WorldWideScience

Sample records for schools invisible threats

  1. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  2. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  3. Making the Invisible Visible: Negotiating (In)Visibility and Transparency for LGBT Issues in Education

    Science.gov (United States)

    Reilly, Cole

    2007-01-01

    Historically, schooling has been a point of contention and restless agitation for many lesbian, gay, bisexual, and transgender (LGBT) individuals in North America who may feel trapped in prisons of invisibility. Traditionally, queer people's existence in educational settings has been denied or made invisible, not just physically (in school…

  4. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  5. Making Invisible Histories Visible

    Science.gov (United States)

    Hanssen, Ana Maria

    2012-01-01

    This article features Omaha Public Schools' "Making Invisible Histories Visible" program, or MIHV. Omaha's schools have a low failure rate among 8th graders but a high one among high school freshmen. MIHV was created to help at-risk students "adjust to the increased demands of high school." By working alongside teachers and…

  6. Threats of school violence in Pennsylvania after media coverage of the Columbine High School massacre: examining the role of imitation.

    Science.gov (United States)

    Kostinsky, S; Bixler, E O; Kettl, P A

    2001-09-01

    Following the April 20, 1999, massacre at Columbine High School, Littleton, Colo, school administrators, law enforcement officials, and the media reported a rash of successive bomb threats and threats of school violence that were attributed to imitation. To establish that the clustering of threats of school violence following the Columbine massacre was initiated by imitation. A database of threats of school violence reported to the Pennsylvania Emergency Management Agency, Harrisburg, during the 50 days following the Columbine incident was examined to determine the daily frequency of threats. To determine factors that predict the occurrence of these threats, counties and school districts in which threats occurred were noted. Pennsylvania school districts reported 354 threats of school violence during the 50 days after the Columbine massacre, far exceeding the 1 or 2 threats per year estimated by school administrators before 1999. The frequency of these threats over time demonstrated a crescendo-decrescendo pattern. Fifty-six percent of the threats were made on or before day 10 after the incident, and more than one third occurred on days 8, 9, and 10. Factors that predicted the likelihood of a school's receiving a threat after the massacre included a greater proportion of white students and larger school enrollment. Successive threats of violence follow a publicized act of school violence. The media should recognize that imitation threats can occur and craft their stories accordingly.

  7. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  8. Home(lessness) in Urbanizing China: Invisible Violence and Left-Behind Children in Martial Arts Schools

    Science.gov (United States)

    Dong, Xuan

    2017-01-01

    This article examines how martial arts students retell their stories about being left behind and how they have experienced, viewed, and struggled with the invisible violence. Popularly known as the "hometown of Chinese martial arts," Dengfeng is home to 48 registered martial arts schools and more than 70,000 full-time students. Drawing…

  9. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  10. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  11. Threats of Violence in Schools: The Dallas Independent School District's Response.

    Science.gov (United States)

    Ryan-Arrendondo, Kim; Renouf, Kristin; Egyed, Carla; Doxey, Meredith; Dobbins, Maria; Sanchez, Serafin; Rakowitz, Bert

    2001-01-01

    Discusses the Dallas Public Schools' procedures for assessing the potential for violence among children who express intent to harm others. The Dallas Violence Risk Assessment (DVRA) was developed to evaluate students who have made threats of violence, and to assist school staff in determining appropriate intervention strategies. Describes the…

  12. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-12-01

    Full Text Available Abstract Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic.

  13. Adolescents expressing school massacre threats online: something to be extremely worried about?

    Science.gov (United States)

    2012-01-01

    Background Peer groups identified through the Internet have played an important role in facilitating school shootings. The aim of the present study was to determine whether the adolescents who had expressed a school massacre threat online differed from those who had expressed one offline. Methods A nationwide explorative study was conducted on a group of 77 13- to 18-year-old adolescents sent for adolescent psychiatric evaluation between November 2007 and June 2009 by their general practitioners because they had threatened to carry out a school massacre. According to the referrals and medical files, 17 adolescents expressed the threat online and 60 did so offline. Results The adolescents who expressed their threats online were more likely to be bullied and depressed, had more often pronounced the threat with clear intention and had more often made preparations to carry out the act. In contrast, the adolescents who expressed their threats offline were more likely to have problems with impulse control and had showed delinquent behavior prior to the massacre threats. Conclusions The Finnish adolescents who expressed their massacre threats online could be considered a riskier group than the group who expressed the threats offline. Further studies with larger sample sizes are needed to elucidate this important topic. PMID:23241433

  14. Making Invisible Forces Visible

    DEFF Research Database (Denmark)

    Ratner, Helene Gad

    2013-01-01

    This paper investigates managerial tactics of visualisation when a need to know and manage employees' values and attitudes is expressed. Using the Danish public school as a case study, we explore how school managers use teachers' emotions to render visible presumably invisible information about...... their 'true' attitudes and values. The paper draws on theories of affect as well as actor-network theory to analyse three incidents where managers turn their interpretations of teachers' emotions into such information. These incidents suggest that the efforts to render employees' attitudes and values visible...

  15. Invisibility Studies

    DEFF Research Database (Denmark)

    Invisibility Studies explores current changes in the relationship between what we consider visible and what invisible in different areas of contemporary culture. Contributions trace how these changes make their marks on various cultural fields and investigate the cultural significance of these de......Invisibility Studies explores current changes in the relationship between what we consider visible and what invisible in different areas of contemporary culture. Contributions trace how these changes make their marks on various cultural fields and investigate the cultural significance...... conditioned by physical and social settings that create certain possibilities for visibility and visuality, yet exclude others. The richness and complexity of this cultural framework means that no single discipline or interdisciplinary approach could capture it single-handedly. Invisibility Studies begins...

  16. Invisibility & Interpretation

    Directory of Open Access Journals (Sweden)

    Michael eHerzog

    2014-09-01

    Full Text Available Invisibility is often thought to occur because of the low-level limitations of the visual system. For example, it is often assumed that backward masking renders a target invisible because the visual system is simply too slow to resolve the target and the mask separately. Here, we propose an alternative explanation in which invisibility is a goal rather than a limitation and occurs naturally when making sense out of the plethora of incoming information. For example, we present evidence that (invisibility of an element can strongly depend on how it groups with other elements. Changing grouping changes visibility. In addition, we will show that features often just appear to be invisible but are in fact visible in a way the experimenter is not aware of.

  17. Students as Threats: Schooling inside a Youth Prison

    Science.gov (United States)

    Vélez Young-Alfaro, Morghan

    2017-01-01

    This ethnography explores incarcerated students' experiences and dynamics of identity formation inside a youth prison school. Across two years, 100 students and 50 adults were engaged. The structure, discourse, and adult-student interactions revealed a fixation on framing students as threats with a racialized undertone while also exposing the…

  18. Invisibility and interpretation.

    Science.gov (United States)

    Herzog, Michael H; Hermens, Frouke; Oğmen, Haluk

    2014-01-01

    Invisibility is often thought to occur because of the low-level limitations of the visual system. For example, it is often assumed that backward masking renders a target invisible because the visual system is simply too slow to resolve the target and the mask separately. Here, we propose an alternative explanation in which invisibility is a goal rather than a limitation and occurs naturally when making sense out of the plethora of incoming information. For example, we present evidence that (in)visibility of an element can strongly depend on how it groups with other elements. Changing grouping changes visibility. In addition, we will show that features often just appear to be invisible but are in fact visible in a way the experimenter is not aware of.

  19. The Efficacy of Choice Threats within School Accountability Systems: Results from Legislatively Induced Experiments. PEPG 05-01

    Science.gov (United States)

    West, Martin R.; Peterson, Paul E.

    2005-01-01

    Stigma and school voucher threats under a revised 2002 Florida accountability law have positive impacts on student performance. Stigma and public school choice threats under the U.S. federal accountability law, No Child Left Behind, do not have similar effects in Florida. Significant impacts of stigma, when combined with the voucher threat, are…

  20. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  1. Visible Voices: Literacy Identity and the Invisible Homeless

    Science.gov (United States)

    Juchniewicz, Melissa M.

    2012-01-01

    Despite calls for increased awareness of and sensitivity to diverse students and their in- and out-of-school literacies, the "invisible homeless"--those who often decline to self-identify--receive inadequate scholarly attention. They are often individuals who fear the stigma associated with homelessness as they navigate workplace, academic, and…

  2. Invisible Engineers

    Science.gov (United States)

    Ohashi, Hideo

    Questionnaire to ask “mention three names of scientists you know” and “three names of engineers you know” was conducted and the answers from 140 adults were analyzed. The results indicated that the image of scientists is represented by Nobel laureates and that of engineers by great inventors like Thomas Edison and industry founders like Soichiro Honda. In order to reveal the image of engineers among young generation, questionnaire was conducted for pupils in middle and high schools. Answers from 1,230 pupils were analyzed and 226 names mentioned as engineers were classified. White votes reached 60%. Engineers who are neither big inventors nor company founders collected less than 1% of named votes. Engineers are astonishingly invisible from young generation. Countermeasures are proposed.

  3. Confronting Invisibility: Early Childhood Pre-Service Teachers' Beliefs toward Homeless Children

    Science.gov (United States)

    Kim, Jinhee

    2013-01-01

    Children make up half of the homeless population in the US, and of those, almost 50 percent are under age six. Homeless children face many different challenges in school. These children and their families have been invisible in school due to the indifference and stereotypes about them. This article focuses on early childhood pre-service teachers'…

  4. Invisible Display in Aluminum

    DEFF Research Database (Denmark)

    Prichystal, Jan Phuklin; Hansen, Hans Nørgaard; Bladt, Henrik Henriksen

    2005-01-01

    Bang & Olufsen a/s has been working with ideas for invisible integration of displays in metal surfaces. Invisible integration of information displays traditionally has been possible by placing displays behind transparent or semitransparent materials such as plastic or glass. The wish for an integ......Bang & Olufsen a/s has been working with ideas for invisible integration of displays in metal surfaces. Invisible integration of information displays traditionally has been possible by placing displays behind transparent or semitransparent materials such as plastic or glass. The wish...... for an integrated display in a metal surface is often ruled by design and functionality of a product. The integration of displays in metal surfaces requires metal removal in order to clear the area of the display to some extent. The idea behind an invisible display in Aluminum concerns the processing of a metal...

  5. In/visible Punctuation

    Science.gov (United States)

    Lennard, John

    2011-01-01

    This article offers two approaches to the question of "invisible punctuation," theoretical and critical. The first is a taxonomy of modes of punctuational invisibility, identifying "denial, repression, habituation, error" and "absence." Each is briefly discussed and some relations with technologies of reading are considered. The second considers…

  6. Performing Belonging, celebrating invisibility?

    DEFF Research Database (Denmark)

    Juul, Kristine

    2014-01-01

    Serbian migrants living transnational lives consciously or unconsciously move between visibility and invisibility in their performance of migrant success stories. A case in point are public festivals, performed to make visible migrants’ successful inclusion in Danish society, i.e. celebrating...... invisibility. Meanwhile, other celebrations are consciously relegated to the invisible confines of the Serbian homeland. This article analyses celebrations in Denmark and in Serbia and shows how visible displays of ethnicity and difference tend to turn into easily palatable heritage versions of Serbian culture...... when performed in a Danish context. In turn, the visibility acquired through celebrations of migrants’ belonging in their homeland is inclined to render invisible those who did not take part in the migration experience....

  7. Minority Adolescents in Ethnically Diverse Schools: Perceptions of Equal Treatment Buffer Threat Effects

    Science.gov (United States)

    Baysu, Gülseli; Celeste, Laura; Brown, Rupert; Verschueren, Karine; Phalet, Karen

    2016-01-01

    Can perceptions of equal treatment buffer the negative effects of threat on the school success of minority students? Focusing on minority adolescents from Turkish and Moroccan heritage in Belgium (M[subscript age] = 14.5; N = 735 in 47 ethnically diverse schools), multilevel mediated moderation analyses showed: (a) perceived discrimination at…

  8. Making the Invisible Visible: A Methodological and a Substantive Issue

    Science.gov (United States)

    Dagley, Valerie

    2004-01-01

    This article discusses the issue of "making the invisible visible" from a methodological and a substantive viewpoint. The ideas emerged from a doctoral research study into individual target setting with middle ability students in an English secondary school. The students involved had been identified by assessments as "average"…

  9. L’ICÔNE : L’IMAGE ET L’INVISIBLE (Icon: The Image and the Invisible

    Directory of Open Access Journals (Sweden)

    Veronica Cibotaru

    2015-06-01

    Full Text Available An icon is part of the visible world, moreover, of things that are visible in a second degree. It is not only a sensitive thing, but a sensitive image of a sensitive entity. As an eikon, it is located in a platonic sense among the lowest degree of the doxa, and within the lowest degree of the scale of being. However it is not a simple sensitive and illusory representation of God, such as one criticized from a Kantian point of view. The profound sense of an icon lies in its opening towards the invisible. An icon tries to capture the invisible. How is this meeting point of the visible and the invisible entangled? Can an icon really allow us to “see” the invisible or is it only a profanation of the invisible? It is my aim to analyze those questions in the following article.

  10. Threat Perception Bias and Anxiety among Chinese School Children and Adolescents

    Science.gov (United States)

    Lu, Weili; Daleiden, Eric; Lu, Shou-En

    2007-01-01

    This study evaluated the relationship between threat perception bias and anxiety among children and adolescents in China. A sample of 1,004 elementary, middle and high school students aged 9 to 19 years listened to stories containing themes of generalized anxiety, social anxiety and separation anxiety in either an ambiguous or non-ambiguous…

  11. LE PÈRE INVISIBLE ET SILENCIEUX CHEZ GISÈLE FOURNIER (The Invisible and Silent Father by Gisèle Fournier

    Directory of Open Access Journals (Sweden)

    Julie Crohas Commans

    2015-06-01

    Full Text Available The game of visible and invisible led by the paternal character in the novel Non-dits (2000 of Gisèle Fournier betrays the threat which presses on the story of a family torn by the secrets of the past. The father keeps out of the oppressive closed world he is sentenced to, using silence. Far from losing him, this attitude allows him to be marked out. And actually in the slow succession of the novel’s monologues, his image and his presence persist even after his suicide. The look of both character and reader is thus headed towards this paternal figure. Once narrativized, this vision allows us to question the contemporary illness which affects the transmission.

  12. Exploring the academic invisible web

    OpenAIRE

    Lewandowski, Dirk; Mayr, Philipp

    2006-01-01

    Purpose: To provide a critical review of Bergman’s 2001 study on the Deep Web. In addition, we bring a new concept into the discussion, the Academic Invisible Web (AIW). We define the Academic Invisible Web as consisting of all databases and collections relevant to academia but not searchable by the general-purpose internet search engines. Indexing this part of the Invisible Web is central to scientific search engines. We provide an overview of approaches followed thus far. Design/methodol...

  13. Exploring the academic invisible web

    OpenAIRE

    Lewandowski, Dirk

    2006-01-01

    The Invisible Web is often discussed in the academic context, where its contents (mainly in the form of databases) are of great importance. But this discussion is mainly based on some seminal research done by Sherman and Price (2001) and Bergman (2001), respectively. We focus on the types of Invisible Web content relevant for academics and the improvements made by search engines to deal with these content types. In addition, we question the volume of the Invisible Web as stated by Bergman. Ou...

  14. Stereotype Threat Effects on African American Children in an Urban Elementary School

    Science.gov (United States)

    Wasserberg, Martin J.

    2014-01-01

    This study investigated whether a diagnostic testing condition leads to stereotype threat effects for African American children (n = 198) at an urban elementary school. Results indicated that presenting a reading test as diagnostic of abilities hindered the performance of African American children aware of racial stereotypes but not of those…

  15. In seach of the invisible (audiences)

    DEFF Research Database (Denmark)

    Hartley, Jannie Møller

    The paper shows need to distinguish between: ignored audiences (invisible in the literature, in our case very young children and ) and post-communist audiences Literally or actual invisible (online lurking and unintended) audiences the unintended or lurking audiences are invisible in a two-fold way...... : both as cases of study, but also as actual audiences. a lack of historical contextualization in the studies...

  16. Signatures de l'invisible

    CERN Multimedia

    CERN Press Office. Geneva

    2000-01-01

    "Signatures of the Invisible" is an unique collaboration between contemporary artists and contemporary physicists which has the potential to help redefine the relationship between science and art. "Signatures of the Invisible" is jointly organised by the London Institute - the world's largest college of art and design and CERN*, the world's leading particle physics laboratory. 12 leading visual artists:

  17. Invisible magnetic sensors

    Science.gov (United States)

    Mach-Batlle, Rosa; Navau, Carles; Sanchez, Alvaro

    2018-04-01

    Sensing magnetic fields is essential in many applications in biomedicine, transportation, or smart cities. The distortion magnetic sensors create in response to the field they are detecting may hinder their use, for example, in applications requiring dense packaging of sensors or accurately shaped field distributions. For sensing electromagnetic waves, cloaking shells that reduce the scattering of sensors have been introduced. However, the problem of making a magnetic sensor undetectable remains unsolved. Here, we present a general strategy on how to make a sensor magnetically invisible while keeping its ability to sense. The sensor is rendered undetectable by surrounding it with a spherical shell having a tailored magnetic permeability. Our method can be applied to arbitrary shaped magnetic sensors in arbitrary magnetic fields. The invisibility can be made exact when the sensor is spherical and the probed field is uniform. A metasurface composed of superconducting pieces is presented as a practical realization of the ideal invisibility shell.

  18. Transformation optics and invisibility cloaks

    DEFF Research Database (Denmark)

    Qiu, Min; Yan, Min; Yan, Wei

    2008-01-01

    In this paper, we briefly summarize the theory of transformation optics and introduce its application in achieving perfect invisibility cloaking. In particular, we theoretically show how the task of realizing cylindrical invisibility cloaks can be eased by using either structural approximation...

  19. Design, implementation, and extension of thermal invisibility cloaks

    Science.gov (United States)

    Zhang, Youming; Xu, Hongyi; Zhang, Baile

    2015-05-01

    A thermal invisibility cloak, as inspired by optical invisibility cloaks, is a device which can steer the conductive heat flux around an isolated object without changing the ambient temperature distribution so that the object can be "invisible" to external thermal environment. While designs of thermal invisibility cloaks inherit previous theories from optical cloaks, the uniqueness of heat diffusion leads to more achievable implementations. Thermal invisibility cloaks, as well as the variations including thermal concentrator, rotator, and illusion devices, have potentials to be applied in thermal management, sensing and imaging applications. Here, we review the current knowledge of thermal invisibility cloaks in terms of their design and implementation in cloaking studies, and their extension as other functional devices.

  20. Social Class (In)Visibility and the Professional Experiences of Middle-Class Novice Teachers

    Science.gov (United States)

    Hall, David; Jones, Lisa

    2013-01-01

    This article focuses upon the classed and early professional experiences of middle-class novice teachers in England experiencing and contemplating working in schools serving socio-economically disadvantaged communities. Through an examination of the visibility and invisibility of social class in education set within an increasingly unequal and…

  1. Retrospectives: Ethics and the Invisible Hand

    OpenAIRE

    Jerry Evensky

    1993-01-01

    As modern economists, we use Adam Smith's "invisible hand" metaphor confident that we all know what it means in our discourse: it reflects our admiration for the elegant and smooth functioning of the market system as a coordinator of autonomous individual choices in an interdependent world. But in Adam Smith's moral philosophy, the invisible hand has a much broader responsibility: if individuals are to enjoy the fruits of a classical liberal society, the invisible hand must not only coordinat...

  2. Cloaks with multiple invisible regions

    International Nuclear Information System (INIS)

    Luo, Yang; Zhu, Shouzheng; He, Lianxing; Wang, Yu

    2011-01-01

    This paper proposes a general method of extending the effective invisible regions for both the shell-like interior cloak and the complementary media exterior cloak, without affecting their original cloaking regions. The proposed method is based on layered spatial mapping instead of the intact mapping. Certain interior or exterior invisible regions can be obtained by properly using a compressed or folded transformation in each space layer. Therefore, the proposal enables the as-designed cloaks to provide multiple invisible regions of different types simultaneously. Thus objects can be hidden in the interior cavity and/or in the exterior space, or even be embedded between the cloaking shells

  3. Invisible Colleges: A Literature Review

    Directory of Open Access Journals (Sweden)

    Rassoul Zavaraqi

    2010-09-01

    Full Text Available Generation and consumption of information are among the functions unique to higher education. Scholarly communication plays an essential role in this process to such a degree that some consider it as being the cornerstone of science. Thus it could be said that no education could be realized without communication. Scientometrists analyze and assess formal scientific communications by studying the level of citation of such scientific outputs as books, journals and etc. Nevertheless, there is a special type of communication that lacks any external manifestation such as citations. Informal learning and education are indebted to such communication. This kind of informal communication for generating knowledge leads to an informal association among the scholars, which is called as "The invisible college". There are various definitions and interpretations concerning an invisible college. According to Price’s opinion, an invisible college is comprised of over a hundred colleagues that are engaged in communication with one another. He believed that members in such an association are reasonably in touch with and could consult and influence one another. The present paper, by reacquainting with the concept of invisible college, would review the role of informal links in the production of knowledge and higher education system, various assessment methods and critical notes, as well as the impact of modern ICT tools on the concept of invisible college.

  4. The Invisible Boy

    DEFF Research Database (Denmark)

    Perry, Kevin Anthony; Jensen, Iben

    , the participants agreed that all students in their class are part of the community. Following the participants, a good class community is when ‘you do lots of things together’. However, as the interview progressed (after eight minutes), it became apparent that at least one student was isolated and stood outside...... the participant’s definition of ‘good community’. It seemed almost as if they had forgotten a particular student in the class, until a question refreshed their collective memory. Participants suddenly became aware that there is at least one student in their class who does not participate in any joint activities......, either in or outside school. The question about how a group of students can collectively forget that one student is isolated in the class must be raised. The aim of this thinking note is to explore the mechanisms around social stigma and attempt to shed more light on the issue surrounding the ‘invisible...

  5. A newly identified group of adolescents at "invisible" risk for psychopathology and suicidal behavior: findings from the SEYLE study.

    Science.gov (United States)

    Carli, Vladimir; Hoven, Christina W; Wasserman, Camilla; Chiesa, Flaminia; Guffanti, Guia; Sarchiapone, Marco; Apter, Alan; Balazs, Judit; Brunner, Romuald; Corcoran, Paul; Cosman, Doina; Haring, Christian; Iosue, Miriam; Kaess, Michael; Kahn, Jean Pierre; Keeley, Helen; Postuvan, Vita; Saiz, Pilar; Varnik, Airi; Wasserman, Danuta

    2014-02-01

    This study explored the prevalence of risk behaviors (excessive alcohol use, illegal drug use, heavy smoking, reduced sleep, overweight, underweight, sedentary behavior, high use of Internet/TV/videogames for reasons not related to school or work, and truancy), and their association with psychopathology and self-destructive behaviors, in a sample of 12,395 adolescents recruited in randomly selected schools across 11 European countries. Latent class analysis identified three groups of adolescents: a low-risk group (57.8%) including pupils with low or very low frequency of risk behaviors; a high-risk group (13.2%) including pupils who scored high on all risk behaviors, and a third group ("invisible" risk, 29%) including pupils who were positive for high use of Internet/TV/videogames for reasons not related to school or work, sedentary behavior and reduced sleep. Pupils in the "invisible" risk group, compared with the high-risk group, had a similar prevalence of suicidal thoughts (42.2% vs. 44%), anxiety (8% vs. 9.2%), subthreshold depression (33.2% vs. 34%) and depression (13.4% vs. 14.7%). The prevalence of suicide attempts was 5.9% in the "invisible" group, 10.1% in the high-risk group and 1.7% in the low-risk group. The prevalence of all risk behaviors increased with age and most of them were significantly more frequent among boys. Girls were significantly more likely to experience internalizing (emotional) psychiatric symptoms. The "invisible" group may represent an important new intervention target group for potentially reducing psychopathology and other untoward outcomes in adolescence, including suicidal behavior. Copyright © 2014 World Psychiatric Association.

