive for high use of Internet/TV/videogames for reasons not related to school or work, sedentary behavior and reduced sleep. Pupils in the "invisible" risk group, compared with the high-risk group, had a similar prevalence of suicidal thoughts (42.2% vs. 44%), anxiety (8% vs. 9.2%), subthreshold depression (33.2% vs. 34%) and depression (13.4% vs. 14.7%). The prevalence of suicide attempts was 5.9% in the "invisible" group, 10.1% in the high-risk group and 1.7% in the low-risk group. The prevalence of all risk behaviors increased with age and most of them were significantly more frequent among boys. Girls were significantly more likely to experience internalizing (emotional) psychiatric symptoms. The "invisible" group may represent an important new intervention target group for potentially reducing psychopathology and other untoward outcomes in adolescence, including suicidal behavior. Copyright © 2014 World Psychiatric Association.

  13. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  14. Soil and public health: invisible bridges

    Science.gov (United States)

    Pachepsky, Yakov

    2017-04-01

    Public health institutions, as ancient as civilizations itself, are intrinsically connected with soils. The massive body of the empirical knowledge about this connection has been accumulated. Recently unraveling the underlying mechanisms of this link has begun, and many of them appear to have the microbiological origin. The impressive progress in understanding the nexus between soil and health has been achieved by experimentation with preserved soil microbial systems functioning along with the metagenomic characterization. The objective of this work is to present an overview of some recent onsets. In the food safety arena, survival of human pathogens in soils has been related to the degree of soil eutrophication and/or related structure of soil microbial communities. Soil microbial systems affect the affinity of plants to internalizing pathogenic organisms. Pharmaceutical arsenals benefit from using field soil environment for developing antibiotics. Enzyme production by soil bacteria is used as the signal source for drug activation. Sanitary functions of sols are dependent on soil microbial system workings. The healthy living can be enhanced by the human immune system training received from direct contact with soils. The hygiene hypothesis considers the microbial input due to exposure to soil as the essential ecosystem service. The invisible links between soil and public health result in large-scale consequences. Examples of concurrent degradation of soil and public health are worth scrutinizing. Public health records can provide valuable sources of 'soil-public health' interactions. It may be worthwhile to examine current assessments of soil health from the public health standpoint. Soil management can be an efficient instrument of public health control.

  15. Invisible Higgs decays from Higgs-graviscalar mixing

    International Nuclear Information System (INIS)

    Dominici, Daniele; Gunion, John F.

    2009-01-01

    We recompute the invisible Higgs decay width arising from Higgs-graviscalar mixing in the Arkani-Hamed, Dimopoulos, Dvali model, comparing the original derivation in the nondiagonal mass basis to that in a diagonal mass basis. The results obtained are identical (and differ by a factor of 2 from the original calculation) but the diagonal-basis derivation is pedagogically useful for clarifying the physics of the invisible width from mixing. We emphasize that both derivations make it clear that a direct scan in energy for a process such as WW→WW mediated by Higgs plus graviscalar intermediate resonances would follow a single Breit-Wigner form with total width given by Γ tot =Γ h SM +Γ invisible . We also compute the additional contributions to the invisible width due to direct Higgs to graviscalar-pair decays. We find that the invisible width due to the latter is relatively small, unless the Higgs mass is comparable to or larger than the effective extra-dimensional Planck mass.

  16. The Physics of Invisibility A Story of Light and Deception

    CERN Document Server

    Beech, Martin

    2012-01-01

    Arthur C. Clarke famously wrote that, "any sufficiently advanced technology is indistinguishable from magic." These words most certainly ring true with respect to invisibility cloaking devices. At work is the magic of science, of course. The technology to make an object simply disappear from view is now a reality. There is both great fear and great desire in the thought of invisibility. Indeed, for thousands of years, authors have grappled with the idea. Power, devilry, secrecy, ethical dilemma, and moral corruption - invisibility has it all. And yet, our waking world is full of familiar invisible phenomena. Electricity flowing along a metal wire, the gravity that keeps us grounded, the air we breathe, the bacteria and viruses that make us ill, the X-rays that reveal our broken bones - all are invisible to our eyes. They surround and envelop us, and we don't give them a second thought. Nature long ago learned how to play tricks with light rays, enriching the world with rainbows, mirages, and animal camouflag...

  17. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  18. Neglect of teaching in Physical Education classes the invisibility of the disciplinary knowledge

    Directory of Open Access Journals (Sweden)

    Fernando Jaime González

    2013-12-01

    Full Text Available This research aimed to recognize similarities and differences in the configuration of cases of teachers of Physical Education characterized by dereliction of teaching. This study tried to understand how members of the school community, especially managers, see (if they do the teaching practices of two teachers with similar teaching propositions in the classroom, but with a different engagement with the institution.The text was constructed based on two case studies developed in 2010 in public schools in counties of northeastern states of Rio Grande do Sul.Data were collected based on semi-structured interviews and field diaries.The results indicate that the neglect of teaching is perceived by members of the school community only when the teacher rejects any proposition in class and does not respond to other needs of the school, and his action is not acknowledged. The teacher is not guided by the contents of the higher education of the school discipline, and still does not change the school routines and minimally contemplates the tradition. The knowledge addressed (or not in Physical Education classes is invisible to the eyes of school administrators

  19. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  20. Extinction cross-section suppression and active acoustic invisibility cloaking

    Science.gov (United States)

    Mitri, F. G.

    2017-10-01

    Invisibility in its canonical form requires rendering a zero extinction cross-section (or energy efficiency) from an active or a passive object. This work demonstrates the successful theoretical realization of this physical effect for an active cylindrically radiating acoustic body, undergoing periodic axisymmetric harmonic vibrations near a flat rigid boundary. Radiating, amplification and extinction cross-sections of the active source are defined. Assuming monopole and dipole modal oscillations of the circular source, conditions are found where the extinction energy efficiency factor of the active source vanishes, achieving total invisibility with minimal influence of the source size. It also takes positive or negative values, depending on its size and distance from the boundary. Moreover, the amplification energy efficiency factor is negative for the acoustically-active source. These effects also occur for higher-order modal oscillations of the active source. The results find potential applications in the development of acoustic cloaking devices and invisibility.

  1. Extinction cross-section suppression and active acoustic invisibility cloaking

    International Nuclear Information System (INIS)

    Mitri, F G

    2017-01-01

    Invisibility in its canonical form requires rendering a zero extinction cross-section (or energy efficiency) from an active or a passive object. This work demonstrates the successful theoretical realization of this physical effect for an active cylindrically radiating acoustic body, undergoing periodic axisymmetric harmonic vibrations near a flat rigid boundary. Radiating, amplification and extinction cross-sections of the active source are defined. Assuming monopole and dipole modal oscillations of the circular source, conditions are found where the extinction energy efficiency factor of the active source vanishes, achieving total invisibility with minimal influence of the source size. It also takes positive or negative values, depending on its size and distance from the boundary. Moreover, the amplification energy efficiency factor is negative for the acoustically-active source. These effects also occur for higher-order modal oscillations of the active source. The results find potential applications in the development of acoustic cloaking devices and invisibility. (letter)

  2. En el limbo de lo invisible. In the limbo of the invisible

    Directory of Open Access Journals (Sweden)

    Carmen Arocena

    2012-04-01

    Full Text Available La violencia sobre la mujer representada en los medios de comunicación adquiere diversas formas que no siempre se manifiestan de manera explícita. A través de las modalidades de manipulación descritas por Greimas y Cour t é s l a s imágenes contemporáneas imponen a la mujer un único canon de belleza aceptable y una engañosa representación de su goce mediatizada por el deseo y la satisfacción masculinas. La dialéctica entre lo visible y lo invisible que el ojo patriarcal ha instaurado en la sociedad occidental por medio de la tiranía de los medios de comunicación de masas,aún impiden a la mujer, en pleno siglo XXI, el acceso a una manifestación libre y fidedigna de su propia naturaleza física y sexual.The representation of violence against women in the mass media adopts different forms that are not always explicit. Through the modes of manipulation described by Greimas and Courtés, contemporary images subject women to a single canon of acceptable beauty and a deceitfull representation of their pleasure mediated by masculine desire and satisfaction. Well into the XXI century, the dialectic between the visible and the invisible, which the patriarchal eye has installed inwestern society through the tyranny of the mass media, still preventswomen from having access to a free and reliable expression of theirown physical and sexual nature.

  3. Invisible fat on CT: making it visible by MRI.

    Science.gov (United States)

    Ünal, Emre; Karaosmanoğlu, Ali Devrim; Akata, Deniz; Özmen, Mustafa Nasuh; Karçaaltıncaba, Muşturay

    2016-01-01

    Presence of fat in a lesion significantly narrows the differential diagnosis. Small quantities of macroscopic fat and intracellular fat are invisible on computed tomography (CT) and ultrasonography. Magnetic resonance imaging (MRI) can reveal any fatty change in a lesion and can also differentiate macroscopic fat from intracellular and intravoxel fat. Hypodensity on CT may be a sign of invisible fat and MRI can help to diagnose even minute amounts of fat in liver, pancreas, adrenal, musculoskeletal, and omental pseudolesions and lesions. This article will review the superiority of MRI over CT in demonstrating fat in abdominal lesions.

  4. Design of invisibility cloaks with an open tunnel.

    Science.gov (United States)

    Ako, Thomas; Yan, Min; Qiu, Min

    2010-12-20

    In this paper we apply the methodology of transformation optics for design of a novel invisibility cloak which can possess an open tunnel. Such a cloak facilitates the insertion (retrieval) of matter into (from) the cloak's interior without significantly affecting the cloak's performance, overcoming the matter exchange bottleneck inherent to most previously proposed cloak designs.We achieve this by applying a transformation which expands a point at the origin in electromagnetic space to a finite area in physical space in a highly anisotropic manner. The invisibility performance of the proposed cloak is verified by using full-wave finite-element simulations.

  5. Smith’s invisible hand: controversy is needed

    Directory of Open Access Journals (Sweden)

    Flavia Di Mario

    2017-11-01

    Full Text Available Smith’s metaphor of the invisible hand, commonly attributed to The Wealth of Nations, is described in the Theory of Moral Sentiments. It is a ‘deception’ fed to the lower classes. Private initiative depends upon the presence of privileged classes in a conservative rather than liberal state. Only thus can the ‘invisible hand’ improve the nation’s ‘wealth.’ Hence, the economic mainstream cannot easily claim Adam Smith as their ancestor. Nor can the Marxists associate him to the misdeeds of the mainstream. A Smithian ancestry is more plausible for Neoliberals.

  6. The 'invisible hand': regulation of RHO GTPases by RHOGDIs.

    Science.gov (United States)

    Garcia-Mata, Rafael; Boulter, Etienne; Burridge, Keith

    2011-07-22

    The 'invisible hand' is a term originally coined by Adam Smith in The Theory of Moral Sentiments to describe the forces of self-interest, competition and supply and demand that regulate the resources in society. This metaphor continues to be used by economists to describe the self-regulating nature of a market economy. The same metaphor can be used to describe the RHO-specific guanine nucleotide dissociation inhibitor (RHOGDI) family, which operates in the background, as an invisible hand, using similar forces to regulate the RHO GTPase cycle.

  7. The invisible hand: regulation of RHO GTPases by RHOGDIs

    Science.gov (United States)

    Garcia-Mata, Rafael; Boulter, Etienne; Burridge, Keith

    2011-01-01

    Preface The 'invisible hand' is a term originally coined by Adam Smith in the Theory of Moral Sentiments to describe the forces of self-interest, competition, and supply and demand that regulate the resources in society. This metaphor continues to be used by economists to describe the self-regulating nature of a market economy. The same metaphor can be used to describe the RHO-specific guanine nucleotide dissociation inhibitor (RHOGDI) family, which operates in the background, as an invisible hand, using similar forces to regulate the RHO GTPase cycle. PMID:21779026

  8. Adam Smith and the Invisible Hand: From Metaphor to Myth

    OpenAIRE

    Gavin Kennedy

    2009-01-01

    Adam Smith and the ‘invisible hand’ are nearly synonymous in modern economic thinking. Adam Smith is strongly associated with the invisible hand, understood as a general rule that people in realising their self-interests unintentionally benefit the public good. The attribution to Smith is challengeable. Adam Smith’s use of the metaphor was much more modest; it was re-invented in the 1930s and 1940s onwards to bolster mathematical treatments of capitalism (Samuelson, Friedman) and to sup...

  9. Slow light invisibility, teleportation, and other mysteries of light

    CERN Document Server

    Perkowitz, Sidney

    2011-01-01

    Slow Light is a popular treatment of today's astonishing breakthroughs in the science of light. Even though we don't understand light's quantum mysteries, we can slow it to a stop and speed it up beyond its Einsteinian speed limit, 186,000 miles/sec; use it for quantum telecommunications; teleport it; manipulate it to create invisibility; and perhaps generate hydrogen fusion power with it. All this is lucidly presented for non-scientists who wonder about teleportation, Harry Potter invisibility cloaks, and other fantastic outcomes. Slow Light shows how the real science and the fantasy inspire

  10. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  11. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  12. Radon in Schools

    Science.gov (United States)

    ... Search Search Radon Contact Us Share Radon in Schools Related Information Managing Radon in Schools Radon Measurement ... Radon Could Be a Serious Threat to Your School Chances are you've already heard of radon - ...

  13. Whiteness and Ethnocentric Monoculturalism: Making the "Invisible" Visible

    Science.gov (United States)

    Sue, Derald Wing

    2004-01-01

    Whiteness and ethnocentric monoculturalism are powerful and entrenched determinants of worldview. Because they are invisible and operate outside the level of conscious awareness, they can be detrimental to people of color, women, and other marginalized groups in society. Both define a reality that gives advantages to White Euro American males…

  14. Racism, Invisibility, and the Alienation of the African American in ...

    African Journals Online (AJOL)

    Although Ralph Ellison's Invisible Man has enjoyed a plethora of readings, how the Marxist concept of alienation and estrangement figure in the narrative has been largely ignored. Moreover, critics appear not to be in agreement about Ellison's aesthetic project in this novel. While some acknowledge the “Negro slant” of the ...

  15. The Visible and the Invisible: Mathematics as Revelation

    Science.gov (United States)

    Roth, Wolff-Michael; Maheux, Jean-François

    2015-01-01

    Mathematics educators have shown increasing interest in theorizing knowing and learning as something alive or as something that comes alive through the involvement of the body. Almost all current efforts attempt doing so by focusing on the body in which the otherwise invisible living being exhibits itself, thereby failing to consider everything…

  16. Signals for invisible matter from solar-terrestrial observations

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    We observe a strong correlation between the orbital position of the planets with solar phenomena like flares or the variation of EUV irradiance. Similarly, a correlation is found in the study of the ionization content of the Earth atmosphere. Planetary gravitational lensing of one (or more) streams of slow moving invisible matter is proposed as an explanation of such a behaviour.

  17. Search for invisibly decaying Higgs boson at Large Hadron Collider

    Indian Academy of Sciences (India)

    boson with a mass of 120 GeV/c2 for LHC energy of 14 TeV. Since the ... The exercise described here for the determination of the significance for excess ... to search for the invisible Higgs boson with less than 10 fb−1 at 3σ level [8]. We report ...

  18. Invisible Connections : Why Migrating Shorebirds Need the Yellow Sea

    NARCIS (Netherlands)

    van de Kam, Jan; Battley, Phil; McCaffery, Brian; Rogers, Danny; Hong, Jae-Sang; Moores, Nial; Yong-ki, Yu; Lewis, Jan; Piersma, Theunis

    2010-01-01

    Each year, invisible to the naked eye, millions of migrating shorebirds fly from Australasia towards the tidal flats of the Yellow Sea bordering China and Korea. Each flock is made up of individuals using whatever strategies they can muster to endure the flights, weather the storms and find safe

  19. Exploring the invisible universe from black holes to superstrings

    CERN Document Server

    Baaquie, Belal E

    2015-01-01

    "Why"? Why is the world, the Universe the way it is? Is space infinitely large? How small is small? What happens when one continues to divide matter into ever smaller pieces? Indeed, what is matter? Is there anything else besides what can be seen? Pursuing the questions employing the leading notions of physics, one soon finds that the tangible and visible world dissolves — rather unexpectedly — into invisible things and domains that are beyond direct perception. A remarkable feature of our Universe is that most of its constituents turn out to be invisible, and this fact is brought out with great force by this book. Exploring the Invisible Universe covers the gamut of topics in advanced modern physics and provides extensive and well substantiated answers to these questions and many more. Discussed in a non-technical, yet also non-trivial manner, are topics dominated by invisible things — such as Black Holes and Superstrings as well as Fields, Gravitation, the Standard Model, Cosmology, Relativity, the O...

  20. Invisible Culture: Taking Art Education to the Streets

    Science.gov (United States)

    Darts, David

    2011-01-01

    Art educators and administrators allowed a project to evolve based on the "street life" experiences of ordinarily invisible people. The goal was to create a space or number of spaces for celebrating the human spirit through art, music, dance, poetry, theater, and story while also providing a forum for exploring some of the social issues affecting…

  1. Children's Attributions of Intentions to an Invisible Agent

    Science.gov (United States)

    Bering, Jesse M.; Parker, Becky D.

    2006-01-01

    Children ages 3-9 years were informed that an invisible agent (Princess Alice) would help them play a forced-choice game by "telling them, somehow, when they chose the wrong box," whereas a matched control group of children were not given this supernatural prime. On 2 unexpected event trials, an experimenter triggered a simulated unexpected event…

  2. Harlequin, Holberg and the (in)visible masks

    DEFF Research Database (Denmark)

    Holm, Bent

    1998-01-01

    A reading of Holberg's harquinades "Ulysses Von Itacia" and "The Invisibles" placed in a context of European grotesque theatre with a specific regard to the texts relation to respectively older and newer French-Italian masque theatre. The analysis suggeststhat the first text is in perfect accorda...

  3. Aligners: the Invisible Corrector-A Boon or Bane.

    Science.gov (United States)

    Mahendra, Lodd

    2018-03-01

    The trend of clinical orthodontics has shown a palpable shift from conventional braces to innovative technologies like invisible aligners. Aligners are sequences of clear trays worn by patients to straighten their teeth. They were envisaged for the main purpose of esthetics, mainly directed toward self-conscious teenagers who otherwise would shy away from essential correction of malocclusion.

  4. The Signatures of the Invisible exhibition in Geneva

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The artist Paola Pivi with her work at the Signatures of the Invisible exhibition in Geneva during February 2002. This piece with needles suspended on nylon thread 'detects' people as they approach. The exhibition was for art inspired by research carried out at CERN.

  5. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  6. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  7. Ghost Children: Invisible Middle Level Students

    Science.gov (United States)

    Matteson, Shirley M.

    2014-01-01

    For this study, 119 middle level teacher candidates identified, observed, and documented their interactions with middle school "ghost children" as part of their field placement activities. About two thirds of the 124 ghost children identified for this study were male. The teacher candidates documented additional characteristics of ghost…

  8. The Invisible Woman and the Silent University

    Science.gov (United States)

    Cole, Elizabeth Robinson

    2012-01-01

    Anna Eliot Ticknor (1823-1896) founded the first correspondence school in the United States, the Society to Encourage Studies at Home. In the fall of 1873 an educational movement was quietly initiated from her home in Boston, Massachusetts. A politically and socially sophisticated leader, she recognized the need that women felt for continuing…

  9. A rigorous analysis of high-order electromagnetic invisibility cloaks

    International Nuclear Information System (INIS)

    Weder, Ricardo

    2008-01-01

    There is currently a great deal of interest in the invisibility cloaks recently proposed by Pendry et al that are based on the transformation approach. They obtained their results using first-order transformations. In recent papers, Hendi et al and Cai et al considered invisibility cloaks with high-order transformations. In this paper, we study high-order electromagnetic invisibility cloaks in transformation media obtained by high-order transformations from general anisotropic media. We consider the case where there is a finite number of spherical cloaks located in different points in space. We prove that for any incident plane wave, at any frequency, the scattered wave is identically zero. We also consider the scattering of finite-energy wave packets. We prove that the scattering matrix is the identity, i.e., that for any incoming wave packet the outgoing wave packet is the same as the incoming one. This proves that the invisibility cloaks cannot be detected in any scattering experiment with electromagnetic waves in high-order transformation media, and in particular in the first-order transformation media of Pendry et al. We also prove that the high-order invisibility cloaks, as well as the first-order ones, cloak passive and active devices. The cloaked objects completely decouple from the exterior. Actually, the cloaking outside is independent of what is inside the cloaked objects. The electromagnetic waves inside the cloaked objects cannot leave the concealed regions and vice versa, the electromagnetic waves outside the cloaked objects cannot go inside the concealed regions. As we prove our results for media that are obtained by transformation from general anisotropic materials, we prove that it is possible to cloak objects inside general crystals

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  12. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  13. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  14. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  15. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  16. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  17. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  18. An ultrathin invisibility skin cloak for visible light.

    Science.gov (United States)

    Ni, Xingjie; Wong, Zi Jing; Mrejen, Michael; Wang, Yuan; Zhang, Xiang

    2015-09-18

    Metamaterial-based optical cloaks have thus far used volumetric distribution of the material properties to gradually bend light and thereby obscure the cloaked region. Hence, they are bulky and hard to scale up and, more critically, typical carpet cloaks introduce unnecessary phase shifts in the reflected light, making the cloaks detectable. Here, we demonstrate experimentally an ultrathin invisibility skin cloak wrapped over an object. This skin cloak conceals a three-dimensional arbitrarily shaped object by complete restoration of the phase of the reflected light at 730-nanometer wavelength. The skin cloak comprises a metasurface with distributed phase shifts rerouting light and rendering the object invisible. In contrast to bulky cloaks with volumetric index variation, our device is only 80 nanometer (about one-ninth of the wavelength) thick and potentially scalable for hiding macroscopic objects. Copyright © 2015, American Association for the Advancement of Science.

  19. Object permanence in dogs: invisible displacement in a rotation task.

    Science.gov (United States)

    Miller, Holly C; Gipson, Cassie D; Vaughan, Aubrey; Rayburn-Reeves, Rebecca; Zentall, Thomas R

    2009-02-01

    Dogs were tested for object permanence using an invisible displacement in which an object was hidden in one of two containers at either end of a beam and the beam was rotated. Consistent with earlier research, when the beam was rotated 180 degrees , the dogs failed to find the object. However, when the beam was rotated only 90 degrees , they were successful. Furthermore, when the dogs were led either 90 degrees or 180 degrees around the apparatus, they were also successful. In a control condition, when the dogs could not see the direction of the 90 degrees rotation, they failed to find the object. The results suggest that the 180 degrees rotation may produce an interfering context that can be reduced by rotating the apparatus only 90 degrees or by changing the dogs' perspective. Once the conflict is eliminated, dogs show evidence of object permanence that includes invisibly displaced objects.

  20. Unpacking the invisible knapsack: The invention of white privilege pedagogy

    Directory of Open Access Journals (Sweden)

    Leslie Margolin

    2015-12-01

    Full Text Available This article uses Ricoeur’s hermeneutics of suspicion, an interpretive strategy directed to the hidden or repressed meanings behind texts, to examine the origins of white privilege pedagogy, in particular their foundational technique, “unpacking the invisible knapsack.” This article’s chief finding is that this pedagogy, though designed to fight racism, has the unintended effect of supporting white privilege. Teaching whites to “unpack their invisible knapsack” does not make them more willing to take action against racial inequality. On the contrary, it makes them more complacent, more at home in an unjust world, and more comfortable with their whiteness. White privilege pedagogy does this by focusing on personal identity (whites’ personal identity over institutional structures, by paying more attention to whites’ experiences than to blacks’, by falsely claiming that the confession of white privileges leads to social action beneficial to blacks, and by restoring and expanding whites’ sense of moral rightness.

  1. Phenomenology of a leptonic goldstino and invisible Higgs boson decays

    CERN Document Server

    Antoniadis, Ignatios; Zwirner, Fabio; Antoniadis, Ignatios; Tuckmantel, Marc; Zwirner, Fabio

    2005-01-01

    Non-linearly realized supersymmetry, combined with the Standard Model field content and SU(3)XSU(2)XU(1) gauge invariance, permits local dimension-six operators involving a goldstino, a lepton doublet and a Higgs doublet. These interactions preserve total lepton number if the left-handed goldstino transforms as an antilepton. We discuss the resulting phenomenology, in the simple limit where the new couplings involve only one lepton family, thus conserving also lepton flavour. Both the Z boson and the Higgs boson can decay into a neutrino and a goldstino: the present limits from the invisible Z width and from other observables leave room for the striking possibility of a Higgs boson decaying dominantly, or at least with a sizable branching ratio, via such an invisible mode. We finally comment on the perspectives at hadron and lepton colliders, and on possible extensions of our analysis.

  2. Search for an invisibly-decaying Higgs boson at LEP

    CERN Document Server

    Achard, P; Aguilar-Benítez, M; Alcaraz, J; Alemanni, G; Allaby, James V; Aloisio, A; Alviggi, M G; Anderhub, H; Andreev, V P; Anselmo, F; Arefev, A; Azemoon, T; Aziz, T; Bagnaia, P; Bajo, A; Baksay, G; Baksay, L; Baldew, S V; Banerjee, S; Barczyk, A; Barillère, R; Bartalini, P; Basile, M; Batalova, N; Battiston, R; Bay, A; Becattini, F; Becker, U; Behner, F; Bellucci, L; Berbeco, R; Berdugo, J; Berges, P; Bertucci, B; Betev, B L; Biasini, M; Biglietti, M; Biland, A; Blaising, J J; Blyth, S C; Bobbink, G J; Böhm, A; Boldizsar, L; Borgia, B; Bottai, S; Bourilkov, D; Bourquin, Maurice; Braccini, S; Branson, J G; Brochu, F; Burger, J D; Burger, W J; Cai, X D; Capell, M; Cara Romeo, G; Carlino, G; Cartacci, A; Casaus, J; Cavallari, F; Cavallo, N; Cecchi, C; Cerrada, M; Chamizo-Llatas, M; Chang, Y H; Chemarin, M; Chen, A; Chen, G; Chen, G M; Chen, H F; Chen, H S; Chiefari, G; Cifarelli, Luisa; Cindolo, F; Clare, I; Clare, R; Coignet, G; Colino, N; Costantini, S; de la Cruz, B; Cucciarelli, S; van Dalen, J A; De Asmundis, R; Déglon, P L; Debreczeni, J; Degré, A; Dehmelt, K; Deiters, K; Della Volpe, D; Delmeire, E; Denes, P; De Notaristefani, F; De Salvo, A; Diemoz, M; Dierckxsens, M; Dionisi, C; Dittmar, M; Doria, A; Dova, M T; Duchesneau, D; Duda, M; Echenard, B; Eline, A; El-Hage, A; El-Mamouni, H; Engler, A; Eppling, F J; Extermann, P; Falagán, M A; Falciano, S; Favara, A; Fay, J; Fedin, O; Felcini, M; Ferguson, T; Fesefeldt, H S; Fiandrini, E; Field, J H; Filthaut, F; Fisher, P H; Fisher, W; Fisk, I; Forconi, G; Freudenreich, Klaus; Furetta, C; Galaktionov, Yu; Ganguli, S N; García-Abia, P; Gataullin, M; Gentile, S; Giagu, S; Gong, Z F; Grenier, G; Grimm, O; Grünewald, M W; Guida, M; Gupta, V K; Gurtu, A; Gutay, L J; Haas, D; Hatzifotiadou, D; Hebbeker, T; Hervé, A; Hirschfelder, J; Hofer, H; Hohlmann, M; Holzner, G; Hou, S R; Hu, Y; Jin, B N; Jones, L W; de Jong, P; Josa-Mutuberria, I; Kaur, M; Kienzle-Focacci, M N; Kim, J K; Kirkby, Jasper; Kittel, E W; Klimentov, A; König, A C; Kopal, M; Koutsenko, V F; Kraber, M; Krämer, R W; Krüger, A; Kunin, A; Ladrón de Guevara, P; Laktineh, I; Landi, G; Lebeau, M; Lebedev, A; Lebrun, P; Lecomte, P; Lecoq, P; Le Coultre, P; Le Goff, J M; Leiste, R; Levtchenko, M; Levchenko, P M; Li, C; Likhoded, S; Lin, C H; Lin, W T; Linde, Frank L; Lista, L; Liu, Z A; Lohmann, W; Longo, E; Lü, Y S; Luci, C; Luminari, L; Lustermann, W; Ma Wen Gan; Malgeri, L; Malinin, A; Maña, C; Mans, J; Martin, J P; Marzano, F; Mazumdar, K; McNeil, R R; Mele, S; Merola, L; Meschini, M; Metzger, W J; Mihul, A; Milcent, H; Mirabelli, G; Mnich, J; Mohanty, G B; Muanza, G S; Muijs, A J M; Musicar, B; Musy, M; Nagy, S; Natale, S; Napolitano, M; Nessi-Tedaldi, F; Newman, H; Nisati, A; Novák, T; Nowak, H; Ofierzynski, R A; Organtini, G; Pal, I; Palomares, C; Paolucci, P; Paramatti, R; Passaleva, G; Patricelli, S; Paul, T; Pauluzzi, M; Paus, C; Pauss, Felicitas; Pedace, M; Pensotti, S; Perret-Gallix, D; Petersen, B; Piccolo, D; Pierella, F; Pioppi, M; Piroué, P A; Pistolesi, E; Plyaskin, V; Pohl, M; Pozhidaev, V; Pothier, J; Prokofev, D; Prokofiev, D O; Quartieri, J; Rahal-Callot, G; Rahaman, M A; Raics, P; Raja, N; Ramelli, R; Rancoita, P G; Ranieri, R; Raspereza, A V; Razis, P; Ren, D; Rescigno, M; Reucroft, S; Riemann, S; Riles, K; Roe, B P; Romero, L; Rosca, A; Rosemann, C; Rosenbleck, C; Rosier-Lees, S; Roth, S; Rubio, J A; Ruggiero, G; Rykaczewski, H; Sakharov, A; Saremi, S; Sarkar, S; Salicio, J; Sánchez, E; Schäfer, C; Shchegelskii, V; Schopper, Herwig Franz; Schotanus, D J; Sciacca, C; Servoli, L; Shevchenko, S; Shivarov, N; Shoutko, V; Shumilov, E; Shvorob, A; Son, D; Souga, C; Spillantini, P; Steuer, M; Stickland, D P; Stoyanov, B; Strässner, A; Sudhakar, K; Sultanov, G G; Sun, L Z; Sushkov, S; Suter, H; Swain, J D; Szillási, Z; Tang, X W; Tarjan, P; Tauscher, L; Taylor, L; Tellili, B; Teyssier, D; Timmermans, C; Ting, Samuel C C; Ting, S M; Tonwar, S C; Tóth, J; Tully, C; Tung, K L; Ulbricht, J; Valente, E; Van de Walle, R T; Vásquez, R; Veszpremi, V; Vesztergombi, G; Vetlitskii, I; Vicinanza, D; Viertel, Gert M; Villa, S; Vivargent, M; Vlachos, S; Vodopyanov, I; Vogel, H; Vogt, H; Vorobev, I; Vorobyov, A A; Wadhwa, M; Wang, Q; Wang, X L; Wang, Z M; Weber, M; Wilkens, H; Wynhoff, S; Xia, L; Xu, Z Z; Yamamoto, J; Yang, B Z; Yang, C G; Yang, H J; Yang, M; Yeh, S C; Zalite, A; Zalite, Yu; Zhang, Z P; Zhao, J; Zhu, G Y; Zhu, R Y; Zhuang, H L; Zichichi, A; Zimmermann, B; Zöller, M

    2005-01-01

    A search for a Higgs boson produced in e^+e^- collisions in association with a Z boson and decaying into invisible particles is performed. Data collected at LEP with the L3 detector at centre-of-mass energies from 189 GeV to 209 GeV are used, corresponding to an integrated luminosity of 0.63/fb. Events with hadrons, electrons or muons with visible masses compatible with a Z boson and missing energy and momentum are selected. They are consistent with the Standard Model expectations. A lower limit of 112.3 GeV is set at 95% confidence level on the mass of the invisibly-decaying Higgs boson in the hypothesis that its production cross section equals that of the Standard Model Higgs boson. Relaxing this hypothesis, upper limits on the production cross section are derived.