  6. From Nonradiating Sources to Directionally Invisible Objects

    Science.gov (United States)

    Hurwitz, Elisa

    The goal of this dissertation is to extend the understanding of invisible objects, in particular nonradiating sources and directional nonscattering scatterers. First, variations of null-field nonradiating sources are derived from Maxwell's equations. Next, it is shown how to design a nonscattering scatterer by applying the boundary conditions for nonradiating sources to the scalar wave equation, referred to here as the "field cloak method". This technique is used to demonstrate directionally invisible scatterers for an incident field with one direction of incidence, and the influence of symmetry on the directionality is explored. This technique, when applied to the scalar wave equation, is extended to show that a directionally invisible object may be invisible for multiple directions of incidence simultaneously. This opens the door to the creation of optically switchable, directionally invisible objects which could be implemented in couplers and other novel optical devices. Next, a version of the "field cloak method" is extended to the Maxwell's electro-magnetic vector equations, allowing more flexibility in the variety of directionally invisible objects that can be designed. This thesis concludes with examples of such objects and future applications.

  7. Stricter School Soda Limits Offered: Facing Lawsuit Threat, Beverage Industry Vows to Curb High-Calorie Drinks

    Science.gov (United States)

    Samuels, Christina A.

    2006-01-01

    The soft-drink industry vowed to voluntarily curb selling sugary sodas and other high-calorie beverages in schools, a move that was taken under threat of litigation by critics who see the industry as a prime culprit in a national obesity crisis. The promise offered no guarantee that schools would go along with the restrictions, though many…

  8. Invisible Higgs decays from Higgs-graviscalar mixing

    International Nuclear Information System (INIS)

    Dominici, Daniele; Gunion, John F.

    2009-01-01

    We recompute the invisible Higgs decay width arising from Higgs-graviscalar mixing in the Arkani-Hamed, Dimopoulos, Dvali model, comparing the original derivation in the nondiagonal mass basis to that in a diagonal mass basis. The results obtained are identical (and differ by a factor of 2 from the original calculation) but the diagonal-basis derivation is pedagogically useful for clarifying the physics of the invisible width from mixing. We emphasize that both derivations make it clear that a direct scan in energy for a process such as WW→WW mediated by Higgs plus graviscalar intermediate resonances would follow a single Breit-Wigner form with total width given by Γ tot =Γ h SM +Γ invisible . We also compute the additional contributions to the invisible width due to direct Higgs to graviscalar-pair decays. We find that the invisible width due to the latter is relatively small, unless the Higgs mass is comparable to or larger than the effective extra-dimensional Planck mass.

  9. Broadband invisibility by non-Euclidean cloaking.

    Science.gov (United States)

    Leonhardt, Ulf; Tyc, Tomás

    2009-01-02

    Invisibility and negative refraction are both applications of transformation optics where the material of a device performs a coordinate transformation for electromagnetic fields. The device creates the illusion that light propagates through empty flat space, whereas in physical space, light is bent around a hidden interior or seems to run backward in space or time. All of the previous proposals for invisibility require materials with extreme properties. Here we show that transformation optics of a curved, non-Euclidean space (such as the surface of a virtual sphere) relax these requirements and can lead to invisibility in a broad band of the spectrum.

  10. Invisible the dangerous allure of the unseen

    CERN Document Server

    Ball, Philip

    2015-01-01

    If you could be invisible, what would you do? The chances are that it would have something to do with power, wealth or sex. Perhaps all three. But there's no need to feel guilty. Impulses like these have always been at the heart of our fascination with invisibility: it points to realms beyond our senses, serves as a receptacle for fears and dreams, and hints at worlds where other rules apply. Invisibility is a mighty power and a terrible curse, a sexual promise, a spiritual condition. This is a history of humanity's turbulent relationship with the invisible. It takes on the myths and morals of Plato, the occult obsessions of the Middle Ages, the trickeries and illusions of stage magic, the auras and ethers of Victorian physics, military strategies to camouflage armies and ships and the discovery of invisibly small worlds. From the medieval to the cutting-edge, fairy tales to telecommunications, from beliefs about the supernatural to the discovery of dark energy, Philip Ball reveals the universe of the invi...

  11. Freedom, invisibility, and community: a qualitative study of self-identification with asexuality.

    Science.gov (United States)

    MacNeela, Pádraig; Murphy, Aisling

    2015-04-01

    A significant body of research is now emerging on the subjective meaning of asexuality. This study explored how self-identification as asexual is managed, both as a threat to the self-concept and a source of personal meaning. A total of 66 self-identified asexuals were recruited from an asexuality internet community and responded to open-ended questions on an online survey. Of these, 31 participants identified as female, 15 as male, 18 gave a different label such as genderqueer or androgynous, and two did not provide information on gender. A thematic analysis of the transcripts resulted in three themes. Socially, asexuality attracted denial and resistance due to incompatibility with heteronormative societal expectations. Despite the threat to self-integrity arising from asexuality being socially rejected, it was typically assimilated as a valued and meaningful orientation on an intra-personal level, aided by information and support from the online community. A second level of threat to self arose whereby other self-identifications, especially gender, had to be reconciled with a non-sexual persona. The accommodation made to other elements of the self was reflected in complex sub-identities. The findings were interpreted using identity process theory to understand how threats arising from self-identifying as asexual are managed. Although asexuality emerges as an orientation to sexuality that can be reconciled with the self, its invisibility or outright rejection in society constitute an on-going challenge.

  12. Geometry and light the science of invisibility

    CERN Document Server

    Leonhardt, Ulf

    2010-01-01

    The science of invisibility combines two of physics' greatest concepts: Einstein's general relativity and Maxwell's principles of electromagnetism. Recent years have witnessed major breakthroughs in the area, and the authors of this volume - Ulf Leonhardt and Thomas Philbin of Scotland's University of St. Andrews - have been active in the transformation of invisibility from fiction into science. Their work on designing invisibility devices is based on modern metamaterials, inspired by Fermat's principle, analogies between mechanics and optics, and the geometry of curved space. Suitable for gra

  13. Cuidados invisibles: ¿son suficientemente reconocidos?

    Directory of Open Access Journals (Sweden)

    Rosanna de la Rosa Eduardo

    Full Text Available Los cuidados invisibles son un elemento central y fundamental de la práctica de la Enfermería y son la base de su identidad profesional. La Enfermería ha sufrido un importante y positivo proceso de profesionalización en los últimos 150 años, sin embargo, los cuidados invisibles siguen siendo poco reconocidos, a pesar de su importancia en la recuperación y en la calidad de vida de los usuarios. En este trabajo se analizan brevemente las grandes transformaciones sociales actuales que obligan a replantearse la necesidad de visibilizar los cuidados invisibles, se plantean interrogantes clave para abordar esta discusión y se proponen una serie de acciones concretas para avanzar en este reconocimiento.

  14. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  15. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  16. Invisible Support: Effects on the Provider's Positive and Negative Affect.

    Science.gov (United States)

    König, Claudia; Stadler, Gertraud; Knoll, Nina; Ochsner, Sibylle; Hornung, Rainer; Scholz, Urte

    2016-07-01

    Social support that goes unnoticed by receivers (i.e. invisible support) seems to be most beneficial for the receivers' well-being. The providers' well-being, however, has been neglected so far. This study examines how invisible support is related to the providers' well-being and whether this association is dependent on the providers' relationship satisfaction. Overall, 97 non-smoking partners of smokers who were about to quit smoking were examined. Invisible support was assessed dyadically: partners' reports on smoking-specific provided social support together with smokers' reports on received support were assessed at baseline. Partners' relationship satisfaction was also assessed at baseline. Partners' positive and negative affect were measured at baseline and six-week follow-up. No main effects of invisible instrumental or emotional support occurred. However, partners' relationship satisfaction moderated the association between invisible instrumental support and change in partners' negative and positive affect: For partners with lower relationship satisfaction more invisible instrumental support was related to increased negative affect and decreased positive affect, whereas for partners with higher relationship satisfaction the inverse effects occurred. The study's results emphasise that invisible instrumental support might have emotional costs for the providers. Relationship satisfaction seems to serve as a protective factor. © 2016 The International Association of Applied Psychology.

  17. LES DEUX NIVEAUX DE L’INVISIBLE DANS L’OEUVRE DE FRIDA KAHLO (The two levels of invisible in the work of Frida Kahlo

    Directory of Open Access Journals (Sweden)

    Luca Molnár

    2015-06-01

    Full Text Available The aim of this study is to reveal the different levels of representation of invisible feelings in the work of Frida Kahlo. In order to express these feelings, in some paintings, the artist uses visible objects, such as tears – which become the first level of representation of the invisible. In other paintings, however, she uses internal organs of the human body to represent invisible pain or suffering. These organs are hidden from the eye and are therefore invisible. There are two categories within this second level: the first one consists of internal organs traditionally used to represent invisible feelings in the European culture, such as the skull. The second category embraces organs used especially by Frida, like the womb. The study observes how her life had made this physically broken, but mentally strong artist to cut open her own body to show it to the world, representing feelings that only a woman can feel, but nobody can see.

  18. The Invisible Cinema

    NARCIS (Netherlands)

    Hanich, Julian; Fossati, Giovanna; van den Oever, Annie

    The Invisible Cinema was an experimental movie theater designed by an experimental filmmaker. Devised by the Austrian avantgardist Peter Kubelka, it served as the first place of exhibition for the Anthology Film Archives in New York. Apart from the screen (and some exit signs and aisle lights

  19. Invisibility cloaking via non-smooth transformation optics and ray tracing

    International Nuclear Information System (INIS)

    Crosskey, Miles M.; Nixon, Andrew T.; Schick, Leland M.; Kovacic, Gregor

    2011-01-01

    We present examples of theoretically-predicted invisibility cloaks with shapes other than spheres and cylinders, including cones and ellipsoids, as well as shapes spliced from parts of these simpler shapes. In addition, we present an example explicitly displaying the non-uniqueness of invisibility cloaks of the same shape. We depict rays propagating through these example cloaks using ray tracing for geometric optics. - Highlights: → Theoretically-predicted conical and ellipsoidal invisibility cloaks. → Non-smooth cloaks spliced from parts of simpler shapes. → Example displaying non-uniqueness of invisibility cloaks of the same shape. → Rays propagating through example cloaks depicted using geometric optics.

  20. Invisible marker based augmented reality system

    Science.gov (United States)

    Park, Hanhoon; Park, Jong-Il

    2005-07-01

    Augmented reality (AR) has recently gained significant attention. The previous AR techniques usually need a fiducial marker with known geometry or objects of which the structure can be easily estimated such as cube. Placing a marker in the workspace of the user can be intrusive. To overcome this limitation, we present an AR system using invisible markers which are created/drawn with an infrared (IR) fluorescent pen. Two cameras are used: an IR camera and a visible camera, which are positioned in each side of a cold mirror so that their optical centers coincide with each other. We track the invisible markers using IR camera and visualize AR in the view of visible camera. Additional algorithms are employed for the system to have a reliable performance in the cluttered background. Experimental results are given to demonstrate the viability of the proposed system. As an application of the proposed system, the invisible marker can act as a Vision-Based Identity and Geometry (VBIG) tag, which can significantly extend the functionality of RFID. The invisible tag is the same as RFID in that it is not perceivable while more powerful in that the tag information can be presented to the user by direct projection using a mobile projector or by visualizing AR on the screen of mobile PDA.

  1. Digital/Commercial (In)visibility

    DEFF Research Database (Denmark)

    Leander, Anna

    2017-01-01

    an argument demonstrating specifically how digital and commercial logics characterize the aesthetic, circulatory, and infrastructuring practices re-producing the regime of (in)visibility. It shows that digital/commercial logics are at the heart of the combinatorial marketing of multiple, contradictory images......This article explores one aspect of digital politics, the politics of videos and more spe- cifically of DAESH recruitment videos. It proposes a practice theoretical approach to the politics of DAESH recruitment videos focused on the re-production of regimes of (in)visibility. The article develops...... on the internet. The theoretical and political cost of overlooking these digital and commercial characteristics of DAESH visibility practices are high. It perpetuates misconceptions of how the videos work and what their politics are and it reinforces the digital Orientalism/Occidentalism in which...

  2. Stereotype Threat? Male and Female Students in Advanced High School Courses

    Science.gov (United States)

    Corra, Mamadi

    Propositions of stereotype threat theory imply that the social consequences of academic distinction in advanced quantitative areas (such as math and the physical sciences) for women may promote the under representation of female students in advanced quantitative academic courses. The hypothesis that female students will be underrepresented in advanced quantitative (honors and advanced placement math and physical science) courses is tested using academic performance and enrollment data for high school students in a "Student/Parent Informed Choice" (open registration) school district in North Carolina. Results show female students to be overrepresented in both advanced verbal/writing intensive (honors and advanced placement English, foreign language, and social science) and advanced quantitative (honors and advanced placement math and physical science) courses compared to their proportion of the student body. More surprisingly, results also indicate female students (compared to male students) to be overrepresented in advanced courses compared to their proportion of high-performing students. Furthermore, as with patterns observed at the district level, additional analysis of enrollment data for the entire state reveals similar results. Taken together, the findings call into question the prevailing presumption that female students continue to be underrepresented in math and physical science courses. Instead, the changing social context within which females and males experience schooling may provide an explanation for the findings.

  3. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  4. Learning or Lurking?: Tracking the "Invisible" Online Student.

    Science.gov (United States)

    Beaudoin, Michael F.

    2002-01-01

    This case study of inactive, or invisible, students enrolled in an online graduate course identifies how much time is spent in course-related activity, what the reasons are for students' invisibility, and if their preferred learning styles influence online behavior. Preliminary analysis of grades indicate that grades are better for high-visibility…

  5. Invisible and scrutinized bodies

    Directory of Open Access Journals (Sweden)

    Léopold Lambert

    2015-03-01

    Full Text Available The following text will attempt to demonstrate that both processes that aim at making bodies either invisible or, on the contrary, hyper-visible operates through the same mechanisms of a productive politics of visibility.

  6. Thermal invisibility based on scattering cancellation and mantle cloaking

    KAUST Repository

    Farhat, Mohamed; Chen, P.-Y.; Bagci, Hakan; Amra, C.; Guenneau, S.; Alù , A.

    2015-01-01

    We theoretically and numerically analyze thermal invisibility based on the concept of scattering cancellation and mantle cloaking. We show that a small object can be made completely invisible to heat diffusion waves, by tailoring the heat conductivity of the spherical shell enclosing the object. This means that the thermal scattering from the object is suppressed, and the heat flow outside the object and the cloak made of these spherical shells behaves as if the object is not present. Thermal invisibility may open new vistas in hiding hot spots in infrared thermography, military furtivity, and electronics heating reduction.

  7. Thermal invisibility based on scattering cancellation and mantle cloaking

    KAUST Repository

    Farhat, Mohamed

    2015-04-30

    We theoretically and numerically analyze thermal invisibility based on the concept of scattering cancellation and mantle cloaking. We show that a small object can be made completely invisible to heat diffusion waves, by tailoring the heat conductivity of the spherical shell enclosing the object. This means that the thermal scattering from the object is suppressed, and the heat flow outside the object and the cloak made of these spherical shells behaves as if the object is not present. Thermal invisibility may open new vistas in hiding hot spots in infrared thermography, military furtivity, and electronics heating reduction.

  8. The Physics of Invisibility A Story of Light and Deception

    CERN Document Server

    Beech, Martin

    2012-01-01

    Arthur C. Clarke famously wrote that, "any sufficiently advanced technology is indistinguishable from magic." These words most certainly ring true with respect to invisibility cloaking devices. At work is the magic of science, of course. The technology to make an object simply disappear from view is now a reality. There is both great fear and great desire in the thought of invisibility. Indeed, for thousands of years, authors have grappled with the idea. Power, devilry, secrecy, ethical dilemma, and moral corruption - invisibility has it all. And yet, our waking world is full of familiar invisible phenomena. Electricity flowing along a metal wire, the gravity that keeps us grounded, the air we breathe, the bacteria and viruses that make us ill, the X-rays that reveal our broken bones - all are invisible to our eyes. They surround and envelop us, and we don't give them a second thought. Nature long ago learned how to play tricks with light rays, enriching the world with rainbows, mirages, and animal camouflag...

  9. Deaf/LGBTQ Intersectional Invisibility in Schools: The Lived Experiences of Deaf Lesbian Students of Color at a School for the Deaf

    Science.gov (United States)

    Dunne, Courtney M.

    2013-01-01

    Historically, American society has had conflicting views on the nature and nurture of Deaf people and Lesbian, Gay, Bisexual, Transgender, Queer (LGBTQ) people. In the context of majority cultures and societies in history, the reality of Deaf and LGBTQ people's lives has often been summarized in general terms such as invisibility and oppression.…

  10. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  11. Thermal imitators with single directional invisibility

    Science.gov (United States)

    Wang, Ruizhe; Xu, Liujun; Huang, Jiping

    2017-12-01

    Thermal metamaterials have been intensively studied during the past years to achieve the long-standing dream of invisibility, illusion, and other inconceivable thermal phenomena. However, many thermal metamaterials can only exhibit omnidirectional thermal response, which take on the distinct feature of geometrical isotropy. In this work, we theoretically design and experimentally fabricate a pair of thermal imitators by applying geometrical anisotropy provided by elliptical/ellipsoidal particles and layered structures. This pair of thermal imitators possesses thermal invisibility in one direction, while having thermal opacity in other directions. This work may open a gate in designing direction-dependent thermal metamaterials.

  12. Exploring the invisible universe from black holes to superstrings

    CERN Document Server

    Baaquie, Belal E

    2015-01-01

    "Why"? Why is the world, the Universe the way it is? Is space infinitely large? How small is small? What happens when one continues to divide matter into ever smaller pieces? Indeed, what is matter? Is there anything else besides what can be seen? Pursuing the questions employing the leading notions of physics, one soon finds that the tangible and visible world dissolves — rather unexpectedly — into invisible things and domains that are beyond direct perception. A remarkable feature of our Universe is that most of its constituents turn out to be invisible, and this fact is brought out with great force by this book. Exploring the Invisible Universe covers the gamut of topics in advanced modern physics and provides extensive and well substantiated answers to these questions and many more. Discussed in a non-technical, yet also non-trivial manner, are topics dominated by invisible things — such as Black Holes and Superstrings as well as Fields, Gravitation, the Standard Model, Cosmology, Relativity, the O...

  13. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  14. Neglect of teaching in Physical Education classes the invisibility of the disciplinary knowledge

    Directory of Open Access Journals (Sweden)

    Fernando Jaime González

    2013-12-01

    Full Text Available This research aimed to recognize similarities and differences in the configuration of cases of teachers of Physical Education characterized by dereliction of teaching. This study tried to understand how members of the school community, especially managers, see (if they do the teaching practices of two teachers with similar teaching propositions in the classroom, but with a different engagement with the institution.The text was constructed based on two case studies developed in 2010 in public schools in counties of northeastern states of Rio Grande do Sul.Data were collected based on semi-structured interviews and field diaries.The results indicate that the neglect of teaching is perceived by members of the school community only when the teacher rejects any proposition in class and does not respond to other needs of the school, and his action is not acknowledged. The teacher is not guided by the contents of the higher education of the school discipline, and still does not change the school routines and minimally contemplates the tradition. The knowledge addressed (or not in Physical Education classes is invisible to the eyes of school administrators

  15. Illusory ownership of an invisible body reduces autonomic and subjective social anxiety responses

    Science.gov (United States)

    Guterstam, Arvid; Abdulkarim, Zakaryah; Ehrsson, H. Henrik

    2015-01-01

    What is it like to be invisible? This question has long fascinated man and has been the central theme of many classic literary works. Recent advances in materials science suggest that invisibility cloaking of the human body may be possible in the not-so-distant future. However, it remains unknown how invisibility affects body perception and embodied cognition. To address these questions, we developed a perceptual illusion of having an entire invisible body. Through a series of experiments, we characterized the multisensory rules that govern the elicitation of the illusion and show that the experience of having an invisible body reduces the social anxiety response to standing in front of an audience. This study provides an experimental model of what it is like to be invisible and shows that this experience affects bodily self-perception and social cognition. PMID:25906330

  16. Illusory ownership of an invisible body reduces autonomic and subjective social anxiety responses.

    Science.gov (United States)

    Guterstam, Arvid; Abdulkarim, Zakaryah; Ehrsson, H Henrik

    2015-04-23

    What is it like to be invisible? This question has long fascinated man and has been the central theme of many classic literary works. Recent advances in materials science suggest that invisibility cloaking of the human body may be possible in the not-so-distant future. However, it remains unknown how invisibility affects body perception and embodied cognition. To address these questions, we developed a perceptual illusion of having an entire invisible body. Through a series of experiments, we characterized the multisensory rules that govern the elicitation of the illusion and show that the experience of having an invisible body reduces the social anxiety response to standing in front of an audience. This study provides an experimental model of what it is like to be invisible and shows that this experience affects bodily self-perception and social cognition.

  17. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  18. Invisible Web and Academic Research: A Partnership for Quality

    Science.gov (United States)

    Alyami, Huda Y.; Assiri, Eman A.

    2018-01-01

    The present study aims to identify the most significant roles of the invisible web in improving academic research and the main obstacles and challenges facing the use of the invisible web in improving academic research from the perspective of academics in Saudi universities. The descriptive analytical approach was utilized in this study. It…

  19. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  20. Signatures of the Invisible

    CERN Multimedia

    Strom, D

    2003-01-01

    On the Net it is possible to take a look at art from afar via Virtual Museums. One such exhibition was recently in the New York Museum of Modern Art's branch, PS1. Entitled 'Signatures of the Invisible' it was a collaborative effort between artists and physicists (1/2 page).

  1. Invisible realities: Caring for older Moroccan migrants with dementia in Belgium.

    Science.gov (United States)

    Berdai Chaouni, Saloua; De Donder, Liesbeth

    2018-01-01

    The number of older Moroccan migrants reaching the age of high risk for dementia is increasing in Belgium. Yet no study has been performed to explore how Moroccan families facing dementia experience and manage the condition. The study employed a qualitative design using semi-structured interviews with 12 informal and 13 formal caregivers to answer this research question. Findings indicate that the experience of dementia includes several invisible realities that challenge the informal and formal caregivers: (1) the invisibility of dementia as a condition; (2) the invisible subtleties of the informal care execution; (3) the invisibility and inaccessibility of care services as explanation for these family's non-use of available services; and (4) the overlooking of culture, migration and religion as invisible influencers of the overall dementia experience. A better understanding of these hidden realities of migrant older people with dementia and their caregivers could lead to interventions to provide effective and tailored person-centred care that is sensitive to the individual's life experiences, culture and religious background.

  2. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  3. From Invisibility to Transparency: Identifying the Implications

    Directory of Open Access Journals (Sweden)

    Nancy J. Turner

    2008-12-01

    Full Text Available This paper explores the need for a broader and more inclusive approach to decisions about land and resources, one that recognizes the legitimacy of cultural values and traditional knowledge in environmental decision making and policy. Invisible losses are those not widely recognized or accounted for in decisions about resource planning and decision making in resource- and land-use negotiations precisely because they involve considerations that tend to be ignored by managers and scientists or because they are often indirect or cumulative, resulting from a complex, often cumulative series of events, decisions, choices, or policies. First Nations communities in western North America have experienced many such losses that, together, have resulted in a decline in the overall resilience of individuals and communities. We have identified eight types invisible losses that are often overlapping and cumulative: cultural/lifestyle losses, loss of identity, health losses, loss of self-determination and influence, emotional and psychological losses, loss of order in the world, knowledge losses, and indirect economic losses and lost opportunities. To render such invisible losses more transparent, which represents the first step in developing a more positive and equitable basis for decision making and negotiations around land and resources, we recommend six processes: focusing on what matters to the people affected, describing what matters in meaningful ways, making a place for these concerns in decision making, evaluating future losses and gains from a historical baseline, recognizing culturally derived values as relevant, and creating better alternatives for decision making so that invisible losses will be diminished or eliminated in the future.

  4. It's About Making Surfaces Invisible

    Indian Academy of Sciences (India)

    It's About Making Surfaces Invisible ... light is reflected from the surface between two media. The in- tensity of ... The reflection from each new interface and the combined reflec- .... Let us see the requirements of a material for a good stamp. The.

  5. Smith’s invisible hand: controversy is needed

    Directory of Open Access Journals (Sweden)

    Flavia Di Mario

    2017-11-01

    Full Text Available Smith’s metaphor of the invisible hand, commonly attributed to The Wealth of Nations, is described in the Theory of Moral Sentiments. It is a ‘deception’ fed to the lower classes. Private initiative depends upon the presence of privileged classes in a conservative rather than liberal state. Only thus can the ‘invisible hand’ improve the nation’s ‘wealth.’ Hence, the economic mainstream cannot easily claim Adam Smith as their ancestor. Nor can the Marxists associate him to the misdeeds of the mainstream. A Smithian ancestry is more plausible for Neoliberals.

  6. Invisibility, safety and psycho-social distress among same-sex attracted women in rural South Australia.

    Science.gov (United States)

    Edwards, Jane

    2005-01-01

    'everybody knows everybody'. In such settings, much of the conduct of daily life is visible to other community members and may be closely scrutinized. In such locations, women initially try to keep their same sex attraction invisible. Women rarely comment on the threat of violence that underpins the attempt to keep same-sex identity or relationships secret. Nevertheless, even while it remains a largely unarticulated factor, it was a powerful one fueling the maintenance of their invisibility. Fear of violence ranges from the threat of overt physical violence to more commonly voiced concerns over 'mundane' harassment. Fear of social violence, in the form of rejection and ostracism, is the most frequently nominated factor motivating women to keep same-sex attraction invisible in rural settings. While keeping their same-sex identity and relationships invisible offers women some safety from physical and social violence, it may pose dangers for their psycho-social well-being. Trying to keep SSA relationships invisible within communities involves women censoring their behaviour while in public. Invisibility also gives rise to isolation, since women do not have the opportunity to form same-sex attracted social networks. Furthermore, some women experience great psycho-social distress as their awareness of their same-sex attraction becomes increasingly incongruent with the established pattern of their lives. Women find it very difficult to seek appropriate forms of help if they do experience psycho-social problems. Concerns over confidentiality means that women are extremely reluctant to seek help and support locally. Distance is a powerful mediating factor in both women's experience of distress and their capacity to seek help to ameliorate it. For women who live in closer proximity to the state capital, the capacity to meet other SSA women and engage in same-sex attracted social activities helps ease their sense of difference and isolation. Likewise, should they wish to utilize

  7. Invisible anti-cloak with elliptic cross section using phase complement

    International Nuclear Information System (INIS)

    Yang Yu-Qi; Zhang Min; Yue Jian-Xiang

    2011-01-01

    Based on the theory of phase complement, an anti-cloak with circular cross section can be made invisible to an object outside its domain. As the cloak with elliptic cross section is more effective to make objects invisible than that with circular cross section, a scaled coordinate system is proposed to design equivalent materials of invisible anti-cloak with elliptic cross section using phase complement. The cloaks with conventional dielectric and double negative parameters are both simulated with the geometrical transformations. The results show that the cloak with elliptic cross section through phase complement can effectively hide the outside objects. (classical areas of phenomenology)

  8. A gender- and sexual orientation-dependent spatial attentional effect of invisible images.

    Science.gov (United States)

    Jiang, Yi; Costello, Patricia; Fang, Fang; Huang, Miner; He, Sheng

    2006-11-07

    Human observers are constantly bombarded with a vast amount of information. Selective attention helps us to quickly process what is important while ignoring the irrelevant. In this study, we demonstrate that information that has not entered observers' consciousness, such as interocularly suppressed (invisible) erotic pictures, can direct the distribution of spatial attention. Furthermore, invisible erotic information can either attract or repel observers' spatial attention depending on their gender and sexual orientation. While unaware of the suppressed pictures, heterosexual males' attention was attracted to invisible female nudes, heterosexual females' attention was attracted to invisible male nudes, gay males behaved similarly to heterosexual females, and gay/bisexual females performed in-between heterosexual males and females.

  9. Search for invisibly decaying Higgs boson at Large Hadron Collider

    Indian Academy of Sciences (India)

    In several scenarios of Beyond Standard Model physics, the invisible decay mode of the Higgs boson is an interesting possibility. The search strategy for an invisible Higgs boson at the Large Hadron Collider (LHC), using weak boson fusion process, has been studied in detail, by taking into account all possible ...

  10. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  11. The Invisibility of Steam

    Science.gov (United States)

    Greenslade, Thomas B., Jr.

    2014-01-01

    Almost everyone "knows" that steam is visible. After all, one can see the cloud of white issuing from the spout of a boiling tea kettle. In reality, steam is the gaseous phase of water and is invisible. What you see is light scattered from the tiny droplets of water that are the result of the condensation of the steam as its temperature…

  12. A rigorous analysis of high-order electromagnetic invisibility cloaks

    International Nuclear Information System (INIS)

    Weder, Ricardo

    2008-01-01

    There is currently a great deal of interest in the invisibility cloaks recently proposed by Pendry et al that are based on the transformation approach. They obtained their results using first-order transformations. In recent papers, Hendi et al and Cai et al considered invisibility cloaks with high-order transformations. In this paper, we study high-order electromagnetic invisibility cloaks in transformation media obtained by high-order transformations from general anisotropic media. We consider the case where there is a finite number of spherical cloaks located in different points in space. We prove that for any incident plane wave, at any frequency, the scattered wave is identically zero. We also consider the scattering of finite-energy wave packets. We prove that the scattering matrix is the identity, i.e., that for any incoming wave packet the outgoing wave packet is the same as the incoming one. This proves that the invisibility cloaks cannot be detected in any scattering experiment with electromagnetic waves in high-order transformation media, and in particular in the first-order transformation media of Pendry et al. We also prove that the high-order invisibility cloaks, as well as the first-order ones, cloak passive and active devices. The cloaked objects completely decouple from the exterior. Actually, the cloaking outside is independent of what is inside the cloaked objects. The electromagnetic waves inside the cloaked objects cannot leave the concealed regions and vice versa, the electromagnetic waves outside the cloaked objects cannot go inside the concealed regions. As we prove our results for media that are obtained by transformation from general anisotropic materials, we prove that it is possible to cloak objects inside general crystals

  13. The invisible Web uncovering information sources search engines can't see

    CERN Document Server

    Sherman, Chris

    2001-01-01

    Enormous expanses of the Internet are unreachable with standard web search engines. This book provides the key to finding these hidden resources by identifying how to uncover and use invisible web resources. Mapping the invisible Web, when and how to use it, assessing the validity of the information, and the future of Web searching are topics covered in detail. Only 16 percent of Net-based information can be located using a general search engine. The other 84 percent is what is referred to as the invisible Web-made up of information stored in databases. Unlike pages on the visible Web, informa

  14. The spatial practices of school administrative clerks: making space ...

    African Journals Online (AJOL)

    The spatial practices of school administrative clerks: making space for ... their invisible, largely taken-for-granted roles in a school's everyday functioning. This main aim of this article is to make their everyday practices and contributions visible, ...

  15. Witnessing violence: making the invisible visible.

    Science.gov (United States)

    Holton, J K

    1995-01-01

    In his novel of Black life circa the 1950s, Invisible Man, Ralph Ellison laid bare the wasteful, destructive societal consequences of racism. At the close of the 20th century, we are faced with the phenomenon of another social problem, likewise unresolved and likely to haunt us similarly: urban violence. Following Ellison's example, this paper seeks to explore the impact of violence's stark invisibility by discussing a research strategy that better explains the terrifying phenomenon of violence. In order to comprehend the totality of violence, macro- and micro-level variables have to be introduced into the research design and measured over time. Therefore, research might best address violence if it was designed to include variables of poverty and racism, and was more inclusive of research from a broader range of scientific disciplines.

  16. Australian Lesbian Teachers--A Reflection of Homophobic Harassment of High School Teachers in New South Wales Government Schools.

    Science.gov (United States)

    Ferfolja, Tania

    1998-01-01

    Examines the homophobic harassment of lesbian teachers working in government high schools in Sydney (Australia). The experiences of six lesbian teachers show that harassment based on sexual orientation is often an invisible issue in schools, as is homosexuality in general. Recommendations are made for teaching about homosexual tolerance. (SLD)

  17. Distributed Leadership And The Visibility/invisibility Paradox In On-line Communities

    Directory of Open Access Journals (Sweden)

    Jill Jameson

    2011-01-01

    Full Text Available This paper analyzes the role of distributed leadership in three on-line communities, reflecting on an observed visibility/invisibility paradox in leadership within these communities. Leaders who downplay their seniority and assume a degree of invisibility, allocating discretionary powers to subordinate levels in an organizational hierarchy, may facilitate the emergence of distributed leadership. Yet, simultaneously, leader-led relations are enabled by high leadership visibility. This paradox—that leaders need to be both highly visible and also invisible, or hands-off, when the occasion requires it—was derived from prior research into e-learning communities and tested in the analysis of discussions from on-line communities using a case study pattern-matching process. The operation of both visibility and invisibility in leadership is a key issue for enabling effective collaborations in distributed leadership situations based on trust. Such collaboration fosters positive group interaction and participative decision making in a consensus facilitated through leadership distribution amongst on-line community members.

  18. Energy Awareness Displays - Making the Invisible Visible

    NARCIS (Netherlands)

    Börner, Dirk

    2011-01-01

    Börner, D. (2011). Energy Awareness Displays - Making the Invisible Visible. Presentation given at the Startbijeenkomst SURFnet Innovatieregeling Duurzaamheid & ICT. May, 13, 2011, Utrecht, The Netherlands.

  19. Invisibility: the lived experience of women with cancer of the vulva.

    Science.gov (United States)

    Jefferies, Hilary; Clifford, Collette

    2012-01-01

    This study describes an exploration of the lived experience of 13 British women with cancer of the vulva who underwent surgical treatment. A review of the literature highlighted a paucity of knowledge as many studies were conducted during the 1980s and 1990s and investigated sexual functioning only. An interpretive phenomenological approach based on the work of Heidegger and van Manen was used to frame the study by posing the question, "What must it be like to be diagnosed with, and have surgery for a cancer of the vulva?" The women, younger than 50 years, were identified by purposive sampling and interviewed between 6 months and 5 years after surgery. The data were analyzed using framework analysis. The women's lived experience is described in its entirety by the concept of invisibility, characterized as something "no one can see," "heard of," and "talks about." The impact of this invisibility is discussed as the "invisibility of understanding" and "invisibility of support." Although many women may expect to be cured of their vulval cancer, the invisible nature of the condition and the resulting lack of understanding and support may continue for a considerable period, as every aspect of their everyday life and in their relationships may be affected. The challenge now is to raise awareness of this condition and provide greater informational and emotional support for these women.

  20. Heidegger’s phenomenology of the invisible

    Directory of Open Access Journals (Sweden)

    Andrzej SERAFIN

    2016-12-01

    Full Text Available Martin Heidegger has retrospectively characterized his philosophy as “phenomenology of the invisible”. This paradoxical formula suggests that the aim of his thinking was to examine the origin of the phenomena. Furthermore, Heidegger has also stated that his philosophy is ultimately motivated by a theological interest, namely the question of God’s absence. Following the guiding thread of those remarks, this essay analyzes the essential traits of Heidegger’s thought by interpreting them as an attempt to develop a phenomenology of the invisible. Heidegger’s attitude towards physics and metaphysics, his theory of truth, his reading of Aristotle, his concept of Dasein, his understanding of nothingness are all situated within the problematic context of the relation between the invisible and the revealed. Heidegger’s thought is thereby posited at the point of intersection of phenomenology, ontology, and theology.

  1. Design of invisibility cloaks with an open tunnel.

    Science.gov (United States)

    Ako, Thomas; Yan, Min; Qiu, Min

    2010-12-20

    In this paper we apply the methodology of transformation optics for design of a novel invisibility cloak which can possess an open tunnel. Such a cloak facilitates the insertion (retrieval) of matter into (from) the cloak's interior without significantly affecting the cloak's performance, overcoming the matter exchange bottleneck inherent to most previously proposed cloak designs.We achieve this by applying a transformation which expands a point at the origin in electromagnetic space to a finite area in physical space in a highly anisotropic manner. The invisibility performance of the proposed cloak is verified by using full-wave finite-element simulations.

  2. The invisible hand: regulation of RHO GTPases by RHOGDIs

    OpenAIRE

    Garcia-Mata, Rafael; Boulter, Etienne; Burridge, Keith

    2011-01-01

    The 'invisible hand' is a term originally coined by Adam Smith in the Theory of Moral Sentiments to describe the forces of self-interest, competition, and supply and demand that regulate the resources in society. This metaphor continues to be used by economists to describe the self-regulating nature of a market economy. The same metaphor can be used to describe the RHO-specific guanine nucleotide dissociation inhibitor (RHOGDI) family, which operates in the background, as an invisible hand, u...

  3. Invisible Barriers: The Loneliness of School Principals at Turkish ...

    African Journals Online (AJOL)

    Psychological insight is the notion that all participants agreed on and emphasised when asked to offer a definition of loneliness at schools. Participants also agreed on the fact that the organisational climate at Turkish schools represented the most significant reason for principals' loneliness at work. The school principals that ...

  4. Increased risk of sadness and suicidality among victims of bullying experiencing additional threats to physical safety.

    Science.gov (United States)

    Pham, Tammy B; Adesman, Andrew

    2017-11-23

    Objective To examine, in a nationally-representative sample of high school students, to what extent one or more additional threats to physical safety exacerbates the risk of sadness and suicidality among victims of school and/or cyber-bullying. Methods National data from the 2015 Youth Risk Behavior Survey (YRBS) were analyzed for grades 9-12 (n = 15,624). Victimization groups were characterized by school-bullying and cyber-bullying, with and without additional threats to physical safety: fighting at school, being threatened/injured at school, and skipping school out of fear for one's safety. Outcomes included 2-week sadness and suicidality. Outcomes for victimization groups were compared to non-victims using logistic regression adjusting for sex, grade and race/ethnicity. Results Overall, 20.2% of students were school-bullied, and 15.5% were cyber-bullied in the past year. Compared to non-victims, victims of school-bullying and victims of cyber-bullying (VoCBs) who did not experience additional threats to physical safety were 2.76 and 3.83 times more likely to report 2-week sadness, and 3.39 and 3.27 times more likely to exhibit suicidality, respectively. Conversely, victims of bullying who experienced one or more additional threats to physical safety were successively more likely to report these adverse outcomes. Notably, victims of school-bullying and VoCBs with all three additional risk factors were 13.13 and 17.75 times more likely to exhibit suicidality, respectively. Conclusion Risk of depression symptoms and suicidality among victims of school-bullying and/or cyber-bullying is greatly increased among those who have experienced additional threats to physical safety: fighting at school, being threatened/injured at school and skipping school out of fear for their safety.

  5. Extinction cross-section suppression and active acoustic invisibility cloaking

    Science.gov (United States)

    Mitri, F. G.

    2017-10-01

    Invisibility in its canonical form requires rendering a zero extinction cross-section (or energy efficiency) from an active or a passive object. This work demonstrates the successful theoretical realization of this physical effect for an active cylindrically radiating acoustic body, undergoing periodic axisymmetric harmonic vibrations near a flat rigid boundary. Radiating, amplification and extinction cross-sections of the active source are defined. Assuming monopole and dipole modal oscillations of the circular source, conditions are found where the extinction energy efficiency factor of the active source vanishes, achieving total invisibility with minimal influence of the source size. It also takes positive or negative values, depending on its size and distance from the boundary. Moreover, the amplification energy efficiency factor is negative for the acoustically-active source. These effects also occur for higher-order modal oscillations of the active source. The results find potential applications in the development of acoustic cloaking devices and invisibility.

  6. Extinction cross-section suppression and active acoustic invisibility cloaking

    International Nuclear Information System (INIS)

    Mitri, F G

    2017-01-01

    Invisibility in its canonical form requires rendering a zero extinction cross-section (or energy efficiency) from an active or a passive object. This work demonstrates the successful theoretical realization of this physical effect for an active cylindrically radiating acoustic body, undergoing periodic axisymmetric harmonic vibrations near a flat rigid boundary. Radiating, amplification and extinction cross-sections of the active source are defined. Assuming monopole and dipole modal oscillations of the circular source, conditions are found where the extinction energy efficiency factor of the active source vanishes, achieving total invisibility with minimal influence of the source size. It also takes positive or negative values, depending on its size and distance from the boundary. Moreover, the amplification energy efficiency factor is negative for the acoustically-active source. These effects also occur for higher-order modal oscillations of the active source. The results find potential applications in the development of acoustic cloaking devices and invisibility. (letter)

  7. Gay Youth in American Public High Schools: Invisible Diversity.

    Science.gov (United States)

    Reed, Donald B.

    Gay youth enter high school with the knowledge that they are different and with the belief that heterosexuality is normal and that homosexuality is not normal. Also, gay youth enter high school with the belief that honesty and integrity are important personal values. Additionally, the gay youth enter high school without family knowledge of their…

  8. Broadband three-dimensional diamond-shaped invisible cloaks composed of tetrahedral homogeneous blocks

    International Nuclear Information System (INIS)

    Wang Xinhua; Qu Shaobo; Wu Xiang; Wang Jiafu; Ma Hua; Xu Zhuo

    2010-01-01

    By means of embedded optical transformation, three-dimensional diamond-shaped invisible cloaks composed of tetrahedral homogeneous blocks have been designed in this paper. The constitutive parameters of the invisible cloaks can be obtained based on the form invariance of Maxwell's equations in coordinate transformation. Numerical methods using the finite element method verified the diamond-shaped cloaks. The invisible properties of the designed cloaks are nearly perfect when the original line section is sufficiently short compared with its counterpart in the after-transformed space. The designed cloaks can operate in a wide bandwidth due to the line transformation in the coordinate transformation process.

  9. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  10. The 'Invisible' Metal Particles in Catalysis

    NARCIS (Netherlands)

    Koningsberger, D.C.; Diaz-Moreno, S.; Muñoz-Paez, A.

    1997-01-01

    An easy, reliable and straightforward method to determine the sizes of small metal particles in supported metal catalyst which are invisible for most techniques (chemisorption, XRD, HRTEM) is presented. The technique we consider more appropriate is EXAFS, because it detects metal metal bonds even

  11. Axions: on the way to invisibility

    International Nuclear Information System (INIS)

    Girardi, G.

    1982-01-01

    We present a survey of the theoretical motivation which lead to the axion and we summarize its properties. A brief account of the experimental situation is given, which in addition to cosmological constraints imposes to the axion the way of invisibility in Grand Unified Theories

  12. The 'invisible hand': regulation of RHO GTPases by RHOGDIs.

    Science.gov (United States)

    Garcia-Mata, Rafael; Boulter, Etienne; Burridge, Keith

    2011-07-22

    The 'invisible hand' is a term originally coined by Adam Smith in The Theory of Moral Sentiments to describe the forces of self-interest, competition and supply and demand that regulate the resources in society. This metaphor continues to be used by economists to describe the self-regulating nature of a market economy. The same metaphor can be used to describe the RHO-specific guanine nucleotide dissociation inhibitor (RHOGDI) family, which operates in the background, as an invisible hand, using similar forces to regulate the RHO GTPase cycle.

  13. The invisible hand: regulation of RHO GTPases by RHOGDIs

    Science.gov (United States)

    Garcia-Mata, Rafael; Boulter, Etienne; Burridge, Keith

    2011-01-01

    Preface The 'invisible hand' is a term originally coined by Adam Smith in the Theory of Moral Sentiments to describe the forces of self-interest, competition, and supply and demand that regulate the resources in society. This metaphor continues to be used by economists to describe the self-regulating nature of a market economy. The same metaphor can be used to describe the RHO-specific guanine nucleotide dissociation inhibitor (RHOGDI) family, which operates in the background, as an invisible hand, using similar forces to regulate the RHO GTPase cycle. PMID:21779026

  14. Slow light invisibility, teleportation, and other mysteries of light

    CERN Document Server

    Perkowitz, Sidney

    2011-01-01

    Slow Light is a popular treatment of today's astonishing breakthroughs in the science of light. Even though we don't understand light's quantum mysteries, we can slow it to a stop and speed it up beyond its Einsteinian speed limit, 186,000 miles/sec; use it for quantum telecommunications; teleport it; manipulate it to create invisibility; and perhaps generate hydrogen fusion power with it. All this is lucidly presented for non-scientists who wonder about teleportation, Harry Potter invisibility cloaks, and other fantastic outcomes. Slow Light shows how the real science and the fantasy inspire

  15. Strategic analyses in nursing schools: attracting, educating, and graduating more nursing students: part I--strengths, weaknesses, opportunities, and threats analysis.

    Science.gov (United States)

    Crow, Stephen M; Hartman, Sandra J; Mahesh, Sathiadev; McLendon, Christy L; Henson, Steve W; Jacques, Paul

    2008-01-01

    The shortage of nurses in the United States remains a persistent problem. Faced with this reality, nursing programs in colleges and universities continue to struggle to expand enrollment levels to meet the spiraling demand. This research uses familiar tools in strategic management: the strengths, weaknesses, opportunities, and threats (SWOT) analysis and stakeholder analysis as initial steps to draw more students to the profession of nursing. In a 2-round modified Delphi survey, chief administrators of schools of nursing identify the main SWOT of schools of nursing and the important internal and external stakeholders that influence nursing school success. The authors of the research suggest ways to use that knowledge to increase the enrollment level of nursing students. Part I of this research focuses on the SWOT analyses.

  16. Invisible data matrix detection with smart phone using geometric correction and Hough transform

    Science.gov (United States)

    Sun, Halit; Uysalturk, Mahir C.; Karakaya, Mahmut

    2016-04-01

    Two-dimensional data matrices are used in many different areas that provide quick and automatic data entry to the computer system. Their most common usage is to automatically read labeled products (books, medicines, food, etc.) and recognize them. In Turkey, alcohol beverages and tobacco products are labeled and tracked with the invisible data matrices for public safety and tax purposes. In this application, since data matrixes are printed on a special paper with a pigmented ink, it cannot be seen under daylight. When red LEDs are utilized for illumination and reflected light is filtered, invisible data matrices become visible and decoded by special barcode readers. Owing to their physical dimensions, price and requirement of special training to use; cheap, small sized and easily carried domestic mobile invisible data matrix reader systems are required to be delivered to every inspector in the law enforcement units. In this paper, we first developed an apparatus attached to the smartphone including a red LED light and a high pass filter. Then, we promoted an algorithm to process captured images by smartphones and to decode all information stored in the invisible data matrix images. The proposed algorithm mainly involves four stages. In the first step, data matrix code is processed by Hough transform processing to find "L" shaped pattern. In the second step, borders of the data matrix are found by using the convex hull and corner detection methods. Afterwards, distortion of invisible data matrix corrected by geometric correction technique and the size of every module is fixed in rectangular shape. Finally, the invisible data matrix is scanned line by line in the horizontal axis to decode it. Based on the results obtained from the real test images of invisible data matrix captured with a smartphone, the proposed algorithm indicates high accuracy and low error rate.