  3. Illusory Speed is Retained in Memory during Invisible Motion

    Directory of Open Access Journals (Sweden)

    Luca Battaglini

    2013-05-01

    Full Text Available The brain can retain speed information in early visual short-term memory in an astonishingly precise manner. We investigated whether this (early visual memory system is active during the extrapolation of occluded motion and whether it reflects speed misperception due to contrast and size. Experiments 1A and 2A showed that reducing target contrast or increasing its size led to an illusory speed underestimation. Experiments 1B, 2B, and 3 showed that this illusory phenomenon is reflected in the memory of speed during occluded motion, independent of the range of visible speeds, of the length of the visible trajectory or the invisible trajectory, and of the type of task. These results suggest that illusory speed is retained in memory during invisible motion.

  4. The strong CP problem and the visibility of invisible axions

    International Nuclear Information System (INIS)

    Buchmueller, W.

    1986-12-01

    The main subject of these lectures are general properties of axions and recent suggestions of how to detect invisible axions. After a brief review of the strong CP problem and the Peccei-Quinn mechanism in sects. 2 and 3, we discuss axion properties by means of an effective lagrangian approach in sect. 4. Experimental bounds on axion production and decays are reviewed in sect. 5. Sect. 6 deals briefly with the recently proposed variant axion models, and in sect. 7 we discuss the possible relevance of supersymmetry to the strong CP problem. In sect. 8 we then review the different proposals for the detection of invisible axions. Some conclusions are given in sect. 9. (orig./HSI)

  5. LES DEUX NIVEAUX DE L’INVISIBLE DANS L’OEUVRE DE FRIDA KAHLO (The two levels of invisible in the work of Frida Kahlo

    Directory of Open Access Journals (Sweden)

    Luca Molnár

    2015-06-01

    Full Text Available The aim of this study is to reveal the different levels of representation of invisible feelings in the work of Frida Kahlo. In order to express these feelings, in some paintings, the artist uses visible objects, such as tears – which become the first level of representation of the invisible. In other paintings, however, she uses internal organs of the human body to represent invisible pain or suffering. These organs are hidden from the eye and are therefore invisible. There are two categories within this second level: the first one consists of internal organs traditionally used to represent invisible feelings in the European culture, such as the skull. The second category embraces organs used especially by Frida, like the womb. The study observes how her life had made this physically broken, but mentally strong artist to cut open her own body to show it to the world, representing feelings that only a woman can feel, but nobody can see.

  6. THE WORK PROCESS IN RADIOLOGICAL NURSING: INVISIBILITY OFIONIZING RADIATION

    OpenAIRE

    Melo,Juliana Almeida Coelho de; Gelbcke,Francine Lima; Huhn,Andrea; Vargas,Mara Ambrosina de Oliveira

    2015-01-01

    ABSTRACT Qualitative descriptive and exploratory research, performed with 20 nursing professionals working in a general radiology unit and surgery center with the "C-arm" equipment, and the hemodynamics unit of a southern Brazilian teaching hospital. Aim was to analyze the dimensions of the work process for radiological technology nurse professionals. This paper made clear that radiological technologies are outside nursing, which leads to the invisibility of ionizing radiation, leading to ina...

  7. Invisible Cost Effective Mechanics for Anterior Space Closure.

    Science.gov (United States)

    Jumle, Aatish Vinod; Bagrecha, Saurabh; Gharat, Ninad; Misal, Abhijit; Toshniwal, N G

    2015-01-01

    The shifting paradigm towards invisible orthodontic treatment and also awareness in patients has allured their focus towards the most esthetic treatment approach. Also the lingual treatment is proved successful and is very well accepted by the patients. The problem that persist is its high expenses, which is not affordable by all patients. This article is a effort to treat a simple Class I malocclusion with anterior spacing using a simple, esthetic, Cost effective approach with acceptable results when esthetics plays a priority role.

  8. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  9. Dark matter from late invisible decays to and of gravitinos

    Science.gov (United States)

    Allahverdi, Rouzbeh; Dutta, Bhaskar; Queiroz, Farinaldo S.; Strigari, Louis E.; Wang, Mei-Yu

    2015-03-01

    In this work, we sift a simple supersymmetric framework of late invisible decays to and of the gravitino. We study a simple extension of the minimal supersymmetric standard model that includes isosinglet color-triplet superfields and a singlet superfield. We investigate two cases where the gravitino is the lightest supersymmetric particle or the next-to-lightest supersymmetric particle. The next-to-lightest supersymmetric particle decays into two dark matter candidates and has a long lifetime due to gravitationally suppressed interactions. However, because of the absence of any hadronic or electromagnetic products, it satisfies the tight bounds set by big bang nucleosynthesis and the cosmic microwave background. One or both of the dark matter candidates produced in invisible decays can contribute to the amount of dark radiation and suppress perturbations at scales that are being probed by the galaxy power spectrum and the Lyman-alpha forest data. We show that these constraints are satisfied in large regions of the parameter space and, as a result, the late invisible decays to and of the gravitino can be responsible for the entire dark matter relic abundance.

  10. Active electromagnetic invisibility cloaking and radiation force cancellation

    Science.gov (United States)

    Mitri, F. G.

    2018-03-01

    This investigation shows that an active emitting electromagnetic (EM) Dirichlet source (i.e., with axial polarization of the electric field) in a homogeneous non-dissipative/non-absorptive medium placed near a perfectly conducting boundary can render total invisibility (i.e. zero extinction cross-section or efficiency) in addition to a radiation force cancellation on its surface. Based upon the Poynting theorem, the mathematical expression for the extinction, radiation and amplification cross-sections (or efficiencies) are derived using the partial-wave series expansion method in cylindrical coordinates. Moreover, the analysis is extended to compute the self-induced EM radiation force on the active source, resulting from the waves reflected by the boundary. The numerical results predict the generation of a zero extinction efficiency, achieving total invisibility, in addition to a radiation force cancellation which depend on the source size, the distance from the boundary and the associated EM mode order of the active source. Furthermore, an attractive EM pushing force on the active source directed toward the boundary or a repulsive pulling one pointing away from it can arise accordingly. The numerical predictions and computational results find potential applications in the design and development of EM cloaking devices, invisibility and stealth technologies.

  11. Infrared technique for decoding of invisible laser markings

    Science.gov (United States)

    Haferkamp, Heinz; Jaeschke, Peter; Stein, Johannes; Goede, Martin

    2002-03-01

    Counterfeiting and product piracy continues to be an important issue not only for the Western industry, but also for the society in general. Due to the drastic increase in product imitation and the request for plagiarism protection as well as for reducing thefts there is a high interest in new protection methods providing new security features. The method presented here consists of security markings which are included below paint layers. These markings are invisible for the human eye due to the non-transparency of the upper layers in the visible spectral range. However, the markings can be detected by an infrared technique taking advantage on the partial transparency of the upper paint layers in the IR-region. Metal sheets are marked using laser radiation. The beam of a Nd:YAG-laser provides a modification of the surface structure, resulting in dark markings due to the annealing effect. After coating of the laser-marked material, the markings are invisible for the bare eye. In order to read out the invisible information below the coating, an infrared reflection technique is used. The samples are illuminated with halogen lamps or infrared radiators. Many coating materials (i. e. paints) show a certain transparency in the mid-infrared region, especially between 3 - 5 micrometers . The reflected radiation is detected using an IR-camera with a sensitivity range from 3.4 - 5 micrometers . Due to the different reflection properties between the markings and their surrounding, the information can be detected.

  12. Notes from the back room: gender, power, and (In)visibility in women's experiences of masturbation.

    Science.gov (United States)

    Fahs, Breanne; Frank, Elena

    2014-01-01

    While popular culture has more frequently depicted women's masturbation in recent years, scholarly attention to women's own meaning making about masturbation remains largely absent. Existing research that emphasizes women's masturbation frequency, health correlates, masturbation as a factor in couples therapy, and masturbation as a substitute for partnered sexual behaviors have dominated the research, largely neglecting social identity correlates and women's subjectivities about masturbation. This study drew upon qualitative interviews with 20 women (mean age = 34, SD = 13.35) from diverse backgrounds to illuminate five themes in women's experiences with masturbation: (a) assumptions that most women self-penetrate during masturbation even when primarily using clitoral stimulation; (b) masturbation as sexual labor; (c) masturbation as a threat to male dominance; (d) masturbation as routine tension release; and (e) masturbation as a source of joy, fun, and pleasure. Because women revealed such a diverse set of experiences, we explored the advantages and disadvantages of the invisibility of women's masturbation. As a result of the internalization of stereotypically masculine scripts about sexuality-including an imagined penetrative focus, goal-oriented drive toward orgasm, sex as labor, and masturbation as nonemotional-women's masturbation experiences, regardless of sexual orientation, revealed the power imbalances often present in partnered (hetero)sexual dynamics.

  13. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  14. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  15. Illusory ownership of an invisible body reduces autonomic and subjective social anxiety responses

    Science.gov (United States)

    Guterstam, Arvid; Abdulkarim, Zakaryah; Ehrsson, H. Henrik

    2015-01-01

    What is it like to be invisible? This question has long fascinated man and has been the central theme of many classic literary works. Recent advances in materials science suggest that invisibility cloaking of the human body may be possible in the not-so-distant future. However, it remains unknown how invisibility affects body perception and embodied cognition. To address these questions, we developed a perceptual illusion of having an entire invisible body. Through a series of experiments, we characterized the multisensory rules that govern the elicitation of the illusion and show that the experience of having an invisible body reduces the social anxiety response to standing in front of an audience. This study provides an experimental model of what it is like to be invisible and shows that this experience affects bodily self-perception and social cognition. PMID:25906330

  16. Illusory ownership of an invisible body reduces autonomic and subjective social anxiety responses.

    Science.gov (United States)

    Guterstam, Arvid; Abdulkarim, Zakaryah; Ehrsson, H Henrik

    2015-04-23

    What is it like to be invisible? This question has long fascinated man and has been the central theme of many classic literary works. Recent advances in materials science suggest that invisibility cloaking of the human body may be possible in the not-so-distant future. However, it remains unknown how invisibility affects body perception and embodied cognition. To address these questions, we developed a perceptual illusion of having an entire invisible body. Through a series of experiments, we characterized the multisensory rules that govern the elicitation of the illusion and show that the experience of having an invisible body reduces the social anxiety response to standing in front of an audience. This study provides an experimental model of what it is like to be invisible and shows that this experience affects bodily self-perception and social cognition.

  17. Invisibility cloaking via non-smooth transformation optics and ray tracing

    International Nuclear Information System (INIS)

    Crosskey, Miles M.; Nixon, Andrew T.; Schick, Leland M.; Kovacic, Gregor

    2011-01-01

    We present examples of theoretically-predicted invisibility cloaks with shapes other than spheres and cylinders, including cones and ellipsoids, as well as shapes spliced from parts of these simpler shapes. In addition, we present an example explicitly displaying the non-uniqueness of invisibility cloaks of the same shape. We depict rays propagating through these example cloaks using ray tracing for geometric optics. - Highlights: → Theoretically-predicted conical and ellipsoidal invisibility cloaks. → Non-smooth cloaks spliced from parts of simpler shapes. → Example displaying non-uniqueness of invisibility cloaks of the same shape. → Rays propagating through example cloaks depicted using geometric optics.

  18. Rape in South Africa: an invisible part of apartheid's legacy.

    Science.gov (United States)

    Armstrong, S

    1994-06-01

    Male dominated power systems in South Africa coupled with a culture of aggression and domination have not allowed for the mainstream emergence of qualities such as trust, compassion, and gentleness, frequently associated with female virtues. Rape under such circumstances is the assertion of male power, and, as expected, the numbers of rape cases and other forms of gender violence have increased. Under an apartheid system, where only the rape of white women was prosecuted, and gender and race issues could diffuse the black struggle, there were difficulties in mobilizing support to end violence against black women. There was social acceptance that rape of black women was part of life. Police statistics on the incidence of rape were notoriously unreliable, because only a small percentage of cases are reported to police, and many women would be ashamed to admit to marital abuse, including rape. In women's groups, it was reported that 1 out of every 4 women had been raped, and raped at early ages, such as 14 years of age. In impoverished communities, there is widespread poverty, injustice, prejudice, alcohol abuse, and other conditions impacting on women. The rapists may be school classmates, or street fighters, or political activists. The sexual initiation of women worldwide and in South Africa frequently is accompanied by coercion. Abduction and forced sex is considered legitimate for young men, who believe that mental health is deleteriously affected by lack of sex. Girls may even be abducted from the classroom, as a way of preventing women's power and control over assets and resources and diminishing the potential threat to gender power relations. School girls who become pregnant are often forced to leave school. Victims of rape may be excluded from family life and forced to seek prostitution as a means of support. Rape is reportedly experienced among older women with bottles, tins, or other devices which inflict injury. Only rape with penal penetration is an

  19. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  20. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  3. Supersymmetric SU(11), the invisible axion, and proton decay

    International Nuclear Information System (INIS)

    Alwis, S.P. de; Kim, J.E.

    1981-09-01

    We supersymmetrize the very attractive flavour unification model SU(11). As with other supersymmetric GUTs the gauge hierarchy problem is simplified, but we may also have observable (tausub(p) is approximately 10 33 yrs) proton decay. The required split multiplets are obtained by making the adjoint take a particular direction. Supersymmetry is broken softly at the TeV scale. There is a unique U(1)sub(A) symmetry, and hence there are no true Nambu-Goldstone bosons. The U(1)sub(A) is broken at the GUT scale and there result an invisible axion and neutrino masses. (author)

  4. [Street Outreach Offices: visibility, invisibility, and enhanced visibility].

    Science.gov (United States)

    Hallais, Janaína Alves da Silveira; Barros, Nelson Filice de

    2015-07-01

    This article discusses care for street people from a socio-anthropological perspective, using participant observation conducted with a team from a street outreach project. Based on observations, street people are historically viewed as marginal and rarely obtain access to health services, thus making them invisible to the Brazilian Unified National Health System. Brazil's National Policy for the Homeless provides for their access to health care, but such care is not always guaranteed in practice, because health services and professionals have little experience in dealing with homeless persons. The study concludes that enhanced visibility is needed to ensure care for people living on the street, establishing a therapeutic bond that deconstructs stigmatizing practice.

  5. Accounting for the Invisible Work of Hospital Orderlies

    DEFF Research Database (Denmark)

    Stisen, Allan; Verdezoto, Nervo; Blunck, Henrik

    2016-01-01

    the coordination changes in orderlies’ work practices in connection to the implementation of a workflow application at the hospital. By applying a mixed methods approach (both qualitative and quantitative studies), this paper calls for attention to the changes in orderlies’ coordination activities while moving......The cooperative, invisible non-clinical work of hospital orderlies is often overlooked. It consists foremost of transferring patients between hospital departments. As the overall efficiency of the hospital is highly dependent on the coordination of the work of orderlies, this study investigates...... coordination. We also present design recommendations for future design of coordination tools to support orderlies’ work practices....

  6. What is Molecular is not invisible to the eyes

    Directory of Open Access Journals (Sweden)

    Frank Lizaraso Caparó

    2017-01-01

    Full Text Available A molecular failure (in principle invisible will determine symptoms, diseases and conditions of Health pretty visible. Molecular studies have been developed mostly in populations in Europe, USA (Descendants of Europeans and African Americans Africa and Asia. The Peruvians are represented in the Latin / Hispanic who is genetically too heterogeneous (eg, Mexican Latino is different from Argentinian or Puerto Rican (11. Peru globally has about 70% of South American native ancestors, which has been scarcely represented In molecular studies there is a pending task to characterize its population, as well as being Watchers of our endemic pathogens and those adapted to our territory.

  7. Homogenous isotropic invisible cloak based on geometrical optics.

    Science.gov (United States)

    Sun, Jingbo; Zhou, Ji; Kang, Lei

    2008-10-27

    Invisible cloak derived from the coordinate transformation requires its constitutive material to be anisotropic. In this work, we present a cloak of graded-index isotropic material based on the geometrical optics theory. The cloak is realized by concentric multilayered structure with designed refractive index to achieve the low-scattering and smooth power-flow. Full-wave simulations on such a design of a cylindrical cloak are performed to demonstrate the cloaking ability to incident wave of any polarization. Using normal nature material with isotropy and low absorption, the cloak shows light on a practical path to stealth technology, especially that in the optical range.

  8. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  9. Going beyond Google again strategies for using and teaching the invisible web

    CERN Document Server

    Devine, Jane

    2014-01-01

    Demonstrating why teaching the Invisible Web should be a requirement for information literacy education in the 21st century, here the authors expand on the teaching foundation provided in the first book and persuasively argue that the Invisible Web is still relevant not only to student research but also to everyday life.

  10. Visualizing the Invisible College: Community among Authors in Top Social Work Journals

    Science.gov (United States)

    Woehle, Ralph

    2012-01-01

    A review of literature related to the existence of an invisible college community among coauthors of articles in top-rated social work journals indicated that an invisible college could promote quality scholarship but that coauthoring might be inadequately studied or valued in social work education. Social network analysis revealed a skeletal…

  11. Gender Justice and School Education

    Science.gov (United States)

    Gao, Desheng

    2009-01-01

    Gender justice includes three basic dimensions: gender equality, respect for difference, and free choice. In reality, schools construct and reproduce the gender injustice of the social culture through multiple dimensions that include the visible and the invisible curriculum, and the teacher's behaviour. In terms of gender justice, the social…

  12. Coordinate transformations make perfect invisibility cloaks with arbitrary shape

    International Nuclear Information System (INIS)

    Yan Wei; Yan Min; Ruan Zhichao; Qiu Min

    2008-01-01

    By investigating wave properties at cloak boundaries, invisibility cloaks with arbitrary shape constructed by general coordinate transformations are confirmed to be perfectly invisible to the external incident wave. The differences between line transformed cloaks and point transformed cloaks are discussed. The fields in the cloak medium are found analytically to be related to the fields in the original space via coordinate transformation functions. At the exterior boundary of the cloak, it is shown that no reflection is excited even though the permittivity and permeability do not always have a perfectly matched layer form, whereas at the inner boundary, no reflection is excited either, and in particular no field can penetrate into the cloaked region. However, for the inner boundary of any line transformed cloak, the permittivity and permeability in a specific tangential direction are always required to be infinitely large. Furthermore, the field discontinuity at the inner boundary always exists; the surface current is induced to make this discontinuity self-consistent. A point transformed cloak does not experience such problems. The tangential fields at the inner boundary are all zero, implying that no field discontinuity exists

  13. Diffusive-light invisibility cloak for transient illumination

    Science.gov (United States)

    Orazbayev, B.; Beruete, M.; Martínez, A.; García-Meca, C.

    2016-12-01

    Invisibility in a diffusive-light-scattering medium has been recently demonstrated by employing a scattering-cancellation core-shell cloak. Unlike nondiffusive cloaks, such a device can be simultaneously macroscopic, broadband, passive, polarization independent, and omnidirectional. Unfortunately, it has been verified that this cloak, as well as more sophisticated ones based on transformation optics, fail under pulsed illumination, invalidating their use for a variety of applications. Here, we introduce a different approach based on unimodular transformations that enables the construction of unidirectional diffusive-light cloaks exhibiting a perfect invisibility effect, even under transient conditions. Moreover, we demonstrate that a polygonal cloak can extend this functionality to multiple directions with a nearly ideal behavior, while preserving all other features. We propose and numerically verify a simple cloak realization based on a layered stack of two isotropic materials. The studied devices have several applications not addressable by any of the other cloaks proposed to date, including shielding from pulse-based detection techniques, cloaking undesired scattering elements in time-of-flight imaging or high-speed communication systems for diffusive environments, and building extreme optical security features. The discussed cloaking strategy could also be applied to simplify the implementation of thermal cloaks.

  14. A map of the invisible journeys into particle physics

    CERN Document Server

    Butterworth, Jon

    2017-01-01

    What is the universe really made of? How do we know? Follow the map of the invisible to find out... Over the last sixty years, scientists around the world have worked together to explore the fundamental constituents of matter, and the forces that govern their behaviour. The result, so far, is the ‘Standard Model’ of elementary particles: a theoretical map of the basic building blocks of the universe. With the discovery of the Higgs boson in 2012, the map as we know it was completed, but also extended into strange new territory. A Map of the Invisible is an explorer’s guide to the Standard Model and the extraordinary realms of particle physics. After shrinking us down to the size of a sub-atomic particle, pioneering physicist Jon Butterworth takes us on board his research vessel for a journey in search of atoms and quarks, electrons and neutrinos, and the forces that shape the universe. Step by step, discovery by discovery, we journey into the world of the unseen, from the atom to black holes and dark ...

  15. Invisible waves and hidden realms: augmented reality and experimental art

    Science.gov (United States)

    Ruzanka, Silvia

    2012-03-01

    Augmented reality is way of both altering the visible and revealing the invisible. It offers new opportunities for artistic exploration through virtual interventions in real space. In this paper, the author describes the implementation of two art installations using different AR technologies, one using optical marker tracking on mobile devices and one integrating stereoscopic projections into the physical environment. The first artwork, De Ondas y Abejas (The Waves and the Bees), is based on the widely publicized (but unproven) hypothesis of a link between cellphone radiation and the phenomenon of bee colony collapse disorder. Using an Android tablet, viewers search out small fiducial markers in the shape of electromagnetic waves hidden throughout the gallery, which reveal swarms of bees scattered on the floor. The piece also creates a generative soundscape based on electromagnetic fields. The second artwork, Urban Fauna, is a series of animations in which features of the urban landscape become plants and animals. Surveillance cameras become flocks of birds while miniature cellphone towers, lampposts, and telephone poles grow like small seedlings in time-lapse animation. The animations are presented as small stereoscopic projections, integrated into the physical space of the gallery. These two pieces explore the relationship between nature and technology through the visualization of invisible forces and hidden alternate realities.

  16. ADAM SMITH: LA MANO INVISIBLE O LA CONFIANZA

    Directory of Open Access Journals (Sweden)

    Gache, Fernando Luis

    2010-12-01

    Full Text Available En 1776 Adam Smith planteó que una mano invisible era quien movía a los mercados para obtener su eficiencia. No obstante en el presente trabajo vamos a plantear la hipótesis, que dicha mano invisible, es en realidad la confianza que cada persona siente en el momento de hacer un negocio. Que además es única, pues es distinta a la confianza de los demás y que se trata de una variable no lineal que fundamentalmente está ligada a las respectivas historias personales. Para ello vamos a tomar como base el trabajo de Leopoldo Abadía (2009, respecto de la crisis económico financiera que se desató en el 2007-2008, para poner en evidencia la forma en que opera la confianza. Por lo tanto la contribución que esperamos hacer con este trabajo es destacar que, el nivel de confianza de los diferentes actores, es quien realmente mueve a los mercados, (por tanto la economía y que la crisis de las hipotecas subprime es una crisis de confianza a nivel mundial.

  17. Invisible losses and the logics of resettlement compensation.

    Science.gov (United States)

    Witter, Rebecca; Satterfield, Terre

    2014-10-01

    The necessity of compensating people negatively affected by conservation and other development projects has been widely acknowledged. It is less widely acknowledged that because conventional compensation assessments focus on material resources and their economic equivalents, many important losses incurred by resettlers are invisible to project authorities. Through ethnographic observations and interviews, we documented losses identified by people facing resettlement from Mozambique's Limpopo National Park. We also examined resettlement planning documents to determine why decision makers' assessments of natural resource use and value neglect losses residents identified as critical. Identifying, preventing, and mitigating invisible losses in resettlement planning necessitates a better understanding of intangible benefits residents derive from resources, which are often as or more important than their readily apparent material properties. These benefits include but are not limited to decision-making authority linked to owning land versus having the use of fields; ancestral identity and social belonging linked to gravesites; the importance of tree roots that provide a powerful sense of security because they suppress hunger in periods of scarcity; and the importance of people's location within social networks and hierarchies as they determine the benefits versus risks that will be incurred through resettlement. © 2014 Society for Conservation Biology.

  18. Invisible Higgs boson decay with B→Kνν constraint

    International Nuclear Information System (INIS)

    Kim, C. S.; Park, Seong Chan; Wang Kai; Zhu Guohuai

    2010-01-01

    If the Higgs boson were the only particle within the LHC accessible range, precision measurement of the Higgs's properties would play a unique role in studying electroweak symmetry breaking as well as possible new physics. We try to use low energy experiments such as rare B decay to constrain a challenging decay mode of Higgs, in which a Higgs decays to a pair of light (≅1∼2 GeV) SM singlet S and becomes invisible. By using the current experimental bound of rare decay B→Kνν and computing the contribution of B→KSS to (the) B→K+Ee, we obtain an upper bound on the Higgs coupling to such light singlet. It is interesting that the partial width of the invisible decay mode h→SS by taking the upper bound value of coupling is at a comparable level with h→WW/ZZ or WW ( * ) decay modes, making the Higgs identifiable but with a different predicted decay branching ratio from [the] standard model Higgs decay. It will then have an impact on precision measurement of the Higgs's properties. We also study the implication for cosmology from such a light singlet and propose a solution to the potential problem.

  19. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  20. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  1. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  2. Invisibility, safety and psycho-social distress among same-sex attracted women in rural South Australia.

    Science.gov (United States)

    Edwards, Jane

    2005-01-01

    'everybody knows everybody'. In such settings, much of the conduct of daily life is visible to other community members and may be closely scrutinized. In such locations, women initially try to keep their same sex attraction invisible. Women rarely comment on the threat of violence that underpins the attempt to keep same-sex identity or relationships secret. Nevertheless, even while it remains a largely unarticulated factor, it was a powerful one fueling the maintenance of their invisibility. Fear of violence ranges from the threat of overt physical violence to more commonly voiced concerns over 'mundane' harassment. Fear of social violence, in the form of rejection and ostracism, is the most frequently nominated factor motivating women to keep same-sex attraction invisible in rural settings. While keeping their same-sex identity and relationships invisible offers women some safety from physical and social violence, it may pose dangers for their psycho-social well-being. Trying to keep SSA relationships invisible within communities involves women censoring their behaviour while in public. Invisibility also gives rise to isolation, since women do not have the opportunity to form same-sex attracted social networks. Furthermore, some women experience great psycho-social distress as their awareness of their same-sex attraction becomes increasingly incongruent with the established pattern of their lives. Women find it very difficult to seek appropriate forms of help if they do experience psycho-social problems. Concerns over confidentiality means that women are extremely reluctant to seek help and support locally. Distance is a powerful mediating factor in both women's experience of distress and their capacity to seek help to ameliorate it. For women who live in closer proximity to the state capital, the capacity to meet other SSA women and engage in same-sex attracted social activities helps ease their sense of difference and isolation. Likewise, should they wish to utilize

  3. Stereotype Threat Effects on African American and Latina/o Elementary Students Tested Together

    Science.gov (United States)

    Wasserberg, Martin James

    2017-01-01

    Purpose: This study aimed to investigate whether a diagnostic testing condition leads to stereotype threat effects for African American and Latina/o children (N = 81) when tested together at an urban elementary school in Miami, Florida. Design/methodology/approach: To analyze the effect of stereotype threat on participants' reading test…

  4. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  5. The boundary conditions for point transformed electromagnetic invisibility cloaks

    International Nuclear Information System (INIS)

    Weder, Ricardo

    2008-01-01

    In this paper we study point transformed electromagnetic invisibility cloaks in transformation media that are obtained by transformation from general anisotropic media. We assume that there are several point transformed electromagnetic cloaks located in different points in space. Our results apply in particular to the first-order invisibility cloaks introduced by Pendry et al and to the high-order invisibility cloaks introduced by Hendi et al and by Cai et al. We identify the appropriate cloaking boundary conditions that the solutions of Maxwell equations have to satisfy at the outside, ∂K + , and at the inside, ∂K - , of the boundary of the cloaked object K in the case where the permittivity and the permeability are bounded below and above in K. Namely, that the tangential components of the electric and the magnetic fields have to vanish at ∂K + -which is always true-and that the normal components of the curl of the electric and the magnetic fields have to vanish at ∂K - . These results are proven requiring that energy be conserved. In the case of one spherical cloak with a spherically stratified K and a radial current at ∂K we verify by an explicit calculation that our cloaking boundary conditions are satisfied and that cloaking of active devices holds, even if the current is at the boundary of the cloaked object. As we prove our results for media that are obtained by transformation from general anisotropic media, our results apply to the cloaking of objects with passive and active devices contained in general anisotropic media, in particular to objects with passive and active devices contained inside general crystals. Our results suggest a method to enhance cloaking in the approximate transformation media that are used in practice. Namely, to coat the boundary of the cloaked object (the inner boundary of the cloak) with a material that imposes the boundary conditions above. As these boundary conditions have to be satisfied for exact transformation

  6. The beautiful invisible creativity, imagination, and theoretical physics

    CERN Document Server

    Vignale, Giovanni

    2011-01-01

    Challenging the image of theoretical physics as a dry discipline, The Beautiful Invisible shows that this highly abstract science is in fact teeming with beautiful concepts, and the task of imagining them demands profound creativity, just as creative as the work of poets or magical realist novelists such as Borges and Musil. "A good scientific theory is like a symbolic tale, an allegory of reality," writes Giovanni Vignale, as he uncovers the unexpected links between theoretical physics and artistic creativity. In engaging and at times poetic prose, and with ample quotations from many of the writers he admires, Vignale presents his own unorthodox accounts of fundamental theoretical concepts such as Newtonian mechanics, superconductivity, and Einstein's theory of relativity, illuminating their profound implications. Throughout, the author treats readers to glimpses of physics as "exercised in the still night, when only the moon rages." Indeed, as we delve behind now-familiar concepts such as "electron spin" an...