  17. First search for invisible decays of ortho-positronium confined in a vacuum cavity

    OpenAIRE

    Vigo, C.; Gerchow, L.; Liszkay, L.; Rubbia, A.; Crivelli, P.

    2018-01-01

    The experimental setup and results of the first search for invisible decays of ortho-positronium (o-Ps) confined in a vacuum cavity are reported. No evidence of invisible decays at a level $\\text{Br}\\left(\\text{o-Ps}\\to\\text{invisible}\\right) < 5.9\\times 10^{-4}$ (90% C. L.) was found. This decay channel is predicted in Hidden Sector models such as the Mirror Matter (MM), which could be a candidate for Dark Matter. Analyzed within the MM context, this result provides an upper limit on the kin...

  18. Visualizing the Invisible College: Community among Authors in Top Social Work Journals

    Science.gov (United States)

    Woehle, Ralph

    2012-01-01

    A review of literature related to the existence of an invisible college community among coauthors of articles in top-rated social work journals indicated that an invisible college could promote quality scholarship but that coauthoring might be inadequately studied or valued in social work education. Social network analysis revealed a skeletal…

  19. A feeling of being (in)visible

    DEFF Research Database (Denmark)

    Damsgaard, Janne Brammer; Bastrup, Lene; Norlyk, Annelise

    Abstract PhD Day 2015 The illness trajectory of spine fusion patients. A feeling of being (in)visible Background Research shows that being a back patient is associated with great personal cost, and that back patients who undergo so-called spine fusion often experience particularly long...

  20. Invisible Axions and Large-Radius Compactifications

    CERN Document Server

    Dienes, Keith R.; Gherghetta, Tony; Dienes, Keith R.; Dudas, Emilian; Gherghetta, Tony

    2000-01-01

    We study some of the novel effects that arise when the QCD axion is placed in the ``bulk'' of large extra spacetime dimensions. First, we find that the mass of the axion can become independent of the energy scale associated with the breaking of the Peccei-Quinn symmetry. This implies that the mass of the axion can be adjusted independently of its couplings to ordinary matter, thereby providing a new method of rendering the axion invisible. Second, we discuss the new phenomenon of laboratory axion oscillations (analogous to neutrino oscillations), and show that these oscillations cause laboratory axions to ``decohere'' extremely rapidly as a result of Kaluza-Klein mixing. This decoherence may also be a contributing factor to axion invisibility. Third, we discuss the role of Kaluza-Klein axions in axion-mediated processes and decays, and propose several experimental tests of the higher-dimensional nature of the axion. Finally, we show that under certain circumstances, the presence of an infinite tower of Kaluza...

  1. Forensic Luminol Blood Test for Preventing Cross-contamination in Dentistry: An Evaluation of a Dental School Clinic.

    Science.gov (United States)

    Bortoluzzi, Marcelo Carlos; Cadore, Peterson; Gallon, Andrea; Imanishi, Soraia Almeida Watanabe

    2014-10-01

    More than 200 different diseases may be transmitted from exposure to blood in the dental setting. The aim of this study is to identify possible faults in the crosscontamination chain control in a dental school clinic searching for traces of blood in the clinical contact surfaces (CCS) through forensic luminol blood test. Traces of invisible blood where randomly searched in CCS of one dental school clinic. Forty eight surfaces areas in the CCS were tested and the presence of invisible and remnant blood was identified in 28 (58.3%) items. We suggest that the luminol method is suitable for identifying contamination with invisible blood traces and this method may be a useful tool to prevent cross-contamination in the dental care setting.

  2. Going beyond Google again strategies for using and teaching the invisible web

    CERN Document Server

    Devine, Jane

    2014-01-01

    Demonstrating why teaching the Invisible Web should be a requirement for information literacy education in the 21st century, here the authors expand on the teaching foundation provided in the first book and persuasively argue that the Invisible Web is still relevant not only to student research but also to everyday life.

  3. Active electromagnetic invisibility cloaking and radiation force cancellation

    Science.gov (United States)

    Mitri, F. G.

    2018-03-01

    This investigation shows that an active emitting electromagnetic (EM) Dirichlet source (i.e., with axial polarization of the electric field) in a homogeneous non-dissipative/non-absorptive medium placed near a perfectly conducting boundary can render total invisibility (i.e. zero extinction cross-section or efficiency) in addition to a radiation force cancellation on its surface. Based upon the Poynting theorem, the mathematical expression for the extinction, radiation and amplification cross-sections (or efficiencies) are derived using the partial-wave series expansion method in cylindrical coordinates. Moreover, the analysis is extended to compute the self-induced EM radiation force on the active source, resulting from the waves reflected by the boundary. The numerical results predict the generation of a zero extinction efficiency, achieving total invisibility, in addition to a radiation force cancellation which depend on the source size, the distance from the boundary and the associated EM mode order of the active source. Furthermore, an attractive EM pushing force on the active source directed toward the boundary or a repulsive pulling one pointing away from it can arise accordingly. The numerical predictions and computational results find potential applications in the design and development of EM cloaking devices, invisibility and stealth technologies.

  4. Invisible fat on CT: making it visible by MRI.

    Science.gov (United States)

    Ünal, Emre; Karaosmanoğlu, Ali Devrim; Akata, Deniz; Özmen, Mustafa Nasuh; Karçaaltıncaba, Muşturay

    2016-01-01

    Presence of fat in a lesion significantly narrows the differential diagnosis. Small quantities of macroscopic fat and intracellular fat are invisible on computed tomography (CT) and ultrasonography. Magnetic resonance imaging (MRI) can reveal any fatty change in a lesion and can also differentiate macroscopic fat from intracellular and intravoxel fat. Hypodensity on CT may be a sign of invisible fat and MRI can help to diagnose even minute amounts of fat in liver, pancreas, adrenal, musculoskeletal, and omental pseudolesions and lesions. This article will review the superiority of MRI over CT in demonstrating fat in abdominal lesions.

  5. (In)Visible Hand(s)

    OpenAIRE

    Predrag Zima

    2007-01-01

    In this paper, the author discusses the regulatory role of the state and legal norms, in market economy, especially in so-called transition countries. Legal policy, and other questions of the state and free market economy are here closely connected, because the state must ensure with legal norms that economic processes are not interrupted: only the state can establish the legal basis for a market economy. The free market’s invisible hand is acting in questions such as: what is to be produced,...

  6. Aprendizaje Invisible. Hacia una nueva ecología de la educación

    OpenAIRE

    Cobo, Cristóbal; Moravec, John W.

    2011-01-01

    Índice Carta del Editor Visibilidad para analizar la cara invisible del aprendizaje Por Hugo Pardo Kuklinski 9 Prólogo Una visión más amplia de Internet en el aprendizaje Por William H. Dutton 13 Capítulo 0 Introducción al aprendizaje invisible: la (r)evolución fuera del aula Por Cristóbal Cobo y John W. Moravec 17 Capítulo 1 Desde la sociedad 1.0 a la sociedad 3.0 Por John W. Moravec 47 Capítulo 2 Uso invisible de las tecnologías y competencias para ...

  7. Invisible-hand explanations: From blindness to lack of we-ness

    OpenAIRE

    Dayer-Tieffenbach, Emma

    2013-01-01

    The unintendedness of the phenomenon that is to be explained is a constraint visible in the various applications and clarifications of invisible hand explanations. The article casts doubt on such a requirement and proposes a revised account. To have a role in an invisible hand process it is argued agents may very well act with a view to contributing to the occurrence of the social outcome that is to be explained provided they see what they do as an aggregation of their individual actions rath...

  8. When risk becomes invisible in the everyday life of day care

    DEFF Research Database (Denmark)

    Villumsen, Anne Marie; Kristensen, Ole Steen

    2016-01-01

    Both the identification of children at risk in day care and multidisciplinary collaboration with other professions have a political focus. This study was designed as an organizational field study and attempts to establish a coherent practice of multidisciplinary collaboration between day care...... and their life circumstances become invisible in the everyday life of day care. Due to defensive routines as well as an organizational culture that frames and creates a non-explicitly structured practice using intuitive processes, the problems of children at risk become invisible in the everyday life of day care....... When risk become invisible, it not only impedes the mono-professional help the children receive, it also inhibits a crucial multidisciplinary collaborative provision of support to children at risk and their families. The identification of children at risk seems to be based on an unexamined selection...

  9. Group study of an "undercover" test for visuospatial neglect: invisible cancellation can reveal more neglect than standard cancellation.

    Science.gov (United States)

    Wojciulik, E; Rorden, C; Clarke, K; Husain, M; Driver, J

    2004-09-01

    Visual neglect is a relatively common deficit after brain damage, particularly strokes. Cancellation tests provide standard clinical measures of neglect severity and deficits in daily life. A recent single-case study introduced a new variation on standard cancellation. Instead of making a visible mark on each target found, the patient made invisible marks (recorded with carbon paper underneath, for later scoring). Such invisible cancellation was found to reveal more neglect than cancellation with visible marks. Here we test the generality of this. Twenty three successive cases with suspected neglect each performed cancellation with visible or invisible marks. Neglect of contralesional targets was more pronounced with invisible marks. Indeed, about half of the patients only showed neglect in this version. For cases showing more neglect with invisible marks, stronger neglect of contralesional targets correlated with more revisits to ipsilesional targets for making additional invisible marks upon them. These results indicate that cancellation with invisible marks can reveal more neglect than standard cancellation with visible marks, while still providing a practical bedside test. Our observations may be consistent with recent proposals that demands on spatial working memory (required to keep track of previously found items only when marked invisibly) can exacerbate spatial neglect.

  10. Mechanically Invisible Polymer Coatings

    DEFF Research Database (Denmark)

    2014-01-01

    phase comprises particles, said particles comprising a filler material and an encapsulating coating of a second polymeric material, wherein the backbones of the first and second polymeric materials are the same. The composition may be used in electroactive polymers (EAPs) in order to obtain mechanically......The present invention relates to a composition comprising encapsulated particles in a polymeric material. The composition comprises a continuous phase and a discontinuous phase incorporated therein, wherein the continuous phase comprises a first polymeric material and wherein the discontinuous...... invisible polymer coatings....

  11. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  12. Why Information Literacy Is Invisible

    OpenAIRE

    William Badke

    2011-01-01

    Despite the many information literacy programs on higher education campuses, the literature of information literacy and the concept of information literacy as a viable academic subject remain hidden to most professors and academic administrators. Information literacy is invisible to academia because it is misunderstood, academic administrators have not put it on their institutions' agendas, the literature of information literacy remains in the library silo, there is a false belief that infor...

  13. How to observe the invisible

    International Nuclear Information System (INIS)

    Destefanis, G.; Peyret, O.; Darier, P.

    2000-01-01

    The observation of events and objects by images resulted from the detection of invisible radiation (infrared, X and gamma ray) emitted from these objects, is now more possible. This is mainly due to the progress in the microelectronics and semiconductors devices. With these advanced devices, it is possible to manufacture cameras with TV display size image and high resolution, which have many applications in military, medical and industrial sectors. (author)

  14. The Treatment of Smith's Invisible Hand

    Science.gov (United States)

    Wight, Jonathan B.

    2007-01-01

    Adam Smith used the metaphor of an invisible hand to represent the instincts of human nature that direct behavior. Moderated by self-control and guided by proper institutional incentives, actions grounded in instincts can be shown to generate a beneficial social order even if not intended. Smith's concept, however, has been diluted and distorted…

  15. Adam Smith and the Invisible Hand: From Metaphor to Myth

    OpenAIRE

    Gavin Kennedy

    2009-01-01

    Adam Smith and the ‘invisible hand’ are nearly synonymous in modern economic thinking. Adam Smith is strongly associated with the invisible hand, understood as a general rule that people in realising their self-interests unintentionally benefit the public good. The attribution to Smith is challengeable. Adam Smith’s use of the metaphor was much more modest; it was re-invented in the 1930s and 1940s onwards to bolster mathematical treatments of capitalism (Samuelson, Friedman) and to sup...

  16. Gender Justice and School Education

    Science.gov (United States)

    Gao, Desheng

    2009-01-01

    Gender justice includes three basic dimensions: gender equality, respect for difference, and free choice. In reality, schools construct and reproduce the gender injustice of the social culture through multiple dimensions that include the visible and the invisible curriculum, and the teacher's behaviour. In terms of gender justice, the social…

  17. En el limbo de lo invisible. In the limbo of the invisible

    Directory of Open Access Journals (Sweden)

    Carmen Arocena

    2012-04-01

    Full Text Available La violencia sobre la mujer representada en los medios de comunicación adquiere diversas formas que no siempre se manifiestan de manera explícita. A través de las modalidades de manipulación descritas por Greimas y Cour t é s l a s imágenes contemporáneas imponen a la mujer un único canon de belleza aceptable y una engañosa representación de su goce mediatizada por el deseo y la satisfacción masculinas. La dialéctica entre lo visible y lo invisible que el ojo patriarcal ha instaurado en la sociedad occidental por medio de la tiranía de los medios de comunicación de masas,aún impiden a la mujer, en pleno siglo XXI, el acceso a una manifestación libre y fidedigna de su propia naturaleza física y sexual.The representation of violence against women in the mass media adopts different forms that are not always explicit. Through the modes of manipulation described by Greimas and Courtés, contemporary images subject women to a single canon of acceptable beauty and a deceitfull representation of their pleasure mediated by masculine desire and satisfaction. Well into the XXI century, the dialectic between the visible and the invisible, which the patriarchal eye has installed inwestern society through the tyranny of the mass media, still preventswomen from having access to a free and reliable expression of theirown physical and sexual nature.

  18. Unidirectional reflection and invisibility in nonlinear media with an incoherent nonlinearity

    Science.gov (United States)

    Mostafazadeh, Ali; Oflaz, Neslihan

    2017-11-01

    We give explicit criteria for the reflectionlessness, transparency, and invisibility of a finite-range potential in the presence of an incoherent (intensity-dependent) nonlinearity that is confined to the range of the potential. This allows us to conduct a systematic study of the effects of such a nonlinearity on a locally periodic class of finite-range potentials that display perturbative unidirectional invisibility. We use our general results to examine the effects of a weak Kerr nonlinearity on the behavior of these potentials and show that the presence of nonlinearity destroys the unidirectional invisibility of these potentials. If the strength of the Kerr nonlinearity is so weak that the first-order perturbation theory is reliable, the presence of nonlinearity does not affect the unidirectional reflectionlessness and transmission reciprocity of the potential. We show that the expected violation of the latter is a second order perturbative effect.

  19. A gender- and sexual orientation-dependent spatial attentional effect of invisible images

    OpenAIRE

    Jiang, Yi; Costello, Patricia; Fang, Fang; Huang, Miner; He, Sheng

    2006-01-01

    Human observers are constantly bombarded with a vast amount of information. Selective attention helps us to quickly process what is important while ignoring the irrelevant. In this study, we demonstrate that information that has not entered observers' consciousness, such as interocularly suppressed (invisible) erotic pictures, can direct the distribution of spatial attention. Furthermore, invisible erotic information can either attract or repel observers' spatial attention depending on their ...

  20. L'invisible invité

    OpenAIRE

    Frémy, Anne

    2012-01-01

    Tiré du site Internet de Onestar Press: ""They’re a kind of cabin or hut, very basic and awkwardly assembled, wedged into the space of the balcony between the guardrail and the wall of the building.The vertical sides are made of plywood, canvas or tarp, and are topped by a vegetal roofing that is more or less dry, more or less green, threaded with palm wattle. These huts are opaque and seem to communicate with apartments…" Excerpt from L’Invisible invité by Anne Frémy, english by Bruce Bender...

  1. Dark matter from late invisible decays to and of gravitinos

    Science.gov (United States)

    Allahverdi, Rouzbeh; Dutta, Bhaskar; Queiroz, Farinaldo S.; Strigari, Louis E.; Wang, Mei-Yu

    2015-03-01

    In this work, we sift a simple supersymmetric framework of late invisible decays to and of the gravitino. We study a simple extension of the minimal supersymmetric standard model that includes isosinglet color-triplet superfields and a singlet superfield. We investigate two cases where the gravitino is the lightest supersymmetric particle or the next-to-lightest supersymmetric particle. The next-to-lightest supersymmetric particle decays into two dark matter candidates and has a long lifetime due to gravitationally suppressed interactions. However, because of the absence of any hadronic or electromagnetic products, it satisfies the tight bounds set by big bang nucleosynthesis and the cosmic microwave background. One or both of the dark matter candidates produced in invisible decays can contribute to the amount of dark radiation and suppress perturbations at scales that are being probed by the galaxy power spectrum and the Lyman-alpha forest data. We show that these constraints are satisfied in large regions of the parameter space and, as a result, the late invisible decays to and of the gravitino can be responsible for the entire dark matter relic abundance.

  2. Chernobyl clean-up workers` perception of radiation threat

    Energy Technology Data Exchange (ETDEWEB)

    Tarabrina, N.; Lazebnaya, E.; Zelenova, M. [Russian Academy of Science, Moscow (Russian Federation). Inst. of Psychology; Lasko, N. [Harvard Medical School, Manchester, NH (United States). VA Research Service

    1996-12-31

    The goals of this study were: (1) to compare the psychometric profiles of male Chernobyl liquidators who met DSM-III-R criteria for current PTSD with those who did not, and (2) to explore liquidators` perception and assessment of the `invisible` stressor of the radioactive hazard. Results of t-test comparisons between the PTSD and non-PTSD groups for the various psychometric measures are shown. Both diagnostic groups were similar in regard to their mean ages and education levels. The PTSD group scored significantly higher than the non-PTSD group on all the measures of PTSD and general psychiatric symptomatology, state and trait anxiety, depression. On the whole, results of this study demonstrate the determining role of individual perception and assessment of radioactive hazard in the development of post-traumatic stress and place this problem among the most important in studying the psychological consequences of experiencing radioactive threat. The real working conditions and the level of information also affected workers` estimate of the severity of the radiation hazard in Chernobyl. (author).

  3. Chernobyl clean-up workers' perception of radiation threat

    International Nuclear Information System (INIS)

    Tarabrina, N.; Lazebnaya, E.; Zelenova, M.; Lasko, N.

    1996-01-01

    The goals of this study were: (1) to compare the psychometric profiles of male Chernobyl liquidators who met DSM-III-R criteria for current PTSD with those who did not, and (2) to explore liquidators' perception and assessment of the 'invisible' stressor of the radioactive hazard. Results of t-test comparisons between the PTSD and non-PTSD groups for the various psychometric measures are shown. Both diagnostic groups were similar in regard to their mean ages and education levels. The PTSD group scored significantly higher than the non-PTSD group on all the measures of PTSD and general psychiatric symptomatology, state and trait anxiety, depression. On the whole, results of this study demonstrate the determining role of individual perception and assessment of radioactive hazard in the development of post-traumatic stress and place this problem among the most important in studying the psychological consequences of experiencing radioactive threat. The real working conditions and the level of information also affected workers' estimate of the severity of the radiation hazard in Chernobyl. (author)

  4. Harlequin, Holberg and the (in)visible masks

    DEFF Research Database (Denmark)

    Holm, Bent

    1998-01-01

    A reading of Holberg's harquinades "Ulysses Von Itacia" and "The Invisibles" placed in a context of European grotesque theatre with a specific regard to the texts relation to respectively older and newer French-Italian masque theatre. The analysis suggeststhat the first text is in perfect accorda...

  5. ''Invisible'' axion detectors

    International Nuclear Information System (INIS)

    Sikivie, P.

    1985-01-01

    A brief review is given of various ideas which have been put forth to detect ''invisible'' axions, i.e., axions with f/sub a/ between 3 x 10 7 GeV and 2 x 10 12 GeV. These experiments would attempt to detect the axions which constitute the halo of our galaxy or axions which are emitted by our sun; or they would attempt to detect the force mediated by virtual axions. Various relevant axion parameters are given as f/sub a/. Among the experiments described are: galactic axion detector using a cavity; ''spin coupled'' axion detection; axion to photon conversion in an inhomogeneous static magnetic field; and macroscopic forces mediated by axions. 27 refs

  6. Heterogeneous Defensive Naval Weapon Assignment To Swarming Threats In Real Time

    Science.gov (United States)

    2016-03-01

    come under fire from multiple sources simultaneously. These threats would be engaged in a numbers game , seeking to saturate the battlespace with many...optimization extension that uses the Python modeling language. B. TEST SCENARIO The following test scenario was developed to validate the models...Adaptive rapid response to swarming threats Concept Briefing. Presented at Naval Postgraduate School, Monterey, CA. Python [Computer Software]. (2015

  7. Medición de los Capitales Intelectuales Visibles e Invisibles

    OpenAIRE

    Jorge Luis Heredia Heredia; Martha González Adame

    2010-01-01

    El objetivo de esta investigación es presentar una propuesta para medir el capital intelectual visible e invisible y conocer la relación estadística entre ambos tipos de capital. Se parte de la propuesta de Nevado [1] sobre la clasificación de los activos intangibles visibles e invisibles y de la visión social evolutiva de Bueno [2]. A partir de esta postura se realiza un análisis del capital intelectual y los modelos para su medición hasta encontrar los criterios básicos de la nueva propuest...

  8. Single plasmonic nanoparticles for ultrasensitive DNA sensing: From invisible to visible.

    Science.gov (United States)

    Guo, Longhua; Chen, Lichan; Hong, Seungpyo; Kim, Dong-Hwan

    2016-05-15

    The background signal is a major factor that restricts the limit of detection of biosensors. Herein, we present a zero-background DNA-sensing approach that utilizes enzyme-guided gold nanoparticle (AuNP) enlargement. This sensing strategy is based on the finding that small nanoparticles are invisible under a darkfield optical microscope, thus completely eliminating the background signal. In the event of target binding, Ag deposition is triggered and enlarges the AuNP beyond its optical diffraction limit, thereby making the invisible AuNP visible. Because the plasmon scattering of Ag is stronger than that of Au, only a thin layer of Ag is required to greatly enhance the scattering intensity of the AuNPs. Our investigation revealed that a target DNA concentration as low as 5.0×10(-21)M can transform the darkfield image of the nanoparticle from completely dark (invisible) to a blue dot (visible). Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Flowers behind the back of the universe: A cosmic art project exploring the invisible

    Science.gov (United States)

    Tanaka, Yuri; Doser, Michael; Sakurai, Ryu; Shimoyama, Hajime; Takahashi, Ryo

    2018-05-01

    What can be seen within this universe? Since humans are not instinctively aware of the limitations of their sensorium, what is being missed is not immediately obvious. Aiming to explore with our imagination the invisible elements in the universe, we created an interactive cosmic art project in collaboration with the Gunma Astronomical Observatory, and the Polytech Festival in Moscow. In this paper, we firstly address the topic of dark matter, from the physics point of view, the concept in our project touching upon the invisible beauty in the universe, and then discuss the practical methodology for the process of making the installation. This installation was laid out based on a map of constellations from where people were able to see the antipode of Moscow, an opposite point from the venue where the installation was set, in analogy to illustrating what exists, but can not be seen. Using origami flowers - made in the course of a workshop by the visitors of the festival - as a metaphor of the beauty and transience of life, the installation seeks to deepen the awareness of participants about the numerous invisible structures in the universe. Placing them within reflective structures underlines both our reliance on technology to make the invisible visible, and the influence of the point of view on how we perceive and interpret the resulting representations. In their various forms and colors, these flowers can be seen as metaphorical mirror images of that which lies at the antipodes of our awareness: of colorful gas glowing in radio waves, supernovas in their many x-ray hues, dark matter, neutrinos, gravitational waves, dark energy. Considering both the invisible scenery of the sky and the invisible elements of beauty in the universe as lying behind the 'back' of the universe, hidden to our senses, this project explores a new way of communication between humans and the ubiquitous invisible in an artistic manner. Finally, the whole process of this project is summarized

  10. Attentional load modulates responses of human primary visual cortex to invisible stimuli.

    Science.gov (United States)

    Bahrami, Bahador; Lavie, Nilli; Rees, Geraint

    2007-03-20

    Visual neuroscience has long sought to determine the extent to which stimulus-evoked activity in visual cortex depends on attention and awareness. Some influential theories of consciousness maintain that the allocation of attention is restricted to conscious representations [1, 2]. However, in the load theory of attention [3], competition between task-relevant and task-irrelevant stimuli for limited-capacity attention does not depend on conscious perception of the irrelevant stimuli. The critical test is whether the level of attentional load in a relevant task would determine unconscious neural processing of invisible stimuli. Human participants were scanned with high-field fMRI while they performed a foveal task of low or high attentional load. Irrelevant, invisible monocular stimuli were simultaneously presented peripherally and were continuously suppressed by a flashing mask in the other eye [4]. Attentional load in the foveal task strongly modulated retinotopic activity evoked in primary visual cortex (V1) by the invisible stimuli. Contrary to traditional views [1, 2, 5, 6], we found that availability of attentional capacity determines neural representations related to unconscious processing of continuously suppressed stimuli in human primary visual cortex. Spillover of attention to cortical representations of invisible stimuli (under low load) cannot be a sufficient condition for their awareness.

  11. The scattering of a cylindrical invisibility cloak: reduced parameters and optimization

    DEFF Research Database (Denmark)

    Peng, Liang; Ran, L.; Mortensen, Asger

    2011-01-01

    We investigate the scattering of 2D cylindrical invisibility cloaks with simplified constitutive parameters with the assistance of scattering coefficients. We show that the scattering of the cloaks originates not only from the boundary conditions but also from the spatial variation of the component...... of permittivity/permeability. According to our formulation, we propose some restrictions to the invisibility cloak in order to minimize its scattering after the simplification has taken place. With our theoretical analysis, it is possible to design a simplified cloak using some peculiar composites...

  12. Another Distortion of Adam Smith: The Case of the "Invisible Hand"

    OpenAIRE

    Michael Meeropol

    2004-01-01

    This paper addresses a major omission in the way textbook writers and journalists utilize Adam Smith’s concept of the “invisible hand” to make Adam Smith an intellectual precursor of modern neo-liberal economic policy. Specifically, the paper addresses the use of the concept of the “invisible hand” by Adam Smith to address two major issues in the debate over neo-liberal policy: the international flow of capital and its role in the location of investment projects and the inequality in the dist...

  13. Experimental verification of free-space singular boundary conditions in an invisibility cloak

    International Nuclear Information System (INIS)

    Wu, Qiannan; Gao, Fei; Song, Zhengyong; Lin, Xiao; Zhang, Youming; Zhang, Baile; Chen, Huanyang

    2016-01-01

    A major issue in invisibility cloaking, which caused intense mathematical discussions in the past few years but still remains physically elusive, is the plausible singular boundary conditions associated with the singular metamaterials at the inner boundary of an invisibility cloak. The perfect cloaking phenomenon, as originally proposed by Pendry et al for electromagnetic waves, cannot be treated as physical before a realistic inner boundary of a cloak is demonstrated. Although a recent demonstration has been done in a waveguide environment, the exotic singular boundary conditions should apply to a general environment as in free space. Here we fabricate a metamaterial surface that exhibits the singular boundary conditions and demonstrate its performance in free space. Particularly, the phase information of waves reflected from this metamaterial surface is explicitly measured, confirming the singular responses of boundary conditions for an invisibility cloak. (paper)

  14. Experimental verification of free-space singular boundary conditions in an invisibility cloak

    Science.gov (United States)

    Wu, Qiannan; Gao, Fei; Song, Zhengyong; Lin, Xiao; Zhang, Youming; Chen, Huanyang; Zhang, Baile

    2016-04-01

    A major issue in invisibility cloaking, which caused intense mathematical discussions in the past few years but still remains physically elusive, is the plausible singular boundary conditions associated with the singular metamaterials at the inner boundary of an invisibility cloak. The perfect cloaking phenomenon, as originally proposed by Pendry et al for electromagnetic waves, cannot be treated as physical before a realistic inner boundary of a cloak is demonstrated. Although a recent demonstration has been done in a waveguide environment, the exotic singular boundary conditions should apply to a general environment as in free space. Here we fabricate a metamaterial surface that exhibits the singular boundary conditions and demonstrate its performance in free space. Particularly, the phase information of waves reflected from this metamaterial surface is explicitly measured, confirming the singular responses of boundary conditions for an invisibility cloak.

  15. Infrared technique for decoding of invisible laser markings

    Science.gov (United States)

    Haferkamp, Heinz; Jaeschke, Peter; Stein, Johannes; Goede, Martin

    2002-03-01

    Counterfeiting and product piracy continues to be an important issue not only for the Western industry, but also for the society in general. Due to the drastic increase in product imitation and the request for plagiarism protection as well as for reducing thefts there is a high interest in new protection methods providing new security features. The method presented here consists of security markings which are included below paint layers. These markings are invisible for the human eye due to the non-transparency of the upper layers in the visible spectral range. However, the markings can be detected by an infrared technique taking advantage on the partial transparency of the upper paint layers in the IR-region. Metal sheets are marked using laser radiation. The beam of a Nd:YAG-laser provides a modification of the surface structure, resulting in dark markings due to the annealing effect. After coating of the laser-marked material, the markings are invisible for the bare eye. In order to read out the invisible information below the coating, an infrared reflection technique is used. The samples are illuminated with halogen lamps or infrared radiators. Many coating materials (i. e. paints) show a certain transparency in the mid-infrared region, especially between 3 - 5 micrometers . The reflected radiation is detected using an IR-camera with a sensitivity range from 3.4 - 5 micrometers . Due to the different reflection properties between the markings and their surrounding, the information can be detected.

  16. Stereotype Threat Effects on African American and Latina/o Elementary Students Tested Together

    Science.gov (United States)

    Wasserberg, Martin James

    2017-01-01

    Purpose: This study aimed to investigate whether a diagnostic testing condition leads to stereotype threat effects for African American and Latina/o children (N = 81) when tested together at an urban elementary school in Miami, Florida. Design/methodology/approach: To analyze the effect of stereotype threat on participants' reading test…

  17. ¿Why are women invisible in the Teaching of history? Abstract

    Directory of Open Access Journals (Sweden)

    Edda Sant Obiols

    2011-07-01

    Full Text Available In this article we wonder why women are invisible in the teaching of history and we develop some assumptions about the reasons for this invisibility. We analyze the place women occupy in the curriculum of social sciences and history of Catalonia to claim their presence in texts and in practices. We exemplify their role in a teaching unit called Gifts of the 36 -Women of the 36- dedicated to recall the role of Republican women during the Spanish Civil War, the Franquism and the transition to democracy.

  18. Eavesdropping on the two-way quantum communication protocols with invisible photons

    Energy Technology Data Exchange (ETDEWEB)

    Cai Qingyu [State Key Laboratory of Magnetics Resonance and Atomic and Molecular Physics, Wuhan Institution of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)]. E-mail: qycai@wipm.ac.cn

    2006-02-20

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed00.

  19. Eavesdropping on the two-way quantum communication protocols with invisible photons

    International Nuclear Information System (INIS)

    Cai Qingyu

    2006-01-01

    The crucial issue of quantum communication protocol is its security. In this Letter, we show that all the deterministic and direct two-way quantum communication protocols, sometimes called ping-pong (PP) protocols, are insecure when an eavesdropper uses the invisible photon to eavesdrop on the communication. With our invisible photon eavesdropping (IPE) scheme, the eavesdropper can obtain full information of the communication with zero risk of being detected. We show that this IPE scheme can be implemented experimentally with current technology. Finally, a possible improvement of PP communication protocols security is proposed

  20. Illusory Speed is Retained in Memory during Invisible Motion

    Directory of Open Access Journals (Sweden)

    Luca Battaglini

    2013-05-01

    Full Text Available The brain can retain speed information in early visual short-term memory in an astonishingly precise manner. We investigated whether this (early visual memory system is active during the extrapolation of occluded motion and whether it reflects speed misperception due to contrast and size. Experiments 1A and 2A showed that reducing target contrast or increasing its size led to an illusory speed underestimation. Experiments 1B, 2B, and 3 showed that this illusory phenomenon is reflected in the memory of speed during occluded motion, independent of the range of visible speeds, of the length of the visible trajectory or the invisible trajectory, and of the type of task. These results suggest that illusory speed is retained in memory during invisible motion.

  1. Shifts of visuospatial attention to invisible (metacontrast-masked singletons: Clues from reaction times and event-related potential

    Directory of Open Access Journals (Sweden)

    Manfred Heumann

    2006-01-01

    Full Text Available In the current study, we tested whether a masked and, thus, invisible singleton-cue captures atten-tion in a stimulus-driven manner or in a top-down contingent manner. The manual RT (Reaction Time capture effect with the invisible singleton--cue decreased substantially when a match between the singleton-cue and the top-down controlled set of searched-for target features was also decreased. By contrast, with the PCN (Posterior Contralateral Negativity, an electrophysiological measure of the capture of visuospatial attention by the invisible singleton-cue, no significant decrement was observed. Taken together, the results support the assumption that an invisible singleton-cue can capture attention in a stimulus-driven manner, and that different delays in the deallocation of attention (i.e., attention is deallocated more efficiently from acue that does not match the top-down controlled set than from a cue that does match the same set account for the weaker manual RT capture effect with a set- -nonmatching invisible singleton-cue.

  2. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  3. Robot Vision to Monitor Structures in Invisible Fog Environments Using Active Imaging Technology

    Energy Technology Data Exchange (ETDEWEB)

    Park, Seungkyu; Park, Nakkyu; Baik, Sunghoon; Choi, Youngsoo; Jeong, Kyungmin [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-05-15

    Active vision is a direct visualization technique using a highly sensitive image sensor and a high intensity illuminant. Range-gated imaging (RGI) technique providing 2D and 3D images is one of emerging active vision technologies. The RGI technique extracts vision information by summing time sliced vision images. In the RGI system, objects are illuminated for ultra-short time by a high intensity illuminant and then the light reflected from objects is captured by a highly sensitive image sensor with the exposure of ultra-short time. The RGI system provides 2D and 3D image data from several images and it moreover provides clear images from invisible fog and smoke environment by using summing of time-sliced images. Nowadays, the Range-gated (RG) imaging is an emerging technology in the field of surveillance for security applications, especially in the visualization of invisible night and fog environment. Although RGI viewing was discovered in the 1960's, this technology is, nowadays, more and more applicable by virtue of the rapid development of optical and sensor technologies, such as highly sensitive imaging sensor and ultra-short pulse laser light. In contrast to passive vision systems, this technology enables operation even in harsh environments like fog and smoke. During the past decades, several applications of this technology have been applied in target recognition and in harsh environments, such as fog, underwater vision. Also, this technology has been demonstrated 3D imaging based on range-gated imaging. In this paper, a robot system to monitor structures in invisible fog environment is developed using an active range-gated imaging technique. The system consists of an ultra-short pulse laser device and a highly sensitive imaging sensor. The developed vision system is carried out to monitor objects in invisible fog environment. The experimental result of this newly approach vision system is described in this paper. To see invisible objects in fog

  4. Robot Vision to Monitor Structures in Invisible Fog Environments Using Active Imaging Technology

    International Nuclear Information System (INIS)

    Park, Seungkyu; Park, Nakkyu; Baik, Sunghoon; Choi, Youngsoo; Jeong, Kyungmin

    2014-01-01

    Active vision is a direct visualization technique using a highly sensitive image sensor and a high intensity illuminant. Range-gated imaging (RGI) technique providing 2D and 3D images is one of emerging active vision technologies. The RGI technique extracts vision information by summing time sliced vision images. In the RGI system, objects are illuminated for ultra-short time by a high intensity illuminant and then the light reflected from objects is captured by a highly sensitive image sensor with the exposure of ultra-short time. The RGI system provides 2D and 3D image data from several images and it moreover provides clear images from invisible fog and smoke environment by using summing of time-sliced images. Nowadays, the Range-gated (RG) imaging is an emerging technology in the field of surveillance for security applications, especially in the visualization of invisible night and fog environment. Although RGI viewing was discovered in the 1960's, this technology is, nowadays, more and more applicable by virtue of the rapid development of optical and sensor technologies, such as highly sensitive imaging sensor and ultra-short pulse laser light. In contrast to passive vision systems, this technology enables operation even in harsh environments like fog and smoke. During the past decades, several applications of this technology have been applied in target recognition and in harsh environments, such as fog, underwater vision. Also, this technology has been demonstrated 3D imaging based on range-gated imaging. In this paper, a robot system to monitor structures in invisible fog environment is developed using an active range-gated imaging technique. The system consists of an ultra-short pulse laser device and a highly sensitive imaging sensor. The developed vision system is carried out to monitor objects in invisible fog environment. The experimental result of this newly approach vision system is described in this paper. To see invisible objects in fog

  5. On measuring the masses of pair-produced semi-invisibly decaying particles at hadron colliders

    International Nuclear Information System (INIS)

    Tovey, Daniel R.

    2008-01-01

    A straightforward new technique is introduced which enables measurement at hadron colliders of an analytical combination of the masses of pair-produced semi-invisibly decaying particles and their invisible decay products. The new technique makes use of the invariance under contra-linear Lorentz boosts of a simple combination of the transverse momentum components of the aggregate visible products of each decay chain. In the general case where the invariant masses of the visible decay products are non-zero it is shown that in principle the masses of both the initial particles from the hard scattering and the invisible particles produced in the decay chains can be determined independently. This application is likely to be difficult to realise in practice however due to the contamination of the final state with ISR jets. The technique may be of most use for measurements of SUSY particle masses at the LHC, however the technique should be applicable to any class of hadron collider events in which heavy particles of unknown mass are pair-produced and decay to semi-invisible final states

  6. A Study of Terrorism Emergency Preparedness Policies in School Districts

    Science.gov (United States)

    Umoh, Emmanuel

    2013-01-01

    The threat of terrorism is a concern in public facilities including schools. This study focused on school districts in a southwestern state. Terrorism emergency preparedness policies are well-documented as measures to protect students and staff in school districts from terrorism threats and vulnerabilities. However, those threats and…

  7. All-dielectric invisibility cloaks made of BaTiO3-loaded polyurethane foam

    International Nuclear Information System (INIS)

    Bao Di; Rajab, Khalid Z; Hao Yang; Kallos, Efthymios; Tang, Wenxuan; Argyropoulos, Christos; Piao Yongzhe; Yang Shoufeng

    2011-01-01

    Transformation optics has led the way in the development of electromagnetic invisibility cloaks from science fiction to engineering practice. Invisibility cloaks have been demonstrated over a wide range of the electromagnetic spectrum, and with a variety of different fabrication techniques. However, all previous schemes have relied on the use of metamaterials consisting of arrays of sub-wavelength inclusions. We report on the first cloaking structure made of a high-κ dielectric-loaded foam mixture. A polyurethane foam mixed with different ratios of barium titanate is used to produce the required range of permittivities, and the invisibility cloak is demonstrated to work for all incident angles over a wide range of microwave frequencies. This method will greatly facilitate the development and large-scale manufacture of a wide range of transformation optics-based structures. (paper)

  8. An ultrathin invisibility skin cloak for visible light.

    Science.gov (United States)

    Ni, Xingjie; Wong, Zi Jing; Mrejen, Michael; Wang, Yuan; Zhang, Xiang

    2015-09-18

    Metamaterial-based optical cloaks have thus far used volumetric distribution of the material properties to gradually bend light and thereby obscure the cloaked region. Hence, they are bulky and hard to scale up and, more critically, typical carpet cloaks introduce unnecessary phase shifts in the reflected light, making the cloaks detectable. Here, we demonstrate experimentally an ultrathin invisibility skin cloak wrapped over an object. This skin cloak conceals a three-dimensional arbitrarily shaped object by complete restoration of the phase of the reflected light at 730-nanometer wavelength. The skin cloak comprises a metasurface with distributed phase shifts rerouting light and rendering the object invisible. In contrast to bulky cloaks with volumetric index variation, our device is only 80 nanometer (about one-ninth of the wavelength) thick and potentially scalable for hiding macroscopic objects. Copyright © 2015, American Association for the Advancement of Science.

  9. School is not “place for belly”

    Directory of Open Access Journals (Sweden)

    Denise Raquel Rohr

    2015-11-01

    Full Text Available Public schools and teenage pregnancy were the focus of the master’s dissertation School experiences of mother-girls from the suburbs of Ijui-RS. In this study, the relationship between public schools and pregnant students or teenage mothers is discussed, from the speech of management teams about the actions tried at schools facing issues of sexuality and pregnancy. It is aimed at understanding the limits and possibilities of the school dealing with pregnancy and the perception of oneself as pregnant student. The school seems to be a non place for bellies, once pregnancy of a young student points to a certain strangeness, even though invisible, between the young mother and the school.

  10. ADAM SMITH: THE INVISIBLE HAND OR CONFIDENCE

    Directory of Open Access Journals (Sweden)

    Fernando Luis, Gache

    2010-01-01

    Full Text Available In 1776 Adam Smith raised the matter that an invisible hand was the one which moved the markets to obtain its efficiency. Despite in the present paper we are going to raise the hypothesis, that this invisible hand is in fact the confidence that each person feels when he is going to do business. That in addition it is unique, because it is different from the confidence of the others and that is a variable nonlinear that essentially is ligatured to respective personal histories. For that we are going to take as its bases the paper by Leopoldo Abadía (2009, with respect to the financial economy crisis that happened in 2007-2008, to evidence the form in which confidence operates. Therefore the contribution that we hope to do with this paper is to emphasize that, the level of confidence of the different actors, is the one which really moves the markets, (therefore the economy and that the crisis of the subprime mortgages is a confidence crisis at world-wide level.

  11. Leadership and Conflict in Two School Districts: "Visible" and "Invisible" Factors.

    Science.gov (United States)

    Bridgeland, William M.; Thomas, David M.

    1979-01-01

    In this study, the decision making processes of two Michigan school systems are examined with respect to issues in each community, effectiveness of school leadership, and system differences. Information is based on census data, school data, and intensive interviews with key informants. (Author/WI)

  12. The Signatures of the Invisible exhibition in Geneva

    CERN Multimedia

    Patrice Loïez

    2002-01-01

    The artist Paola Pivi with her work at the Signatures of the Invisible exhibition in Geneva during February 2002. This piece with needles suspended on nylon thread 'detects' people as they approach. The exhibition was for art inspired by research carried out at CERN.

  13. A Framework for School Safety and Risk Management: Results from a Study of 18 Targeted School Shooters

    Science.gov (United States)

    Lenhardt, Ann Marie C.; Graham, Lemuel W.; Farrell, Melissa L.

    2018-01-01

    Targeted violence continues to pose a threat to school safety. Reported here are the results of a study of 18 cases of school shooters from 1996 to 2012. Variables examined are individual factors and behaviors, family dynamics, and triggering events. Results indicate the need for expanded school-based mental health services, threat assessment, and…

  14. MODERN THREATS OF SOCIAL SAFETY OF THE EDUCATION ENVIRONMENT AND THEIR PREVENTION

    Directory of Open Access Journals (Sweden)

    Павел Александрович Кисляков

    2013-04-01

    Full Text Available Purpose: identify modern threats of safety of the school and substantiate the direction of their prevention.Methodology: a theoretical analysis of psychological and pedagogical literature on the issues of safety of students.Results: on the basis of theoretical and empirical analysis identified the following threats of social safety of the education environment: criminal threats, threats of extremism and terrorism, physical and mental abuse, interpersonal conflicts, addictive behavior of students. Substantiates the necessity the design of social safety protection, including space of health, space of tolerance, psychologically comfortable space without violence also providing appropriate training of educators.Practical implications: the system of education.DOI: http://dx.doi.org/10.12731/2218-7405-2013-2-2

  15. The strong CP problem and the visibility of invisible axions

    International Nuclear Information System (INIS)

    Buchmueller, W.

    1986-12-01

    The main subject of these lectures are general properties of axions and recent suggestions of how to detect invisible axions. After a brief review of the strong CP problem and the Peccei-Quinn mechanism in sects. 2 and 3, we discuss axion properties by means of an effective lagrangian approach in sect. 4. Experimental bounds on axion production and decays are reviewed in sect. 5. Sect. 6 deals briefly with the recently proposed variant axion models, and in sect. 7 we discuss the possible relevance of supersymmetry to the strong CP problem. In sect. 8 we then review the different proposals for the detection of invisible axions. Some conclusions are given in sect. 9. (orig./HSI)

  16. Invisible Wars: Iraq, Afghanistan, and Teaching Insurgencies in Public Schools

    Science.gov (United States)

    Doyle, Christopher L.

    2012-01-01

    This author contends that contemporary issues classes no longer have currency, as standardized test results are the litmus test for education. In many schools, students are isolated from firsthand accounts and formal study of events that textbooks will one day proclaim as defining experiences of their generation. According to Doyle, schools tend…

  17. Ortodoncia estética invisible

    OpenAIRE

    Chávez Sevillano, Manuel Gustavo; Soldevilla Galarza, Luciano

    2014-01-01

    El adulto suele ofrecer resistencia a los convencionales tratamientos ortodóncicos, debido a la necesidad de llevar brackets visibles, tanto metálicos como estéticos de porcelana. El concepto de Ortodoncia Estética Invisible u Ortodoncia Lingual cubre las expectativas de este tipo de pacientes. La técnica multibrackets con aparatología lingual tiene aproximadamente 25 años de desarrollo y con la experiencia de los casos tratados, se ha llegado a la concepción de una técnica completamente prot...

  18. Invisible Higgs and Dark Matter

    DEFF Research Database (Denmark)

    Heikinheimo, Matti; Tuominen, Kimmo; Virkajärvi, Jussi Tuomas

    2012-01-01

    We investigate the possibility that a massive weakly interacting fermion simultaneously provides for a dominant component of the dark matter relic density and an invisible decay width of the Higgs boson at the LHC. As a concrete model realizing such dynamics we consider the minimal walking...... technicolor, although our results apply more generally. Taking into account the constraints from the electroweak precision measurements and current direct searches for dark matter particles, we find that such scenario is heavily constrained, and large portions of the parameter space are excluded....

  19. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  20. Radon in Schools

    Science.gov (United States)

    ... Search Search Radon Contact Us Share Radon in Schools Related Information Managing Radon in Schools Radon Measurement ... Radon Could Be a Serious Threat to Your School Chances are you've already heard of radon - ...