  7. Invisibility and Cloaking: Origins, Present, and Future Perspectives

    Science.gov (United States)

    Fleury, Romain; Monticone, Francesco; Alù, Andrea

    2015-09-01

    The development of metamaterials, i.e., artificially structured materials that interact with waves in unconventional ways, has revolutionized our ability to manipulate the propagation of electromagnetic waves and their interaction with matter. One of the most exciting applications of metamaterial science is related to the possibility of totally suppressing the scattering of an object using an invisibility cloak. Here, we review the available methods to make an object undetectable to electromagnetic waves, and we highlight the outstanding challenges that need to be addressed in order to obtain a fully functional coating capable of suppressing the total scattering of an object. Our outlook discusses how, while passive linear cloaks are fundamentally limited in terms of bandwidth of operation and overall scattering suppression, active and/or nonlinear cloaks hold the promise to overcome, at least partially, some of these limitations.

  8. Acoustic invisibility cloaks of arbitrary shapes for complex background media

    Science.gov (United States)

    Zhu, Jian; Chen, Tianning; Liang, Qingxuan; Wang, Xiaopeng; Xiong, Jie; Jiang, Ping

    2016-04-01

    We report on the theoretical investigation of the acoustic cloaks working in complex background media in this paper. The constitutive parameters of arbitrary-shape cloaks are derived based on the transformation acoustic theory and coordinate transformation technique. The detailed analysis of boundaries conditions and potential applications of the cloaks are also presented in our work. To overcome the difficulty of achieving the materials with ideal parameters in nature, concentric alternating layered isotropic materials is adopted to approximate the required properties of the cloak. Theoretical design and excellent invisibility are demonstrated by numerical simulations. The inhomogeneous medium and arbitrary-shape acoustic cloaks grow closer to real application and may be a new hot spot in future.

  9. Komas uit 'n Bamboesstok en Invisible Cities van Italo Calvino

    Directory of Open Access Journals (Sweden)

    H. van Vuuren

    1986-05-01

    Calvino’s novel also has a character, the fictionalised Marco Polo, who plays such an important role in Komas uil 'n bamboesstok. When the traces of Italo Calvino’s work are sought in Komas, the coherence between poems in the volume emerges more clearly. The importance of Calvino’s “novel” as intertext does not primarily reside in the clarifying reciprocity which it has with single poems or pairs of poems. It is the central intertcxt in the volume, seeing that it is of determining importance for its structure. Opperman’s poetic technique in this volume reiterates the structure of Invisible cities: multiplicity which in the end can be reduced to unity.

  10. Topological mapping and navigation in indoor environment with invisible barcode

    International Nuclear Information System (INIS)

    Huh, Jin Wook; Chung, Woong Sik; Chung, Wan Kyun

    2006-01-01

    This paper addresses the localization and navigation problem using invisible two dimensional barcodes on the floor. Compared with other methods using natural/artificial landmark, the proposed localization method has great advantages in cost and appearance, since the location of the robot is perfectly known using the barcode information after the mapping is finished. We also propose a navigation algorithm which uses the topological structure. For the topological information, we define nodes and edges which are suitable for indoor navigation, especially for large area having multiple rooms, many walls and many static obstacles. The proposed algorithm also has an advantage that errors occurred in each node are mutually independent and can be compensated exactly after some navigation using barcode. Simulation and experimental results were performed to verify the algorithm in the barcode environment, and the result showed an excellent performance. After mapping, it is also possible to solve the kidnapped case and generate paths using topological information

  11. Econophysical visualization of Adam Smith’s invisible hand

    Science.gov (United States)

    Cohen, Morrel H.; Eliazar, Iddo I.

    2013-02-01

    Consider a complex system whose macrostate is statistically observable, but yet whose operating mechanism is an unknown black-box. In this paper we address the problem of inferring, from the system’s macrostate statistics, the system’s intrinsic force yielding the observed statistics. The inference is established via two diametrically opposite approaches which result in the very same intrinsic force: a top-down approach based on the notion of entropy, and a bottom-up approach based on the notion of Langevin dynamics. The general results established are applied to the problem of visualizing the intrinsic socioeconomic force-Adam Smith’s invisible hand-shaping the distribution of wealth in human societies. Our analysis yields quantitative econophysical representations of figurative socioeconomic forces, quantitative definitions of “poor” and “rich”, and a quantitative characterization of the “poor-get-poorer” and the “rich-get-richer” phenomena.

  12. Invisible hand effect in an evolutionary minority game model

    Science.gov (United States)

    Sysi-Aho, Marko; Saramäki, Jari; Kaski, Kimmo

    2005-03-01

    In this paper, we study the properties of a minority game with evolution realized by using genetic crossover to modify fixed-length decision-making strategies of agents. Although the agents in this evolutionary game act selfishly by trying to maximize their own performances only, it turns out that the whole society will eventually be rewarded optimally. This “invisible hand” effect is what Adam Smith over two centuries ago expected to take place in the context of free market mechanism. However, this behaviour of the society of agents is realized only under idealized conditions, where all agents are utilizing the same efficient evolutionary mechanism. If on the other hand part of the agents are adaptive, but not evolutionary, the system does not reach optimum performance, which is also the case if part of the evolutionary agents form a uniformly acting “cartel”.

  13. Invisible Z′ and dark matter: LHC vs LUX constraints

    International Nuclear Information System (INIS)

    Arcadi, Giorgio; Mambrini, Yann; Tytgat, Michel H.G.; Zaldívar, Bryan

    2014-01-01

    We consider a simple, yet generic scenario in which a new heavy Z′ gauge boson couples both to SM fermions and to dark matter. In this framework we confront the best LHC limits on an extra gauge boson Z′ to the constraints on couplings to dark matter from direct detection experiments. In particular we show that the LHC searches for resonant production of dileptons and the recent exclusion limits obtained by the LUX collaboration give complementary constraints. Together, they impose strong bounds on the invisible branching ratio and exclude a large part of the parameter space for generic Z′ models. Our study encompasses many possible Z′ models, including SSM, E 6 -inspired or B-L scenario

  14. [Journey to what is essentially invisible: pysochosocial aspects of disease].

    Science.gov (United States)

    Turabián, J L; Pérez-Franco, B

    2014-03-01

    Physicians may be well equipped for the biological aspects of disease, but not for its psychosocial dimensions, an issue that has been absent in family medicine. The psychosocial aspects of the disease are the factors involved in how patients react to the disease, play a role in the expression of symptoms and disease, and have implications on the lives of patients. Moreover, the biological effects (specific) and psychosocial effects (non-specific) are not simply additive but interactive. Physicians should be aware of this hidden, essentially invisible patient psychosocial morbidity, and must incorporate bio-psychosocial interventions into routine medical care to be more effective. In addition, to consider these aspects in the context of care contributes to the distinctive elements of family medicine. Copyright © 2012 Sociedad Española de Médicos de Atención Primaria (SEMERGEN). Publicado por Elsevier España. All rights reserved.

  15. Visible and invisible the wonders of light phenomena

    CERN Document Server

    Bisi, Olmes

    2015-01-01

    Light phenomena have intrigued humankind since prehistory. Think of the rainbow, a sunset on the sea, a game of shadows. Humans have always used light for their own needs, from cooking food to illuminating a room. However, light is not only limited to what we can see with our eyes. The invisible part of the electromagnetic spectrum is broad and dynamic. This book outlines the mysteries and wonders of electromagnetism, heat, and light. It also covers the history of our scientific understanding of light. The dark as well as the bright sides of light are fully explored in these pages, from their impact on our world to their use in cutting-edge technologies in a variety of fields. Numerous full-color images and drawings complement the text, and light phenomena are explained in a simple and engaging way.

  16. The Michelson interferometer-how to detect invisible interference patterns

    International Nuclear Information System (INIS)

    Verovnik, Ivo; Likar, Andrej

    2004-01-01

    In a Michelson interferometer, the contrast of the interference pattern fades away due to incoherence of light when the mirrors are not in equidistant positions. We propose an experiment where the distance between the interference fringes can be determined, even when the difference in length of the interferometer arms is far beyond the coherence length of the light, i.e. when the interference pattern disappears completely for the naked eye. We used a semiconductor laser with two photodiodes as sensors, which enabled us to follow the fluctuations of the light intensity on the screen. The distance between invisible interference fringes was determined from periodic changes of the summed fluctuating signal, obtained by changing the distance between the two sensors

  17. Search for the decay J/ψ→γ+invisible

    International Nuclear Information System (INIS)

    Insler, J.; Muramatsu, H.; Park, C. S.; Thorndike, E. H.; Yang, F.; Ricciardi, S.; Thomas, C.; Artuso, M.; Blusk, S.; Khalil, S.; Mountain, R.; Skwarnicki, T.; Stone, S.; Wang, J. C.; Zhang, L. M.; Bonvicini, G.; Cinabro, D.; Lincoln, A.; Smith, M. J.; Zhou, P.

    2010-01-01

    A search for J/ψ radiative decay to weakly interacting neutral final states was performed using the CLEO-c detector at the Cornell Electron Storage Ring. J/ψ events were selected by observing the hadronic decay ψ(2S)→π + π - J/ψ. A total of 3.7x10 6 J/ψ events were used to study the decay J/ψ→γ+X, where X is a narrow state that is invisible to the detector. No significant signal was observed, and upper limits on the branching fraction were set for masses m X up to 960 MeV/c 2 . The upper limit corresponding to m X =0 is 4.3x10 -6 at the 90% confidence level.

  18. The Sun and its Planets as detectors for invisible matter

    Science.gov (United States)

    Bertolucci, Sergio; Zioutas, Konstantin; Hofmann, Sebastian; Maroudas, Marios

    2017-09-01

    Gravitational lensing of invisible streaming matter towards the Sun with speeds around 10-4 to 10-3 c could be the explanation of the puzzling solar flares and the unexplained solar emission in the EUV. Assuming that this invisible massive matter has some form of interaction with normal matter and that preferred directions exist in its flow, then one would expect a more pronounced solar activity at certain planetary heliocentric longitudes. This is best demonstrated in the case of the Earth and the two inner planets, considering their relatively short revolution time (365, 225 and 88 days) in comparison to a solar cycle of about 11 years. We have analyzed the solar flares as well as the EUV emission in the periods 1976-2015 and 1999-2015, respectively. The results derived from each data set mutually exclude systematics as the cause of the observed planetary correlations. We observe statistically significant signals when one or more planets have heliocentric longitudes mainly between 230° and 300°. We also analyzed daily data of the global ionization degree of the dynamic Earth atmosphere taken in the period 1995-2012. Again here, we observe a correlation between the total atmospheric electron content (TEC) and the orbital position of the inner three planets. Remarkably, the strongest correlation appears with the phase of the Moon. The broad velocity spectrum of the assumed constituents makes it difficult at this stage to identify its source(s) in space. More refined analyses might in the future increase the precision in the determination of the stream(s) direction and possibly allow to infer some properties of its constituents. Presently, no firmly established model of massive streaming particles exists, although in the literature there are abundant examples of hypotheses. Among them, the anti-quark nuggets model for dark matter seems the better suited to explain our observations and deserves further study.

  19. Invisible anti-cloak with elliptic cross section using phase complement

    International Nuclear Information System (INIS)

    Yang Yu-Qi; Zhang Min; Yue Jian-Xiang

    2011-01-01

    Based on the theory of phase complement, an anti-cloak with circular cross section can be made invisible to an object outside its domain. As the cloak with elliptic cross section is more effective to make objects invisible than that with circular cross section, a scaled coordinate system is proposed to design equivalent materials of invisible anti-cloak with elliptic cross section using phase complement. The cloaks with conventional dielectric and double negative parameters are both simulated with the geometrical transformations. The results show that the cloak with elliptic cross section through phase complement can effectively hide the outside objects. (classical areas of phenomenology)

  20. Broadband three-dimensional diamond-shaped invisible cloaks composed of tetrahedral homogeneous blocks

    International Nuclear Information System (INIS)

    Wang Xinhua; Qu Shaobo; Wu Xiang; Wang Jiafu; Ma Hua; Xu Zhuo

    2010-01-01

    By means of embedded optical transformation, three-dimensional diamond-shaped invisible cloaks composed of tetrahedral homogeneous blocks have been designed in this paper. The constitutive parameters of the invisible cloaks can be obtained based on the form invariance of Maxwell's equations in coordinate transformation. Numerical methods using the finite element method verified the diamond-shaped cloaks. The invisible properties of the designed cloaks are nearly perfect when the original line section is sufficiently short compared with its counterpart in the after-transformed space. The designed cloaks can operate in a wide bandwidth due to the line transformation in the coordinate transformation process.

  1. Aprendizaje Invisible. Hacia una nueva ecología de la educación

    OpenAIRE

    Cobo, Cristóbal; Moravec, John W.

    2011-01-01

    Índice Carta del Editor Visibilidad para analizar la cara invisible del aprendizaje Por Hugo Pardo Kuklinski 9 Prólogo Una visión más amplia de Internet en el aprendizaje Por William H. Dutton 13 Capítulo 0 Introducción al aprendizaje invisible: la (r)evolución fuera del aula Por Cristóbal Cobo y John W. Moravec 17 Capítulo 1 Desde la sociedad 1.0 a la sociedad 3.0 Por John W. Moravec 47 Capítulo 2 Uso invisible de las tecnologías y competencias para ...

  2. The invisible Web uncovering information sources search engines can't see

    CERN Document Server

    Sherman, Chris

    2001-01-01

    Enormous expanses of the Internet are unreachable with standard web search engines. This book provides the key to finding these hidden resources by identifying how to uncover and use invisible web resources. Mapping the invisible Web, when and how to use it, assessing the validity of the information, and the future of Web searching are topics covered in detail. Only 16 percent of Net-based information can be located using a general search engine. The other 84 percent is what is referred to as the invisible Web-made up of information stored in databases. Unlike pages on the visible Web, informa

  3. First search for invisible decays of ortho-positronium confined in a vacuum cavity

    OpenAIRE

    Vigo, C.; Gerchow, L.; Liszkay, L.; Rubbia, A.; Crivelli, P.

    2018-01-01

    The experimental setup and results of the first search for invisible decays of ortho-positronium (o-Ps) confined in a vacuum cavity are reported. No evidence of invisible decays at a level $\\text{Br}\\left(\\text{o-Ps}\\to\\text{invisible}\\right) < 5.9\\times 10^{-4}$ (90% C. L.) was found. This decay channel is predicted in Hidden Sector models such as the Mirror Matter (MM), which could be a candidate for Dark Matter. Analyzed within the MM context, this result provides an upper limit on the kin...

  4. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  5. Toward making the invisible visible: Studying science teaching self-efficacy beliefs

    Science.gov (United States)

    Perkins, Catherine J.

    This dissertation consists of two articles to be submitted for publication. The first, a literature review, makes visible common influences on science teaching self-efficacy beliefs and also points to potentially invisible validation concerns regarding the instrument used. The second investigates the participants' invisible science teaching self-efficacy beliefs and, through the use of a more focused interview, makes those beliefs visible. Science teaching self-efficacy beliefs are science teachers' perceptions of their abilities to teach science effectively. The construct "teaching self-efficacy" originated in social cognitive theory (Bandura, 1977). The first article reviews the mixed results from teaching self-efficacy research in science contexts. The review focuses upon factors that facilitate or inhibit the development of self-efficacy beliefs among science teachers across stages of their careers. Although many studies of science teaching self-efficacy beliefs have utilized the Science Teaching Efficacy Belief Instrument - STEBI (Enochs & Riggs, 1990; Riggs & Enochs, 1990), this review also includes non-STEBI studies in order to represent diverse lines of research methodology. The review's findings indicate that antecedent factors such as science activities in and out of school, teacher preparation, science teaching experiences and supportive job contexts are significant influences on the development of science teaching self-efficacy beliefs. The review also indicates that the majority of these studies are short term and rely on a single STEBI administration with the collection of antecedent/demographic and/or interview data. The second article documents a study that responded to the above literature review findings. This study utilized multiple STEBI administrations during the preservice and beginning year of teaching for two science teachers. Rather than general questions, these participants were asked item specific, yet open-ended, questions to determine

  6. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  7. ¿Violencia invisible o del éxtasis al dolor? Invisible violence or from ecstasy to pain?

    Directory of Open Access Journals (Sweden)

    Lourdes Fernández Rius

    2008-04-01

    Full Text Available Los valores y roles para cada género no tienen el mismo reconocimiento social. Se trata de una construcción cultural que pretende, apoyándose en las diferencias, y en una dicotómica jerarquización y poder, establecer una desigualdad que acentúa la supremacía de lo masculino como valor. En la cultura patriarcal - como tendencia - suelen ser los hombres los más violentos, para un comportamiento de dependencia y docilidad en las mujeres. Por ello las relaciones de pareja, asociadas con fantasías de amor, constituyen un espacio de poder y son acosadas constantemente por vivencias de servidumbre y dominio. Diferencia - jerarquía - desigualdad - discriminación - violencia, circuito invisible en retroalimentación que la cultura reedita cotidianamente y que se expresa desde formas psicológicas, hasta daños extremos fundamentalmente hacia las mujeres en los vínculos amorosos.The values and roles for each gender are not socially recognized in an impartial way. It is a cultural construction that seeks, relying on the differences and, on a dichotomous hierarchy and power, to establish an inequality that reinforces the supremacy of masculinity as a value. In patriarchal culture - as a trend - men tend to be the most violent, and women to have a behavior of dependence and docility. Therefore the coupling relationships associated with fantasies of love are a space of power and are constantly harassed by experiences of servitude and domination. Difference - hierarchy - inequality - discrimination - violence, invisible feedback circuit that culture reedits daily and which expresses itself from psychological form to extreme damages primarily toward women on the amorous relationship.

  8. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  9. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  10. Chernobyl clean-up workers` perception of radiation threat

    Energy Technology Data Exchange (ETDEWEB)

    Tarabrina, N.; Lazebnaya, E.; Zelenova, M. [Russian Academy of Science, Moscow (Russian Federation). Inst. of Psychology; Lasko, N. [Harvard Medical School, Manchester, NH (United States). VA Research Service

    1996-12-31

    The goals of this study were: (1) to compare the psychometric profiles of male Chernobyl liquidators who met DSM-III-R criteria for current PTSD with those who did not, and (2) to explore liquidators` perception and assessment of the `invisible` stressor of the radioactive hazard. Results of t-test comparisons between the PTSD and non-PTSD groups for the various psychometric measures are shown. Both diagnostic groups were similar in regard to their mean ages and education levels. The PTSD group scored significantly higher than the non-PTSD group on all the measures of PTSD and general psychiatric symptomatology, state and trait anxiety, depression. On the whole, results of this study demonstrate the determining role of individual perception and assessment of radioactive hazard in the development of post-traumatic stress and place this problem among the most important in studying the psychological consequences of experiencing radioactive threat. The real working conditions and the level of information also affected workers` estimate of the severity of the radiation hazard in Chernobyl. (author).

  11. Chernobyl clean-up workers' perception of radiation threat

    International Nuclear Information System (INIS)

    Tarabrina, N.; Lazebnaya, E.; Zelenova, M.; Lasko, N.

    1996-01-01

    The goals of this study were: (1) to compare the psychometric profiles of male Chernobyl liquidators who met DSM-III-R criteria for current PTSD with those who did not, and (2) to explore liquidators' perception and assessment of the 'invisible' stressor of the radioactive hazard. Results of t-test comparisons between the PTSD and non-PTSD groups for the various psychometric measures are shown. Both diagnostic groups were similar in regard to their mean ages and education levels. The PTSD group scored significantly higher than the non-PTSD group on all the measures of PTSD and general psychiatric symptomatology, state and trait anxiety, depression. On the whole, results of this study demonstrate the determining role of individual perception and assessment of radioactive hazard in the development of post-traumatic stress and place this problem among the most important in studying the psychological consequences of experiencing radioactive threat. The real working conditions and the level of information also affected workers' estimate of the severity of the radiation hazard in Chernobyl. (author)

  12. Designing for the invisible: user-centered design of infrastructure awareness systems

    DEFF Research Database (Denmark)

    Ramos, Juan David Hincapie; Tabard, Aurélien; Bardram, Jakob

    2010-01-01

    Infrastructure awareness systems reveal invisible aspects of infrastructures to their existing or potential users. Designing such systems is challenging as it requires making visible the hidden activity of infrastructures while providing information of interest to the users. To address...

  13. Mass restricting variables in semi-invisible production at the LHC

    Indian Academy of Sciences (India)

    Partha Konar

    2017-10-05

    Oct 5, 2017 ... in reconstructing such events with the momenta of invisible particles. This feature is .... Exclusive methods – These variables are defined with the assumption that the ... ble independent invariant mass variables using the SM.

  14. Schiffer's Conjecture, Interior Transmission Eigenvalues and Invisibility Cloaking: Singular Problem vs. Nonsingular Problem

    OpenAIRE

    Liu, Hongyu

    2012-01-01

    In this note, we present some interesting observations on the Schiffer's conjecture, interior transmission eigenvalue problem and their connections to singular and nonsingular invisibility cloaking problems of acoustic waves.

  15. A gender- and sexual orientation-dependent spatial attentional effect of invisible images.

    Science.gov (United States)

    Jiang, Yi; Costello, Patricia; Fang, Fang; Huang, Miner; He, Sheng

    2006-11-07

    Human observers are constantly bombarded with a vast amount of information. Selective attention helps us to quickly process what is important while ignoring the irrelevant. In this study, we demonstrate that information that has not entered observers' consciousness, such as interocularly suppressed (invisible) erotic pictures, can direct the distribution of spatial attention. Furthermore, invisible erotic information can either attract or repel observers' spatial attention depending on their gender and sexual orientation. While unaware of the suppressed pictures, heterosexual males' attention was attracted to invisible female nudes, heterosexual females' attention was attracted to invisible male nudes, gay males behaved similarly to heterosexual females, and gay/bisexual females performed in-between heterosexual males and females.

  16. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  17. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  18. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  19. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  20. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  1. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  2. A gender- and sexual orientation-dependent spatial attentional effect of invisible images

    OpenAIRE

    Jiang, Yi; Costello, Patricia; Fang, Fang; Huang, Miner; He, Sheng

    2006-01-01

    Human observers are constantly bombarded with a vast amount of information. Selective attention helps us to quickly process what is important while ignoring the irrelevant. In this study, we demonstrate that information that has not entered observers' consciousness, such as interocularly suppressed (invisible) erotic pictures, can direct the distribution of spatial attention. Furthermore, invisible erotic information can either attract or repel observers' spatial attention depending on their ...

  3. Increased risk of sadness and suicidality among victims of bullying experiencing additional threats to physical safety.

    Science.gov (United States)

    Pham, Tammy B; Adesman, Andrew

    2017-11-23

    Objective To examine, in a nationally-representative sample of high school students, to what extent one or more additional threats to physical safety exacerbates the risk of sadness and suicidality among victims of school and/or cyber-bullying. Methods National data from the 2015 Youth Risk Behavior Survey (YRBS) were analyzed for grades 9-12 (n = 15,624). Victimization groups were characterized by school-bullying and cyber-bullying, with and without additional threats to physical safety: fighting at school, being threatened/injured at school, and skipping school out of fear for one's safety. Outcomes included 2-week sadness and suicidality. Outcomes for victimization groups were compared to non-victims using logistic regression adjusting for sex, grade and race/ethnicity. Results Overall, 20.2% of students were school-bullied, and 15.5% were cyber-bullied in the past year. Compared to non-victims, victims of school-bullying and victims of cyber-bullying (VoCBs) who did not experience additional threats to physical safety were 2.76 and 3.83 times more likely to report 2-week sadness, and 3.39 and 3.27 times more likely to exhibit suicidality, respectively. Conversely, victims of bullying who experienced one or more additional threats to physical safety were successively more likely to report these adverse outcomes. Notably, victims of school-bullying and VoCBs with all three additional risk factors were 13.13 and 17.75 times more likely to exhibit suicidality, respectively. Conclusion Risk of depression symptoms and suicidality among victims of school-bullying and/or cyber-bullying is greatly increased among those who have experienced additional threats to physical safety: fighting at school, being threatened/injured at school and skipping school out of fear for their safety.

  4. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  5. A School Shooting Plot Foiled

    Science.gov (United States)

    Swezey, James A.; Thorp, Kimberly A.

    2010-01-01

    Dinkes, Cataldi, and Lin-Kelly (2007) claims that 78% of public schools reported one or more violent incidents during the 2005/2006 school year. School shootings are a rare but real threat on school campuses. Shootings at private schools are even less frequent with only a few recorded examples in the United States. This case study examines how a…

  6. The ontology of vision. The invisible, consciousness of Living matter.

    Directory of Open Access Journals (Sweden)

    Giorgia eFiorio

    2016-02-01

    Full Text Available If I close my eyes, the absence of light activates the peripheral cells devoted to the perception of darkness. The awareness of ‘seeing oneself seeing’ is in its essence a thought, one that is internal to the vision and previous to any object of sight. To this amphibious faculty, the diaphanous color of darkness, Aristotle assigns the principle of knowledge. Vision is a whole perceptual system, not a channel of sense. Functions of vision are interweaved to the texture of human interaction within a terrestrial environment that is in turn contained into the cosmic order. Within the internal resonance of a double reflection, the living being is the transitive host between two orders of scale, both bigger and smaller than the individual and unity. In the perceptual integrative system of human vision, the convergence-divergence of the corporeal presence and the diffraction of its own appearance is the margin. The sensation of being no longer coincides with the breath of life, it does not seems ‘real’ without the trace of some visible evidence and its simultaneous ‘sharing.’ Without a shadow, without an imprint, and destined for multiple invisible witnesses, the numeric copia of the physical presence inhabits the transient memory of our electronic prostheses. A rudimentary ‘visuality’ replaces tangible experience dissipating its meaning and the awareness of being alive. Transversal to the civilizations of the ancient world, through different orders of function and status, the anthropomorphic figuration of archaic sculpture questions the idea of Being. Ancient statues do not appear in order to be visible as artworks, but rather to exist. The awareness of human finiteness seals the compulsion to ‘give body’ to an invisible apparition that shapes the figuration of Being as the corporeal expression of an ontogenetic waking of human consciousness.Subject and object, the term humanum fathoms the relationship between matter and its living

  7. Australian Lesbian Teachers--A Reflection of Homophobic Harassment of High School Teachers in New South Wales Government Schools.

    Science.gov (United States)

    Ferfolja, Tania

    1998-01-01

    Examines the homophobic harassment of lesbian teachers working in government high schools in Sydney (Australia). The experiences of six lesbian teachers show that harassment based on sexual orientation is often an invisible issue in schools, as is homosexuality in general. Recommendations are made for teaching about homosexual tolerance. (SLD)

  8. The "Invisible" Drama/Theatre in Education Curriculum in Kenya

    Science.gov (United States)

    Joseph, Christopher Odhiambo

    2016-01-01

    This vignette presents the state of theatre in Education Kenya. The paper argues that though there are several theatre in education like practices, these have not been entrenched in the school curriculum. Theatre in Education finds expression and manifestations outside the mainstream school curriculum for instance in schools and colleges drama…

  9. Vector Higgs-portal dark matter and the invisible Higgs

    International Nuclear Information System (INIS)

    Lebedev, Oleg; Lee, Hyun Min; Mambrini, Yann

    2011-11-01

    The Higgs sector of the Standard Model offers a unique probe of the hidden sector. In this work, we explore the possibility of renormalizable Higgs couplings to the hidden sector vector fields which can constitute dark matter (DM). Abelian gauge sectors with minimal field content, necessary to render the gauge fields massive, have a natural Z 2 parity. This symmetry ensures stability of the vector fields making them viable dark matter candidates, while evading the usual electroweak constraints. We illustrate this idea with the Stueckelberg and Higgs mechanisms. Vector DM is consistent with the WMAP, XENON100, and LHC constraints, while it can affect significantly the invisible Higgs decay. Due to the enhanced branching ratio for the Higgs decay into the longitudinal components of the vector field, the vector Higgs portal provides an efficient way to hide the Higgs at the LHC. This could be the reason why the latest combined ATLAS/CMS data did not bring evidence for the existence of the Higgs boson. (orig.)

  10. Vector Higgs-portal dark matter and the invisible Higgs

    Energy Technology Data Exchange (ETDEWEB)

    Lebedev, Oleg [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Lee, Hyun Min [European Organization for Nuclear Research (CERN), Geneva (Switzerland); Mambrini, Yann [Paris-Sud Univ., 91 - Orsay (France). Lab. de Physique Theorique

    2011-11-15

    The Higgs sector of the Standard Model offers a unique probe of the hidden sector. In this work, we explore the possibility of renormalizable Higgs couplings to the hidden sector vector fields which can constitute dark matter (DM). Abelian gauge sectors with minimal field content, necessary to render the gauge fields massive, have a natural Z{sub 2} parity. This symmetry ensures stability of the vector fields making them viable dark matter candidates, while evading the usual electroweak constraints. We illustrate this idea with the Stueckelberg and Higgs mechanisms. Vector DM is consistent with the WMAP, XENON100, and LHC constraints, while it can affect significantly the invisible Higgs decay. Due to the enhanced branching ratio for the Higgs decay into the longitudinal components of the vector field, the vector Higgs portal provides an efficient way to hide the Higgs at the LHC. This could be the reason why the latest combined ATLAS/CMS data did not bring evidence for the existence of the Higgs boson. (orig.)

  11. Networks of echoes imitation, innovation and invisible leaders

    CERN Document Server

    West, Bruce J; Grigolini, Paolo

    2014-01-01

    Networks of Echoes: Imitation, Innovation and Invisible Leaders is a mathematically rigorous and data rich book on a fascinating area of the science and engineering of social webs.  There are hundreds of complex network phenomena whose statistical properties are described by inverse power laws.  The phenomena of interest are not arcane events that we encounter only fleetingly, but are events that dominate our lives. We examine how this intermittent statistical behavior intertwines itself with what appears to be the organized activity of social groups.  The book is structured as answers to a sequence of questions such as: How are decisions reached in elections and boardrooms?  How is the stability of a society undermined by zealots and committed minorities, and how is that stability re-established?  Can we learn to answer such questions about human behavior by studying the way flocks of birds retain their formation when eluding a predator?  These questions and others are answered using a generic model of...

  12. Empowering the digitally excluded: learning initiatives for (invisible groups

    Directory of Open Access Journals (Sweden)

    Jane Seale

    2012-12-01

    Full Text Available There is growing evidence that some digitally excluded groups of learners are receiving more attention than others. Discussions regarding why some digitally excluded learners are more visible than others and therefore worthy of more committed digital inclusion interventions raises important questions about how we define and conceptualise digital inclusion and digital inclusion practice; particularly in relation to empowerment. In this article, we draw on a range of research, practice and policy literature to examine two important questions: what is empowerment and in whose hands does empowerment lie? We argue that empowerment involves making informed choices about technology use, but that learners often require support- human intervention- to make these choices. However, current digital inclusion research has failed to produce a detailed critique of what constitutes empowering support from educational institutions and their staff. A lack of open and reflexive accounts of practice means that we are no closer to identifying and understanding the kinds of empowering practices that are required to challenge the kinds of prejudices, stereotypes, risk-aversiveness and low aspirations associated with the most invisible of digitally excluded learners.

  13. Double Marginalized Livelihoods: Invisible Gender Inequality in Pastoral Societies

    Directory of Open Access Journals (Sweden)

    Sileshi Mengistu

    2013-02-01

    Full Text Available Achieving gender equality is the Third Millennium Development Goal, and the major challenge to poverty reduction is the inability of governments to address this at grass root levels. This study is therefore aimed at assessing gender inequality as it pertains to socio-economic factors in (agro- pastoral societies. It tries to explain how “invisible” forces perpetuate gender inequality, based on data collected from male and female household heads and community representatives. The findings indicate that in comparison with men, women lack access to control rights over livestock, land, and income, which are critical to securing a sustainable livelihood. However, this inequality remains invisible to women who appear to readily submit to local customs, and to the community at large due to a lack of public awareness and gender based interventions. In addition, violence against women is perpetuated through traditional beliefs and sustained by tourists to the area. As a result, (agro- pastoral woman face double marginalization, for being pastoralist, and for being a woman.

  14. The invisible universe the story of radio astronomy

    CERN Document Server

    Verschuur, Gerrit

    2015-01-01

    Hidden from human view, accessible only to sensitive receivers attached to huge radio telescopes, the invisible universe beyond our senses continues to fascinate and intrigue our imaginations. Closer to home, in the Milky Way galaxy, radio astronomers listen patiently to the ticking of pulsars that tell of star death and states of matter of awesome densities. All of this happens out there in the universe hidden from our eyes, even when aided by the Hubble Space Telescope. This is the story of radio astronomy, of how radio waves are generated by stars, supernova, quasars, colliding galaxies and by the very beginnings of the universe itself. The author discusses what radio astronomers are doing in the New Mexico desert, in a remote valley in Puerto Rico, and in the green Pocahontas Valley in West Virginia, as well as dozens of other remote sites around the world. With each of these observatories, the scientists collect and analyze their data, "listening" to the radio signals from space in order to learn what, ...

  15. Vector Higgs portal dark matter and the invisible Higgs

    International Nuclear Information System (INIS)

    Lebedev, Oleg; Lee, Hyun Min; Mambrini, Yann

    2012-01-01

    The Higgs sector of the Standard Model offers a unique probe of the hidden sector. In this work, we explore the possibility of renormalizable Higgs couplings to the hidden sector vector fields which can constitute dark matter (DM). Abelian gauge sectors with minimal field content, necessary to render the gauge fields massive, have a natural Z 2 parity. This symmetry ensures stability of the vector fields making them viable dark matter candidates, while evading the usual electroweak constraints. We illustrate this idea with the Stückelberg and Higgs mechanisms. Vector DM is consistent with the WMAP, XENON100, and LHC constraints, while it can affect significantly the invisible Higgs decay. Due to the enhanced branching ratio for the Higgs decay into the longitudinal components of the vector field, the vector Higgs portal provides an efficient way to hide the Higgs at the LHC. This could be the reason why the latest combined ATLAS/CMS data did not bring evidence for the existence of the Higgs boson.

  16. Productions of invisible: considerations about time and training of teachers

    Directory of Open Access Journals (Sweden)

    Alice Dalmaso

    2013-01-01

    Full Text Available This paper aims to approach, even though in a briefly way, the subject of invention in the training of teachers. In order to do this, we will make a brief overview on Virgínia Kastrup contributions about this issue. One of the questions is the time - through Henri Bergson’s duration concept and its using in training theme. From this point, we will try to deconstruct a view about the identity reference in contemporaneity toward to multiple and open ways of existence. In the inventive movements of the processuality, the time is considered as an expression of human being individuation. It means to last refer to an immediacy of being, of being time, which are modulable and mutant, always in a creation process. In a movement of building a body which leaves an identity reference – that is opposite of self-transformation – necessarily we report us to the relation between the idea of time as duration and the individuation principle by Gilberto Simondon. With these concepts and their possible resonance in the discussion about formative politics, we can develop a view over the invisible to training of teachers and over the learners and another ways of operating in the world. The invention as a lever direct us to a field of possibilities to conceive and experience another time (and space which is producer of subjectivity, singularities and differences.

  17. Invisible axionlike dark matter from the electroweak bosonic seesaw mechanism

    Science.gov (United States)

    Ishida, Hiroyuki; Matsuzaki, Shinya; Yamaguchi, Yuya

    2016-11-01

    We explore a model based on the classically scale-invariant standard model (SM) with a strongly coupled vectorlike dynamics, which is called hypercolor (HC). The scale symmetry is dynamically broken by the vectorlike condensation at the TeV scale, so that the SM Higgs acquires the negative mass squared by the bosonic seesaw mechanism to realize the electroweak symmetry breaking. An elementary pseudoscalar S is introduced to give masses for the composite Nambu-Goldstone bosons (HC pions): The HC pion can be a good target to explore through a diphoton channel at the LHC. As a consequence of the bosonic seesaw, the fluctuating mode of S , which we call s , develops tiny couplings to the SM particles and is predicted to be very light. The s predominantly decays to a diphoton and can behave as invisible axionlike dark matter. The mass of the s dark matter is constrained by currently available cosmological and astrophysical limits to be 10-4 eV ≲ms≲1 eV . We find that a sufficient amount of relic abundance for the s dark matter can be accumulated via the coherent oscillation. The detection potential in microwave cavity experiments is also addressed.

  18. Transforce lingual appliances pre-adjusted invisible appliances simplify treatment.

    Science.gov (United States)

    Clark, William John

    2011-01-01

    Transforce lingual appliances are designed to be used in conjunction with conventional fixed appliances. Lingual arch development is normally followed by bonded fixed appliances to detail the occlusion. Alternatively Transforce appliance treatment is an efficient method of preparing complex malocclusions prior to a finishing stage with invisible appliances. This approach is ideal for adult treatment, using light continuous forces for arch development with appliances that are comfortable to wear. Sagittal and Transverse appliances are designed for arch development in a range of sizes for contracted arches. They can be used to treat all classes of malocclusion and are pre-adjusted fixed/removable devices for non-compliance treatment. Force modules with nickel titanium coil springs enclosed in a tube deliver a gentle, biocompatible continuous force with a long range of action. They are excellent for mixed dentition and ideal for adult arch development. There are multiple sizes for upper and lower arch development and a sizing chart may be placed over a study model for correct selection, eliminating the need for laboratory work.

  19. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  20. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  1. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  2. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  3. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    OpenAIRE

    Sylwia Bedyńska; Izabela Krejtz; Grzegorz Sedek

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness ...

  5. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  6. Invisible data matrix detection with smart phone using geometric correction and Hough transform

    Science.gov (United States)

    Sun, Halit; Uysalturk, Mahir C.; Karakaya, Mahmut

    2016-04-01

    Two-dimensional data matrices are used in many different areas that provide quick and automatic data entry to the computer system. Their most common usage is to automatically read labeled products (books, medicines, food, etc.) and recognize them. In Turkey, alcohol beverages and tobacco products are labeled and tracked with the invisible data matrices for public safety and tax purposes. In this application, since data matrixes are printed on a special paper with a pigmented ink, it cannot be seen under daylight. When red LEDs are utilized for illumination and reflected light is filtered, invisible data matrices become visible and decoded by special barcode readers. Owing to their physical dimensions, price and requirement of special training to use; cheap, small sized and easily carried domestic mobile invisible data matrix reader systems are required to be delivered to every inspector in the law enforcement units. In this paper, we first developed an apparatus attached to the smartphone including a red LED light and a high pass filter. Then, we promoted an algorithm to process captured images by smartphones and to decode all information stored in the invisible data matrix images. The proposed algorithm mainly involves four stages. In the first step, data matrix code is processed by Hough transform processing to find "L" shaped pattern. In the second step, borders of the data matrix are found by using the convex hull and corner detection methods. Afterwards, distortion of invisible data matrix corrected by geometric correction technique and the size of every module is fixed in rectangular shape. Finally, the invisible data matrix is scanned line by line in the horizontal axis to decode it. Based on the results obtained from the real test images of invisible data matrix captured with a smartphone, the proposed algorithm indicates high accuracy and low error rate.

  7. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  8. ARQUITECTURAS INVISIBLES / Invisible architecture

    Directory of Open Access Journals (Sweden)

    Francisco Javier Montero Fernández

    2012-11-01

    Full Text Available RESUMEN El concurso siempre ha sido una herramienta de investigación necesitada de una puesta al día de los conocimientos: difundiendo los logros alcanzados se muestra también la exigente actualización del arquitecto de una manera integral. No todos los concursos son iguales, ni pretenden los mismos objetivos y en un gran número, desgraciadamente, han servido de camuflaje a cuestiones que van más allá de la calidad. Intereses políticos o comerciales tienden a confundir la oportunidad de la difusión con la bondad del proyecto. Sería posible enumerar numerosos concursos que en el último siglo han supuesto un avance significativo en la arquitectura; una cierta añoranza de aquellos tiempos de debate -bienales y trienales- o de otras fórmulas, como las exposiciones internaciones, que eran capaces de llevar la investigación empírica desde la práctica directa. Hoy, por el contrario, a menudo, la definición del marco de actuación del proyecto arquitectónico se define de una manera ajena a la propia arquitectura, administrativamente dominado por un proceso que prima el cumplimiento legal y técnico frente a la calidad del propio proyecto, confundiendo el medio con el fin. La crítica apunta siempre al autor; se olvidan los excelentes procedimientos que armaron a un jurado exonerado de responsabilidad de manera gratuita o ese marco legal que tanto asfixia a la arquitectura en contra del espíritu investigador que siempre debiera prevalecer. Este numero se plantea como la asimilación del concurso a un proceso de investigación paralelo a una arquitectura unida a la calidad y el progreso, una arquitectura avanzada. SUMMARY The competition has always been a research tool in need of a knowledge update: the broadcasting of achievements also demonstrates the need for an integrated update of the architect. Not all competitions are equal or set the same objectives, and, unfortunately, to a large extent, they have served as camouflage for questions that go beyond quality. Political or commercial interests tend to confuse the opportunity for promotion with the merit of the project. It would be possible to number many competitions which have supposed a significant advance in architecture in the last century; a certain nostalgia for those times of debate which, together with other similar formulas such as entries in biennials, triennials or exhibitions, were capable of making empirical research from direct practice. On the contrary, today the policy framework of the architectural project is often defined in a manner foreign to real architecture, administratively dominated by a process that prioritizes legal and technical compliance over the quality of the project itself, confusing the means with the end. Criticism always aims at the author; it forgets the notable procedures which armed a jury gratuitously exonerated of responsibility or that legal framework that asphyxiates both architecture and the spirit of inquiry which should always prevail. This issue of the journal considers the assimilation of the competition into a research process parallel to an architecture united with quality and progress, an advanced architecture.

  9. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  10. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  11. Providing rehabilitation online - invisible work and diagnostic agents.

    Science.gov (United States)

    Bødker, Malene; Juul Nielsen, Annegrete

    2015-01-01

    Telecare promises to deliver healthcare services more efficiently while, at the same time, improving the quality of care. The purpose of this paper is to challenge these promises by analysing the implications of introducing telecare in the rehabilitation of patients suffering from chronic obstructive pulmonary disease. Empirically, the paper is based on interviews with and observations of rehabilitation therapists and patients taking part in a Danish telerehabilitation programme. Theoretically, the paper draws on Science and Technology Studies. The introduction of telecare alters rehabilitation practices in multiple ways. First, several new time-consuming work routines, carried out in collaboration between therapists, patients and technical professions, emerge. Although crucial in establishing and maintaining telerehabilitation infrastructures, this work remains invisible in evaluations of the programme. Second, rather than simply increasing patient agency, responsibilities are redistributed and negotiated in subtle and non-uniform ways. These negotiations make it less transparent where one responsibility begins and where another potentially conflicting one ends. Evaluations of telecare technologies should pay more attention to work- and responsibility-related effects of introducing telecare in order better to account for predicted and unpredicted as well as desirable and undesirable socio-technical changes. Using an ethnographic approach, the paper points to the discrepancy between simplistic political promises that telecare technologies can serve as tools for improvement, on the one hand, and the substantial changes in the organisation and management of healthcare observed in practice, on the other. Rather than regarding telecare as technologies of improvement, it is more productive to regard them as technologies of change.

  12. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    Science.gov (United States)

    Bedyńska, Sylwia; Krejtz, Izabela; Sedek, Grzegorz

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement – namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed. PMID:29666599

  13. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    Directory of Open Access Journals (Sweden)

    Sylwia Bedyńska

    2018-04-01

    Full Text Available Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement – namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed.

  14. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness.

    Science.gov (United States)

    Bedyńska, Sylwia; Krejtz, Izabela; Sedek, Grzegorz

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement - namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed.

  15. Invisibility: the lived experience of women with cancer of the vulva.

    Science.gov (United States)

    Jefferies, Hilary; Clifford, Collette

    2012-01-01

    This study describes an exploration of the lived experience of 13 British women with cancer of the vulva who underwent surgical treatment. A review of the literature highlighted a paucity of knowledge as many studies were conducted during the 1980s and 1990s and investigated sexual functioning only. An interpretive phenomenological approach based on the work of Heidegger and van Manen was used to frame the study by posing the question, "What must it be like to be diagnosed with, and have surgery for a cancer of the vulva?" The women, younger than 50 years, were identified by purposive sampling and interviewed between 6 months and 5 years after surgery. The data were analyzed using framework analysis. The women's lived experience is described in its entirety by the concept of invisibility, characterized as something "no one can see," "heard of," and "talks about." The impact of this invisibility is discussed as the "invisibility of understanding" and "invisibility of support." Although many women may expect to be cured of their vulval cancer, the invisible nature of the condition and the resulting lack of understanding and support may continue for a considerable period, as every aspect of their everyday life and in their relationships may be affected. The challenge now is to raise awareness of this condition and provide greater informational and emotional support for these women.

  16. Invisible realities: Caring for older Moroccan migrants with dementia in Belgium.

    Science.gov (United States)

    Berdai Chaouni, Saloua; De Donder, Liesbeth

    2018-01-01

    The number of older Moroccan migrants reaching the age of high risk for dementia is increasing in Belgium. Yet no study has been performed to explore how Moroccan families facing dementia experience and manage the condition. The study employed a qualitative design using semi-structured interviews with 12 informal and 13 formal caregivers to answer this research question. Findings indicate that the experience of dementia includes several invisible realities that challenge the informal and formal caregivers: (1) the invisibility of dementia as a condition; (2) the invisible subtleties of the informal care execution; (3) the invisibility and inaccessibility of care services as explanation for these family's non-use of available services; and (4) the overlooking of culture, migration and religion as invisible influencers of the overall dementia experience. A better understanding of these hidden realities of migrant older people with dementia and their caregivers could lead to interventions to provide effective and tailored person-centred care that is sensitive to the individual's life experiences, culture and religious background.

  17. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  18. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  19. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  20. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  1. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    Science.gov (United States)

    2016-03-01

    come under fire from multiple sources simultaneously. These threats would be engaged in a numbers game , seeking to saturate the battlespace with many...optimization extension that uses the Python modeling language. B. TEST SCENARIO The following test scenario was developed to validate the models...Adaptive rapid response to swarming threats Concept Briefing. Presented at Naval Postgraduate School, Monterey, CA. Python [Computer Software]. (2015

  2. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  3. Experimental verification of free-space singular boundary conditions in an invisibility cloak

    International Nuclear Information System (INIS)

    Wu, Qiannan; Gao, Fei; Song, Zhengyong; Lin, Xiao; Zhang, Youming; Zhang, Baile; Chen, Huanyang

    2016-01-01

    A major issue in invisibility cloaking, which caused intense mathematical discussions in the past few years but still remains physically elusive, is the plausible singular boundary conditions associated with the singular metamaterials at the inner boundary of an invisibility cloak. The perfect cloaking phenomenon, as originally proposed by Pendry et al for electromagnetic waves, cannot be treated as physical before a realistic inner boundary of a cloak is demonstrated. Although a recent demonstration has been done in a waveguide environment, the exotic singular boundary conditions should apply to a general environment as in free space. Here we fabricate a metamaterial surface that exhibits the singular boundary conditions and demonstrate its performance in free space. Particularly, the phase information of waves reflected from this metamaterial surface is explicitly measured, confirming the singular responses of boundary conditions for an invisibility cloak. (paper)

  4. Experimental verification of free-space singular boundary conditions in an invisibility cloak

    Science.gov (United States)

    Wu, Qiannan; Gao, Fei; Song, Zhengyong; Lin, Xiao; Zhang, Youming; Chen, Huanyang; Zhang, Baile

    2016-04-01

    A major issue in invisibility cloaking, which caused intense mathematical discussions in the past few years but still remains physically elusive, is the plausible singular boundary conditions associated with the singular metamaterials at the inner boundary of an invisibility cloak. The perfect cloaking phenomenon, as originally proposed by Pendry et al for electromagnetic waves, cannot be treated as physical before a realistic inner boundary of a cloak is demonstrated. Although a recent demonstration has been done in a waveguide environment, the exotic singular boundary conditions should apply to a general environment as in free space. Here we fabricate a metamaterial surface that exhibits the singular boundary conditions and demonstrate its performance in free space. Particularly, the phase information of waves reflected from this metamaterial surface is explicitly measured, confirming the singular responses of boundary conditions for an invisibility cloak.

  5. When risk becomes invisible in the everyday life of day care

    DEFF Research Database (Denmark)

    Villumsen, Anne Marie; Kristensen, Ole Steen

    2016-01-01

    Both the identification of children at risk in day care and multidisciplinary collaboration with other professions have a political focus. This study was designed as an organizational field study and attempts to establish a coherent practice of multidisciplinary collaboration between day care...... and their life circumstances become invisible in the everyday life of day care. Due to defensive routines as well as an organizational culture that frames and creates a non-explicitly structured practice using intuitive processes, the problems of children at risk become invisible in the everyday life of day care....... When risk become invisible, it not only impedes the mono-professional help the children receive, it also inhibits a crucial multidisciplinary collaborative provision of support to children at risk and their families. The identification of children at risk seems to be based on an unexamined selection...

  6. All-dielectric invisibility cloaks made of BaTiO3-loaded polyurethane foam

    International Nuclear Information System (INIS)

    Bao Di; Rajab, Khalid Z; Hao Yang; Kallos, Efthymios; Tang, Wenxuan; Argyropoulos, Christos; Piao Yongzhe; Yang Shoufeng

    2011-01-01

    Transformation optics has led the way in the development of electromagnetic invisibility cloaks from science fiction to engineering practice. Invisibility cloaks have been demonstrated over a wide range of the electromagnetic spectrum, and with a variety of different fabrication techniques. However, all previous schemes have relied on the use of metamaterials consisting of arrays of sub-wavelength inclusions. We report on the first cloaking structure made of a high-κ dielectric-loaded foam mixture. A polyurethane foam mixed with different ratios of barium titanate is used to produce the required range of permittivities, and the invisibility cloak is demonstrated to work for all incident angles over a wide range of microwave frequencies. This method will greatly facilitate the development and large-scale manufacture of a wide range of transformation optics-based structures. (paper)

  7. Unidirectional reflection and invisibility in nonlinear media with an incoherent nonlinearity

    Science.gov (United States)

    Mostafazadeh, Ali; Oflaz, Neslihan

    2017-11-01

    We give explicit criteria for the reflectionlessness, transparency, and invisibility of a finite-range potential in the presence of an incoherent (intensity-dependent) nonlinearity that is confined to the range of the potential. This allows us to conduct a systematic study of the effects of such a nonlinearity on a locally periodic class of finite-range potentials that display perturbative unidirectional invisibility. We use our general results to examine the effects of a weak Kerr nonlinearity on the behavior of these potentials and show that the presence of nonlinearity destroys the unidirectional invisibility of these potentials. If the strength of the Kerr nonlinearity is so weak that the first-order perturbation theory is reliable, the presence of nonlinearity does not affect the unidirectional reflectionlessness and transmission reciprocity of the potential. We show that the expected violation of the latter is a second order perturbative effect.

  8. The Citizen Science Program "H2O SOS: Help Heal the Ocean—Student Operated Solutions: Operation Climate Change" teaches middle and high school students about ocean threats related to climate change through hands-on activities and learning experiences in the field. This is a continuation of the Program presented last year at the Poster Session.

    Science.gov (United States)

    Weiss, N. K.; Wood, J. H.

    2017-12-01

    TThe Citizen Science Program H2O SOS: Help Heal the Ocean—Student Operated Solutions: Operation Climate Change, teaches middle and high school students about ocean threats related to climate change through hands-on activities and learning experiences in the field. During each session (in-class or after-school as a club), students build an understanding about how climate change impacts our oceans using resources provided by ExplorOcean (hands-on activities, presentations, multi-media). Through a student leadership model, students present lessons to each other, interweaving a deep learning of science, 21st century technology, communication skills, and leadership. After participating in learning experiences and activities related to 6 key climate change concepts: 1) Introduction to climate change, 2) Increased sea temperatures, 3) Ocean acidification, 4) Sea level rise, 5) Feedback mechanisms, and 6) Innovative solutions. H2O SOS- Operation Climate change participants select one focus issue and use it to design a multi-pronged campaign to increase awareness about this issue in their local community. The campaign includes social media, an interactive activity, and a visual component. All participating clubs that meet participation and action goals earn a field trip to Ocean Quest where they dive deeper into their selected issue through hands-on activities, real-world investigations, and interviews or presentations with experts. In addition to self-selected opportunities to showcase their focus issue, teams will participate in one of several key events identified by Ocean Quest.

  9. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  10. Paramilitary Terrorism: A Neglected Threat

    National Research Council Canada - National Science Library

    Tallen, Jr, George W

    2007-01-01

    ... be ignored. Terrorist seizure of either a soft target, like Russia's Beslan No. 1 school in 2004, or a hard target such as nuclear materials or facilities, could have enormous strategic consequences...

  11. Emerging Threats to National Security

    National Research Council Canada - National Science Library

    Treverton, Gregory F

    2005-01-01

    Statement of Gregory F. Treverton, Director, Intelligence Policy Center, RAND Corporation, Associate Dean, Pardee RAND Graduate School, before the Permanent Select Committee on Intelligence, given before the United States...

  12. Group study of an "undercover" test for visuospatial neglect: invisible cancellation can reveal more neglect than standard cancellation.

    Science.gov (United States)

    Wojciulik, E; Rorden, C; Clarke, K; Husain, M; Driver, J

    2004-09-01

    Visual neglect is a relatively common deficit after brain damage, particularly strokes. Cancellation tests provide standard clinical measures of neglect severity and deficits in daily life. A recent single-case study introduced a new variation on standard cancellation. Instead of making a visible mark on each target found, the patient made invisible marks (recorded with carbon paper underneath, for later scoring). Such invisible cancellation was found to reveal more neglect than cancellation with visible marks. Here we test the generality of this. Twenty three successive cases with suspected neglect each performed cancellation with visible or invisible marks. Neglect of contralesional targets was more pronounced with invisible marks. Indeed, about half of the patients only showed neglect in this version. For cases showing more neglect with invisible marks, stronger neglect of contralesional targets correlated with more revisits to ipsilesional targets for making additional invisible marks upon them. These results indicate that cancellation with invisible marks can reveal more neglect than standard cancellation with visible marks, while still providing a practical bedside test. Our observations may be consistent with recent proposals that demands on spatial working memory (required to keep track of previously found items only when marked invisibly) can exacerbate spatial neglect.

  13. Rose George: Deep Sea and Foreign Going: Inside Shipping, the Invisible Industry that Brings you 90% of Everything

    DEFF Research Database (Denmark)

    Taudal Poulsen, René

    2014-01-01

    Book review of: Rose George: Deep Sea and Foreign Going: Inside Shipping, the Invisible Industry that Brings you 90% of Everything. London :Portobello Books, 2013. 320 pp. ISBN 9781846272639......Book review of: Rose George: Deep Sea and Foreign Going: Inside Shipping, the Invisible Industry that Brings you 90% of Everything. London :Portobello Books, 2013. 320 pp. ISBN 9781846272639...

  14. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  15. The scattering of a cylindrical invisibility cloak: reduced parameters and optimization

    DEFF Research Database (Denmark)

    Peng, Liang; Ran, L.; Mortensen, Asger

    2011-01-01

    We investigate the scattering of 2D cylindrical invisibility cloaks with simplified constitutive parameters with the assistance of scattering coefficients. We show that the scattering of the cloaks originates not only from the boundary conditions but also from the spatial variation of the component...... of permittivity/permeability. According to our formulation, we propose some restrictions to the invisibility cloak in order to minimize its scattering after the simplification has taken place. With our theoretical analysis, it is possible to design a simplified cloak using some peculiar composites...

  16. Magnetically controlled multifrequency invisibility cloak with a single shell of ferrite material

    Science.gov (United States)

    Wang, Xiaohua; Liu, Youwen

    2015-02-01

    A magnetically controlled multifrequency invisibility cloak with a single shell of the isotropic and homogeneous ferrite material has been investigated based on the scattering cancellation method from the Mie scattering theory. The analytical and simulated results have demonstrated that such this shell can drastically reduce the total scattering cross-section of this cloaking system at multiple frequencies. These multiple cloaking frequencies of this shell can be externally controlled since the magnetic permeability of ferrites is well tuned by the applied magnetic field. This may provide a potential way to design a tunable multifrequency invisibility cloak with considerable flexibility.

  17. Optimized cylindrical invisibility cloak with minimum layers of non-magnetic isotropic materials

    International Nuclear Information System (INIS)

    Yu Zhenzhong; Feng Yijun; Xu Xiaofei; Zhao Junming; Jiang Tian

    2011-01-01

    We present optimized design of cylindrical invisibility cloak with minimum layers of non-magnetic isotropic materials. Through an optimization procedure based on genetic algorithm, simpler cloak structure and more realizable material parameters can be achieved with better cloak performance than that of an ideal non-magnetic cloak with a reduced set of parameters. We demonstrate that a cloak shell with only five layers of two normal materials can result in an average 20 dB reduction in the scattering width for all directions when covering the inner conducting cylinder with the cloak. The optimized design can substantially simplify the realization of the invisibility cloak, especially in the optical range.

  18. Search for Invisible Axion Dark Matter with the Axion Dark Matter Experiment.

    Science.gov (United States)

    Du, N; Force, N; Khatiwada, R; Lentz, E; Ottens, R; Rosenberg, L J; Rybka, G; Carosi, G; Woollett, N; Bowring, D; Chou, A S; Sonnenschein, A; Wester, W; Boutan, C; Oblath, N S; Bradley, R; Daw, E J; Dixit, A V; Clarke, J; O'Kelley, S R; Crisosto, N; Gleason, J R; Jois, S; Sikivie, P; Stern, I; Sullivan, N S; Tanner, D B; Hilton, G C

    2018-04-13

    This Letter reports the results from a haloscope search for dark matter axions with masses between 2.66 and 2.81  μeV. The search excludes the range of axion-photon couplings predicted by plausible models of the invisible axion. This unprecedented sensitivity is achieved by operating a large-volume haloscope at subkelvin temperatures, thereby reducing thermal noise as well as the excess noise from the ultralow-noise superconducting quantum interference device amplifier used for the signal power readout. Ongoing searches will provide nearly definitive tests of the invisible axion model over a wide range of axion masses.

  19. Another Distortion of Adam Smith: The Case of the "Invisible Hand"

    OpenAIRE

    Michael Meeropol

    2004-01-01

    This paper addresses a major omission in the way textbook writers and journalists utilize Adam Smith’s concept of the “invisible hand” to make Adam Smith an intellectual precursor of modern neo-liberal economic policy. Specifically, the paper addresses the use of the concept of the “invisible hand” by Adam Smith to address two major issues in the debate over neo-liberal policy: the international flow of capital and its role in the location of investment projects and the inequality in the dist...

  20. ¿Why are women invisible in the Teaching of history? Abstract

    Directory of Open Access Journals (Sweden)

    Edda Sant Obiols

    2011-07-01

    Full Text Available In this article we wonder why women are invisible in the teaching of history and we develop some assumptions about the reasons for this invisibility. We analyze the place women occupy in the curriculum of social sciences and history of Catalonia to claim their presence in texts and in practices. We exemplify their role in a teaching unit called Gifts of the 36 -Women of the 36- dedicated to recall the role of Republican women during the Spanish Civil War, the Franquism and the transition to democracy.

  1. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  2. Invisible-hand explanations: From blindness to lack of we-ness

    OpenAIRE

    Dayer-Tieffenbach, Emma

    2013-01-01

    The unintendedness of the phenomenon that is to be explained is a constraint visible in the various applications and clarifications of invisible hand explanations. The article casts doubt on such a requirement and proposes a revised account. To have a role in an invisible hand process it is argued agents may very well act with a view to contributing to the occurrence of the social outcome that is to be explained provided they see what they do as an aggregation of their individual actions rath...

  3. Medición de los Capitales Intelectuales Visibles e Invisibles

    OpenAIRE

    Jorge Luis Heredia Heredia; Martha González Adame

    2010-01-01

    El objetivo de esta investigación es presentar una propuesta para medir el capital intelectual visible e invisible y conocer la relación estadística entre ambos tipos de capital. Se parte de la propuesta de Nevado [1] sobre la clasificación de los activos intangibles visibles e invisibles y de la visión social evolutiva de Bueno [2]. A partir de esta postura se realiza un análisis del capital intelectual y los modelos para su medición hasta encontrar los criterios básicos de la nueva propuest...

  4. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  5. Flavor connections and neutrino mass hierarchy in variant invisible axion models without domain wall problem

    International Nuclear Information System (INIS)

    Geng, C.Q.; Ng, J.N.

    1988-08-01

    New types of invisible axion model based on the recent variant axion models are presented. They belong to the N=1 type model and hence are free of domain wall problems. The Peccei-Quinn symmetry transformations are not totally generation and flavor blind, which may help in understanding the small values of electron and u-quark and large t-quark masses. The light neutrino mass pattern in the two Higgs singlet models can have a very different hierarchy that differs from the other type invisible axion model. (Author) (25 refs.)

  6. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  7. The concept of leakage in threat assessment.

    Science.gov (United States)

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  8. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  9. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  10. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  11. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  12. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  13. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  14. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  15. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  16. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  17. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  18. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  19. On measuring the masses of pair-produced semi-invisibly decaying particles at hadron colliders

    International Nuclear Information System (INIS)

    Tovey, Daniel R.