  1. Making the invisible visible: gender, data, and evidence for ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-11-30

    Nov 30, 2017 ... ... research projects play a critical role in reducing the invisibility gap. Thinking about gender and the related social categorizations such as class, ability, age, nation, and race when designing data collection and analysis tools ...

  2. Search for an invisibly-decaying Higgs boson at LEP

    CERN Document Server

    Achard, P; Aguilar-Benítez, M; Alcaraz, J; Alemanni, G; Allaby, James V; Aloisio, A; Alviggi, M G; Anderhub, H; Andreev, V P; Anselmo, F; Arefev, A; Azemoon, T; Aziz, T; Bagnaia, P; Bajo, A; Baksay, G; Baksay, L; Baldew, S V; Banerjee, S; Barczyk, A; Barillère, R; Bartalini, P; Basile, M; Batalova, N; Battiston, R; Bay, A; Becattini, F; Becker, U; Behner, F; Bellucci, L; Berbeco, R; Berdugo, J; Berges, P; Bertucci, B; Betev, B L; Biasini, M; Biglietti, M; Biland, A; Blaising, J J; Blyth, S C; Bobbink, G J; Böhm, A; Boldizsar, L; Borgia, B; Bottai, S; Bourilkov, D; Bourquin, Maurice; Braccini, S; Branson, J G; Brochu, F; Burger, J D; Burger, W J; Cai, X D; Capell, M; Cara Romeo, G; Carlino, G; Cartacci, A; Casaus, J; Cavallari, F; Cavallo, N; Cecchi, C; Cerrada, M; Chamizo-Llatas, M; Chang, Y H; Chemarin, M; Chen, A; Chen, G; Chen, G M; Chen, H F; Chen, H S; Chiefari, G; Cifarelli, Luisa; Cindolo, F; Clare, I; Clare, R; Coignet, G; Colino, N; Costantini, S; de la Cruz, B; Cucciarelli, S; van Dalen, J A; De Asmundis, R; Déglon, P L; Debreczeni, J; Degré, A; Dehmelt, K; Deiters, K; Della Volpe, D; Delmeire, E; Denes, P; De Notaristefani, F; De Salvo, A; Diemoz, M; Dierckxsens, M; Dionisi, C; Dittmar, M; Doria, A; Dova, M T; Duchesneau, D; Duda, M; Echenard, B; Eline, A; El-Hage, A; El-Mamouni, H; Engler, A; Eppling, F J; Extermann, P; Falagán, M A; Falciano, S; Favara, A; Fay, J; Fedin, O; Felcini, M; Ferguson, T; Fesefeldt, H S; Fiandrini, E; Field, J H; Filthaut, F; Fisher, P H; Fisher, W; Fisk, I; Forconi, G; Freudenreich, Klaus; Furetta, C; Galaktionov, Yu; Ganguli, S N; García-Abia, P; Gataullin, M; Gentile, S; Giagu, S; Gong, Z F; Grenier, G; Grimm, O; Grünewald, M W; Guida, M; Gupta, V K; Gurtu, A; Gutay, L J; Haas, D; Hatzifotiadou, D; Hebbeker, T; Hervé, A; Hirschfelder, J; Hofer, H; Hohlmann, M; Holzner, G; Hou, S R; Hu, Y; Jin, B N; Jones, L W; de Jong, P; Josa-Mutuberria, I; Kaur, M; Kienzle-Focacci, M N; Kim, J K; Kirkby, Jasper; Kittel, E W; Klimentov, A; König, A C; Kopal, M; Koutsenko, V F; Kraber, M; Krämer, R W; Krüger, A; Kunin, A; Ladrón de Guevara, P; Laktineh, I; Landi, G; Lebeau, M; Lebedev, A; Lebrun, P; Lecomte, P; Lecoq, P; Le Coultre, P; Le Goff, J M; Leiste, R; Levtchenko, M; Levchenko, P M; Li, C; Likhoded, S; Lin, C H; Lin, W T; Linde, Frank L; Lista, L; Liu, Z A; Lohmann, W; Longo, E; Lü, Y S; Luci, C; Luminari, L; Lustermann, W; Ma Wen Gan; Malgeri, L; Malinin, A; Maña, C; Mans, J; Martin, J P; Marzano, F; Mazumdar, K; McNeil, R R; Mele, S; Merola, L; Meschini, M; Metzger, W J; Mihul, A; Milcent, H; Mirabelli, G; Mnich, J; Mohanty, G B; Muanza, G S; Muijs, A J M; Musicar, B; Musy, M; Nagy, S; Natale, S; Napolitano, M; Nessi-Tedaldi, F; Newman, H; Nisati, A; Novák, T; Nowak, H; Ofierzynski, R A; Organtini, G; Pal, I; Palomares, C; Paolucci, P; Paramatti, R; Passaleva, G; Patricelli, S; Paul, T; Pauluzzi, M; Paus, C; Pauss, Felicitas; Pedace, M; Pensotti, S; Perret-Gallix, D; Petersen, B; Piccolo, D; Pierella, F; Pioppi, M; Piroué, P A; Pistolesi, E; Plyaskin, V; Pohl, M; Pozhidaev, V; Pothier, J; Prokofev, D; Prokofiev, D O; Quartieri, J; Rahal-Callot, G; Rahaman, M A; Raics, P; Raja, N; Ramelli, R; Rancoita, P G; Ranieri, R; Raspereza, A V; Razis, P; Ren, D; Rescigno, M; Reucroft, S; Riemann, S; Riles, K; Roe, B P; Romero, L; Rosca, A; Rosemann, C; Rosenbleck, C; Rosier-Lees, S; Roth, S; Rubio, J A; Ruggiero, G; Rykaczewski, H; Sakharov, A; Saremi, S; Sarkar, S; Salicio, J; Sánchez, E; Schäfer, C; Shchegelskii, V; Schopper, Herwig Franz; Schotanus, D J; Sciacca, C; Servoli, L; Shevchenko, S; Shivarov, N; Shoutko, V; Shumilov, E; Shvorob, A; Son, D; Souga, C; Spillantini, P; Steuer, M; Stickland, D P; Stoyanov, B; Strässner, A; Sudhakar, K; Sultanov, G G; Sun, L Z; Sushkov, S; Suter, H; Swain, J D; Szillási, Z; Tang, X W; Tarjan, P; Tauscher, L; Taylor, L; Tellili, B; Teyssier, D; Timmermans, C; Ting, Samuel C C; Ting, S M; Tonwar, S C; Tóth, J; Tully, C; Tung, K L; Ulbricht, J; Valente, E; Van de Walle, R T; Vásquez, R; Veszpremi, V; Vesztergombi, G; Vetlitskii, I; Vicinanza, D; Viertel, Gert M; Villa, S; Vivargent, M; Vlachos, S; Vodopyanov, I; Vogel, H; Vogt, H; Vorobev, I; Vorobyov, A A; Wadhwa, M; Wang, Q; Wang, X L; Wang, Z M; Weber, M; Wilkens, H; Wynhoff, S; Xia, L; Xu, Z Z; Yamamoto, J; Yang, B Z; Yang, C G; Yang, H J; Yang, M; Yeh, S C; Zalite, A; Zalite, Yu; Zhang, Z P; Zhao, J; Zhu, G Y; Zhu, R Y; Zhuang, H L; Zichichi, A; Zimmermann, B; Zöller, M

    2005-01-01

    A search for a Higgs boson produced in e^+e^- collisions in association with a Z boson and decaying into invisible particles is performed. Data collected at LEP with the L3 detector at centre-of-mass energies from 189 GeV to 209 GeV are used, corresponding to an integrated luminosity of 0.63/fb. Events with hadrons, electrons or muons with visible masses compatible with a Z boson and missing energy and momentum are selected. They are consistent with the Standard Model expectations. A lower limit of 112.3 GeV is set at 95% confidence level on the mass of the invisibly-decaying Higgs boson in the hypothesis that its production cross section equals that of the Standard Model Higgs boson. Relaxing this hypothesis, upper limits on the production cross section are derived.

  3. Eagle-i: Making Invisible Resources, Visible

    Science.gov (United States)

    Haendel, M.; Wilson, M.; Torniai, C.; Segerdell, E.; Shaffer, C.; Frost, R.; Bourges, D.; Brownstein, J.; McInnerney, K.

    2010-01-01

    RP-134 The eagle-i Consortium – Dartmouth College, Harvard Medical School, Jackson State University, Morehouse School of Medicine, Montana State University, Oregon Health and Science University (OHSU), the University of Alaska, the University of Hawaii, and the University of Puerto Rico – aims to make invisible resources for scientific research visible by developing a searchable network of resource repositories at research institutions nationwide. Now in early development, it is hoped that the system will scale beyond the consortium at the end of the two-year pilot. Data Model & Ontology: The eagle-i ontology development team at the OHSU Library is generating the data model and ontologies necessary for resource indexing and querying. Our indexing system will enable cores and research labs to represent resources within a defined vocabulary, leading to more effective searches and better linkage between data types. This effort is being guided by active discussions within the ontology community (http://RRontology.tk) bringing together relevant preexisting ontologies in a logical framework. The goal of these discussions is to provide context for interoperability and domain-wide standards for resource types used throughout biomedical research. Research community feedback is welcomed. Architecture Development, led by a team at Harvard, includes four main components: tools for data collection, management and curation; an institutional resource repository; a federated network; and a central search application. Each participating institution will populate and manage their repository locally, using data collection and curation tools. To help improve search performance, data tools will support the semi-automatic annotation of resources. A central search application will use a federated protocol to broadcast queries to all repositories and display aggregated results. The search application will leverage the eagle-i ontologies to help guide users to valid queries via auto

  4. Testing invisible momentum ansatze in missing energy events at the LHC

    Science.gov (United States)

    Kim, Doojin; Matchev, Konstantin T.; Moortgat, Filip; Pape, Luc

    2017-08-01

    We consider SUSY-like events with two decay chains, each terminating in an invisible particle, whose true energy and momentum are not measured in the detector. Nevertheless, a useful educated guess about the invisible momenta can still be obtained by optimizing a suitable invariant mass function. We review and contrast several proposals in the literature for such ansatze: four versions of the M T 2-assisted on-shell reconstruction (MAOS), as well as several variants of the on-shell constrained M 2 variables. We compare the performance of these methods with regards to the mass determination of a new particle resonance along the decay chain from the peak of the reconstructed invariant mass distribution. For concreteness, we consider the event topology of dilepton t\\overline{t} events and study each of the three possible subsystems, in both a t\\overline{t} and a SUSY example. We find that the M 2 variables generally provide sharper peaks and therefore better ansatze for the invisible momenta. We show that the performance can be further improved by preselecting events near the kinematic endpoint of the corresponding variable from which the momentum ansatz originates.

  5. Whiteness and Ethnocentric Monoculturalism: Making the "Invisible" Visible

    Science.gov (United States)

    Sue, Derald Wing

    2004-01-01

    Whiteness and ethnocentric monoculturalism are powerful and entrenched determinants of worldview. Because they are invisible and operate outside the level of conscious awareness, they can be detrimental to people of color, women, and other marginalized groups in society. Both define a reality that gives advantages to White Euro American males…

  6. Diffusive-light invisibility cloak for transient illumination

    Science.gov (United States)

    Orazbayev, B.; Beruete, M.; Martínez, A.; García-Meca, C.

    2016-12-01

    Invisibility in a diffusive-light-scattering medium has been recently demonstrated by employing a scattering-cancellation core-shell cloak. Unlike nondiffusive cloaks, such a device can be simultaneously macroscopic, broadband, passive, polarization independent, and omnidirectional. Unfortunately, it has been verified that this cloak, as well as more sophisticated ones based on transformation optics, fail under pulsed illumination, invalidating their use for a variety of applications. Here, we introduce a different approach based on unimodular transformations that enables the construction of unidirectional diffusive-light cloaks exhibiting a perfect invisibility effect, even under transient conditions. Moreover, we demonstrate that a polygonal cloak can extend this functionality to multiple directions with a nearly ideal behavior, while preserving all other features. We propose and numerically verify a simple cloak realization based on a layered stack of two isotropic materials. The studied devices have several applications not addressable by any of the other cloaks proposed to date, including shielding from pulse-based detection techniques, cloaking undesired scattering elements in time-of-flight imaging or high-speed communication systems for diffusive environments, and building extreme optical security features. The discussed cloaking strategy could also be applied to simplify the implementation of thermal cloaks.

  7. Invisible Barriers: The Loneliness of School Principals at Turkish ...

    African Journals Online (AJOL)

    x

    2016-11-10

    Nov 10, 2016 ... Department of Educational Administration, College of Education, Yildiz Technical ... The participants of the study consisted of seven elementary school principals. ..... Technical University to conduct this study, and was.

  8. The Visible and the Invisible: Mathematics as Revelation

    Science.gov (United States)

    Roth, Wolff-Michael; Maheux, Jean-François

    2015-01-01

    Mathematics educators have shown increasing interest in theorizing knowing and learning as something alive or as something that comes alive through the involvement of the body. Almost all current efforts attempt doing so by focusing on the body in which the otherwise invisible living being exhibits itself, thereby failing to consider everything…

  9. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  10. Daily negative affect and smoking after a self-set quit attempt: The role of dyadic invisible social support in a daily diary study.

    Science.gov (United States)

    Lüscher, Janina; Stadler, Gertraud; Ochsner, Sibylle; Rackow, Pamela; Knoll, Nina; Hornung, Rainer; Scholz, Urte

    2015-11-01

    Social support receipt from one's partner is assumed to be beneficial for successful smoking cessation. However, support receipt can have costs. Recent research suggests that the most effective support is unnoticed by the receiver (i.e., invisible). Therefore, this study examined the association between everyday levels of dyadic invisible emotional and instrumental support, daily negative affect, and daily smoking after a self-set quit attempt in smoker-non-smoker couples. Overall, 100 smokers (72.0% men, mean age M = 40.48, SD = 9.82) and their non-smoking partners completed electronic diaries from a self-set quit date on for 22 consecutive days, reporting daily invisible emotional and instrumental social support, daily negative affect, and daily smoking. Same-day multilevel analyses showed that at the between-person level, higher individual mean levels of invisible emotional and instrumental support were associated with less daily negative affect. In contrast to our assumption, more receipt of invisible emotional and instrumental support was related to more daily cigarettes smoked. The findings are in line with previous results, indicating invisible support to have beneficial relations with affect. However, results emphasize the need for further prospective daily diary approaches for understanding the dynamics of invisible support on smoking cessation. Statement of contribution What is already known on this subject? Social support receipt from a close other has proven to have emotional costs. According to current studies, the most effective social support is unnoticed by the receiver (i.e., invisible). There is empirical evidence for beneficial effects of invisible social support on affective well-being. What does this study add? Confirming benefits of invisible social support for negative affect in a health behaviour change setting Providing first evidence for detrimental effects of invisible social support on smoking. © 2015 The British Psychological Society.

  11. Invisible Barriers: The Loneliness of School Principals at Turkish ...

    African Journals Online (AJOL)

    x

    2016-11-10

    Nov 10, 2016 ... Keywords: barriers; loneliness at work; school principals; Turkish elementary ... competencies as they face the challenges of their position (Howard & Mallory, 2008). ..... of the participants was female and six of them were.

  12. Magnetically controlled multifrequency invisibility cloak with a single shell of ferrite material

    Science.gov (United States)

    Wang, Xiaohua; Liu, Youwen

    2015-02-01

    A magnetically controlled multifrequency invisibility cloak with a single shell of the isotropic and homogeneous ferrite material has been investigated based on the scattering cancellation method from the Mie scattering theory. The analytical and simulated results have demonstrated that such this shell can drastically reduce the total scattering cross-section of this cloaking system at multiple frequencies. These multiple cloaking frequencies of this shell can be externally controlled since the magnetic permeability of ferrites is well tuned by the applied magnetic field. This may provide a potential way to design a tunable multifrequency invisibility cloak with considerable flexibility.

  13. Search for Invisible Axion Dark Matter with the Axion Dark Matter Experiment.

    Science.gov (United States)

    Du, N; Force, N; Khatiwada, R; Lentz, E; Ottens, R; Rosenberg, L J; Rybka, G; Carosi, G; Woollett, N; Bowring, D; Chou, A S; Sonnenschein, A; Wester, W; Boutan, C; Oblath, N S; Bradley, R; Daw, E J; Dixit, A V; Clarke, J; O'Kelley, S R; Crisosto, N; Gleason, J R; Jois, S; Sikivie, P; Stern, I; Sullivan, N S; Tanner, D B; Hilton, G C

    2018-04-13

    This Letter reports the results from a haloscope search for dark matter axions with masses between 2.66 and 2.81  μeV. The search excludes the range of axion-photon couplings predicted by plausible models of the invisible axion. This unprecedented sensitivity is achieved by operating a large-volume haloscope at subkelvin temperatures, thereby reducing thermal noise as well as the excess noise from the ultralow-noise superconducting quantum interference device amplifier used for the signal power readout. Ongoing searches will provide nearly definitive tests of the invisible axion model over a wide range of axion masses.

  14. The scattering of a cylindrical invisibility cloak: reduced parameters and optimization

    International Nuclear Information System (INIS)

    Peng, L; Mortensen, N A; Ran, L

    2011-01-01

    We investigate the scattering of 2D cylindrical invisibility cloaks with simplified constitutive parameters with the assistance of scattering coefficients. We show that the scattering of the cloaks originates not only from the boundary conditions but also from the spatial variation of the component of permittivity/permeability. According to our formulation, we propose some restrictions to the invisibility cloak in order to minimize its scattering after the simplification has taken place. With our theoretical analysis, it is possible to design a simplified cloak using some peculiar composites such as photonic crystals which mimic an effective refractive index landscape rather than offering effective constitutives, meanwhile cancelling the scattering from the inner and outer boundaries.

  15. Invisible metal-grid transparent electrode prepared by electrohydrodynamic (EHD) jet printing

    International Nuclear Information System (INIS)

    Jang, Yonghee; Byun, Doyoung; Kim, Jihoon

    2013-01-01

    Invisible Ag-grid transparent electrodes (TEs) were prepared by electrohydrodynamic (EHD) jet printing using Ag nano-particle inks. Ag-grid width less than 10 µm was achieved by the EHD jet printing, which was invisible to the naked eye. The Ag-grid line-to-line distance (pitch) was modulated in order to investigate the electrical and optical properties of the EHD jet-printed Ag-grid TEs. The decrease in the sheet resistance at the expense of the transmittance was observed as the Ag-grid pitch decreased. The figure of merit of Ag-grid TEs with various Ag-grid pitches was investigated in order to determine the optimum pitch condition for both electrical and optical properties. With the 150 µm Ag-grid pitch, the EHD jet-printed Ag-grid TE has the sheet resistance of 4.87 Ω sq −1 and the transmittance of 81.75% after annealing at 200 °C under near-infrared. Ag filling factor (FF) was defined to predict the electrical and optical properties of Ag-grid TEs. It was found that the measured electrical and optical properties were well simulated by the theoretical equations incorporating FF. The EHD jet-printed invisible Ag-grid TE with good electrical and optical properties implies its promising application to the printed optoelectronic devices. (paper)

  16. Motivation and detectability of an invisibly decaying Higgs boson at the Fermilab Tevatron

    International Nuclear Information System (INIS)

    Martin, S.P.; Wells, J.D.

    1999-01-01

    A Higgs boson with a mass below 150 GeV has a total decay width of less than 20 MeV into accessible standard model states. This narrow width means that the usual branching fractions for such a light Higgs boson are highly susceptible to any new particles to which it has unsuppressed couplings. In particular, there are many reasonable and interesting theoretical ideas that naturally imply an invisibly decaying Higgs boson. The motivations include models with light supersymmetric neutralinos, spontaneously broken lepton number, radiatively generated neutrino masses, additional singlet scalar(s), or right-handed neutrinos in the extra dimensions of TeV gravity. We discuss these approaches to model building and their implications for Higgs boson phenomenology in future Fermilab Tevatron runs. We find, for example, that the Tevatron with 30 fb -1 integrated luminosity can make a 3σ observation in the l + l - +E/ T channel for a 125 GeV Higgs boson that is produced with the same strength as the standard model Higgs boson but always decays invisibly. We also analyze the b bar b+E/ T final state signal and conclude that it is not as sensitive, but it may assist in excluding the possibility of an invisibly decaying Higgs boson or enable confirmation of an observed signal in the dilepton channel. We argue that a comprehensive Higgs boson search at the Tevatron should include the possibility that the Higgs boson decays invisibly. copyright 1999 The American Physical Society

  17. Invisible excess of sense in social interaction

    Czech Academy of Sciences Publication Activity Database

    Koubová, Alice

    Roč. 5, September /article 1081 (2014), s. 1-11 ISSN 1664-1078 R&D Projects: GA ČR GAP401/10/1164 Institutional support: RVO:67985955 Keywords : participatory sense-making * enactive theory * Merleau-Ponty * invisibility * opacity * (Inter)acting with the inner partner * performativity * dramaturgical analysis Subject RIV: AA - Philosophy ; Religion Impact factor: 2.560, year: 2014 http://journal.frontiersin.org/Journal/10.3389/fpsyg.2014.01081/abstract

  18. Children's Attributions of Intentions to an Invisible Agent

    Science.gov (United States)

    Bering, Jesse M.; Parker, Becky D.

    2006-01-01

    Children ages 3-9 years were informed that an invisible agent (Princess Alice) would help them play a forced-choice game by "telling them, somehow, when they chose the wrong box," whereas a matched control group of children were not given this supernatural prime. On 2 unexpected event trials, an experimenter triggered a simulated unexpected event…

  19. Invisible Culture: Taking Art Education to the Streets

    Science.gov (United States)

    Darts, David

    2011-01-01

    Art educators and administrators allowed a project to evolve based on the "street life" experiences of ordinarily invisible people. The goal was to create a space or number of spaces for celebrating the human spirit through art, music, dance, poetry, theater, and story while also providing a forum for exploring some of the social issues affecting…

  20. Aligners: the Invisible Corrector-A Boon or Bane.

    Science.gov (United States)

    Mahendra, Lodd

    2018-03-01

    The trend of clinical orthodontics has shown a palpable shift from conventional braces to innovative technologies like invisible aligners. Aligners are sequences of clear trays worn by patients to straighten their teeth. They were envisaged for the main purpose of esthetics, mainly directed toward self-conscious teenagers who otherwise would shy away from essential correction of malocclusion.

  1. Mass restricting variables in semi-invisible production at the LHC

    Indian Academy of Sciences (India)

    Partha Konar

    2017-10-05

    Oct 5, 2017 ... in reconstructing such events with the momenta of invisible particles. This feature is .... Exclusive methods – These variables are defined with the assumption that the ... ble independent invariant mass variables using the SM.

  2. Aunting as a Call to Public Intellectualism: The Roles of (In)Visibility in Health Communication Research and Service.

    Science.gov (United States)

    Tikkanen, Stephanie A

    2017-08-01

    In this essay, the author identifies the theme of (in)visibility permeating her research on fathers of children with a rare genetic condition, Sturge-Weber syndrome. The tension between physical visibility of the condition and lack of awareness is explored, alongside issues of (in)visibility in coping and support-seeking strategies of fathers. Finally, the author examines her own experiences in the research process through the lens of (in)visibility, in both managing her own emotions and exploring her roles as a researcher, an aunt, and a public intellectual.