    2008-01-01

    A straightforward new technique is introduced which enables measurement at hadron colliders of an analytical combination of the masses of pair-produced semi-invisibly decaying particles and their invisible decay products. The new technique makes use of the invariance under contra-linear Lorentz boosts of a simple combination of the transverse momentum components of the aggregate visible products of each decay chain. In the general case where the invariant masses of the visible decay products are non-zero it is shown that in principle the masses of both the initial particles from the hard scattering and the invisible particles produced in the decay chains can be determined independently. This application is likely to be difficult to realise in practice however due to the contamination of the final state with ISR jets. The technique may be of most use for measurements of SUSY particle masses at the LHC, however the technique should be applicable to any class of hadron collider events in which heavy particles of unknown mass are pair-produced and decay to semi-invisible final states

  20. Distributed Leadership And The Visibility/invisibility Paradox In On-line Communities

    Directory of Open Access Journals (Sweden)

    Jill Jameson

    2011-01-01

    Full Text Available This paper analyzes the role of distributed leadership in three on-line communities, reflecting on an observed visibility/invisibility paradox in leadership within these communities. Leaders who downplay their seniority and assume a degree of invisibility, allocating discretionary powers to subordinate levels in an organizational hierarchy, may facilitate the emergence of distributed leadership. Yet, simultaneously, leader-led relations are enabled by high leadership visibility. This paradox—that leaders need to be both highly visible and also invisible, or hands-off, when the occasion requires it—was derived from prior research into e-learning communities and tested in the analysis of discussions from on-line communities using a case study pattern-matching process. The operation of both visibility and invisibility in leadership is a key issue for enabling effective collaborations in distributed leadership situations based on trust. Such collaboration fosters positive group interaction and participative decision making in a consensus facilitated through leadership distribution amongst on-line community members.

  1. Making the Invisible Visible: Engaging Elementary Preservice Teachers in Science and Literacy Connections

    Science.gov (United States)

    Gwekwerere, Yovita; Buley, Jan

    2011-01-01

    Picture books can be used to teach children to infer, hypothesise, question, identify, explain and compare. By making the "invisible visible" preservice teachers in Canada explored ways to enhance the development of critical science and literacy skills through the creation of picture books in collaboration with students in Grades 5 and…

  2. The Invisible Hand of Innovation showing in the General Purpose Technology of Electricity

    NARCIS (Netherlands)

    van der Kooij, B.J.G.

    2017-01-01

    The unintended economic effect on society as result of individual behaviour —Adam Smith’s ‘Invisible Hand’ of economic progress in the eighteenth century — had its equivalent in technological progress. In the nineteenth century, again individual behaviour with its Acts of Innovation and Acts of

  3. Invisible but Essential: The Role of Professional Networks in Promoting Faculty Agency in Career Advancement

    Science.gov (United States)

    Niehaus, Elizabeth; O'Meara, KerryAnn

    2015-01-01

    The benefits of professional networks are largely invisible to the people embedded in them (O'Reilly 1991), yet professional networks may provide key benefits for faculty careers. The purpose of the study reported here was to explore the role of professional networks in faculty agency in career advancement, specifically focusing on the overall…

  4. Simulation Study of Invisible Decays of the Higgs Boson with the Circular Electron Positron Collider

    Science.gov (United States)

    Jyotishmati, Susmita

    A Higgs-like boson has been discovered by the experiments ATLAS and CMS at the LHC. We need to verify that it is the Standard Model (SM) Higgs and understand its nature. A Circular Electron Positron Collider (CEPC), has been proposed as a Higgs factory for detailed study of the Higgs boson. In this dissertation we study the feasibility of measuring the H → Invisible decays at the CEPC. Dark Matter (DM) interacts with matter by gravity, thus appears to be invisible in the CEPC experiment. If Higgs boson couples to DM it could be an important "portal" to New Physics. A Monte Carlo analysis of H → Invisible optimized to achieve high signal significance, and low backgrounds in the e +e- → ZH, Z → mu +mu- channel based on an integrated luminosity of 5 ab-1 expected for ten years run of the CEPC, is performed. Precision on the Higgs to invisible branching ratio at the input values of 0.1%(SM) and Beyond Standard Model (BSM) cases 0%, 1%, 5% and 10% is determined. Two approaches have been employed. They are the cut-based analysis and the multivariate analysis. Based on this dissertation study a baseline analysis approach is recommended for future CEPC design and studies.

  5. Revealing the Invisible Hand: The Role of Teachers in Children's Peer Experiences

    Science.gov (United States)

    Farmer, Thomas W.; Lines, Meghan McAuliffe; Hamm, Jill V.

    2011-01-01

    To introduce this special issue, the concept of the teacher as an ''invisible hand'' is presented as a metaphor to describe the potentially influential but relatively understudied contribution that educators are likely to have on children's peer relationships and their broader interpersonal growth. Building from conceptual work distinguishing…

  6. Invisible Perceptions: Understanding the Perceptions of University Tutors towards Trainee Teachers with Parental Responsibilities

    Science.gov (United States)

    Murtagh, Lisa

    2017-01-01

    In recent decades, Higher Education has undoubtedly changed giving rise to an increasingly diverse student population. However, there has been only limited research on students with parental responsibilities. When they are considered, this is often in a somewhat pejorative way. The challenges faced by such trainees are often invisible. This paper…

  7. Dynamics of processing invisible faces in the brain: automatic neural encoding of facial expression information.

    Science.gov (United States)

    Jiang, Yi; Shannon, Robert W; Vizueta, Nathalie; Bernat, Edward M; Patrick, Christopher J; He, Sheng

    2009-02-01

    The fusiform face area (FFA) and the superior temporal sulcus (STS) are suggested to process facial identity and facial expression information respectively. We recently demonstrated a functional dissociation between the FFA and the STS as well as correlated sensitivity of the STS and the amygdala to facial expressions using an interocular suppression paradigm [Jiang, Y., He, S., 2006. Cortical responses to invisible faces: dissociating subsystems for facial-information processing. Curr. Biol. 16, 2023-2029.]. In the current event-related brain potential (ERP) study, we investigated the temporal dynamics of facial information processing. Observers viewed neutral, fearful, and scrambled face stimuli, either visibly or rendered invisible through interocular suppression. Relative to scrambled face stimuli, intact visible faces elicited larger positive P1 (110-130 ms) and larger negative N1 or N170 (160-180 ms) potentials at posterior occipital and bilateral occipito-temporal regions respectively, with the N170 amplitude significantly greater for fearful than neutral faces. Invisible intact faces generated a stronger signal than scrambled faces at 140-200 ms over posterior occipital areas whereas invisible fearful faces (compared to neutral and scrambled faces) elicited a significantly larger negative deflection starting at 220 ms along the STS. These results provide further evidence for cortical processing of facial information without awareness and elucidate the temporal sequence of automatic facial expression information extraction.

  8. The Lived Experience of Students with an Invisible Disability at a Canadian University

    Science.gov (United States)

    Mullins, Laura; Preyde, Michele

    2013-01-01

    University institutions are required by law to make their services accessible to students with disabilities. Canadian universities have gone a long way to eliminate the physical obstacles that present barriers for students. Many students with disabilities have invisible disabilities that require different types of adjustments. Although some…

  9. The Invisible Web: Uncovering Information Sources Search Engines Can't See.

    Science.gov (United States)

    Sherman, Chris; Price, Gary

    This book takes a detailed look at the nature and extent of the Invisible Web, and offers pathfinders for accessing the valuable information it contains. It is designed to fit the needs of both novice and advanced Web searchers. Chapter One traces the development of the Internet and many of the early tools used to locate and share information via…

  10. Black’s Survival Strategy: Tricksterism in Ralph Ellison’s Invisible Man

    Directory of Open Access Journals (Sweden)

    Meiling Fu

    2017-01-01

    Full Text Available This paper is intended to investigate tricksterism in Ralph Waldo Ellison’s Invisible Man. Through analyzing the successful tricksters and the unsuccessful tricksters, this research concludes that tricksterism is a survival strategy in the society of white supremacy, and black people have to wear the mask and trick the white people for the cause of eliminating racial discrimination.

  11. Attentional load modulates responses of human primary visual cortex to invisible stimuli.

    Science.gov (United States)

    Bahrami, Bahador; Lavie, Nilli; Rees, Geraint

    2007-03-20

    Visual neuroscience has long sought to determine the extent to which stimulus-evoked activity in visual cortex depends on attention and awareness. Some influential theories of consciousness maintain that the allocation of attention is restricted to conscious representations [1, 2]. However, in the load theory of attention [3], competition between task-relevant and task-irrelevant stimuli for limited-capacity attention does not depend on conscious perception of the irrelevant stimuli. The critical test is whether the level of attentional load in a relevant task would determine unconscious neural processing of invisible stimuli. Human participants were scanned with high-field fMRI while they performed a foveal task of low or high attentional load. Irrelevant, invisible monocular stimuli were simultaneously presented peripherally and were continuously suppressed by a flashing mask in the other eye [4]. Attentional load in the foveal task strongly modulated retinotopic activity evoked in primary visual cortex (V1) by the invisible stimuli. Contrary to traditional views [1, 2, 5, 6], we found that availability of attentional capacity determines neural representations related to unconscious processing of continuously suppressed stimuli in human primary visual cortex. Spillover of attention to cortical representations of invisible stimuli (under low load) cannot be a sufficient condition for their awareness.

  12. The (Dis)appearance of Ai Weiwei: Translations and (In)visibilities

    DEFF Research Database (Denmark)

    Glud, Louise Nørgaard; Stenbøg, Anne Sofie Christensen; Albrechtslund, Anders

    This paper offers a study of surveillance themes relating to Ai Weiwei’s highly discussed disappearance and later reappearance in 2011. Our study is based on an Actor-Network Theory (ANT) approach and we focus on the manifold negotiations and (in)visibilities relating to the dramatic events as well...... as Ai’s artwork and life....

  13. The (Dis)appearance of Ai Weiwei: Translations and (In)visibilities

    DEFF Research Database (Denmark)

    Stenbøg, Sofie; Nørgaard Glud, Louise; Albrechtslund, Anders

    2013-01-01

    This paper offers a study of surveillance themes relating to Ai Weiwei’s highly discussed disappearance and later reappearance in 2011. Our study is based on an Actor-Network Theory (ANT) approach and we focus on the manifold negotiations and (in)visibilities relating to the dramatic events as well...... as Ai’s artwork and life....

  14. Instantaneous, Simple, and Reversible Revealing of Invisible Patterns Encrypted in Robust Hollow Sphere Colloidal Photonic Crystals.

    Science.gov (United States)

    Zhong, Kuo; Li, Jiaqi; Liu, Liwang; Van Cleuvenbergen, Stijn; Song, Kai; Clays, Koen

    2018-05-04

    The colors of photonic crystals are based on their periodic crystalline structure. They show clear advantages over conventional chromophores for many applications, mainly due to their anti-photobleaching and responsiveness to stimuli. More specifically, combining colloidal photonic crystals and invisible patterns is important in steganography and watermarking for anticounterfeiting applications. Here a convenient way to imprint robust invisible patterns in colloidal crystals of hollow silica spheres is presented. While these patterns remain invisible under static environmental humidity, even up to near 100% relative humidity, they are unveiled immediately (≈100 ms) and fully reversibly by dynamic humid flow, e.g., human breath. They reveal themselves due to the extreme wettability of the patterned (etched) regions, as confirmed by contact angle measurements. The liquid surface tension threshold to induce wetting (revealing the imprinted invisible images) is evaluated by thermodynamic predictions and subsequently verified by exposure to various vapors with different surface tension. The color of the patterned regions is furthermore independently tuned by vapors with different refractive indices. Such a system can play a key role in applications such as anticounterfeiting, identification, and vapor sensing. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. When physics becomes art: Signatures of the invisible lands in Geneva

    CERN Document Server

    2002-01-01

    Signatures of the Invisible, an exhibition that brings together science and art, arrives in Geneva next week. Thanks to CERN and the London Institute, eleven European artists have worked with physicists from the Laboratory and the result of this collaboration will be shown in the Centre d'Art Contemporain until May.

  16. Lurking and L2 Learners on a Facebook Group: The Voices of the Invisibles

    Science.gov (United States)

    Shafie, Latisha Asmaak; Yaacob, Aizan; Singh, Paramjit Kaur Karpal

    2016-01-01

    This qualitative research investigates the practice of lurking among English as a second language (ESL) learners in a Facebook group discussion. Lurking is a term used to describe the activity of following and observing any online discussions or activities without contributing to the discussions. Lurkers are often accused of being invisible and…

  17. Asymmetric Invisibility Cloaking Theory Based on the Concept of Effective Electromagnetic Fields for Photons

    Science.gov (United States)

    Amemiya, Tomo; Taki, Masato; Kanazawa, Toru; Arai, Shigehisa

    2014-03-01

    The asymmetric invisibility cloak is a special cloak with unidirectional transparency; that is, a person in the cloak should not be seen from the outside but should be able to see the outside. Existing theories of designing invisibility cloaks cannot be used for asymmetric cloaking because they are based on the transformation optics that uses Riemannian metric tensor independent of direction. To overcome this problem, we propose introducing directionality into invisibility cloaking. Our theory is based on ``the theory of effective magnetic field for photons'' proposed by Stanford University.[2] To realize asymmetric cloaking, we have extended the Stanford's theory to add the concept of ``effective electric field for photons.'' The effective electric and the magnetic field can be generated using a photonc resonator lattice, which is a kind of metamaterial. The Hamiltonian for photons in these fields has a similar form to that of the Hamiltonian for a charged particle in an electromagnetic field. An incident photon therefore experiences a ``Lorentz-like'' and a ``Coulomb-like'' force and shows asymmetric movement depending of its travelling direction.We show the procedure of designing actual invisibility cloaks using the photonc resonator lattice and confirm their operation with the aid of computer simulation. This work was supported in part by the MEXT; JSPS KAKENHI Grant Numbers #24246061, #24656046, #25420321, #25420322.

  18. Motivation and detectability of an invisibly decaying Higgs boson at the Fermilab Tevatron

    International Nuclear Information System (INIS)

    Martin, S.P.; Wells, J.D.

    1999-01-01

    A Higgs boson with a mass below 150 GeV has a total decay width of less than 20 MeV into accessible standard model states. This narrow width means that the usual branching fractions for such a light Higgs boson are highly susceptible to any new particles to which it has unsuppressed couplings. In particular, there are many reasonable and interesting theoretical ideas that naturally imply an invisibly decaying Higgs boson. The motivations include models with light supersymmetric neutralinos, spontaneously broken lepton number, radiatively generated neutrino masses, additional singlet scalar(s), or right-handed neutrinos in the extra dimensions of TeV gravity. We discuss these approaches to model building and their implications for Higgs boson phenomenology in future Fermilab Tevatron runs. We find, for example, that the Tevatron with 30 fb -1 integrated luminosity can make a 3σ observation in the l + l - +E/ T channel for a 125 GeV Higgs boson that is produced with the same strength as the standard model Higgs boson but always decays invisibly. We also analyze the b bar b+E/ T final state signal and conclude that it is not as sensitive, but it may assist in excluding the possibility of an invisibly decaying Higgs boson or enable confirmation of an observed signal in the dilepton channel. We argue that a comprehensive Higgs boson search at the Tevatron should include the possibility that the Higgs boson decays invisibly. copyright 1999 The American Physical Society

  19. The [in]visibility of HIV/AIDS in the Malawi public sphere 1 | Lwanda ...

    African Journals Online (AJOL)

    This paper argues that, far from being invisible, issues of sexuality are omnipresent in the African public sphere. However, this presence is not usually found in the medical nor overtly gender/sexual arenas but in general social contexts. Western derived research models have sought and continue to seek to situate gender ...

  20. When risk becomes invisible in the everyday life of day care

    DEFF Research Database (Denmark)

    Villumsen, Anne Marie; Kristensen, Ole Steen

    2016-01-01

    . When risk become invisible, it not only impedes the mono-professional help the children receive, it also inhibits a crucial multidisciplinary collaborative provision of support to children at risk and their families. The identification of children at risk seems to be based on an unexamined selection...

  1. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  2. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  3. Flowers behind the back of the universe: A cosmic art project exploring the invisible

    Science.gov (United States)

    Tanaka, Yuri; Doser, Michael; Sakurai, Ryu; Shimoyama, Hajime; Takahashi, Ryo

    2018-05-01

    What can be seen within this universe? Since humans are not instinctively aware of the limitations of their sensorium, what is being missed is not immediately obvious. Aiming to explore with our imagination the invisible elements in the universe, we created an interactive cosmic art project in collaboration with the Gunma Astronomical Observatory, and the Polytech Festival in Moscow. In this paper, we firstly address the topic of dark matter, from the physics point of view, the concept in our project touching upon the invisible beauty in the universe, and then discuss the practical methodology for the process of making the installation. This installation was laid out based on a map of constellations from where people were able to see the antipode of Moscow, an opposite point from the venue where the installation was set, in analogy to illustrating what exists, but can not be seen. Using origami flowers - made in the course of a workshop by the visitors of the festival - as a metaphor of the beauty and transience of life, the installation seeks to deepen the awareness of participants about the numerous invisible structures in the universe. Placing them within reflective structures underlines both our reliance on technology to make the invisible visible, and the influence of the point of view on how we perceive and interpret the resulting representations. In their various forms and colors, these flowers can be seen as metaphorical mirror images of that which lies at the antipodes of our awareness: of colorful gas glowing in radio waves, supernovas in their many x-ray hues, dark matter, neutrinos, gravitational waves, dark energy. Considering both the invisible scenery of the sky and the invisible elements of beauty in the universe as lying behind the 'back' of the universe, hidden to our senses, this project explores a new way of communication between humans and the ubiquitous invisible in an artistic manner. Finally, the whole process of this project is summarized

  4. The Invisible Student: Understanding Social Identity Construction within Performing Ensembles

    Science.gov (United States)

    Hourigan, Ryan M.

    2009-01-01

    This article was taken from a qualitative case study about Jason, a child who suffered from traumatic brain injury syndrome. This research focused on interactions among Jason, his classmates, his band director, his parents, and his school district. Jason encountered many challenges as a child with special needs in band. The purpose of this article…

  5. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  6. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  7. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  8. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  9. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  10. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  11. Harry Potter and the Public School Library

    Science.gov (United States)

    DeMitchell, Todd A.; Carney, John J.

    2005-01-01

    For multitudes of children Harry Potter is a hero. He fights evil and stands up for his friends. However, not all adults agree. Instead, he is perceived as a threat by many. This article discusses how some adults on a school board reacted to this perceived threat. The majority of a school board voted to restrict access to Harry Potter books in the…

  12. MODERN THREATS OF SOCIAL SAFETY OF THE EDUCATION ENVIRONMENT AND THEIR PREVENTION

    Directory of Open Access Journals (Sweden)

    Павел Александрович Кисляков

    2013-04-01

    Full Text Available Purpose: identify modern threats of safety of the school and substantiate the direction of their prevention.Methodology: a theoretical analysis of psychological and pedagogical literature on the issues of safety of students.Results: on the basis of theoretical and empirical analysis identified the following threats of social safety of the education environment: criminal threats, threats of extremism and terrorism, physical and mental abuse, interpersonal conflicts, addictive behavior of students. Substantiates the necessity the design of social safety protection, including space of health, space of tolerance, psychologically comfortable space without violence also providing appropriate training of educators.Practical implications: the system of education.DOI: http://dx.doi.org/10.12731/2218-7405-2013-2-2

  13. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  14. Astrology Pseudoscience and a Discussion About Its Threats to Society

    Directory of Open Access Journals (Sweden)

    Tevfik UYAR

    2016-05-01

    Full Text Available Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational and medical fields and their threats to society were expressed with some examples. Instances of the astrological activities within higher education institutions, such as an astrology-based master degree thesis, the astrology certificate programs, and an astrology column in an official medical school magazine were evaluated, and it was put forward that they contributed to increase the level of threat and it was also claimed that the existence of astrological activities in the universities contradicts the main purpose and principles of the higher education. In conclusion, some regulatory actions like the implementation of the scientific literacy and demarcation problem to each level of educational curriculum, a general policy for excluding the pseudoscience from higher education institutions and a recommended health warning at the top of the astrology were suggested.

  15. Invisible work of using and monitoring knowledge by parents (end-users) of children with chronic conditions.

    Science.gov (United States)

    Lagosky, Stephanie; Bartlett, Doreen; Shaw, Lynn

    2016-01-01

    Parents who care for young children with chronic conditions are knowledge users. Their efforts, time, and energy to source, consider and monitor information add to the 'invisible' work of parents in making decisions about care, school transitions, and interventions. Little is known or understood about the work of parents as knowledge users. To understand the knowledge use patterns and how these patterns may be monitored in parents caring for their young children with cerebral palsy (CP). An embedded case study methodology was used. In-depth qualitative interviews and visual mapping were employed to collect and analyze data based on the experiences of three mothers of young children with CP. Knowledge use in parents caring for their young children with CP is multi-factorial, complex and temporal. Findings resulted in a provisional model elaborating on the ways knowledge is used by parents and how it may be monitored. The visual mapping of pathways and actions of parents as end users makes the processes of knowledge use more visible and open to be valued as well as appreciated by others. The provisional model has implications for knowledge mobilization as a strategy in childhood rehabilitation and the facilitation of knowledge use in the lives of families with children with chronic health conditions.

  16. Aunting as a Call to Public Intellectualism: The Roles of (In)Visibility in Health Communication Research and Service.

    Science.gov (United States)

    Tikkanen, Stephanie A

    2017-08-01

    In this essay, the author identifies the theme of (in)visibility permeating her research on fathers of children with a rare genetic condition, Sturge-Weber syndrome. The tension between physical visibility of the condition and lack of awareness is explored, alongside issues of (in)visibility in coping and support-seeking strategies of fathers. Finally, the author examines her own experiences in the research process through the lens of (in)visibility, in both managing her own emotions and exploring her roles as a researcher, an aunt, and a public intellectual.

  17. Still in the closet: the invisible minority in medical education

    Science.gov (United States)

    2014-01-01

    Background To investigate the relationship between sexual orientation and gender identity in regard to levels of depression; levels of perceived social support; comfort with disclosure of orientation; and the lesbian, gay, bisexual, and transgender (LGBT) campus climate. Methods E-mail invitations to participate in the current cross-sectional questionnaire-based study were sent to all thirty US osteopathic medical schools in August 2012; six schools responded and disseminated the survey to their students. Participating students completed an anonymous web-based survey, and informed consent was obtained when they accessed the survey. The survey was designed specifically for the current study but contained scales used with permission from previously published research. Analysis procedures included nonparametric tests, one-way analysis of variance and Pearson’s correlations. Results Of the 4112 students invited to participate in the survey, 1334 (32.4%) completed it. Approximately 85% of respondents self-identified as heterosexual only. No respondents identified as transgender. In general, LGB students indicated higher levels of depression (P LGBT campus climate in osteopathic medical students. In the future, osteopathic medical schools should consider closely examining their campus culture in order to create a more positive and inclusive environment for all its students. PMID:25128252

  18. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  19. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  20. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  1. A Framework for School Safety and Risk Management: Results from a Study of 18 Targeted School Shooters

    Science.gov (United States)

    Lenhardt, Ann Marie C.; Graham, Lemuel W.; Farrell, Melissa L.

    2018-01-01

    Targeted violence continues to pose a threat to school safety. Reported here are the results of a study of 18 cases of school shooters from 1996 to 2012. Variables examined are individual factors and behaviors, family dynamics, and triggering events. Results indicate the need for expanded school-based mental health services, threat assessment, and…

  2. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  3. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  4. Robot Vision to Monitor Structures in Invisible Fog Environments Using Active Imaging Technology

    Energy Technology Data Exchange (ETDEWEB)

    Park, Seungkyu; Park, Nakkyu; Baik, Sunghoon; Choi, Youngsoo; Jeong, Kyungmin [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-05-15

    Active vision is a direct visualization technique using a highly sensitive image sensor and a high intensity illuminant. Range-gated imaging (RGI) technique providing 2D and 3D images is one of emerging active vision technologies. The RGI technique extracts vision information by summing time sliced vision images. In the RGI system, objects are illuminated for ultra-short time by a high intensity illuminant and then the light reflected from objects is captured by a highly sensitive image sensor with the exposure of ultra-short time. The RGI system provides 2D and 3D image data from several images and it moreover provides clear images from invisible fog and smoke environment by using summing of time-sliced images. Nowadays, the Range-gated (RG) imaging is an emerging technology in the field of surveillance for security applications, especially in the visualization of invisible night and fog environment. Although RGI viewing was discovered in the 1960's, this technology is, nowadays, more and more applicable by virtue of the rapid development of optical and sensor technologies, such as highly sensitive imaging sensor and ultra-short pulse laser light. In contrast to passive vision systems, this technology enables operation even in harsh environments like fog and smoke. During the past decades, several applications of this technology have been applied in target recognition and in harsh environments, such as fog, underwater vision. Also, this technology has been demonstrated 3D imaging based on range-gated imaging. In this paper, a robot system to monitor structures in invisible fog environment is developed using an active range-gated imaging technique. The system consists of an ultra-short pulse laser device and a highly sensitive imaging sensor. The developed vision system is carried out to monitor objects in invisible fog environment. The experimental result of this newly approach vision system is described in this paper. To see invisible objects in fog

  5. Robot Vision to Monitor Structures in Invisible Fog Environments Using Active Imaging Technology

    International Nuclear Information System (INIS)

    Park, Seungkyu; Park, Nakkyu; Baik, Sunghoon; Choi, Youngsoo; Jeong, Kyungmin

    2014-01-01

    Active vision is a direct visualization technique using a highly sensitive image sensor and a high intensity illuminant. Range-gated imaging (RGI) technique providing 2D and 3D images is one of emerging active vision technologies. The RGI technique extracts vision information by summing time sliced vision images. In the RGI system, objects are illuminated for ultra-short time by a high intensity illuminant and then the light reflected from objects is captured by a highly sensitive image sensor with the exposure of ultra-short time. The RGI system provides 2D and 3D image data from several images and it moreover provides clear images from invisible fog and smoke environment by using summing of time-sliced images. Nowadays, the Range-gated (RG) imaging is an emerging technology in the field of surveillance for security applications, especially in the visualization of invisible night and fog environment. Although RGI viewing was discovered in the 1960's, this technology is, nowadays, more and more applicable by virtue of the rapid development of optical and sensor technologies, such as highly sensitive imaging sensor and ultra-short pulse laser light. In contrast to passive vision systems, this technology enables operation even in harsh environments like fog and smoke. During the past decades, several applications of this technology have been applied in target recognition and in harsh environments, such as fog, underwater vision. Also, this technology has been demonstrated 3D imaging based on range-gated imaging. In this paper, a robot system to monitor structures in invisible fog environment is developed using an active range-gated imaging technique. The system consists of an ultra-short pulse laser device and a highly sensitive imaging sensor. The developed vision system is carried out to monitor objects in invisible fog environment. The experimental result of this newly approach vision system is described in this paper. To see invisible objects in fog

  6. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  7. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  8. Bisexual Invisibility and the Sexual Health Needs of Adolescent Girls

    Science.gov (United States)

    Fisher, Celia B.; Macapagal, Kathryn; Mustanski, Brian

    2016-01-01

    Abstract Purpose: The purpose of this study was to analyze bisexual female youth perspectives on their experiences accessing sexual health information and services provided by a doctor, nurse, or counselor. Specifically, we sought to: (1) understand how youth perceptions of providers' attitudes and behaviors affect their seeking and obtaining sexual health information and services; (2) examine how social stigmas within the family context might be associated with barriers to sexual health information and services; and (3) assess school-based sources of sexual health information. Method: We utilized a mixed-method study design. Data from bisexual female youth were collected through an online questionnaire and asynchronous online focus groups addressing lesbian, gay, bisexual, and transgender health and HIV prevention. Data were analyzed with descriptive statistics and thematic analysis. Results: Barriers to sexual healthcare included judgmental attitudes and assumptions of patient heterosexuality among healthcare providers, and missed opportunities for HIV and sexually transmitted infections (STI) testing. Bisexual stigma within families was associated with restricted youth openness with providers, suggesting fear of disclosure to parent or guardian. School-based sexual health education was limited by a restrictive focus on abstinence and condoms and the exclusion of STI risk information relevant to sex between women. Conclusion: We recommend that practitioners integrate nonjudgmental questions regarding bisexuality into standard contraceptive and sexual health practices involving female youth, including discussion of HIV and STI risk reduction methods. Further support for bisexual health among adolescent girls can come through addressing stigmas of female bisexuality, increasing sensitivity to privacy while engaging parents, and expanding the reach of school-based sexual health education. PMID:27604053

  9. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  10. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  11. Risk Assessment of the Naval Postgraduate School Gigabit Network

    National Research Council Canada - National Science Library

    Rowlands, Dennis

    2004-01-01

    This research thoroughly examines the current Naval Postgraduate School Gigabit Network security posture, identifies any possible threats or vulnerabilities, and recommends any appropriate safeguards...

  12. The secret of the invisible man. The function of the visibility of behavior in identity and change

    Directory of Open Access Journals (Sweden)

    Fernando Mandujano

    2007-05-01

    Full Text Available This article is about the many functions that the visibility of an individual's behaviour has for their identity, and for the efficiency of their processes. The analysis addresses three concerns: first, the issue of the visibility-invisibility of behaviour; second, individual and social perception of that visibility-invisibility; and lastly, the impact of that perception on identity and change.

  13. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  14. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  15. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  16. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  17. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  18. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  19. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  20. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  1. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  2. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  3. The scattering of a cylindrical invisibility cloak: reduced parameters and optimization

    International Nuclear Information System (INIS)

    Peng, L; Mortensen, N A; Ran, L

    2011-01-01

    We investigate the scattering of 2D cylindrical invisibility cloaks with simplified constitutive parameters with the assistance of scattering coefficients. We show that the scattering of the cloaks originates not only from the boundary conditions but also from the spatial variation of the component of permittivity/permeability. According to our formulation, we propose some restrictions to the invisibility cloak in order to minimize its scattering after the simplification has taken place. With our theoretical analysis, it is possible to design a simplified cloak using some peculiar composites such as photonic crystals which mimic an effective refractive index landscape rather than offering effective constitutives, meanwhile cancelling the scattering from the inner and outer boundaries.

  4. Object permanence in cats (Felis catus): an ecological approach to the study of invisible displacements.

    Science.gov (United States)

    Dumas, C

    1992-12-01

    A single invisible displacement object permanence task was administered to 19 cats (Felis catus). In this task, cats watched a target object from behind a transparent panel. However, cats had to walk around an opaque panel to reach the object. While cats were behind the opaque panel, the object was hidden behind one of two screens. As cats did not perceive the disappearance of the object behind the target screen, the object was invisibly hidden. Results showed that cats solved this task with great flexibility, which markedly contrasts with what has been observed in previous research. The discussion emphasizes the difference between the typical Piagetian task in which the information necessary to succeed must be dealt with in retrospective way, whereas in our task cats had to anticipate a new position of the object. The ecological relevance of this new task is also discussed.