  3. Asymmetric Invisibility Cloaking Theory Based on the Concept of Effective Electromagnetic Fields for Photons

    Science.gov (United States)

    Amemiya, Tomo; Taki, Masato; Kanazawa, Toru; Arai, Shigehisa

    2014-03-01

    The asymmetric invisibility cloak is a special cloak with unidirectional transparency; that is, a person in the cloak should not be seen from the outside but should be able to see the outside. Existing theories of designing invisibility cloaks cannot be used for asymmetric cloaking because they are based on the transformation optics that uses Riemannian metric tensor independent of direction. To overcome this problem, we propose introducing directionality into invisibility cloaking. Our theory is based on ``the theory of effective magnetic field for photons'' proposed by Stanford University.[2] To realize asymmetric cloaking, we have extended the Stanford's theory to add the concept of ``effective electric field for photons.'' The effective electric and the magnetic field can be generated using a photonc resonator lattice, which is a kind of metamaterial. The Hamiltonian for photons in these fields has a similar form to that of the Hamiltonian for a charged particle in an electromagnetic field. An incident photon therefore experiences a ``Lorentz-like'' and a ``Coulomb-like'' force and shows asymmetric movement depending of its travelling direction.We show the procedure of designing actual invisibility cloaks using the photonc resonator lattice and confirm their operation with the aid of computer simulation. This work was supported in part by the MEXT; JSPS KAKENHI Grant Numbers #24246061, #24656046, #25420321, #25420322.

  4. Optimized cylindrical invisibility cloak with minimum layers of non-magnetic isotropic materials

    International Nuclear Information System (INIS)

    Yu Zhenzhong; Feng Yijun; Xu Xiaofei; Zhao Junming; Jiang Tian

    2011-01-01

    We present optimized design of cylindrical invisibility cloak with minimum layers of non-magnetic isotropic materials. Through an optimization procedure based on genetic algorithm, simpler cloak structure and more realizable material parameters can be achieved with better cloak performance than that of an ideal non-magnetic cloak with a reduced set of parameters. We demonstrate that a cloak shell with only five layers of two normal materials can result in an average 20 dB reduction in the scattering width for all directions when covering the inner conducting cylinder with the cloak. The optimized design can substantially simplify the realization of the invisibility cloak, especially in the optical range.

  5. Invisible Connections : Why Migrating Shorebirds Need the Yellow Sea

    NARCIS (Netherlands)

    van de Kam, Jan; Battley, Phil; McCaffery, Brian; Rogers, Danny; Hong, Jae-Sang; Moores, Nial; Yong-ki, Yu; Lewis, Jan; Piersma, Theunis

    2010-01-01

    Each year, invisible to the naked eye, millions of migrating shorebirds fly from Australasia towards the tidal flats of the Yellow Sea bordering China and Korea. Each flock is made up of individuals using whatever strategies they can muster to endure the flights, weather the storms and find safe

  6. Narratives of the Invisible: Autobiography, Kinship, and Alterity in Native Amazonia.

    Science.gov (United States)

    Grotti, Vanessa Elisa; Brightman, Marc

    2016-03-01

    Shamanic knowledge is based on an ambiguous commensality with invisible others. As a result, shamans oscillate constantly between spheres of intimacy, both visible and invisible. A place of power and transformation, the spirit world is rarely described by native interlocutors in an objective, detached way; rather, they depict it in terms of events and experiences. Instead of examining the formal qualities of accounts of the spirit world through analyses of ritual performance and shamanic quests, we focus on life histories as autobiographical accounts in order to explore what they reveal about the relationship between personal history (and indigenous historicity) and the spirit world. We introduce the term 'double reflexivity' to refer to processes by which narratives about the self are produced through relationships with alterity.

  7. Influence of removal of invisible fixation on the saccadic and manual gap effect.

    Science.gov (United States)

    Ueda, Hiroshi; Takahashi, Kohske; Watanabe, Katsumi

    2014-01-01

    Saccadic and manual reactions to a peripherally presented target are facilitated by removing a central fixation stimulus shortly before a target onset (the gap effect). The present study examined the effects of removal of a visible and invisible fixation point on the saccadic gap effect and the manual gap effect. Participants were required to fixate a central fixation point and respond to a peripherally presented target as quickly and accurately as possible by making a saccade (Experiment 1) or pressing a corresponding key (Experiment 2). The fixation point was dichoptically presented, and visibility was manipulated by using binocular rivalry and continuous flash suppression technique. In both saccade and key-press tasks, removing the visible fixation strongly quickened the responses. Furthermore, the invisible fixation, which remained on the display but suppressed, significantly delayed the saccadic response. Contrarily, the invisible fixation had no effect on the manual task. These results indicate that partially different processes mediate the saccadic gap effect and the manual gap effect. In particular, unconscious processes might modulate an oculomotor-specific component of the saccadic gap effect, presumably via subcortical mechanisms.

  8. Signals for invisible matter from solar-terrestrial observations

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    We observe a strong correlation between the orbital position of the planets with solar phenomena like flares or the variation of EUV irradiance. Similarly, a correlation is found in the study of the ionization content of the Earth atmosphere. Planetary gravitational lensing of one (or more) streams of slow moving invisible matter is proposed as an explanation of such a behaviour.

  9. The Invisible Web

    CERN Multimedia

    Katarina Anthony

    2010-01-01

    There is an invisible web beneath CERN that keeps the entire system going. It often goes unnoticed, yet is responsible for transmitting the vast amounts of data produced at CERN: the optical fibre network.   CERN’s 35,000 km of optical fibres are also used to synchronise the accelerators, take measurements of the beams and to send controls to the LHC. The network is maintained by a team of seven specialists working in the Cabling and Optical Fibres Section of the Engineering Department, while another eight specialists are responsible for copper control and direct current (DC) power cabling (412,000 cables at CERN). Although their work is essential to keep the LHC running, their record-breaking developments often go unspoken. In a recent seminar held on 14 October, the Optical Fibre team had the opportunity to present their exceptional work with radiation-resistant optical fibres. Daniel Ricci at the CCC optical fibre “starpoint”, which serves the LHC installation...

  10. Simulation Study of Invisible Decays of the Higgs Boson with the Circular Electron Positron Collider

    Science.gov (United States)

    Jyotishmati, Susmita

    A Higgs-like boson has been discovered by the experiments ATLAS and CMS at the LHC. We need to verify that it is the Standard Model (SM) Higgs and understand its nature. A Circular Electron Positron Collider (CEPC), has been proposed as a Higgs factory for detailed study of the Higgs boson. In this dissertation we study the feasibility of measuring the H → Invisible decays at the CEPC. Dark Matter (DM) interacts with matter by gravity, thus appears to be invisible in the CEPC experiment. If Higgs boson couples to DM it could be an important "portal" to New Physics. A Monte Carlo analysis of H → Invisible optimized to achieve high signal significance, and low backgrounds in the e +e- → ZH, Z → mu +mu- channel based on an integrated luminosity of 5 ab-1 expected for ten years run of the CEPC, is performed. Precision on the Higgs to invisible branching ratio at the input values of 0.1%(SM) and Beyond Standard Model (BSM) cases 0%, 1%, 5% and 10% is determined. Two approaches have been employed. They are the cut-based analysis and the multivariate analysis. Based on this dissertation study a baseline analysis approach is recommended for future CEPC design and studies.

  11. Inverse problems, invisibility, and artificial wormholes

    International Nuclear Information System (INIS)

    Greenleaf, A; Kurylev, Y; Lassas, M; Uhlmann, G

    2008-01-01

    We will describe recent theoretical and experimental progress on making objects invisible to electromagnetic waves. Maxwell's equations have transformation laws that allow for design of electromagnetic parameters that would steer light around a hidden region, returning it to its original path on the far side. Not only would observers be unaware of the contents of the hidden region, they would not even be aware that something was hidden. The object would have no shadow. New advances in metamaterials have given some experimental evidence that this indeed can be made possible at certain frequencies

  12. Electromagnetic Invisibility of Elliptic Cylinder Cloaks

    International Nuclear Information System (INIS)

    Kan, Yao; Chao, Li; Fang, Li

    2008-01-01

    Structures with unique electromagnetic properties are designed based on the approach of spatial coordinate transformations of Maxwell's equations. This approach is applied to scheme out invisible elliptic cylinder cloaks, which provide more feasibility for cloaking arbitrarily shaped objects. The transformation expressions for the anisotropic material parameters and the field distribution are derived. The cloaking performances of ideal and lossy elliptic cylinder cloaks are investigated by finite element simulations. It is found that the cloaking performance will degrade in the forward direction with increasing loss. (fundamental areas of phenomenology (including applications))

  13. Mujeres invisibles en el Perú

    OpenAIRE

    Sköld, Luz Marina

    2007-01-01

    En el Perú, actualmente existen aproximadamente un millón de personas que no tienen un documento de identidad y no figuran en los registros del Estado. Son consideradas personas invisibles porque no existen le-galmente. De acuerdo a estudios realizados, este grupo de personas tiene un rostro específico; se trata de una población pobre, rural y principal-mente de mujeres. El 53% de las mujeres indocumentadas residen en el área rural. Las causas que originan la indocumentación son varias, entre...

  14. Ironic inversion in Eliza Haywood's fiction: fantomina and "The History of the Invisible Mistress".

    Science.gov (United States)

    Hinnant, Charles H

    2010-01-01

    This article contends that Fantomina can best be understood as an ironic inversion of “The History of the Invisible Mistress”, a Spanish nouvelle published as an interpolated tale in Paul Scarron's Le Roman Comique. Both works revolve around the efforts of a heroine to capture and hold the attention of a young man upon whom she has set her heart. The plot of both works concerns the successive disguises by which the heroines seek to test their heroes. But where Don Carlos, the hero of “The History of the Invisible Mistress”, remains chaste and faithful to his initial pledge, Beauplaisir, with whom Fantomina becomes sexually involved, displays the inconstancy of a roving libertine. Hence, where “The History of the Invisible Mistress” ends happily in marriage, Fantomina concludes with its heroine's pregnancy and exile in disgrace by her mother to a monastery in France. A comparison of the two texts affords a fascinating glimpse into Haywood's aims and strategies in Fantomina.

  15. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  16. Instantaneous, Simple, and Reversible Revealing of Invisible Patterns Encrypted in Robust Hollow Sphere Colloidal Photonic Crystals.

    Science.gov (United States)

    Zhong, Kuo; Li, Jiaqi; Liu, Liwang; Van Cleuvenbergen, Stijn; Song, Kai; Clays, Koen

    2018-05-04

    The colors of photonic crystals are based on their periodic crystalline structure. They show clear advantages over conventional chromophores for many applications, mainly due to their anti-photobleaching and responsiveness to stimuli. More specifically, combining colloidal photonic crystals and invisible patterns is important in steganography and watermarking for anticounterfeiting applications. Here a convenient way to imprint robust invisible patterns in colloidal crystals of hollow silica spheres is presented. While these patterns remain invisible under static environmental humidity, even up to near 100% relative humidity, they are unveiled immediately (≈100 ms) and fully reversibly by dynamic humid flow, e.g., human breath. They reveal themselves due to the extreme wettability of the patterned (etched) regions, as confirmed by contact angle measurements. The liquid surface tension threshold to induce wetting (revealing the imprinted invisible images) is evaluated by thermodynamic predictions and subsequently verified by exposure to various vapors with different surface tension. The color of the patterned regions is furthermore independently tuned by vapors with different refractive indices. Such a system can play a key role in applications such as anticounterfeiting, identification, and vapor sensing. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. Anti-Counterfeiting Quick Response Code with Emission Color of Invisible Metal-Organic Frameworks as Encoding Information.

    Science.gov (United States)

    Wang, Yong-Mei; Tian, Xue-Tao; Zhang, Hui; Yang, Zhong-Rui; Yin, Xue-Bo

    2018-06-08

    Counterfeiting is a global epidemic that is compelling the development of new anti-counterfeiting strategy. Herein, we report a novel multiple anti-counterfeiting encoding strategy of invisible fluorescent quick response (QR) codes with emission color as information storage unit. The strategy requires red, green, and blue (RGB) light-emitting materials for different emission colors as encrypting information, single excitation for all of the emission for practicability, and ultraviolet (UV) excitation for invisibility under slight. Therefore, RGB light-emitting nanoscale metal-organic frameworks (NMOFs) are designed as inks to construct the colorful light-emitting boxes for information encrypting, while three black vertex boxes were used for positioning. Full-color emissions are obtained by mixing the trichromatic NMOFs inks through inkjet printer. The encrypting information capacity is easily adjusted by the number of light-emitting boxes with the infinite emission colors. The information is decoded with specific excitation light at 275 nm, making the QR codes invisible under daylight. The composition of inks, invisibility, inkjet printing, and the abundant encrypting information all contribute to multiple anti-counterfeiting. The proposed QR codes pattern holds great potential for advanced anti-counterfeiting.

  18. ADAM SMITH: LA MANO INVISIBLE O LA CONFIANZA

    Directory of Open Access Journals (Sweden)

    Gache, Fernando Luis

    2010-12-01

    Full Text Available En 1776 Adam Smith planteó que una mano invisible era quien movía a los mercados para obtener su eficiencia. No obstante en el presente trabajo vamos a plantear la hipótesis, que dicha mano invisible, es en realidad la confianza que cada persona siente en el momento de hacer un negocio. Que además es única, pues es distinta a la confianza de los demás y que se trata de una variable no lineal que fundamentalmente está ligada a las respectivas historias personales. Para ello vamos a tomar como base el trabajo de Leopoldo Abadía (2009, respecto de la crisis económico financiera que se desató en el 2007-2008, para poner en evidencia la forma en que opera la confianza. Por lo tanto la contribución que esperamos hacer con este trabajo es destacar que, el nivel de confianza de los diferentes actores, es quien realmente mueve a los mercados, (por tanto la economía y que la crisis de las hipotecas subprime es una crisis de confianza a nivel mundial.

  19. Raising consciousness about the nuclear threat through music

    Energy Technology Data Exchange (ETDEWEB)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  20. Through the Wormhole: Tracking Invisible MPLS Tunnels

    OpenAIRE

    Vanaubel, Yves; Mérindol, Pascal; Pansiot, Jean-Jacques; Donnet, Benoît

    2017-01-01

    For years, Internet topology research has been conducted through active measurement. For instance, CAIDA builds router level topologies on top of IP level traces obtained with traceroute. The resulting graphs contain a significant amount of nodes with a very large degree, often exceeding the actual number of interfaces of a router. Although this property may result from inaccurate alias resolution, we believe that opaque MPLS clouds made of invisible tunnels are the main cause. Using Layer-2...

  1. The Visibility and Invisibility of Performance Management in Schools

    Science.gov (United States)

    Page, Damien

    2015-01-01

    This article presents findings from a study of performance management in 10 schools, five primary and five secondary. The aim was to gain a snapshot of how headteachers are interpreting and implementing the reforms to the performance and capability procedures for teachers introduced in September 2013. The findings suggest that the evaluation of…

  2. Phenomenology of a leptonic goldstino and invisible Higgs boson decays

    CERN Document Server

    Antoniadis, Ignatios; Zwirner, Fabio; Antoniadis, Ignatios; Tuckmantel, Marc; Zwirner, Fabio

    2005-01-01

    Non-linearly realized supersymmetry, combined with the Standard Model field content and SU(3)XSU(2)XU(1) gauge invariance, permits local dimension-six operators involving a goldstino, a lepton doublet and a Higgs doublet. These interactions preserve total lepton number if the left-handed goldstino transforms as an antilepton. We discuss the resulting phenomenology, in the simple limit where the new couplings involve only one lepton family, thus conserving also lepton flavour. Both the Z boson and the Higgs boson can decay into a neutrino and a goldstino: the present limits from the invisible Z width and from other observables leave room for the striking possibility of a Higgs boson decaying dominantly, or at least with a sizable branching ratio, via such an invisible mode. We finally comment on the perspectives at hadron and lepton colliders, and on possible extensions of our analysis.

  3. Object permanence in dogs: invisible displacement in a rotation task.

    Science.gov (United States)

    Miller, Holly C; Gipson, Cassie D; Vaughan, Aubrey; Rayburn-Reeves, Rebecca; Zentall, Thomas R

    2009-02-01

    Dogs were tested for object permanence using an invisible displacement in which an object was hidden in one of two containers at either end of a beam and the beam was rotated. Consistent with earlier research, when the beam was rotated 180 degrees , the dogs failed to find the object. However, when the beam was rotated only 90 degrees , they were successful. Furthermore, when the dogs were led either 90 degrees or 180 degrees around the apparatus, they were also successful. In a control condition, when the dogs could not see the direction of the 90 degrees rotation, they failed to find the object. The results suggest that the 180 degrees rotation may produce an interfering context that can be reduced by rotating the apparatus only 90 degrees or by changing the dogs' perspective. Once the conflict is eliminated, dogs show evidence of object permanence that includes invisibly displaced objects.

  4. Monetary reward modulates task-irrelevant perceptual learning for invisible stimuli.

    Science.gov (United States)

    Pascucci, David; Mastropasqua, Tommaso; Turatto, Massimo

    2015-01-01

    Task Irrelevant Perceptual Learning (TIPL) shows that the brain's discriminative capacity can improve also for invisible and unattended visual stimuli. It has been hypothesized that this form of "unconscious" neural plasticity is mediated by an endogenous reward mechanism triggered by the correct task performance. Although this result has challenged the mandatory role of attention in perceptual learning, no direct evidence exists of the hypothesized link between target recognition, reward and TIPL. Here, we manipulated the reward value associated with a target to demonstrate the involvement of reinforcement mechanisms in sensory plasticity for invisible inputs. Participants were trained in a central task associated with either high or low monetary incentives, provided only at the end of the experiment, while subliminal stimuli were presented peripherally. Our results showed that high incentive-value targets induced a greater degree of perceptual improvement for the subliminal stimuli, supporting the role of reinforcement mechanisms in TIPL.

  5. In-Vision Continuity Announcers: Performing an Identity for Early Television in Europe

    Directory of Open Access Journals (Sweden)

    Sonja de Leeuw

    2013-12-01

    Full Text Available In-vision continuity announcers have played central – yet understudied – roles in early television history. Through their performances on and off the screen, they mediated the identity of the televisual medium in the 1950s and 1960s, popularizing it as a medium of sound and vision, a domestic and gendered medium as well as a national and transnational institution.Focusing primarily on Dutch and Romanian female in-vision continuity announcers in the 1950s and 60s and making extensive comparisons with other countries in Europe, this article illustrates how these early professionals of television performed as part of a European-wide phenomenon of defining the identity of the new televisual medium.

  6. Correlated and uncorrelated invisible temporal white noise alters mesopic rod signaling.

    Science.gov (United States)

    Hathibelagal, Amithavikram R; Feigl, Beatrix; Kremers, Jan; Zele, Andrew J

    2016-03-01

    We determined how rod signaling at mesopic light levels is altered by extrinsic temporal white noise that is correlated or uncorrelated with the activity of one (magnocellular, parvocellular, or koniocellular) postreceptoral pathway. Rod and cone photoreceptor excitations were independently controlled using a four-primary photostimulator. Psychometric (Weibull) functions were measured for incremental rod pulses (50 to 250 ms) in the presence (or absence; control) of perceptually invisible subthreshold extrinsic noise. Uncorrelated (rod) noise facilitates rod detection. Correlated postreceptoral pathway noise produces differential changes in rod detection thresholds and decreases the slope of the psychometric functions. We demonstrate that invisible extrinsic noise changes rod-signaling characteristics within the three retinogeniculate pathways at mesopic illumination depending on the temporal profile of the rod stimulus and the extrinsic noise type.

  7. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  8. The invisible hand and the rational agent are behind bubbles and crashes

    International Nuclear Information System (INIS)

    Galam, Serge

    2016-01-01

    The 2000 dot-com crash and the 2008 subprime crisis have fueled the belief that the two classical paradigms of economics, the invisible hand and the rational agent, are not well appropriate to describe market dynamics and should be abandoned at the benefit of alternative new theoretical concepts. At odd with such a view, using a simple model of choice dynamics from sociophysics, the invisible hand and the rational agent paradigms are given a new legitimacy. Indeed, it is sufficient to introduce the holding of a few intermediate mini market aggregations by agents sharing their own private information, to recenter the invisible hand and the rational agent at the heart of market self regulation. An elasticity is discovered in the market efficiency mechanism due to the existence of an agent collective anticipation. This elasticity is shown to create spontaneous bubbles, which are rationally founded. At the same time, crashes occur at once when the limit of elasticity is reached. Plasticity can also be achieved through a combination of a crash with a sudden shift of the collective anticipation. Although the findings disclose a path to put an end to the bubble-crash phenomena, it is argued to be rationally not feasible. Bubbles and crashes are thus an intrinsic internal part of classical economics.