  5. In-Vision Continuity Announcers: Performing an Identity for Early Television in Europe

    Directory of Open Access Journals (Sweden)

    Sonja de Leeuw

    2013-12-01

    Full Text Available In-vision continuity announcers have played central – yet understudied – roles in early television history. Through their performances on and off the screen, they mediated the identity of the televisual medium in the 1950s and 1960s, popularizing it as a medium of sound and vision, a domestic and gendered medium as well as a national and transnational institution.Focusing primarily on Dutch and Romanian female in-vision continuity announcers in the 1950s and 60s and making extensive comparisons with other countries in Europe, this article illustrates how these early professionals of television performed as part of a European-wide phenomenon of defining the identity of the new televisual medium.

  6. Monetary reward modulates task-irrelevant perceptual learning for invisible stimuli.

    Directory of Open Access Journals (Sweden)

    David Pascucci

    Full Text Available Task Irrelevant Perceptual Learning (TIPL shows that the brain's discriminative capacity can improve also for invisible and unattended visual stimuli. It has been hypothesized that this form of "unconscious" neural plasticity is mediated by an endogenous reward mechanism triggered by the correct task performance. Although this result has challenged the mandatory role of attention in perceptual learning, no direct evidence exists of the hypothesized link between target recognition, reward and TIPL. Here, we manipulated the reward value associated with a target to demonstrate the involvement of reinforcement mechanisms in sensory plasticity for invisible inputs. Participants were trained in a central task associated with either high or low monetary incentives, provided only at the end of the experiment, while subliminal stimuli were presented peripherally. Our results showed that high incentive-value targets induced a greater degree of perceptual improvement for the subliminal stimuli, supporting the role of reinforcement mechanisms in TIPL.

  7. Monetary reward modulates task-irrelevant perceptual learning for invisible stimuli.

    Science.gov (United States)

    Pascucci, David; Mastropasqua, Tommaso; Turatto, Massimo

    2015-01-01

    Task Irrelevant Perceptual Learning (TIPL) shows that the brain's discriminative capacity can improve also for invisible and unattended visual stimuli. It has been hypothesized that this form of "unconscious" neural plasticity is mediated by an endogenous reward mechanism triggered by the correct task performance. Although this result has challenged the mandatory role of attention in perceptual learning, no direct evidence exists of the hypothesized link between target recognition, reward and TIPL. Here, we manipulated the reward value associated with a target to demonstrate the involvement of reinforcement mechanisms in sensory plasticity for invisible inputs. Participants were trained in a central task associated with either high or low monetary incentives, provided only at the end of the experiment, while subliminal stimuli were presented peripherally. Our results showed that high incentive-value targets induced a greater degree of perceptual improvement for the subliminal stimuli, supporting the role of reinforcement mechanisms in TIPL.

  8. Invisible marking system by extreme ultraviolet radiation: the new frontier for anti-counterfeiting tags

    International Nuclear Information System (INIS)

    Lazzaro, P. Di; Bollanti, S.; Flora, F.; Mezi, L.; Murra, D.; Torre, A.; Bonfigli, F.; Montereali, R.M.; Vincenti, M.A.

    2016-01-01

    We present a marking technology which uses extreme ultraviolet radiation to write invisible patterns on tags based on alkali fluoride thin films. The shape of the pattern is pre-determined by a mask (in the case of contact lithography) or by a suitable mirror (projection lithography). Tags marked using this method offer a much better protection against fakes than currently available anti-counterfeiting techniques. The complexity and cost of this technology can be tailored to the value of the good to be protected, leaving, on the other hand, the specific reading technique straightforward. So far, we have exploited our invisible marking to tag artworks, identity cards, electrical components, and containers of radioactive wastes. Advantages and limits of this technology are discussed in comparison with the anti-counterfeiting systems available in the market.

  9. Narratives of the Invisible: Autobiography, Kinship, and Alterity in Native Amazonia.

    Science.gov (United States)

    Grotti, Vanessa Elisa; Brightman, Marc

    2016-03-01

    Shamanic knowledge is based on an ambiguous commensality with invisible others. As a result, shamans oscillate constantly between spheres of intimacy, both visible and invisible. A place of power and transformation, the spirit world is rarely described by native interlocutors in an objective, detached way; rather, they depict it in terms of events and experiences. Instead of examining the formal qualities of accounts of the spirit world through analyses of ritual performance and shamanic quests, we focus on life histories as autobiographical accounts in order to explore what they reveal about the relationship between personal history (and indigenous historicity) and the spirit world. We introduce the term 'double reflexivity' to refer to processes by which narratives about the self are produced through relationships with alterity.

  10. Correlated and uncorrelated invisible temporal white noise alters mesopic rod signaling.

    Science.gov (United States)

    Hathibelagal, Amithavikram R; Feigl, Beatrix; Kremers, Jan; Zele, Andrew J

    2016-03-01

    We determined how rod signaling at mesopic light levels is altered by extrinsic temporal white noise that is correlated or uncorrelated with the activity of one (magnocellular, parvocellular, or koniocellular) postreceptoral pathway. Rod and cone photoreceptor excitations were independently controlled using a four-primary photostimulator. Psychometric (Weibull) functions were measured for incremental rod pulses (50 to 250 ms) in the presence (or absence; control) of perceptually invisible subthreshold extrinsic noise. Uncorrelated (rod) noise facilitates rod detection. Correlated postreceptoral pathway noise produces differential changes in rod detection thresholds and decreases the slope of the psychometric functions. We demonstrate that invisible extrinsic noise changes rod-signaling characteristics within the three retinogeniculate pathways at mesopic illumination depending on the temporal profile of the rod stimulus and the extrinsic noise type.

  11. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  12. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  13. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  14. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  15. Poverty, Privilege, and Political Dynamics within Rural School Reform: Unraveling Educational Leadership in the Invisible America

    Science.gov (United States)

    Mette, Ian M.; Biddle, Catharine; Mackenzie, Sarah V.; Harris-Smedberg, Kathy

    2016-01-01

    This case was written to help prepare teacher-leaders, principals, and central office administrators, particularly those in rural and economically marginalized settings, who are expected to lead teachers and stakeholders in their community through increasingly stressed economic conditions. The intent of the case study is for educators to examine…

  16. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  17. Detection of invisible and crucial events: from seismic fluctuations to the war against terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Allegrini, Paolo; Fronzoni, Leone; Grigolini, Paolo; Latora, Vito; Mega, Mirko S.; Palatella, Luigi E-mail: luigi.palatella@df.unipi.it; Rapisarda, Andrea; Vinciguerra, Sergio

    2004-04-01

    We argue that the recent discovery of the non-Poissonian statistics of the seismic main-shocks is a special case of a more general approach to the detection of the distribution of the time increments between one crucial but invisible event and the next. We make the conjecture that the proposed approach can be applied to the analysis of terrorist network with significant benefits for the Intelligence Community.

  18. orignal paper: Beyond natural selection and divine intervention: The Lamarckian implication of Adam Smith's invisible hand

    OpenAIRE

    Elias L. Khalil

    2000-01-01

    Adam Smith's invisible hand metaphor (IH) is examined in light of two different accounts of the origin of traits: Charles Darwin's theory of evolutionary optimization and William Paley's theory of divine intervention. Smith's stand supersedes both accounts. For Smith, intermediating drives, such as the sexual one, neither arise accidentally and favored according to their fitness , la Darwin nor planted by the Deity , la Paley. For Smith, such drives are adopted in light of their ultimate end....

  19. Self-interest, Sympathy and the Invisible Hand : From Adam Smith to Market Liberalism

    OpenAIRE

    Avner Offer

    2012-01-01

    Adam Smith rejected Mandeville's invisible-hand doctrine of 'private vices, publick benefits'. In The Theory of Moral Sentiments his model of the 'impartial spectator' is driven not by sympathy for other people, but by their approbation. The innate capacity for sympathy makes approbation credible. Approbation needs to be authenticated, and in Smith's model authentication relies on innate virtue, which is not realistic. An alternative model of 'regard' makes use of signalling and is more pragm...

  20. Le socle d'une œuvre, invisible mais essentiel

    OpenAIRE

    Huguenin, Daniel

    2015-01-01

    Tiré du site internet du blog des Musées d'art et d'histoire (http://blog.mahgeneve.ch): "Le support se faisant aujourd'hui le plus discret possible, voire invisible. Sa réalisation nécessite une étroite collaboration entre les différents acteurs d'une exposition car le socleur doit allier les besoins de la conservation et de la muséographie.".

  1. MO-E-18C-06: Enriching Medical Physics Education By Visualizing The Invisible

    International Nuclear Information System (INIS)

    Sprawls, P

    2014-01-01

    Purpose: To enhance the understanding of medical physics concepts and develop higher levels of learning relating to invisible physics phenomena such as radiation. To provide medical physics educators in all countries of the world with understanding of knowledge structures in the human brain, the different levels of learning, and the types of knowledge required for higher level functions such as problem solving, creative innovations, and applied clinical applications. To provide medical physics educators with an open access resource (tool) that they can use in their teaching activities to enrich and elevate the level of learning for their students, residents, etc. with respect to the invisible realm of medical physics. Methods: An experienced clinical medical physicist and educator has created and provided with open access three complementary web-based resources to achieve the purposes described above. One is a module focusing on the medical physics learning process with respect to mental knowledge structures, how they relate to outcomes and applications, and learning activities that are required to develop the required knowledge structures. The second is an extensive set of visuals that educators can use in their activities (classes, small group discussions, etc.) to visualize the invisible. The third is an interactive online simulation where learners can adjust factors and visually observe changes in x-radiation.These resources are available online at www.BLINDED FOR REVIEW . Results: Medical physics education, especially for non-physicists, is becoming much more interesting and useful especially with respect to invisible radiation. The global impact is that medical imaging professionals can be more effective in optimizing x-ray imaging procedures and risk management when they have knowledge levels that enhance problem solving, innovation, and creativity. Conclusion: Medical physics educators in all institutions can be much more effective and efficient in the

  2. MO-E-18C-06: Enriching Medical Physics Education By Visualizing The Invisible

    Energy Technology Data Exchange (ETDEWEB)

    Sprawls, P [Emory University and Sprawls Educational Foundation, Montreat, NC (United States)

    2014-06-15

    Purpose: To enhance the understanding of medical physics concepts and develop higher levels of learning relating to invisible physics phenomena such as radiation. To provide medical physics educators in all countries of the world with understanding of knowledge structures in the human brain, the different levels of learning, and the types of knowledge required for higher level functions such as problem solving, creative innovations, and applied clinical applications. To provide medical physics educators with an open access resource (tool) that they can use in their teaching activities to enrich and elevate the level of learning for their students, residents, etc. with respect to the invisible realm of medical physics. Methods: An experienced clinical medical physicist and educator has created and provided with open access three complementary web-based resources to achieve the purposes described above. One is a module focusing on the medical physics learning process with respect to mental knowledge structures, how they relate to outcomes and applications, and learning activities that are required to develop the required knowledge structures. The second is an extensive set of visuals that educators can use in their activities (classes, small group discussions, etc.) to visualize the invisible. The third is an interactive online simulation where learners can adjust factors and visually observe changes in x-radiation.These resources are available online at www.BLINDED FOR REVIEW . Results: Medical physics education, especially for non-physicists, is becoming much more interesting and useful especially with respect to invisible radiation. The global impact is that medical imaging professionals can be more effective in optimizing x-ray imaging procedures and risk management when they have knowledge levels that enhance problem solving, innovation, and creativity. Conclusion: Medical physics educators in all institutions can be much more effective and efficient in the

  3. How the Invisible Hand is Supposed to Adjust the Natural Thermostat: A Guide for the Perplexed

    OpenAIRE

    Storm, Servaas

    2016-01-01

    Mainstream climate economics takes global warming seriously, but perplexingly concludes that the optimal economic policy is to almost do nothing about it. This conclusion can be traced to just a few “normative” assumptions, over which there exists fundamental disagreement amongst economists. This paper explores two axes of this disagreement. The first axis (“market vs. regulation”) measures faith in the invisible hand to adjust the natural thermostat. The second axis expresses differences in ...

  4. Invisible nursing research: thoughts about mixed methods research and nursing practice.

    Science.gov (United States)

    Fawcett, Jacqueline

    2015-04-01

    In this this essay, the author addresses the close connection between mixed methods research and nursing practice. If the assertion that research and practice are parallel processes is accepted, then nursing practice may be considered "invisible mixed methods research," in that almost every encounter between a nurse and a patient involves collection and integration of qualitative (word) and quantitative (number) information that actually is single-case mixed methods research. © The Author(s) 2015.

  5. Constraints on new phenomena via Higgs boson couplings and invisible decays with the ATLAS detector

    NARCIS (Netherlands)

    Aad, G.; et al., [Unknown; Aben, R.; Angelozzi, I.; Beemster, L.J.; Bentvelsen, S.; Berge, D.; Bobbink, G.J.; Bos, K.; Brenner, L.; Butti, P.; Castelli, A.; Colijn, A.P.; de Jong, P.; Deigaard, I.; Deluca, C.; Duda, D.; Ferrari, P.; Hartjes, F.; Hessey, N.P.; Hod, N.; Igonkina, O.; Karastathis, N.; Kluit, P.; Koffeman, E.; Linde, F.; Mahlstedt, J.; Meyer, J.; Oussoren, K.P.; Sabato, G.; Salek, D.; Slawinska, M.; Valencic, N.; van den Wollenberg, W.; van der Deijl, P.C.; van der Geer, R.; van der Graaf, H.; van Vulpen, I.; Verkerke, W.; Vermeulen, J.C.; Vreeswijk, M.; Weits, H.; Williams, S.

    2015-01-01

    The ATLAS experiment at the LHC has measured the Higgs boson couplings and mass, and searched for invisible Higgs boson decays, using multiple production and decay channels with up to 4.7 fb−1 of pp collision data at √s=7 TeV and 20.3 fb−1 at √s=8 TeV. In the current study, the measured production

  6. The voices of the invisible girls : reintegration of former female child soldiers in Burundi

    OpenAIRE

    Aase, Camilla Carlsen

    2013-01-01

    Master thesis in development management - University of Agder 2013 Child soldiers are used in armed groups and forces around the word. Children as young as seven years of age have been reported to actively participate in armed conflict. The phenomenon of child soldiering has become increasingly recognized in recent decades. Females constitute between ten per cent to one third of the fighting forces worldwide. Despite this, girls and women have until recently been highly invisible in both r...

  7. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  8. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  9. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  10. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  11. Influence of removal of invisible fixation on the saccadic and manual gap effect.

    Science.gov (United States)

    Ueda, Hiroshi; Takahashi, Kohske; Watanabe, Katsumi

    2014-01-01

    Saccadic and manual reactions to a peripherally presented target are facilitated by removing a central fixation stimulus shortly before a target onset (the gap effect). The present study examined the effects of removal of a visible and invisible fixation point on the saccadic gap effect and the manual gap effect. Participants were required to fixate a central fixation point and respond to a peripherally presented target as quickly and accurately as possible by making a saccade (Experiment 1) or pressing a corresponding key (Experiment 2). The fixation point was dichoptically presented, and visibility was manipulated by using binocular rivalry and continuous flash suppression technique. In both saccade and key-press tasks, removing the visible fixation strongly quickened the responses. Furthermore, the invisible fixation, which remained on the display but suppressed, significantly delayed the saccadic response. Contrarily, the invisible fixation had no effect on the manual task. These results indicate that partially different processes mediate the saccadic gap effect and the manual gap effect. In particular, unconscious processes might modulate an oculomotor-specific component of the saccadic gap effect, presumably via subcortical mechanisms.

  12. Unconscious neural processing differs with method used to render stimuli invisible

    Directory of Open Access Journals (Sweden)

    Sergey Victor Fogelson

    2014-06-01

    Full Text Available Visual stimuli can be kept from awareness using various methods. The extent of processing that a given stimulus receives in the absence of awareness is typically used to make claims about the role of consciousness more generally. The neural processing elicited by a stimulus, however, may also depend on the method used to keep it from awareness, and not only on whether the stimulus reaches awareness. Here we report that the method used to render an image invisible has a dramatic effect on how category information about the unseen stimulus is encoded across the human brain. We collected fMRI data while subjects viewed images of faces and tools, that were rendered invisible using either continuous flash suppression (CFS or chromatic flicker fusion (CFF. In a third condition, we presented the same images under normal fully visible viewing conditions. We found that category information about visible images could be extracted from patterns of fMRI responses throughout areas of neocortex known to be involved in face or tool processing. However, category information about stimuli kept from awareness using CFS could be recovered exclusively within occipital cortex, whereas information about stimuli kept from awareness using CFF was also decodable within temporal and frontal regions. We conclude that unconsciously presented objects are processed differently depending on how they are rendered subjectively invisible. Caution should therefore be used in making generalizations on the basis of any one method about the neural basis of consciousness or the extent of information processing without consciousness.

  13. Unconscious neural processing differs with method used to render stimuli invisible.

    Science.gov (United States)

    Fogelson, Sergey V; Kohler, Peter J; Miller, Kevin J; Granger, Richard; Tse, Peter U

    2014-01-01

    Visual stimuli can be kept from awareness using various methods. The extent of processing that a given stimulus receives in the absence of awareness is typically used to make claims about the role of consciousness more generally. The neural processing elicited by a stimulus, however, may also depend on the method used to keep it from awareness, and not only on whether the stimulus reaches awareness. Here we report that the method used to render an image invisible has a dramatic effect on how category information about the unseen stimulus is encoded across the human brain. We collected fMRI data while subjects viewed images of faces and tools, that were rendered invisible using either continuous flash suppression (CFS) or chromatic flicker fusion (CFF). In a third condition, we presented the same images under normal fully visible viewing conditions. We found that category information about visible images could be extracted from patterns of fMRI responses throughout areas of neocortex known to be involved in face or tool processing. However, category information about stimuli kept from awareness using CFS could be recovered exclusively within occipital cortex, whereas information about stimuli kept from awareness using CFF was also decodable within temporal and frontal regions. We conclude that unconsciously presented objects are processed differently depending on how they are rendered subjectively invisible. Caution should therefore be used in making generalizations on the basis of any one method about the neural basis of consciousness or the extent of information processing without consciousness.

  14. Single plasmonic nanoparticles for ultrasensitive DNA sensing: From invisible to visible.

    Science.gov (United States)

    Guo, Longhua; Chen, Lichan; Hong, Seungpyo; Kim, Dong-Hwan

    2016-05-15

    The background signal is a major factor that restricts the limit of detection of biosensors. Herein, we present a zero-background DNA-sensing approach that utilizes enzyme-guided gold nanoparticle (AuNP) enlargement. This sensing strategy is based on the finding that small nanoparticles are invisible under a darkfield optical microscope, thus completely eliminating the background signal. In the event of target binding, Ag deposition is triggered and enlarges the AuNP beyond its optical diffraction limit, thereby making the invisible AuNP visible. Because the plasmon scattering of Ag is stronger than that of Au, only a thin layer of Ag is required to greatly enhance the scattering intensity of the AuNPs. Our investigation revealed that a target DNA concentration as low as 5.0×10(-21)M can transform the darkfield image of the nanoparticle from completely dark (invisible) to a blue dot (visible). Copyright © 2015 Elsevier B.V. All rights reserved.

  15. The invisible hand and the rational agent are behind bubbles and crashes

    International Nuclear Information System (INIS)

    Galam, Serge

    2016-01-01

    The 2000 dot-com crash and the 2008 subprime crisis have fueled the belief that the two classical paradigms of economics, the invisible hand and the rational agent, are not well appropriate to describe market dynamics and should be abandoned at the benefit of alternative new theoretical concepts. At odd with such a view, using a simple model of choice dynamics from sociophysics, the invisible hand and the rational agent paradigms are given a new legitimacy. Indeed, it is sufficient to introduce the holding of a few intermediate mini market aggregations by agents sharing their own private information, to recenter the invisible hand and the rational agent at the heart of market self regulation. An elasticity is discovered in the market efficiency mechanism due to the existence of an agent collective anticipation. This elasticity is shown to create spontaneous bubbles, which are rationally founded. At the same time, crashes occur at once when the limit of elasticity is reached. Plasticity can also be achieved through a combination of a crash with a sudden shift of the collective anticipation. Although the findings disclose a path to put an end to the bubble-crash phenomena, it is argued to be rationally not feasible. Bubbles and crashes are thus an intrinsic internal part of classical economics.

  16. Search for Invisibly Decaying Higgs Bosons with Large Decay Width Using the OPAL Detector at LEP

    CERN Document Server

    Abbiendi, G.; Akesson, P.F.; Alexander, G.; Anagnostu, G.; Anderson, K.J.; Asai, S.; Axen, D.; Bailey, I.; Barberio, E.; Bailari, T.; Barlow, R.J.; Batly, R.J.; Bechtle, P.; Behnke, T.; Bell, Kenneth Watson; Bell, P.J.; Bella, G.; Bellerive, A.; Benelli, G.; Bethke, S.; Biebel, O.; Boeriu, O.; Bock, P.; Boutemeur, M.; Braibant, S.; Brown, Robert M.; Burckhart, H.J.; Campana, S.; Capiluppi, P.; Carnegie, R.K.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, D.G.; Ciocca, C.; Csilling, A.; Cuffiani, M.; Dado, S.; De Roeck, A.; De Wolf, E.A.; Desch, K.; Dienes, B.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Etzion, E.; Fabbri, F.; Ferrari, P.; Fiedler, F.; Fleck, I.; Ford, M.; Frey, A.; Gagnon, P.; Gary, John William; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Giunta, Marina; Goldberg, J.; Gross, E.; Grunhaus, J.; Gruwe, M.; Gupta, A.; Hajdu, C.; Hamann, M.; Hanson, G.G.; Harel, A.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Herten, G.; Heuer, R.D.; Hill, J.C.; Horvath, D.; Igo-Kemenes, P.; Ishii, K.; Jeremie, H.; Jovanovic, P.; Junk, T.R.; Kanzaki, J.; Karlen, D.; Kawagoe, K.; Kawamoto, T.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kluth, S.; Kobayashi, T.; Kobel, M.; Komamiya, S.; Kramer, T.; Krasznahorkay, A., Jr.; Krieger, P.; von Krogh, J.; Kuhl, T.; Kupper, M.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Lellouch, D.; Letts, J.; Levinson, L.; Lillich, J.; Lloyd, S.L.; Loebinger, F.K.; Lu, J.; Ludwig, A.; Ludwig, J.; Mader, W.; Marcellini, S.; Martin, A.J.; Mashimo, T.; Mattig, Peter; McKenna, J.; McPherson, R.A.; Meijers, F.; Menges, W.; Merritt, F.S.; Mes, H.; Meyer, N.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Mohr, W.; Mori, T.; Mutter, A.; Nagai, K.; Nakamura, I.; Nanjo, H.; Neal, H.A.; Nisius, R.; O'Neale, S.W.; Oh, A.; Oreglia, M.J.; Orito, S.; Pahl, C.; Pasztor, G.; Pilcher, J.E.; Pinfold, J.; Plane, D.E.; Pooth, O.; Przybycien, M.; Quadt, A.; Rabertz, K.; Rembser, C.; Renkel, P.; Roney, J.M.; Rossi, A.M.; Rozen, Y.; Runge, K.; Sachs, K.; Saeki, T.; Sarkisyan, E.K.G.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schorner-Sadenius, T.; Schroder, M.; Schumacher, M.; Seuster, R.; Shears, T.G.; shen, B.C.; sherwood, P.; Skuja, A.; Smith, A.M.; Sobie, R.; Soldner-Rembold, S.; Stahl, A.; Strom, David M.; Strohmer, R.; Tarem, S.; Tasevsky, M.; Teuscher, R.; Thomson, M.A.; Torrence, E.; Toya, D.; Tran, P.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Ujvari, B.; Vollmer, C.F.; Vannerem, P.; Vertesi, R.; Verzocchi, M.; Voss, H.; Vossebeld, J.; Ward, C.P.; Ward, D.R.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wengler, T.; Wermes, N.; Wilson, G.W.; Wilson, J.A.; Wolf, G.; Wyatt, T.R.; Yamashita, S.; Zer-Zion, D.; Zivkovic, Lidija

    2007-01-01

    This paper describes a topological search for an invisibly decaying Higgs boson,H, produced via the Bjorken process (e+e- -> HZ). The analysis is based on data recorded using the OPAL detector at LEP at centre-of-mass energies from 183 to 209 GeV corresponding to a total integrated luminosity of 629pb-1. In the analysis only hadronic decays of the Z boson are considered. A scan over Higgs boson masses from 1 to 120 GeV and decay widths from 1 to 3000 GeV revealed no indication for a signal in the data. From a likelihood ratio of expected signal and Standard Model background we determine upper limits on cross-section times branching ratio to an invisible final state. For moderate Higgs boson decay widths, these range from about 0.07pb Mh = 60GeV) to 0.57pb (Mh = 114GeV). For decay widths above 200GeV the upper limits are of the order of 0.15pb. The results can be interpreted in general scenarios predicting a large invisible decay width of the Higgs boson. As an example we interpret the results in the so-called...

  17. Invisible metal-grid transparent electrode prepared by electrohydrodynamic (EHD) jet printing

    International Nuclear Information System (INIS)

    Jang, Yonghee; Byun, Doyoung; Kim, Jihoon

    2013-01-01

    Invisible Ag-grid transparent electrodes (TEs) were prepared by electrohydrodynamic (EHD) jet printing using Ag nano-particle inks. Ag-grid width less than 10 µm was achieved by the EHD jet printing, which was invisible to the naked eye. The Ag-grid line-to-line distance (pitch) was modulated in order to investigate the electrical and optical properties of the EHD jet-printed Ag-grid TEs. The decrease in the sheet resistance at the expense of the transmittance was observed as the Ag-grid pitch decreased. The figure of merit of Ag-grid TEs with various Ag-grid pitches was investigated in order to determine the optimum pitch condition for both electrical and optical properties. With the 150 µm Ag-grid pitch, the EHD jet-printed Ag-grid TE has the sheet resistance of 4.87 Ω sq −1 and the transmittance of 81.75% after annealing at 200 °C under near-infrared. Ag filling factor (FF) was defined to predict the electrical and optical properties of Ag-grid TEs. It was found that the measured electrical and optical properties were well simulated by the theoretical equations incorporating FF. The EHD jet-printed invisible Ag-grid TE with good electrical and optical properties implies its promising application to the printed optoelectronic devices. (paper)

  18. Ironic inversion in Eliza Haywood's fiction: fantomina and "The History of the Invisible Mistress".

    Science.gov (United States)

    Hinnant, Charles H

    2010-01-01

    This article contends that Fantomina can best be understood as an ironic inversion of “The History of the Invisible Mistress”, a Spanish nouvelle published as an interpolated tale in Paul Scarron's Le Roman Comique. Both works revolve around the efforts of a heroine to capture and hold the attention of a young man upon whom she has set her heart. The plot of both works concerns the successive disguises by which the heroines seek to test their heroes. But where Don Carlos, the hero of “The History of the Invisible Mistress”, remains chaste and faithful to his initial pledge, Beauplaisir, with whom Fantomina becomes sexually involved, displays the inconstancy of a roving libertine. Hence, where “The History of the Invisible Mistress” ends happily in marriage, Fantomina concludes with its heroine's pregnancy and exile in disgrace by her mother to a monastery in France. A comparison of the two texts affords a fascinating glimpse into Haywood's aims and strategies in Fantomina.

  19. Testing invisible momentum ansatze in missing energy events at the LHC

    Science.gov (United States)

    Kim, Doojin; Matchev, Konstantin T.; Moortgat, Filip; Pape, Luc

    2017-08-01

    We consider SUSY-like events with two decay chains, each terminating in an invisible particle, whose true energy and momentum are not measured in the detector. Nevertheless, a useful educated guess about the invisible momenta can still be obtained by optimizing a suitable invariant mass function. We review and contrast several proposals in the literature for such ansatze: four versions of the M T 2-assisted on-shell reconstruction (MAOS), as well as several variants of the on-shell constrained M 2 variables. We compare the performance of these methods with regards to the mass determination of a new particle resonance along the decay chain from the peak of the reconstructed invariant mass distribution. For concreteness, we consider the event topology of dilepton t\\overline{t} events and study each of the three possible subsystems, in both a t\\overline{t} and a SUSY example. We find that the M 2 variables generally provide sharper peaks and therefore better ansatze for the invisible momenta. We show that the performance can be further improved by preselecting events near the kinematic endpoint of the corresponding variable from which the momentum ansatz originates.

  20. Visible Fists, Clandestine Kicks, and Invisible Elbows: Three Forms of Regulating Neoliberal Poverty

    Directory of Open Access Journals (Sweden)

    Javier Auyero

    2010-10-01

    Full Text Available Argentina In a preliminary attempt to understand the daily production of poor people’s subordination in contemporary Argentina, this paper explores the workings of overt and covert forms of state violence against the urban destitute and of more subtle modes of domination. Attention to the simultaneous operation of what this paper calls visible fists, clandestine kicks, and invisible elbows in the daily life of the dispossessed serves to a better integrate violence into the study of popular politics, and b cast light on the productive (and not merely repressive nature of state power.   Resumen: Puños visibles, patadas clandestinas y codos invisibles: tres formas de regulación de la pobreza neoliberal En un acercamiento preliminar a la producción cotidiana de la subordinación de los pobres urbanos en la Argentina contemporánea, este artículo explora las formas abiertas y encubiertas de violencia estatal contra los más destituidos y las modalidades más sutiles de dominación. Una atención simultánea a lo que el artículo denomina puños visibles, patadas clandestinas, y codos invisibles en la vida cotidiana de los desposeídos es útil a los efectos de: a integrar la violencia en el estudio de la política popular, y b iluminar la naturaleza productiva (y no meramente represiva del poder estatal.

  1. Building School Resilience in an Era of Multiple Threats

    National Research Council Canada - National Science Library

    Van Sparrentak, Kenneth J

    2008-01-01

    .... By promoting resilience as a component of recovery as is now done in Israel and the United Kingdom, the United States can empower children and the at-large community, enabling a quicker recovery...

  2. Building School Resilience in an Era of Multiple Threats

    Science.gov (United States)

    2008-09-01

    through the window. In execution 37 style, Roberts had gunned down the lineup of girls on the floor, killing five and critically injuring...Religion has actually been found to be a weak predictor of forgiveness whereas in-group identification and especially out-group attitudes were

  3. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  4. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  5. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  6. Making the invisible visible - blending data with film, CGI and intuitive apps in environmental education and public engagement

    Science.gov (United States)

    Kapur, Ravi

    2015-04-01

    Comprehending the scale of our current environmental challenges and the possible impacts of alternative policy pathways and decisions, is a very human problem, at all levels of society. For everyone from policy negotiators to school children, the invisibility of the processes of environmental change (e.g. the increase of greenhouse gases in the atmosphere), and the timeframes over which impacts are felt, exacerbate the difficulty of both understanding and communicating about the challenge. By unleashing real environmental data and imagery in a form easily usable by educators and non-technical audiences, it is possible to greatly address this problem, whilst also engaging potential new contributors in solution-finding. The combination of real data, innovative data visualisation techniques, film, animation and apps can help to connect with the public, empower teachers and learners, and create new business opportunities. This presentation will look at these opportunities principally through two current case-study initiatives: a) New methods of presenting and enabling access to earth observation data through art, film and apps (including work led by Imperative Space); and b) The use of high-end animation to enable more intuitive understanding of climate change related data (including work led by Carbon Visuals). Through this work, we will consider the importance of 'emotional engagement' and personal impact of environmental imagery and data when presented appropriately. Our aim should be to ensure the next generation of policy and decision-makers have grown up with a routine, embedded, and day-to-day exposure to environmental data and imagery, so that they are equipped with a deep-seated understanding of the majesty, vulnerability and fragility of our environment. Emotional engagement can be derived from clear communication about the context of the imagery and data, but also through high 'production values', the quality of apps and tools, the way in which stories are

  7. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  8. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  9. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  10. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  11. Search for invisible decays of Higgs bosons in the vector boson fusion and associated ZH production modes.

    Science.gov (United States)

    Chatrchyan, S; Khachatryan, V; Sirunyan, A M; Tumasyan, A; Adam, W; Bergauer, T; Dragicevic, M; Erö, J; Fabjan, C; Friedl, M; Frühwirth, R; Ghete, V M; Hartl, C; Hörmann, N; Hrubec, J; Jeitler, M; Kiesenhofer, W; Knünz, V; Krammer, M; Krätschmer, I; Liko, D; Mikulec, I; Rabady, D; Rahbaran, B; Rohringer, H; Schöfbeck, R; Strauss, J; Taurok, A; Treberer-Treberspurg, W; Waltenberger, W; Wulz, C-E; Mossolov, V; Shumeiko, N; Suarez Gonzalez, J; Alderweireldt, S; Bansal, M; Bansal, S; Cornelis, T; De Wolf, E A; Janssen, X; Knutsson, A; Luyckx, S; Ochesanu, S; Roland, B; Rougny, R; Van Haevermaet, H; Van Mechelen, P; Van Remortel, N; Van Spilbeeck, A; Blekman, F; Blyweert, S; D'Hondt, J; Heracleous, N; Kalogeropoulos, A; Keaveney, J; Kim, T J; Lowette, S; Maes, M; Olbrechts, A; Python, Q; Strom, D; Tavernier, S; Van Doninck, W; Van Mulders, P; Van Onsem, G P; Villella, I; Caillol, C; Clerbaux, B; De Lentdecker, G; Favart, L; Gay, A P R; Léonard, A; Marage, P E; Mohammadi, A; Perniè, L; Reis, T; Seva, T; Thomas, L; Vander Velde, C; Vanlaer, P; Wang, J; Adler, V; Beernaert, K; Benucci, L; Cimmino, A; Costantini, S; Crucy, S; Dildick, S; Garcia, G; Klein, B; Lellouch, J; Mccartin, J; Ocampo Rios, A A; Ryckbosch, D; Salva Diblen, S; Sigamani, M; Strobbe, N; Thyssen, F; Tytgat, M; Walsh, S; Yazgan, E; Zaganidis, N; Basegmez, S; Beluffi, C; Bruno, G; Castello, R; Caudron, A; Ceard, L; Da Silveira, G G; Delaere, C; du Pree, T; Favart, D; Forthomme, L; Giammanco, A; Hollar, J; Jez, P; Komm, M; Lemaitre, V; Liao, J; Militaru, O; Nuttens, C; Pagano, D; Pin, A; Piotrzkowski, K; Popov, A; Quertenmont, L; Selvaggi, M; Vidal Marono, M; Vizan Garcia, J M; Beliy, N; Caebergs, T; Daubie, E; Hammad, G H; Alves, G A; Correa Martins Junior, M; Martins, T; Pol, M E; Aldá Júnior, W L; Carvalho, W; Chinellato, J; Custódio, A; Da Costa, E M; De Jesus Damiao, D; De Oliveira Martins, C; Fonseca De Souza, S; Malbouisson, H; Malek, M; Matos Figueiredo, D; Mundim, L; Nogima, H; Prado Da Silva, W L; Santaolalla, J; Santoro, A; Sznajder, A; Tonelli Manganote, E J; Vilela Pereira, A; Bernardes, C A; Dias, F A; Fernandez Perez Tomei, T R; Gregores, E M; Mercadante, P G; Novaes, S F; Padula, Sandra S; Genchev, V; Iaydjiev, P; Marinov, A; Piperov, S; Rodozov, M; Sultanov, G; Vutova, M; Dimitrov, A; Glushkov, I; Hadjiiska, R; Kozhuharov, V; Litov, L; Pavlov, B; Petkov, P; Bian, J G; Chen, G M; Chen, H S; Chen, M; Du, R; Jiang, C H; Liang, D; Liang, S; Meng, X; Plestina, R; Tao, J; Wang, X; Wang, Z; Asawatangtrakuldee, C; Ban, Y; Guo, Y; Li, Q; Li, W; Liu, S; Mao, Y; Qian, S J; Wang, D; Zhang, L; Zou, W; Avila, C; Chaparro Sierra, L F; Florez, C; Gomez, J P; Gomez Moreno, B; Sanabria, J C; Godinovic, N; Lelas, D; Polic, D; Puljak, I; Antunovic, Z; Kovac, M; Brigljevic, V; Kadija, K; Luetic, J; Mekterovic, D; Morovic, S; Tikvica, L; Attikis, A; Mavromanolakis, G; Mousa, J; Nicolaou, C; Ptochos, F; Razis, P A; Bodlak, M; Finger, M; Finger, M; Assran, Y; Elgammal, S; Ellithi Kamel, A; Mahmoud, M A; Mahrous, A; Radi, A; Kadastik, M; Müntel, M; Murumaa, M; Raidal, M; Tiko, A; Eerola, P; Fedi, G; Voutilainen, M; Härkönen, J; Karimäki, V; Kinnunen, R; Kortelainen, M J; Lampén, T; Lassila-Perini, K; Lehti, S; Lindén, T; Luukka, P; Mäenpää, T; Peltola, T; Tuominen, E; Tuominiemi, J; Tuovinen, E; Wendland, L; Tuuva, T; Besancon, M; Couderc, F; Dejardin, M; Denegri, D; Fabbro, B; Faure, J L; Favaro, C; Ferri, F; Ganjour, S; Givernaud, A; Gras, P; Hamel de Monchenault, G; Jarry, P; Locci, E; Malcles, J; Nayak, A; Rander, J; Rosowsky, A; Titov, M; Baffioni, S; Beaudette, F; Busson, P; Charlot, C; Daci, N; Dahms, T; Dalchenko, M; Dobrzynski, L; Filipovic, N; Florent, A; Granier de Cassagnac, R; Mastrolorenzo, L; Miné, P; Mironov, C; Naranjo, I N; Nguyen, M; Ochando, C; Paganini, P; Sabes, D; Salerno, R; Sauvan, J B; Sirois, Y; Veelken, C; Yilmaz, Y; Zabi, A; Agram, J-L; Andrea, J; Bloch, D; Brom, J-M; Chabert, E C; Collard, C; Conte, E; Drouhin, F; Fontaine, J-C; Gelé, D; Goerlach, U; Goetzmann, C; Juillot, P; Le Bihan, A-C; Van Hove, P; Gadrat, S; Beauceron, S; Beaupere, N; Boudoul, G; Brochet, S; Carrillo Montoya, C A; Chasserat, J; Chierici, R; Contardo, D; Depasse, P; El Mamouni, H; Fan, J; Fay, J; Gascon, S; Gouzevitch, M; Ille, B; Kurca, T; Lethuillier, M; Mirabito, L; Perries, S; Ruiz Alvarez, J D; Sgandurra, L; Sordini, V; Vander Donckt, M; Verdier, P; Viret, S; Xiao, H; Tsamalaidze, Z; Autermann, C; Beranek, S; Bontenackels, M; Calpas, B; Edelhoff, M; Feld, L; Hindrichs, O; Klein, K; Ostapchuk, A; Perieanu, A; Raupach, F; Sammet, J; Schael, S; Sprenger, D; Weber, H; Wittmer, B; Zhukov, V; Ata, M; Caudron, J; Dietz-Laursonn, E; Duchardt, D; Erdmann, M; Fischer, R; Güth, A; Hebbeker, T; Heidemann, C; Hoepfner, K; Klingebiel, D; Knutzen, S; Kreuzer, P; Merschmeyer, M; Meyer, A; Olschewski, M; Padeken, K; Papacz, P; Reithler, H; Schmitz, S A; Sonnenschein, L; Teyssier, D; Thüer, S; Weber, M; Cherepanov, V; Erdogan, Y; Flügge, G; Geenen, H; Geisler, M; Haj Ahmad, W; Hoehle, F; Kargoll, B; Kress, T; Kuessel, Y; Lingemann, J; Nowack, A; Nugent, I M; Perchalla, L; Pooth, O; Stahl, A; Asin, I; Bartosik, N; Behr, J; Behrenhoff, W; Behrens, U; Bell, A J; Bergholz, M; Bethani, A; Borras, K; Burgmeier, A; Cakir, A; Calligaris, L; Campbell, A; Choudhury, S; Costanza, F; Diez Pardos, C; Dooling, S; Dorland, T; Eckerlin, G; Eckstein, D; Eichhorn, T; Flucke, G; Garay Garcia, J; Geiser, A; Grebenyuk, A; Gunnellini, P; Habib, S; Hauk, J; Hellwig, G; Hempel, M; Horton, D; Jung, H; Kasemann, M; Katsas, P; Kieseler, J; Kleinwort, C; Krämer, M; Krücker, D; Lange, W; Leonard, J; Lipka, K; Lohmann, W; Lutz, B; Mankel, R; Marfin, I; Melzer-Pellmann, I-A; Meyer, A B; Mnich, J; Mussgiller, A; Naumann-Emme, S; Novgorodova, O; Nowak, F; Ntomari, E; Perrey, H; Petrukhin, A; Pitzl, D; Placakyte, R; Raspereza, A; Ribeiro Cipriano, P M; Riedl, C; Ron, E; Sahin, M Ö; Salfeld-Nebgen, J; Saxena, P; Schmidt, R; Schoerner-Sadenius, T; Schröder, M; Stein, M; Vargas Trevino, A D R; Walsh, R; Wissing, C; Aldaya Martin, M; Blobel, V; Centis Vignali, M; Enderle, H; Erfle, J; Garutti, E; Goebel, K; Görner, M; Gosselink, M; Haller, J; Höing, R S; Kirschenmann, H; Klanner, R; Kogler, R; Lange, J; Lapsien, T; Lenz, T; Marchesini, I; Ott, J; Peiffer, T; Pietsch, N; Rathjens, D; Sander, C; Schettler, H; Schleper, P; Schlieckau, E; Schmidt, A; Seidel, M; Sibille, J; Sola, V; Stadie, H; Steinbrück, G; Troendle, D; Usai, E; Vanelderen, L; Barth, C; Baus, C; Berger, J; Böser, C; Butz, E; Chwalek, T; De Boer, W; Descroix, A; Dierlamm, A; Feindt, M; Guthoff, M; Hartmann, F; Hauth, T; Held, H; Hoffmann, K H; Husemann, U; Katkov, I; Kornmayer, A; Kuznetsova, E; Lobelle Pardo, P; Martschei, D; Mozer, M U; Müller, Th; Niegel, M; Nürnberg, A; Oberst, O; Quast, G; Rabbertz, K; Ratnikov, F; Röcker, S; Schilling, F-P; Schott, G; Simonis, H J; Stober, F M; Ulrich, R; Wagner-Kuhr, J; Wayand, S; Weiler, T; Wolf, R; Zeise, M; Anagnostou, G; Daskalakis, G; Geralis, T; Giakoumopoulou, V A; Kesisoglou, S; Kyriakis, A; Loukas, D; Markou, A; Markou, C; Psallidas, A; Topsis-Giotis, I; Gouskos, L; Panagiotou, A; Saoulidou, N; Stiliaris, E; Aslanoglou, X; Evangelou, I; Flouris, G; Foudas, C; Jones, J; Kokkas, P; Manthos, N; Papadopoulos, I; Paradas, E; Bencze, G; Hajdu, C; Hidas, P; Horvath, D; Sikler, F; Veszpremi, V; Vesztergombi, G; Zsigmond, A J; Beni, N; Czellar, S; Molnar, J; Palinkas, J; Szillasi, Z; Karancsi, J; Raics, P; Trocsanyi, Z L; Ujvari, B; Swain, S K; Beri, S B; Bhatnagar, V; Dhingra, N; Gupta, R; Kalsi, A K; Kaur, M; Mittal, M; Nishu, N; Sharma, A; Singh, J B; Kumar, Ashok; Kumar, Arun; Ahuja, S; Bhardwaj, A; Choudhary, B C; Kumar, A; Malhotra, S; Naimuddin, M; Ranjan, K; Sharma, V; Shivpuri, R K; Banerjee, S; Bhattacharya, S; Chatterjee, K; Dutta, S; Gomber, B; Jain, Sa; Jain, Sh; Khurana, R; Modak, A; Mukherjee, S; Roy, D; Sarkar, S; Sharan, M; Singh, A P; Abdulsalam, A; Dutta, D; Kailas, S; Kumar, V; Mohanty, A K; Pant, L M; Shukla, P; Topkar, A; Aziz, T; Chatterjee, R M; Ganguly, S; Ghosh, S; Guchait, M; Gurtu, A; Kole, G; Kumar, S; Maity, M; Majumder, G; Mazumdar, K; Mohanty, G B; Parida, B; Sudhakar, K; Wickramage, N; Banerjee, S; Dewanjee, R K; Dugad, S; Arfaei, H; Bakhshiansohi, H; Behnamian, H; Etesami, S M; Fahim, A; Jafari, A; Khakzad, M; Mohammadi Najafabadi, M; Naseri, M; Paktinat Mehdiabadi, S; Safarzadeh, B; Zeinali, M; Grunewald, M; Abbrescia, M; Barbone, L; Calabria, C; Chhibra, S S; Colaleo, A; Creanza, D; De Filippis, N; De Palma, M; Fiore, L; Iaselli, G; Maggi, G; Maggi, M; My, S; Nuzzo, S; Pacifico, N; Pompili, A; Pugliese, G; Radogna, R; Selvaggi, G; Silvestris, L; Singh, G; Venditti, R; Verwilligen, P; Zito, G; Abbiendi, G; Benvenuti, A C; Bonacorsi, D; Braibant-Giacomelli, S; Brigliadori, L; Campanini, R; Capiluppi, P; Castro, A; Cavallo, F R; Codispoti, G; Cuffiani, M; Dallavalle, G M; Fabbri, F; Fanfani, A; Fasanella, D; Giacomelli, P; Grandi, C; Guiducci, L; Marcellini, S; Masetti, G; Meneghelli, M; Montanari, A; Navarria, F L; Odorici, F; Perrotta, A; Primavera, F; Rossi, A M; Rovelli, T; Siroli, G P; Tosi, N; Travaglini, R; Albergo, S; Cappello, G; Chiorboli, M; Costa, S; Giordano, F; Potenza, R; Tricomi, A; Tuve, C; Barbagli, G; Ciulli, V; Civinini, C; D'Alessandro, R; Focardi, E; Gallo, E; Gonzi, S; Gori, V; Lenzi, P; Meschini, M; Paoletti, S; Sguazzoni, G; Tropiano, A; Benussi, L; Bianco, S; Fabbri, F; Piccolo, D; Fabbricatore, P; Ferro, F; Lo Vetere, M; Musenich, R; Robutti, E; Tosi, S; Dinardo, M E; Fiorendi, S; Gennai, S; Gerosa, R; Ghezzi, A; Govoni, P; Lucchini, M T; Malvezzi, S; Manzoni, R A; Martelli, A; Marzocchi, B; Menasce, D; Moroni, L; Paganoni, M; Pedrini, D; Ragazzi, S; Redaelli, N; Tabarelli de Fatis, T; Buontempo, S; Cavallo, N; Di Guida, S; Fabozzi, F; Iorio, A O M; Lista, L; Meola, S; Merola, M; Paolucci, P; Azzi, P; Bacchetta, N; Bisello, D; Branca, A; Carlin, R; Checchia, P; Dorigo, T; Dosselli, U; Galanti, M; Gasparini, F; Gasparini, U; Giubilato, P; Gozzelino, A; Kanishchev, K; Lacaprara, S; Lazzizzera, I; Margoni, M; Meneguzzo, A T; Passaseo, M; Pazzini, J; Pegoraro, M; Pozzobon, N; Ronchese, P; Simonetto, F; Torassa, E; Tosi, M; Zotto, P; Zucchetta, A; Zumerle, G; Gabusi, M; Ratti, S P; Riccardi, C; Salvini, P; Vitulo, P; Biasini, M; Bilei, G M; Fanò, L; Lariccia, P; Mantovani, G; Menichelli, M; Romeo, F; Saha, A; Santocchia, A; Spiezia, A; Androsov, K; Azzurri, P; Bagliesi, G; Bernardini, J; Boccali, T; Broccolo, G; Castaldi, R; Ciocci, M A; Dell'Orso, R; Donato, S; Fiori, F; Foà, L; Giassi, A; Grippo, M T; Kraan, A; Ligabue, F; Lomtadze, T; Martini, L; Messineo, A; Moon, C S; Palla, F; Rizzi, A; Savoy-Navarro, A; Serban, A T; Spagnolo, P; Squillacioti, P; Tenchini, R; Tonelli, G; Venturi, A; Verdini, P G; Vernieri, C; Barone, L; Cavallari, F; Del Re, D; Diemoz, M; Grassi, M; Jorda, C; Longo, E; Margaroli, F; Meridiani, P; Micheli, F; Nourbakhsh, S; Organtini, G; Paramatti, R; Rahatlou, S; Rovelli, C; Soffi, L; Traczyk, P; Amapane, N; Arcidiacono, R; Argiro, S; Arneodo, M; Bellan, R; Biino, C; Cartiglia, N; Casasso, S; Costa, M; Degano, A; Demaria, N; Finco, L; Mariotti, C; Maselli, S; Migliore, E; Monaco, V; Musich, M; Obertino, M M; Ortona, G; Pacher, L; Pastrone, N; Pelliccioni, M; Pinna Angioni, G L; Potenza, A; Romero, A; Ruspa, M; Sacchi, R; Solano, A; Staiano, A; Tamponi, U; Belforte, S; Candelise, V; Casarsa, M; Cossutti, F; Della Ricca, G; Gobbo, B; La Licata, C; Marone, M; Montanino, D; Schizzi, A; Umer, T; Zanetti, A; Chang, S; Kim, T Y; Nam, S K; Kim, D H; Kim, G N; Kim, J E; Kim, M S; Kong, D J; Lee, S; Oh, Y D; Park, H; Sakharov, A; Son, D C; Kim, J Y; Kim, Zero J; Song, S; Choi, S; Gyun, D; Hong, B; Jo, M; Kim, H; Kim, Y; Lee, B; Lee, K S; Park, S K; Roh, Y; Choi, M; Kim, J H; Park, C; Park, I C; Park, S; Ryu, G; Choi, Y; Choi, Y K; Goh, J; Kwon, E; Lee, J; Seo, H; Yu, I; Juodagalvis, A; Komaragiri, J R; Castilla-Valdez, H; De La Cruz-Burelo, E; Heredia-de La Cruz, I; Lopez-Fernandez, R; Martínez-Ortega, J; Sanchez-Hernandez, A; Villasenor-Cendejas, L M; Carrillo Moreno, S; Vazquez Valencia, F; Salazar Ibarguen, H A; Casimiro Linares, E; Morelos Pineda, A; Krofcheck, D; Butler, P H; Doesburg, R; Reucroft, S; Ahmad, A; Ahmad, M; Asghar, M I; Butt, J; Hassan, Q; Hoorani, H R; Khan, W A; Khurshid, T; Qazi, S; Shah, M A; Shoaib, M; Bialkowska, H; Bluj, M; Boimska, B; Frueboes, T; Górski, M; Kazana, M; Nawrocki, K; Romanowska-Rybinska, K; Szleper, M; Wrochna, G; Zalewski, P; Brona, G; Bunkowski, K; Cwiok, M; Dominik, W; Doroba, K; Kalinowski, A; Konecki, M; Krolikowski, J; Misiura, M; Wolszczak, W; Bargassa, P; Beirão Da Cruz E Silva, C; Faccioli, P; Ferreira Parracho, P G; Gallinaro, M; Nguyen, F; Rodrigues Antunes, J; Seixas, J; Varela, J; Vischia, P; Golutvin, I; Gorbunov, I; Karjavin, V; Konoplyanikov, V; Korenkov, V; Kozlov, G; Lanev, A; Malakhov, A; Matveev, V; Moisenz, P; Palichik, V; Perelygin, V; Savina, M; Shmatov, S; Shulha, S; Skatchkov, N; Smirnov, V; Zarubin, A; Golovtsov, V; Ivanov, Y; Kim, V; Levchenko, P; Murzin, V; Oreshkin, V; Smirnov, I; Sulimov, V; Uvarov, L; Vavilov, S; Vorobyev, A; Vorobyev, An; Andreev, Yu; Dermenev, A; Gninenko, S; Golubev, N; Kirsanov, M; Krasnikov, N; Pashenkov, A; Tlisov, D; Toropin, A; Epshteyn, V; Gavrilov, V; Lychkovskaya, N; Popov, V; Safronov, G; Semenov, S; Spiridonov, A; Stolin, V; Vlasov, E; Zhokin, A; Andreev, V; Azarkin, M; Dremin, I; Kirakosyan, M; Leonidov, A; Mesyats, G; Rusakov, S V; Vinogradov, A; Belyaev, A; Boos, E; Bunichev, V; Dubinin, M; Dudko, L; Ershov, A; Klyukhin, V; Kodolova, O; Lokhtin, I; Obraztsov, S; Petrushanko, S; Savrin, V; Snigirev, A; Azhgirey, I; Bayshev, I; Bitioukov, S; Kachanov, V; Kalinin, A; Konstantinov, D; Krychkine, V; Petrov, V; Ryutin, R; Sobol, A; Tourtchanovitch, L; Troshin, S; Tyurin, N; Uzunian, A; Volkov, A; Adzic, P; Djordjevic, M; Ekmedzic, M; Milosevic, J; Aguilar-Benitez, M; Alcaraz Maestre, J; Battilana, C; Calvo, E; Cerrada, M; Chamizo Llatas, M; Colino, N; De La Cruz, B; Delgado Peris, A; Domínguez Vázquez, D; Fernandez Bedoya, C; Fernández Ramos, J P; Ferrando, A; Flix, J; Fouz, M C; Garcia-Abia, P; Gonzalez Lopez, O; Goy Lopez, S; Hernandez, J M; Josa, M I; Merino, G; Navarro De Martino, E; Pérez-Calero Yzquierdo, A; Puerta Pelayo, J; Quintario Olmeda, A; Redondo, I; Romero, L; Soares, M S; Willmott, C; Albajar, C; de Trocóniz, J F; Missiroli, M; Brun, H; Cuevas, J; Fernandez Menendez, J; Folgueras, S; Gonzalez Caballero, I; Lloret Iglesias, L; Brochero Cifuentes, J A; Cabrillo, I J; Calderon, A; Duarte Campderros, J; Fernandez, M; Gomez, G; Gonzalez Sanchez, J; Graziano, A; Lopez Virto, A; Marco, J; Marco, R; Martinez Rivero, C; Matorras, F; Munoz Sanchez, F J; Piedra Gomez, J; Rodrigo, T; Rodríguez-Marrero, A Y; Ruiz-Jimeno, A; Scodellaro, L; Vila, I; Vilar Cortabitarte, R; Abbaneo, D; Auffray, E; Auzinger, G; Bachtis, M; Baillon, P; Ball, A H; Barney, D; Benaglia, A; Bendavid, J; Benhabib, L; Benitez, J F; Bernet, C; Bianchi, G; Bloch, P; Bocci, A; Bonato, A; Bondu, O; Botta, C; Breuker, H; Camporesi, T; Cerminara, G; Christiansen, T; Coarasa Perez, J A; Colafranceschi, S; D'Alfonso, M; d'Enterria, D; Dabrowski, A; David, A; De Guio, F; De Roeck, A; De Visscher, S; Dobson, M; Dupont-Sagorin, N; Elliott-Peisert, A; Eugster, J; Franzoni, G; Funk, W; Giffels, M; Gigi, D; Gill, K; Giordano, D; Girone, M; Giunta, M; Glege, F; Gomez-Reino Garrido, R; Gowdy, S; Guida, R; Hammer, J; Hansen, M; Harris, P; Hegeman, J; Innocente, V; Janot, P; Karavakis, E; Kousouris, K; Krajczar, K; Lecoq, P; Lourenço, C; Magini, N; Malgeri, L; Mannelli, M; Masetti, L; Meijers, F; Mersi, S; Meschi, E; Moortgat, F; Mulders, M; Musella, P; Orsini, L; Palencia Cortezon, E; Pape, L; Perez, E; Perrozzi, L; Petrilli, A; Petrucciani, G; Pfeiffer, A; Pierini, M; Pimiä, M; Piparo, D; Plagge, M; Racz, A; Reece, W; Rolandi, G; Rovere, M; Sakulin, H; Santanastasio, F; Schäfer, C; Schwick, C; Sekmen, S; Sharma, A; Siegrist, P; Silva, P; Simon, M; Sphicas, P; Spiga, D; Steggemann, J; Stieger, B; Stoye, M; Treille, D; Tsirou, A; Veres, G I; Vlimant, J R; Wöhri, H K; Zeuner, W D; Bertl, W; Deiters, K; Erdmann, W; Horisberger, R; Ingram, Q; Kaestli, H C; König, S; Kotlinski, D; Langenegger, U; Renker, D; Rohe, T; Bachmair, F; Bäni, L; Bianchini, L; Bortignon, P; Buchmann, M A; Casal, B; Chanon, N; Deisher, A; Dissertori, G; Dittmar, M; Donegà, M; Dünser, M; Eller, P; Grab, C; Hits, D; Lustermann, W; Mangano, B; Marini, A C; Martinez Ruiz Del Arbol, P; Meister, D; Mohr, N; Nägeli, C; Nef, P; Nessi-Tedaldi, F; Pandolfi, F; Pauss, F; Peruzzi, M; Quittnat, M; Rebane, L; Ronga, F J; Rossini, M; Starodumov, A; Takahashi, M; Theofilatos, K; Wallny, R; Weber, H A; Amsler, C; Canelli, M F; Chiochia, V; De Cosa, A; Hinzmann, A; Hreus, T; Ivova Rikova, M; Kilminster, B; Millan Mejias, B; Ngadiuba, J; Robmann, P; Snoek, H; Taroni, S; Verzetti, M; Yang, Y; Cardaci, M; Chen, K H; Ferro, C; Kuo, C M; Li, S W; Lin, W; Lu, Y J; Volpe, R; Yu, S S; Bartalini, P; Chang, P; Chang, Y H; Chang, Y W; Chao, Y; Chen, K F; Chen, P H; Dietz, C; Grundler, U; Hou, W-S; Hsiung, Y; Kao, K Y; Lei, Y J; Liu, Y F; Lu, R-S; Majumder, D; Petrakou, E; Shi, X; Shiu, J G; Tzeng, Y M; Wang, M; Wilken, R; Asavapibhop, B; Srimanobhas, N; Adiguzel, A; Bakirci, M N; Cerci, S; Dozen, C; Dumanoglu, I; Eskut, E; Girgis, S; Gokbulut, G; Gurpinar, E; Hos, I; Kangal, E E; Kayis Topaksu, A; Onengut, G; Ozdemir, K; Ozturk, S; Polatoz, A; Sogut, K; Sunar Cerci, D; Tali, B; Topakli, H; Vergili, M; Akin, I V; Aliev, T; Bilin, B; Bilmis, S; Deniz, M; Gamsizkan, H; Guler, A M; Karapinar, G; Ocalan, K; Ozpineci, A; Serin, M; Sever, R; Surat, U E; Yalvac, M; Zeyrek, M; Gülmez, E; Isildak, B; Kaya, M; Kaya, O; Ozkorucuklu, S; Bahtiyar, H; Barlas, E; Cankocak, K; Günaydin, Y O; Vardarlı, F I; Yücel, M; Levchuk, L; Sorokin, P; Aggleton, R; Brooke, J J; Clement, E; Cussans, D; Flacher, H; Frazier, R; Goldstein, J; Grimes, M; Heath, G P; Heath, H F; Jacob, J; Kreczko, L; Lucas, C; Meng, Z; Newbold, D M; Paramesvaran, S; Poll, A; Senkin, S; Smith, V J; Williams, T; Bell, K W; Belyaev, A; Brew, C; Brown, R M; Cockerill, D J A; Coughlan, J A; Harder, K; Harper, S; Ilic, J; Olaiya, E; Petyt, D; Shepherd-Themistocleous, C H; Thea, A; Tomalin, I R; Womersley, W J; Worm, S D; Baber, M; Bainbridge, R; Buchmuller, O; Burton, D; Colling, D; Cripps, N; Cutajar, M; Dauncey, P; Davies, G; Della Negra, M; Dunne, P; Ferguson, W; Fulcher, J; Futyan, D; Gilbert, A; Guneratne Bryer, A; Hall, G; Hatherell, Z; Hays, J; Iles, G; Jarvis, M; Karapostoli, G; Kenzie, M; Lane, R; Lucas, R; Lyons, L; Magnan, A-M; Marrouche, J; Mathias, B; Nandi, R; Nash, J; Nikitenko, A; Pela, J; Pesaresi, M; Petridis, K; Pioppi, M; Raymond, D M; Rogerson, S; Rose, A; Seez, C; Sharp, P; Sparrow, A; Tapper, A; Vazquez Acosta, M; Virdee, T; Wakefield, S; Wardle, N; Cole, J E; Hobson, P R; Khan, A; Kyberd, P; Leggat, D; Leslie, D; Martin, W; Reid, I D; Symonds, P; Teodorescu, L; Turner, M; Dittmann, J; Hatakeyama, K; Kasmi, A; Liu, H; Scarborough, T; Charaf, O; Cooper, S I; Henderson, C; Rumerio, P; Avetisyan, A; Bose, T; Fantasia, C; Heister, A; Lawson, P; Lazic, D; Richardson, C; Rohlf, J; Sperka, D; St John, J; Sulak, L; Alimena, J; Bhattacharya, S; Christopher, G; Cutts, D; Demiragli, Z; Ferapontov, A; Garabedian, A; Heintz, U; Jabeen, S; Kukartsev, G; Laird, E; Landsberg, G; Luk, M; Narain, M; Segala, M; Sinthuprasith, T; Speer, T; Swanson, J; Breedon, R; Breto, G; Calderon De La Barca Sanchez, M; Chauhan, S; Chertok, M; Conway, J; Conway, R; Cox, P T; Erbacher, R; Gardner, M; Ko, W; Kopecky, A; Lander, R; Miceli, T; Mulhearn, M; Pellett, D; Pilot, J; Ricci-Tam, F; Rutherford, B; Searle, M; Shalhout, S; Smith, J; Squires, M; Tripathi, M; Wilbur, S; Yohay, R; Andreev, V; Cline, D; Cousins, R; Erhan, S; Everaerts, P; Farrell, C; Felcini, M; Hauser, J; Ignatenko, M; Jarvis, C; Rakness, G; Takasugi, E; Valuev, V; Weber, M; Babb, J; Clare, R; Ellison, J; Gary, J W; Hanson, G; Heilman, J; Jandir, P; Lacroix, F; Liu, H; Long, O R; Luthra, A; Malberti, M; Nguyen, H; Shrinivas, A; Sturdy, J; Sumowidagdo, S; Wimpenny, S; Andrews, W; Branson, J G; Cerati, G B; Cittolin, S; D'Agnolo, R T; Evans, D; Holzner, A; Kelley, R; Kovalskyi, D; Lebourgeois, M; Letts, J; Macneill, I; Padhi, S; Palmer, C; Pieri, M; Sani, M; Sharma, V; Simon, S; Sudano, E; Tadel, M; Tu, Y; Vartak, A; Wasserbaech, S; Würthwein, F; Yagil, A; Yoo, J; Barge, D; Bradmiller-Feld, J; Campagnari, C; Danielson, T; Dishaw, A; Flowers, K; Franco Sevilla, M; Geffert, P; George, C; Golf, F; Incandela, J; Justus, C; Magaña Villalba, R; Mccoll, N; Pavlunin, V; Richman, J; Rossin, R; Stuart, D; To, W; West, C; Apresyan, A; Bornheim, A; Bunn, J; Chen, Y; Di Marco, E; Duarte, J; Kcira, D; Mott, A; Newman, H B; Pena, C; Rogan, C; Spiropulu, M; Timciuc, V; Wilkinson, R; Xie, S; Zhu, R Y; Azzolini, V; Calamba, A; Carroll, R; Ferguson, T; Iiyama, Y; Jang, D W; Paulini, M; Russ, J; Vogel, H; Vorobiev, I; Cumalat, J P; Drell, B R; Ford, W T; Gaz, A; Luiggi Lopez, E; Nauenberg, U; Smith, J G; Stenson, K; Ulmer, K A; Wagner, S R; Alexander, J; Chatterjee, A; Chu, J; Eggert, N; Gibbons, L K; Hopkins, W; Khukhunaishvili, A; Kreis, B; Mirman, N; Nicolas Kaufman, G; Patterson, J R; Ryd, A; Salvati, E; Sun, W; Teo, W D; Thom, J; Thompson, J; Tucker, J; Weng, Y; Winstrom, L; Wittich, P; Winn, D; Abdullin, S; Albrow, M; Anderson, J; Apollinari, G; Bauerdick, L A T; Beretvas, A; Berryhill, J; Bhat, P C; Burkett, K; Butler, J N; Chetluru, V; Cheung, H W K; Chlebana, F; Cihangir, S; Elvira, V D; Fisk, I; Freeman, J; Gao, Y; Gottschalk, E; Gray, L; Green, D; Grünendahl, S; Gutsche, O; Hanlon, J; Hare, D; Harris, R M; Hirschauer, J; Hooberman, B; Jindariani, S; Johnson, M; Joshi, U; Kaadze, K; Klima, B; Kwan, S; Linacre, J; Lincoln, D; Lipton, R; Liu, T; Lykken, J; Maeshima, K; Marraffino, J M; Martinez Outschoorn, V I; Maruyama, S; Mason, D; McBride, P; Mishra, K; Mrenna, S; Musienko, Y; Nahn, S; Newman-Holmes, C; O'Dell, V; Prokofyev, O; Ratnikova, N; Sexton-Kennedy, E; Sharma, S; Soha, A; Spalding, W J; Spiegel, L; Taylor, L; Tkaczyk, S; Tran, N V; Uplegger, L; Vaandering, E W; Vidal, R; Whitbeck, A; Whitmore, J; Wu, W; Yang, F; Yun, J C; Acosta, D; Avery, P; Bourilkov, D; Cheng, T; Das, S; De Gruttola, M; Di Giovanni, G P; Dobur, D; Field, R D; Fisher, M; Fu, Y; Furic, I K; Hugon, J; Kim, B; Konigsberg, J; Korytov, A; Kropivnitskaya, A; Kypreos, T; Low, J F; Matchev, K; Milenovic, P; Mitselmakher, G; Muniz, L; Rinkevicius, A; Shchutska, L; Skhirtladze, N; Snowball, M; Yelton, J; Zakaria, M; Gaultney, V; Hewamanage, S; Linn, S; Markowitz, P; Martinez, G; Rodriguez, J L; Adams, T; Askew, A; Bochenek, J; Chen, J; Diamond, B; Haas, J; Hagopian, S; Hagopian, V; Johnson, K F; Prosper, H; Veeraraghavan, V; Weinberg, M; Baarmand, M M; Dorney, B; Hohlmann, M; Kalakhety, H; Yumiceva, F; Adams, M R; Apanasevich, L; Bazterra, V E; Betts, R R; Bucinskaite, I; Cavanaugh, R; Evdokimov, O; Gauthier, L; Gerber, C E; Hofman, D J; Khalatyan, S; Kurt, P; Moon, D H; O'Brien, C; Silkworth, C; Turner, P; Varelas, N; Akgun, U; Albayrak, E A; Bilki, B; Clarida, W; Dilsiz, K; Duru, F; Haytmyradov, M; Merlo, J-P; Mermerkaya, H; Mestvirishvili, A; Moeller, A; Nachtman, J; Ogul, H; Onel, Y; Ozok, F; Penzo, A; Rahmat, R; Sen, S; Tan, P; Tiras, E; Wetzel, J; Yetkin, T; Yi, K; Barnett, B A; Blumenfeld, B; Bolognesi, S; Fehling, D; Gritsan, A V; Maksimovic, P; Martin, C; Swartz, M; Baringer, P; Bean, A; Benelli, G; Gray, J; Kenny, R P; Murray, M; Noonan, D; Sanders, S; Sekaric, J; Stringer, R; Wang, Q; Wood, J S; Barfuss, A F; Chakaberia, I; Ivanov, A; Khalil, S; Makouski, M; Maravin, Y; Saini, L K; Shrestha, S; Svintradze, I; Gronberg, J; Lange, D; Rebassoo, F; Wright, D; Baden, A; Calvert, B; Eno, S C; Gomez, J A; Hadley, N J; Kellogg, R G; Kolberg, T; Lu, Y; Marionneau, M; Mignerey, A C; Pedro, K; Skuja, A; Temple, J; Tonjes, M B; Tonwar, S C; Apyan, A; Barbieri, R; Bauer, G; Busza, W; Cali, I A; Chan, M; Di Matteo, L; Dutta, V; Gomez Ceballos, G; Goncharov, M; Gulhan, D; Klute, M; Lai, Y S; Lee, Y-J; Levin, A; Luckey, P D; Ma, T; Paus, C; Ralph, D; Roland, C; Roland, G; Stephans, G S F; Stöckli, F; Sumorok, K; Velicanu, D; Veverka, J; Wyslouch, B; Yang, M; Yoon, A S; Zanetti, M; Zhukova, V; Dahmes, B; De Benedetti, A; Gude, A; Kao, S C; Klapoetke, K; Kubota, Y; Mans, J; Pastika, N; Rusack, R; Singovsky, A; Tambe, N; Turkewitz, J; Acosta, J G; Cremaldi, L M; Kroeger, R; Oliveros, S; Perera, L; Sanders, D A; Summers, D; Avdeeva, E; Bloom, K; Bose, S; Claes, D R; Dominguez, A; Gonzalez Suarez, R; Keller, J; Knowlton, D; Kravchenko, I; Lazo-Flores, J; Malik, S; Meier, F; Snow, G R; Dolen, J; Godshalk, A; Iashvili, I; Jain, S; Kharchilava, A; Kumar, A; Rappoccio, S; Alverson, G; Barberis, E; Baumgartel, D; Chasco, M; Haley, J; Massironi, A; Nash, D; Orimoto, T; Trocino, D; Wang, R J; Wood, D; Zhang, J; Anastassov, A; Hahn, K A; Kubik, A; Lusito, L; Mucia, N; Odell, N; Pollack, B; Pozdnyakov, A; Schmitt, M; Stoynev, S; Sung, K; Velasco, M; Won, S; Berry, D; Brinkerhoff, A; Chan, K M; Drozdetskiy, A; Hildreth, M; Jessop, C; Karmgard, D J; Kellams, N; Kolb, J; Lannon, K; Luo, W; Lynch, S; Marinelli, N; Morse, D M; Pearson, T; Planer, M; Ruchti, R; Slaunwhite, J; Valls, N; Wayne, M; Wolf, M; Woodard, A; Antonelli, L; Bylsma, B; Durkin, L S; Flowers, S; Hill, C; Hughes, R; Kotov, K; Ling, T Y; Puigh, D; Rodenburg, M; Smith, G; Vuosalo, C; Winer, B L; Wolfe, H; Wulsin, H W; Berry, E; Elmer, P; Halyo, V; Hebda, P; Hunt, A; Jindal, P; Koay, S A; Lujan, P; Marlow, D; Medvedeva, T; Mooney, M; Olsen, J; Piroué, P; Quan, X; Raval, A; Saka, H; Stickland, D; Tully, C; Werner, J S; Zenz, S C; Zuranski, A; Brownson, E; Lopez, A; Mendez, H; Ramirez Vargas, J E; Alagoz, E; Benedetti, D; Bolla, G; Bortoletto, D; De Mattia, M; Everett, A; Hu, Z; Jha, M K; Jones, M; Jung, K; Kress, M; Leonardo, N; Lopes Pegna, D; Maroussov, V; Merkel, P; Miller, D H; Neumeister, N; Radburn-Smith, B C; Shipsey, I; Silvers, D; Svyatkovskiy, A; Wang, F; Xie, W; Xu, L; Yoo, H D; Zablocki, J; Zheng, Y; Parashar, N; Stupak, J; Adair, A; Akgun, B; Ecklund, K M; Geurts, F J M; Li, W; Michlin, B; Padley, B P; Redjimi, R; Roberts, J; Zabel, J; Betchart, B; Bodek, A; Covarelli, R; de Barbaro, P; Demina, R; Eshaq, Y; Ferbel, T; Garcia-Bellido, A; Goldenzweig, P; Han, J; Harel, A; Miner, D C; Petrillo, G; Vishnevskiy, D; Zielinski, M; Bhatti, A; Ciesielski, R; Demortier, L; Goulianos, K; Lungu, G; Malik, S; Mesropian, C; Arora, S; Barker, A; Chou, J P; Contreras-Campana, C; Contreras-Campana, E; Duggan, D; Ferencek, D; Gershtein, Y; Gray, R; Halkiadakis, E; Hidas, D; Lath, A; Panwalkar, S; Park, M; Patel, R; Rekovic, V; Robles, J; Salur, S; Schnetzer, S; Seitz, C; Somalwar, S; Stone, R; Thomas, S; Thomassen, P; Walker, M; Rose, K; Spanier, S; Yang, Z C; York, A; Bouhali, O; Eusebi, R; Flanagan, W; Gilmore, J; Kamon, T; Khotilovich, V; Krutelyov, V; Montalvo, R; Osipenkov, I; Pakhotin, Y; Perloff, A; Roe, J; Rose, A; Safonov, A; Sakuma, T; Suarez, I; Tatarinov, A; Toback, D; Akchurin, N; Cowden, C; Damgov, J; Dragoiu, C; Dudero, P R; Faulkner, J; Kovitanggoon, K; Kunori, S; Lee, S W; Libeiro, T; Volobouev, I; Appelt, E; Delannoy, A G; Greene, S; Gurrola, A; Johns, W; Maguire, C; Mao, Y; Melo, A; Sharma, M; Sheldon, P; Snook, B; Tuo, S; Velkovska, J; Arenton, M W; Boutle, S; Cox, B; Francis, B; Goodell, J; Hirosky, R; Ledovskoy, A; Li, H; Lin, C; Neu, C; Wood, J; Gollapinni, S; Harr, R; Karchin, P E; Kottachchi Kankanamge Don, C; Lamichhane, P; Belknap, D A; Borrello, L; Carlsmith, D; Cepeda, M; Dasu, S; Duric, S; Friis, E; Grothe, M; Hall-Wilton, R; Herndon, M; Hervé, A; Klabbers, P; Klukas, J; Lanaro, A; Lazaridis, C; Levine, A; Loveless, R; Mohapatra, A; Ojalvo, I; Perry, T; Pierro, G A; Polese, G; Ross, I; Sarangi, T; Savin, A; Smith, W H; Woods, N

    A search for invisible decays of Higgs bosons is performed using the vector boson fusion and associated ZH production modes. In the ZH mode, the Z boson is required to decay to a pair of charged leptons or a [Formula: see text] quark pair. The searches use the 8 [Formula: see text] pp collision dataset collected by the CMS detector at the LHC, corresponding to an integrated luminosity of up to 19.7 [Formula: see text]. Certain channels include data from 7 [Formula: see text] collisions corresponding to an integrated luminosity of 4.9 [Formula: see text]. The searches are sensitive to non-standard-model invisible decays of the recently observed Higgs boson, as well as additional Higgs bosons with similar production modes and large invisible branching fractions. In all channels, the observed data are consistent with the expected standard model backgrounds. Limits are set on the production cross section times invisible branching fraction, as a function of the Higgs boson mass, for the vector boson fusion and ZH production modes. By combining all channels, and assuming standard model Higgs boson cross sections and acceptances, the observed (expected) upper limit on the invisible branching fraction at [Formula: see text] [Formula: see text] is found to be 0.58 (0.44) at 95 % confidence level. We interpret this limit in terms of a Higgs-portal model of dark matter interactions.

  12. Shifts of visuospatial attention to invisible (metacontrast-masked singletons: Clues from reaction times and event-related potential

    Directory of Open Access Journals (Sweden)

    Manfred Heumann

    2006-01-01

    Full Text Available In the current study, we tested whether a masked and, thus, invisible singleton-cue captures atten-tion in a stimulus-driven manner or in a top-down contingent manner. The manual RT (Reaction Time capture effect with the invisible singleton--cue decreased substantially when a match between the singleton-cue and the top-down controlled set of searched-for target features was also decreased. By contrast, with the PCN (Posterior Contralateral Negativity, an electrophysiological measure of the capture of visuospatial attention by the invisible singleton-cue, no significant decrement was observed. Taken together, the results support the assumption that an invisible singleton-cue can capture attention in a stimulus-driven manner, and that different delays in the deallocation of attention (i.e., attention is deallocated more efficiently from acue that does not match the top-down controlled set than from a cue that does match the same set account for the weaker manual RT capture effect with a set- -nonmatching invisible singleton-cue.

  13. Coping with stereotype threat: denial as an impression management strategy.

    Science.gov (United States)

    von Hippel, William; von Hippel, Courtney; Conway, Leanne; Preacher, Kristopher J; Schooler, Jonathan W; Radvansky, Gabriel A

    2005-07-01

    Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.

  14. Daily negative affect and smoking after a self-set quit attempt: The role of dyadic invisible social support in a daily diary study.

    Science.gov (United States)

    Lüscher, Janina; Stadler, Gertraud; Ochsner, Sibylle; Rackow, Pamela; Knoll, Nina; Hornung, Rainer; Scholz, Urte

    2015-11-01

    Social support receipt from one's partner is assumed to be beneficial for successful smoking cessation. However, support receipt can have costs. Recent research suggests that the most effective support is unnoticed by the receiver (i.e., invisible). Therefore, this study examined the association between everyday levels of dyadic invisible emotional and instrumental support, daily negative affect, and daily smoking after a self-set quit attempt in smoker-non-smoker couples. Overall, 100 smokers (72.0% men, mean age M = 40.48, SD = 9.82) and their non-smoking partners completed electronic diaries from a self-set quit date on for 22 consecutive days, reporting daily invisible emotional and instrumental social support, daily negative affect, and daily smoking. Same-day multilevel analyses showed that at the between-person level, higher individual mean levels of invisible emotional and instrumental support were associated with less daily negative affect. In contrast to our assumption, more receipt of invisible emotional and instrumental support was related to more daily cigarettes smoked. The findings are in line with previous results, indicating invisible support to have beneficial relations with affect. However, results emphasize the need for further prospective daily diary approaches for understanding the dynamics of invisible support on smoking cessation. Statement of contribution What is already known on this subject? Social support receipt from a close other has proven to have emotional costs. According to current studies, the most effective social support is unnoticed by the receiver (i.e., invisible). There is empirical evidence for beneficial effects of invisible social support on affective well-being. What does this study add? Confirming benefits of invisible social support for negative affect in a health behaviour change setting Providing first evidence for detrimental effects of invisible social support on smoking. © 2015 The British Psychological Society.

  15. Sexual Violence, Race and Media (InVisibility: Intersectional Complexities in a Transnational Frame

    Directory of Open Access Journals (Sweden)

    Vrushali Patil

    2015-08-01

    Full Text Available Intersectional scholarship argues that women of color have distinct experiences of rape compared to white women and highlights their relative invisibility as victims compared to white women victims in news media. While the bulk of intersectional work has examined such issues within one nation and particularly within the US, in an era of increasingly transnationalized media content, we explore such intersectionalities in a transnational frame. That is, we explore the treatment of the rape of a local Indian woman in New Delhi, India, and the rape of a white woman in Steubenville, USA, in the New York Times and the Times of India. We find that contra assumptions in the intersectional literature, the racialized Indian victim is hyper-visible across both papers while the white US victim is relatively invisible. Situating both newspapers within the global histories of the development of news as a particular genre of storytelling, we argue that their respective locations within larger processes shaped by colonial, imperial and neo-colonial histories have critical implications for the coverage each paper offers. Thus, we argue that issues of race and visibility in media operate very differently depending on the space and scale of analysis. In an increasingly globalized world, then, we must start paying attention to the transnational and its implications for rape, race and (invisibility in news media. Ultimately, our approach brings together processes of racialization at multiple scales—both below the nation and above the nation—to offer a more complex, multi-scalar understanding of how racialization processes impact rape coverage.

  16. Visible and invisible displacement with dynamic visual occlusion in bottlenose dolphins (Tursiops spp).

    Science.gov (United States)

    Johnson, Christine M; Sullivan, Jess; Buck, Cara L; Trexel, Julie; Scarpuzzi, Mike

    2015-01-01

    Anticipating the location of a temporarily obscured target-what Piaget (the construction of reality in the child. Basic Books, New York, 1954) called "object permanence"-is a critical skill, especially in hunters of mobile prey. Previous research with bottlenose dolphins found they could predict the location of a target that had been visibly displaced into an opaque container, but not one that was first placed in an opaque container and then invisibly displaced to another container. We tested whether, by altering the task to involve occlusion rather than containment, these animals could show more advanced object permanence skills. We projected dynamic visual displays at an underwater-viewing window and videotaped the animals' head moves while observing these displays. In Experiment 1, the animals observed a small black disk moving behind occluders that shifted in size, ultimately forming one large occluder. Nine out of ten subjects "tracked" the presumed movement of the disk behind this occluder on their first trial-and in a statistically significant number of subsequent trials-confirming their visible displacement abilities. In Experiment 2, we tested their invisible displacement abilities. The disk first disappeared behind a pair of moving occluders, which then moved behind a stationary occluder. The moving occluders then reappeared and separated, revealing that the disk was no longer behind them. The subjects subsequently looked to the correct stationary occluder on eight of their ten first trials, and in a statistically significant number of subsequent trials. Thus, by altering the stimuli to be more ecologically valid, we were able to show that the dolphins could indeed succeed at an invisible displacement task.

  17. The Invisibility of Disability: Using Dance to Shake from Bioethics the Idea of 'Broken Bodies'.

    Science.gov (United States)

    Harmon, Shawn H E

    2015-09-01

    Complex social and ethical problems are often most effectively solved by engaging them at the messy and uncomfortable intersections of disciplines and practices, a notion that grounds the InVisible Difference project, which seeks to extend thinking and alter practice around the making, status, ownership, and value of work by contemporary dance choreographers by examining choreographic work through the lenses of law, bioethics, dance scholarship, and the practice of dance by differently-abled dancers. This article offers a critical thesis on how bioethics has come to occupy a marginal and marginalizing role in questions about the differently-abled body. In doing so, it has rendered the disabled community largely invisible to and in bioethics. It then defends the claim that bioethics - as a social undertaking pursued collaboratively by individuals from different disciplines - must take much better notice of the body and the embodied individual if it is to better achieve its ends, which include constructing a moral and just society. Finally, this article considers how the arts, and specifically dance (and here dance by differently-abled dancers), provides us with rich evidence about the body and our ability to respond positively to normally 'othered' bodies. It concludes that greater attention to empirical evidence like that being generated in InVisible Difference will help to expand the reach and significance of bioethics, and thereby its relevance to (and consciousness of) important questions about the status of bodies and bodily differences, which must be considered as central to its ambitions. © 2014 John Wiley & Sons Ltd.

  18. Search strategies for pair production of heavy Higgs bosons decaying invisibly at the LHC

    Science.gov (United States)

    Arganda, E.; Diaz-Cruz, J. L.; Mileo, N.; Morales, R. A.; Szynkman, A.

    2018-04-01

    The search for heavy Higgs bosons at the LHC represents an intense experimental program, carried out by the ATLAS and CMS collaborations, which includes the hunt for invisible Higgs decays and dark matter candidates. No significant deviations from the SM backgrounds have been observed in any of these searches, imposing significant constraints on the parameter space of different new physics models with an extended Higgs sector. Here we discuss an alternative search strategy for heavy Higgs bosons decaying invisibly at the LHC, focusing on the pair production of a heavy scalar H together with a pseudoscalar A, through the production mode q q bar →Z* → HA. We identify as the most promising signal the final state made up of 4 b +ET miss, coming from the heavy scalar decay mode H → hh → b b bar b b bar , with h being the discovered SM-like Higgs boson with mh = 125GeV, together with the invisible channel of the pseudoscalar. We work within the context of simplified MSSM scenarios that contain quite heavy sfermions of most types with O (10)TeV masses, while the stops are heavy enough to reproduce the 125 GeV mass for the lightest SM-like Higgs boson. By contrast, the gauginos/higgsinos and the heavy MSSM Higgs bosons have masses near the EW scale. Our search strategies, for a LHC center-of-mass energy of √{ s } = 14TeV, allow us to obtain statistical significances of the signal over the SM backgrounds with values up to ∼ 1.6 σ and ∼ 3 σ, for total integrated luminosities of 300fb-1 and 1000fb-1, respectively.

  19. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  20. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  1. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  2. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  3. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  4. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  5. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  6. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  7. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  8. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  9. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic

  10. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  11. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Wilders established the Party for Freedom (PVV), in 2005 with a strong anti-immigration agenda. The party believes Judeo-Christian and humanist ...Allied administration of post-WWI Europe. Right-wing movements of the 60’s and 80’s were a response to an existential threat during the Cold War rather

  12. Analysis in temporal regime of dispersive invisible structures designed from transformation optics

    Science.gov (United States)

    Gralak, B.; Arismendi, G.; Avril, B.; Diatta, A.; Guenneau, S.

    2016-03-01

    A simple invisible structure made of two anisotropic homogeneous layers is analyzed theoretically in temporal regime. The frequency dispersion is introduced and analytic expression of the transient part of the field is derived for large times when the structure is illuminated by a causal excitation. This expression shows that the limiting amplitude principle applies with transient fields decaying as the power -3 /4 of the time. The quality of the cloak is then reduced at short times and remains preserved at large times. The one-dimensional theoretical analysis is supplemented with full-wave numerical simulations in two-dimensional situations which confirm the effect of dispersion.

  13. Detailed optical characterization of three-dimensional visible-frequency polarization-independent carpet invisibility cloak

    International Nuclear Information System (INIS)

    Ergin, Tolga; Fischer, Joachim; Wegener, Martin

    2012-01-01

    The invention of the three-dimensional woodpile photonic crystal by Costas M. Soukoulis and coworkers in 1994 has stimulated much further research - excellent research stimulates further research. Here, we report on using spatially inhomogeneous polymer woodpile structures in the long-wavelength limit as artificial graded-index structures. After briefly reviewing previous work on carpet invisibility cloaks designed by transformation optics, we present new experiments for various focus planes of the inspecting microscope as well as for different inspection angles in three-dimensional space. Numerical ray-tracing modeling is also provided. These data confirm our previous assessment that three-dimensional cloaking is quite robust for these structures.

  14. Rupture on the Brazilian documentary photography: Claudia Andujar and the poetry of the (invisible

    Directory of Open Access Journals (Sweden)

    Rafael Castanheira Pedroso de Moraes

    2014-07-01

    Full Text Available This article aims to analyse Claudia Andujar’s photographies from her books Yanomami and The vulnerability of being not only to reflect about their conceptual characteristics that mix social engagement and personal expression, but also to identify the photographer’s technical and aesthetic choices to document the invisible phenomenons of the Yanomami’s culture. Using innovatives strategies of representation, Andujar reached inedited results from the political and aesthetic points of view, which marked a break with the Brazilian documentary photography history.

  15. Energy and Environmental Policy Trends: The Invisible Cost of Pipeline Constraints

    Directory of Open Access Journals (Sweden)

    G. Kent Fellows

    2018-03-01

    Full Text Available THE INVISIBLE COST OF PIPELINE CONSTRAINTS Over much of the last decade pipeline constraints and the resulting apportionment of pipeline capacity have meant reduced returns on Alberta’s Oil Exports. There is a natural price discount between the US benchmark West Texas Intermediate (WTI Crude oil price and the Canadian benchmark Western Canada Select (WCS price. This differential reflects the lower quality of WCS relative to WTI and the costs associated with pipeline tolls to transport this oil from Alberta to US refining hubs. However, at present western Canada is experiencing significant pipeline capacity constraints which have dramatically increased this discount relative to historical levels.

  16. Can Film Show the Invisible? The Work of Montage in Ethnographic Filmmaking

    DEFF Research Database (Denmark)

    Suhr, Christian; Willerslev, Rane

    2012-01-01

    This article suggests that film can evoke hidden dimensions of ethnographic reality, not by striving for ever more realistic depictions – a position often associated with observational cinema – but rather by exploiting the artificial means through which human vision can be transcended. Achieved...... particularly through the use of montage, such disruptions can multiply the perspectives from which filmic subject matter is perceived, thus conveying its invisible and irreducible otherness. This, however, is an argument not for dismissing the realism of much ethnographic filmmaking, but rather to demonstrate...

  17. The Evolution of Policy Enactment on Gender-Based Violence in Schools

    Science.gov (United States)

    Parkes, Jenny

    2016-01-01

    This article examines how policies and strategies to address school-related gender-based violence have evolved since 2000, when gender-based violence within education was largely invisible. Through an exploration of policy enactment in three countries--Liberia, South Africa, and Brazil--it traces remarkable progress in policy, programmes, and…

  18. Design and analysis of the trapeziform and flat acoustic cloaks with controllable invisibility performance in a quasi-space

    Directory of Open Access Journals (Sweden)

    Jian Zhu

    2015-07-01

    Full Text Available We present the design, implementation and detailed performance analysis for a class of trapeziform and flat acoustic cloaks. An effective large invisible area is obtained compared with the traditional carpet cloak. The cloaks are realized with homogeneous metamaterials which are made of periodic arrangements of subwavelength unit cells composed of steel embedded in air. The microstructures and its effective parameters of the cloaks are determined quickly and precisely in a broadband frequency range by using the effective medium theory and the proposed parameters optimization method. The invisibility capability of the cloaks can be controlled by the variation of the key design parameters and scale factor which are proved to have more influence on the performance in the near field than that in the far field. Different designs are suitable for different application situations. Good cloaking performance demonstrates that such a device can be physically realized with natural materials which will greatly promote the real applications of invisibility cloak.

  19. Invisible watermarking optical camera communication and compatibility issues of IEEE 802.15.7r1 specification

    Science.gov (United States)

    Le, Nam-Tuan

    2017-05-01

    Copyright protection and information security are two most considered issues of digital data following the development of internet and computer network. As an important solution for protection, watermarking technology has become one of the challenged roles in industry and academic research. The watermarking technology can be classified by two categories: visible watermarking and invisible watermarking. With invisible technique, there is an advantage on user interaction because of the visibility. By applying watermarking for communication, it will be a challenge and a new direction for communication technology. In this paper we will propose one new research on communication technology using optical camera communications (OCC) based invisible watermarking. Beside the analysis on performance of proposed system, we also suggest the frame structure of PHY and MAC layer for IEEE 802.15.7r1 specification which is a revision of visible light communication (VLC) standardization.

  20. Deflecting the trajectory and changing the narrative: how self-affirmation affects academic performance and motivation under identity threat.

    Science.gov (United States)

    Sherman, David K; Hartson, Kimberly A; Binning, Kevin R; Purdie-Vaughns, Valerie; Garcia, Julio; Taborsky-Barba, Suzanne; Tomassetti, Sarah; Nussbaum, A David; Cohen, Geoffrey L

    2013-04-01

    To the extent that stereotype and identity threat undermine academic performance, social psychological interventions that lessen threat could buffer threatened students and improve performance. Two studies, each featuring a longitudinal field experiment in a mixed-ethnicity middle school, examined whether a values affirmation writing exercise could attenuate the achievement gap between Latino American and European American students. In Study 1, students completed multiple self-affirmation (or control) activities as part of their regular class assignments. Latino American students, the identity threatened group, earned higher grades in the affirmation than control condition, whereas White students were unaffected. The effects persisted 3 years and, for many students, continued into high school by lifting their performance trajectory. Study 2 featured daily diaries to examine how the affirmation affected psychology under identity threat, with the expectation that it would shape students' narratives of their ongoing academic experience. By conferring a big-picture focus, affirmation was expected to broaden construals, prevent daily adversity from being experienced as identity threat, and insulate academic motivation from identity threat. Indeed, affirmed Latino American students not only earned higher grades than nonaffirmed Latino American students but also construed events at a more abstract than concrete level and were less likely to have their daily feelings of academic fit and motivation undermined by identity threat. Discussion centers on how social-psychological processes propagate themselves over time and how timely interventions targeting these processes can promote well-being and achievement.