  9. Search for invisible decays of Higgs bosons in the vector boson fusion and associated ZH production modes.

    Science.gov (United States)

    Chatrchyan, S; Khachatryan, V; Sirunyan, A M; Tumasyan, A; Adam, W; Bergauer, T; Dragicevic, M; Erö, J; Fabjan, C; Friedl, M; Frühwirth, R; Ghete, V M; Hartl, C; Hörmann, N; Hrubec, J; Jeitler, M; Kiesenhofer, W; Knünz, V; Krammer, M; Krätschmer, I; Liko, D; Mikulec, I; Rabady, D; Rahbaran, B; Rohringer, H; Schöfbeck, R; Strauss, J; Taurok, A; Treberer-Treberspurg, W; Waltenberger, W; Wulz, C-E; Mossolov, V; Shumeiko, N; Suarez Gonzalez, J; Alderweireldt, S; Bansal, M; Bansal, S; Cornelis, T; De Wolf, E A; Janssen, X; Knutsson, A; Luyckx, S; Ochesanu, S; Roland, B; Rougny, R; Van Haevermaet, H; Van Mechelen, P; Van Remortel, N; Van Spilbeeck, A; Blekman, F; Blyweert, S; D'Hondt, J; Heracleous, N; Kalogeropoulos, A; Keaveney, J; Kim, T J; Lowette, S; Maes, M; Olbrechts, A; Python, Q; Strom, D; Tavernier, S; Van Doninck, W; Van Mulders, P; Van Onsem, G P; Villella, I; Caillol, C; Clerbaux, B; De Lentdecker, G; Favart, L; Gay, A P R; Léonard, A; Marage, P E; Mohammadi, A; Perniè, L; Reis, T; Seva, T; Thomas, L; Vander Velde, C; Vanlaer, P; Wang, J; Adler, V; Beernaert, K; Benucci, L; Cimmino, A; Costantini, S; Crucy, S; Dildick, S; Garcia, G; Klein, B; Lellouch, J; Mccartin, J; Ocampo Rios, A A; Ryckbosch, D; Salva Diblen, S; Sigamani, M; Strobbe, N; Thyssen, F; Tytgat, M; Walsh, S; Yazgan, E; Zaganidis, N; Basegmez, S; Beluffi, C; Bruno, G; Castello, R; Caudron, A; Ceard, L; Da Silveira, G G; Delaere, C; du Pree, T; Favart, D; Forthomme, L; Giammanco, A; Hollar, J; Jez, P; Komm, M; Lemaitre, V; Liao, J; Militaru, O; Nuttens, C; Pagano, D; Pin, A; Piotrzkowski, K; Popov, A; Quertenmont, L; Selvaggi, M; Vidal Marono, M; Vizan Garcia, J M; Beliy, N; Caebergs, T; Daubie, E; Hammad, G H; Alves, G A; Correa Martins Junior, M; Martins, T; Pol, M E; Aldá Júnior, W L; Carvalho, W; Chinellato, J; Custódio, A; Da Costa, E M; De Jesus Damiao, D; De Oliveira Martins, C; Fonseca De Souza, S; Malbouisson, H; Malek, M; Matos Figueiredo, D; Mundim, L; Nogima, H; Prado Da Silva, W L; Santaolalla, J; Santoro, A; Sznajder, A; Tonelli Manganote, E J; Vilela Pereira, A; Bernardes, C A; Dias, F A; Fernandez Perez Tomei, T R; Gregores, E M; Mercadante, P G; Novaes, S F; Padula, Sandra S; Genchev, V; Iaydjiev, P; Marinov, A; Piperov, S; Rodozov, M; Sultanov, G; Vutova, M; Dimitrov, A; Glushkov, I; Hadjiiska, R; Kozhuharov, V; Litov, L; Pavlov, B; Petkov, P; Bian, J G; Chen, G M; Chen, H S; Chen, M; Du, R; Jiang, C H; Liang, D; Liang, S; Meng, X; Plestina, R; Tao, J; Wang, X; Wang, Z; Asawatangtrakuldee, C; Ban, Y; Guo, Y; Li, Q; Li, W; Liu, S; Mao, Y; Qian, S J; Wang, D; Zhang, L; Zou, W; Avila, C; Chaparro Sierra, L F; Florez, C; Gomez, J P; Gomez Moreno, B; Sanabria, J C; Godinovic, N; Lelas, D; Polic, D; Puljak, I; Antunovic, Z; Kovac, M; Brigljevic, V; Kadija, K; Luetic, J; Mekterovic, D; Morovic, S; Tikvica, L; Attikis, A; Mavromanolakis, G; Mousa, J; Nicolaou, C; Ptochos, F; Razis, P A; Bodlak, M; Finger, M; Finger, M; Assran, Y; Elgammal, S; Ellithi Kamel, A; Mahmoud, M A; Mahrous, A; Radi, A; Kadastik, M; Müntel, M; Murumaa, M; Raidal, M; Tiko, A; Eerola, P; Fedi, G; Voutilainen, M; Härkönen, J; Karimäki, V; Kinnunen, R; Kortelainen, M J; Lampén, T; Lassila-Perini, K; Lehti, S; Lindén, T; Luukka, P; Mäenpää, T; Peltola, T; Tuominen, E; Tuominiemi, J; Tuovinen, E; Wendland, L; Tuuva, T; Besancon, M; Couderc, F; Dejardin, M; Denegri, D; Fabbro, B; Faure, J L; Favaro, C; Ferri, F; Ganjour, S; Givernaud, A; Gras, P; Hamel de Monchenault, G; Jarry, P; Locci, E; Malcles, J; Nayak, A; Rander, J; Rosowsky, A; Titov, M; Baffioni, S; Beaudette, F; Busson, P; Charlot, C; Daci, N; Dahms, T; Dalchenko, M; Dobrzynski, L; Filipovic, N; Florent, A; Granier de Cassagnac, R; Mastrolorenzo, L; Miné, P; Mironov, C; Naranjo, I N; Nguyen, M; Ochando, C; Paganini, P; Sabes, D; Salerno, R; Sauvan, J B; Sirois, Y; Veelken, C; Yilmaz, Y; Zabi, A; Agram, J-L; Andrea, J; Bloch, D; Brom, J-M; Chabert, E C; Collard, C; Conte, E; Drouhin, F; Fontaine, J-C; Gelé, D; Goerlach, U; Goetzmann, C; Juillot, P; Le Bihan, A-C; Van Hove, P; Gadrat, S; Beauceron, S; Beaupere, N; Boudoul, G; Brochet, S; Carrillo Montoya, C A; Chasserat, J; Chierici, R; Contardo, D; Depasse, P; El Mamouni, H; Fan, J; Fay, J; Gascon, S; Gouzevitch, M; Ille, B; Kurca, T; Lethuillier, M; Mirabito, L; Perries, S; Ruiz Alvarez, J D; Sgandurra, L; Sordini, V; Vander Donckt, M; Verdier, P; Viret, S; Xiao, H; Tsamalaidze, Z; Autermann, C; Beranek, S; Bontenackels, M; Calpas, B; Edelhoff, M; Feld, L; Hindrichs, O; Klein, K; Ostapchuk, A; Perieanu, A; Raupach, F; Sammet, J; Schael, S; Sprenger, D; Weber, H; Wittmer, B; Zhukov, V; Ata, M; Caudron, J; Dietz-Laursonn, E; Duchardt, D; Erdmann, M; Fischer, R; Güth, A; Hebbeker, T; Heidemann, C; Hoepfner, K; Klingebiel, D; Knutzen, S; Kreuzer, P; Merschmeyer, M; Meyer, A; Olschewski, M; Padeken, K; Papacz, P; Reithler, H; Schmitz, S A; Sonnenschein, L; Teyssier, D; Thüer, S; Weber, M; Cherepanov, V; Erdogan, Y; Flügge, G; Geenen, H; Geisler, M; Haj Ahmad, W; Hoehle, F; Kargoll, B; Kress, T; Kuessel, Y; Lingemann, J; Nowack, A; Nugent, I M; Perchalla, L; Pooth, O; Stahl, A; Asin, I; Bartosik, N; Behr, J; Behrenhoff, W; Behrens, U; Bell, A J; Bergholz, M; Bethani, A; Borras, K; Burgmeier, A; Cakir, A; Calligaris, L; Campbell, A; Choudhury, S; Costanza, F; Diez Pardos, C; Dooling, S; Dorland, T; Eckerlin, G; Eckstein, D; Eichhorn, T; Flucke, G; Garay Garcia, J; Geiser, A; Grebenyuk, A; Gunnellini, P; Habib, S; Hauk, J; Hellwig, G; Hempel, M; Horton, D; Jung, H; Kasemann, M; Katsas, P; Kieseler, J; Kleinwort, C; Krämer, M; Krücker, D; Lange, W; Leonard, J; Lipka, K; Lohmann, W; Lutz, B; Mankel, R; Marfin, I; Melzer-Pellmann, I-A; Meyer, A B; Mnich, J; Mussgiller, A; Naumann-Emme, S; Novgorodova, O; Nowak, F; Ntomari, E; Perrey, H; Petrukhin, A; Pitzl, D; Placakyte, R; Raspereza, A; Ribeiro Cipriano, P M; Riedl, C; Ron, E; Sahin, M Ö; Salfeld-Nebgen, J; Saxena, P; Schmidt, R; Schoerner-Sadenius, T; Schröder, M; Stein, M; Vargas Trevino, A D R; Walsh, R; Wissing, C; Aldaya Martin, M; Blobel, V; Centis Vignali, M; Enderle, H; Erfle, J; Garutti, E; Goebel, K; Görner, M; Gosselink, M; Haller, J; Höing, R S; Kirschenmann, H; Klanner, R; Kogler, R; Lange, J; Lapsien, T; Lenz, T; Marchesini, I; Ott, J; Peiffer, T; Pietsch, N; Rathjens, D; Sander, C; Schettler, H; Schleper, P; Schlieckau, E; Schmidt, A; Seidel, M; Sibille, J; Sola, V; Stadie, H; Steinbrück, G; Troendle, D; Usai, E; Vanelderen, L; Barth, C; Baus, C; Berger, J; Böser, C; Butz, E; Chwalek, T; De Boer, W; Descroix, A; Dierlamm, A; Feindt, M; Guthoff, M; Hartmann, F; Hauth, T; Held, H; Hoffmann, K H; Husemann, U; Katkov, I; Kornmayer, A; Kuznetsova, E; Lobelle Pardo, P; Martschei, D; Mozer, M U; Müller, Th; Niegel, M; Nürnberg, A; Oberst, O; Quast, G; Rabbertz, K; Ratnikov, F; Röcker, S; Schilling, F-P; Schott, G; Simonis, H J; Stober, F M; Ulrich, R; Wagner-Kuhr, J; Wayand, S; Weiler, T; Wolf, R; Zeise, M; Anagnostou, G; Daskalakis, G; Geralis, T; Giakoumopoulou, V A; Kesisoglou, S; Kyriakis, A; Loukas, D; Markou, A; Markou, C; Psallidas, A; Topsis-Giotis, I; Gouskos, L; Panagiotou, A; Saoulidou, N; Stiliaris, E; Aslanoglou, X; Evangelou, I; Flouris, G; Foudas, C; Jones, J; Kokkas, P; Manthos, N; Papadopoulos, I; Paradas, E; Bencze, G; Hajdu, C; Hidas, P; Horvath, D; Sikler, F; Veszpremi, V; Vesztergombi, G; Zsigmond, A J; Beni, N; Czellar, S; Molnar, J; Palinkas, J; Szillasi, Z; Karancsi, J; Raics, P; Trocsanyi, Z L; Ujvari, B; Swain, S K; Beri, S B; Bhatnagar, V; Dhingra, N; Gupta, R; Kalsi, A K; Kaur, M; Mittal, M; Nishu, N; Sharma, A; Singh, J B; Kumar, Ashok; Kumar, Arun; Ahuja, S; Bhardwaj, A; Choudhary, B C; Kumar, A; Malhotra, S; Naimuddin, M; Ranjan, K; Sharma, V; Shivpuri, R K; Banerjee, S; Bhattacharya, S; Chatterjee, K; Dutta, S; Gomber, B; Jain, Sa; Jain, Sh; Khurana, R; Modak, A; Mukherjee, S; Roy, D; Sarkar, S; Sharan, M; Singh, A P; Abdulsalam, A; Dutta, D; Kailas, S; Kumar, V; Mohanty, A K; Pant, L M; Shukla, P; Topkar, A; Aziz, T; Chatterjee, R M; Ganguly, S; Ghosh, S; Guchait, M; Gurtu, A; Kole, G; Kumar, S; Maity, M; Majumder, G; Mazumdar, K; Mohanty, G B; Parida, B; Sudhakar, K; Wickramage, N; Banerjee, S; Dewanjee, R K; Dugad, S; Arfaei, H; Bakhshiansohi, H; Behnamian, H; Etesami, S M; Fahim, A; Jafari, A; Khakzad, M; Mohammadi Najafabadi, M; Naseri, M; Paktinat Mehdiabadi, S; Safarzadeh, B; Zeinali, M; Grunewald, M; Abbrescia, M; Barbone, L; Calabria, C; Chhibra, S S; Colaleo, A; Creanza, D; De Filippis, N; De Palma, M; Fiore, L; Iaselli, G; Maggi, G; Maggi, M; My, S; Nuzzo, S; Pacifico, N; Pompili, A; Pugliese, G; Radogna, R; Selvaggi, G; Silvestris, L; Singh, G; Venditti, R; Verwilligen, P; Zito, G; Abbiendi, G; Benvenuti, A C; Bonacorsi, D; Braibant-Giacomelli, S; Brigliadori, L; Campanini, R; Capiluppi, P; Castro, A; Cavallo, F R; Codispoti, G; Cuffiani, M; Dallavalle, G M; Fabbri, F; Fanfani, A; Fasanella, D; Giacomelli, P; Grandi, C; Guiducci, L; Marcellini, S; Masetti, G; Meneghelli, M; Montanari, A; Navarria, F L; Odorici, F; Perrotta, A; Primavera, F; Rossi, A M; Rovelli, T; Siroli, G P; Tosi, N; Travaglini, R; Albergo, S; Cappello, G; Chiorboli, M; Costa, S; Giordano, F; Potenza, R; Tricomi, A; Tuve, C; Barbagli, G; Ciulli, V; Civinini, C; D'Alessandro, R; Focardi, E; Gallo, E; Gonzi, S; Gori, V; Lenzi, P; Meschini, M; Paoletti, S; Sguazzoni, G; Tropiano, A; Benussi, L; Bianco, S; Fabbri, F; Piccolo, D; Fabbricatore, P; Ferro, F; Lo Vetere, M; Musenich, R; Robutti, E; Tosi, S; Dinardo, M E; Fiorendi, S; Gennai, S; Gerosa, R; Ghezzi, A; Govoni, P; Lucchini, M T; Malvezzi, S; Manzoni, R A; Martelli, A; Marzocchi, B; Menasce, D; Moroni, L; Paganoni, M; Pedrini, D; Ragazzi, S; Redaelli, N; Tabarelli de Fatis, T; Buontempo, S; Cavallo, N; Di Guida, S; Fabozzi, F; Iorio, A O M; Lista, L; Meola, S; Merola, M; Paolucci, P; Azzi, P; Bacchetta, N; Bisello, D; Branca, A; Carlin, R; Checchia, P; Dorigo, T; Dosselli, U; Galanti, M; Gasparini, F; Gasparini, U; Giubilato, P; Gozzelino, A; Kanishchev, K; Lacaprara, S; Lazzizzera, I; Margoni, M; Meneguzzo, A T; Passaseo, M; Pazzini, J; Pegoraro, M; Pozzobon, N; Ronchese, P; Simonetto, F; Torassa, E; Tosi, M; Zotto, P; Zucchetta, A; Zumerle, G; Gabusi, M; Ratti, S P; Riccardi, C; Salvini, P; Vitulo, P; Biasini, M; Bilei, G M; Fanò, L; Lariccia, P; Mantovani, G; Menichelli, M; Romeo, F; Saha, A; Santocchia, A; Spiezia, A; Androsov, K; Azzurri, P; Bagliesi, G; Bernardini, J; Boccali, T; Broccolo, G; Castaldi, R; Ciocci, M A; Dell'Orso, R; Donato, S; Fiori, F; Foà, L; Giassi, A; Grippo, M T; Kraan, A; Ligabue, F; Lomtadze, T; Martini, L; Messineo, A; Moon, C S; Palla, F; Rizzi, A; Savoy-Navarro, A; Serban, A T; Spagnolo, P; Squillacioti, P; Tenchini, R; Tonelli, G; Venturi, A; Verdini, P G; Vernieri, C; Barone, L; Cavallari, F; Del Re, D; Diemoz, M; Grassi, M; Jorda, C; Longo, E; Margaroli, F; Meridiani, P; Micheli, F; Nourbakhsh, S; Organtini, G; Paramatti, R; Rahatlou, S; Rovelli, C; Soffi, L; Traczyk, P; Amapane, N; Arcidiacono, R; Argiro, S; Arneodo, M; Bellan, R; Biino, C; Cartiglia, N; Casasso, S; Costa, M; Degano, A; Demaria, N; Finco, L; Mariotti, C; Maselli, S; Migliore, E; Monaco, V; Musich, M; Obertino, M M; Ortona, G; Pacher, L; Pastrone, N; Pelliccioni, M; Pinna Angioni, G L; Potenza, A; Romero, A; Ruspa, M; Sacchi, R; Solano, A; Staiano, A; Tamponi, U; Belforte, S; Candelise, V; Casarsa, M; Cossutti, F; Della Ricca, G; Gobbo, B; La Licata, C; Marone, M; Montanino, D; Schizzi, A; Umer, T; Zanetti, A; Chang, S; Kim, T Y; Nam, S K; Kim, D H; Kim, G N; Kim, J E; Kim, M S; Kong, D J; Lee, S; Oh, Y D; Park, H; Sakharov, A; Son, D C; Kim, J Y; Kim, Zero J; Song, S; Choi, S; Gyun, D; Hong, B; Jo, M; Kim, H; Kim, Y; Lee, B; Lee, K S; Park, S K; Roh, Y; Choi, M; Kim, J H; Park, C; Park, I C; Park, S; Ryu, G; Choi, Y; Choi, Y K; Goh, J; Kwon, E; Lee, J; Seo, H; Yu, I; Juodagalvis, A; Komaragiri, J R; Castilla-Valdez, H; De La Cruz-Burelo, E; Heredia-de La Cruz, I; Lopez-Fernandez, R; Martínez-Ortega, J; Sanchez-Hernandez, A; Villasenor-Cendejas, L M; Carrillo Moreno, S; Vazquez Valencia, F; Salazar Ibarguen, H A; Casimiro Linares, E; Morelos Pineda, A; Krofcheck, D; Butler, P H; Doesburg, R; Reucroft, S; Ahmad, A; Ahmad, M; Asghar, M I; Butt, J; Hassan, Q; Hoorani, H R; Khan, W A; Khurshid, T; Qazi, S; Shah, M A; Shoaib, M; Bialkowska, H; Bluj, M; Boimska, B; Frueboes, T; Górski, M; Kazana, M; Nawrocki, K; Romanowska-Rybinska, K; Szleper, M; Wrochna, G; Zalewski, P; Brona, G; Bunkowski, K; Cwiok, M; Dominik, W; Doroba, K; Kalinowski, A; Konecki, M; Krolikowski, J; Misiura, M; Wolszczak, W; Bargassa, P; Beirão Da Cruz E Silva, C; Faccioli, P; Ferreira Parracho, P G; Gallinaro, M; Nguyen, F; Rodrigues Antunes, J; Seixas, J; Varela, J; Vischia, P; Golutvin, I; Gorbunov, I; Karjavin, V; Konoplyanikov, V; Korenkov, V; Kozlov, G; Lanev, A; Malakhov, A; Matveev, V; Moisenz, P; Palichik, V; Perelygin, V; Savina, M; Shmatov, S; Shulha, S; Skatchkov, N; Smirnov, V; Zarubin, A; Golovtsov, V; Ivanov, Y; Kim, V; Levchenko, P; Murzin, V; Oreshkin, V; Smirnov, I; Sulimov, V; Uvarov, L; Vavilov, S; Vorobyev, A; Vorobyev, An; Andreev, Yu; Dermenev, A; Gninenko, S; Golubev, N; Kirsanov, M; Krasnikov, N; Pashenkov, A; Tlisov, D; Toropin, A; Epshteyn, V; Gavrilov, V; Lychkovskaya, N; Popov, V; Safronov, G; Semenov, S; Spiridonov, A; Stolin, V; Vlasov, E; Zhokin, A; Andreev, V; Azarkin, M; Dremin, I; Kirakosyan, M; Leonidov, A; Mesyats, G; Rusakov, S V; Vinogradov, A; Belyaev, A; Boos, E; Bunichev, V; Dubinin, M; Dudko, L; Ershov, A; Klyukhin, V; Kodolova, O; Lokhtin, I; Obraztsov, S; Petrushanko, S; Savrin, V; Snigirev, A; Azhgirey, I; Bayshev, I; Bitioukov, S; Kachanov, V; Kalinin, A; Konstantinov, D; Krychkine, V; Petrov, V; Ryutin, R; Sobol, A; Tourtchanovitch, L; Troshin, S; Tyurin, N; Uzunian, A; Volkov, A; Adzic, P; Djordjevic, M; Ekmedzic, M; Milosevic, J; Aguilar-Benitez, M; Alcaraz Maestre, J; Battilana, C; Calvo, E; Cerrada, M; Chamizo Llatas, M; Colino, N; De La Cruz, B; Delgado Peris, A; Domínguez Vázquez, D; Fernandez Bedoya, C; Fernández Ramos, J P; Ferrando, A; Flix, J; Fouz, M C; Garcia-Abia, P; Gonzalez Lopez, O; Goy Lopez, S; Hernandez, J M; Josa, M I; Merino, G; Navarro De Martino, E; Pérez-Calero Yzquierdo, A; Puerta Pelayo, J; Quintario Olmeda, A; Redondo, I; Romero, L; Soares, M S; Willmott, C; Albajar, C; de Trocóniz, J F; Missiroli, M; Brun, H; Cuevas, J; Fernandez Menendez, J; Folgueras, S; Gonzalez Caballero, I; Lloret Iglesias, L; Brochero Cifuentes, J A; Cabrillo, I J; Calderon, A; Duarte Campderros, J; Fernandez, M; Gomez, G; Gonzalez Sanchez, J; Graziano, A; Lopez Virto, A; Marco, J; Marco, R; Martinez Rivero, C; Matorras, F; Munoz Sanchez, F J; Piedra Gomez, J; Rodrigo, T; Rodríguez-Marrero, A Y; Ruiz-Jimeno, A; Scodellaro, L; Vila, I; Vilar Cortabitarte, R; Abbaneo, D; Auffray, E; Auzinger, G; Bachtis, M; Baillon, P; Ball, A H; Barney, D; Benaglia, A; Bendavid, J; Benhabib, L; Benitez, J F; Bernet, C; Bianchi, G; Bloch, P; Bocci, A; Bonato, A; Bondu, O; Botta, C; Breuker, H; Camporesi, T; Cerminara, G; Christiansen, T; Coarasa Perez, J A; Colafranceschi, S; D'Alfonso, M; d'Enterria, D; Dabrowski, A; David, A; De Guio, F; De Roeck, A; De Visscher, S; Dobson, M; Dupont-Sagorin, N; Elliott-Peisert, A; Eugster, J; Franzoni, G; Funk, W; Giffels, M; Gigi, D; Gill, K; Giordano, D; Girone, M; Giunta, M; Glege, F; Gomez-Reino Garrido, R; Gowdy, S; Guida, R; Hammer, J; Hansen, M; Harris, P; Hegeman, J; Innocente, V; Janot, P; Karavakis, E; Kousouris, K; Krajczar, K; Lecoq, P; Lourenço, C; Magini, N; Malgeri, L; Mannelli, M; Masetti, L; Meijers, F; Mersi, S; Meschi, E; Moortgat, F; Mulders, M; Musella, P; Orsini, L; Palencia Cortezon, E; Pape, L; Perez, E; Perrozzi, L; Petrilli, A; Petrucciani, G; Pfeiffer, A; Pierini, M; Pimiä, M; Piparo, D; Plagge, M; Racz, A; Reece, W; Rolandi, G; Rovere, M; Sakulin, H; Santanastasio, F; Schäfer, C; Schwick, C; Sekmen, S; Sharma, A; Siegrist, P; Silva, P; Simon, M; Sphicas, P; Spiga, D; Steggemann, J; Stieger, B; Stoye, M; Treille, D; Tsirou, A; Veres, G I; Vlimant, J R; Wöhri, H K; Zeuner, W D; Bertl, W; Deiters, K; Erdmann, W; Horisberger, R; Ingram, Q; Kaestli, H C; König, S; Kotlinski, D; Langenegger, U; Renker, D; Rohe, T; Bachmair, F; Bäni, L; Bianchini, L; Bortignon, P; Buchmann, M A; Casal, B; Chanon, N; Deisher, A; Dissertori, G; Dittmar, M; Donegà, M; Dünser, M; Eller, P; Grab, C; Hits, D; Lustermann, W; Mangano, B; Marini, A C; Martinez Ruiz Del Arbol, P; Meister, D; Mohr, N; Nägeli, C; Nef, P; Nessi-Tedaldi, F; Pandolfi, F; Pauss, F; Peruzzi, M; Quittnat, M; Rebane, L; Ronga, F J; Rossini, M; Starodumov, A; Takahashi, M; Theofilatos, K; Wallny, R; Weber, H A; Amsler, C; Canelli, M F; Chiochia, V; De Cosa, A; Hinzmann, A; Hreus, T; Ivova Rikova, M; Kilminster, B; Millan Mejias, B; Ngadiuba, J; Robmann, P; Snoek, H; Taroni, S; Verzetti, M; Yang, Y; Cardaci, M; Chen, K H; Ferro, C; Kuo, C M; Li, S W; Lin, W; Lu, Y J; Volpe, R; Yu, S S; Bartalini, P; Chang, P; Chang, Y H; Chang, Y W; Chao, Y; Chen, K F; Chen, P H; Dietz, C; Grundler, U; Hou, W-S; Hsiung, Y; Kao, K Y; Lei, Y J; Liu, Y F; Lu, R-S; Majumder, D; Petrakou, E; Shi, X; Shiu, J G; Tzeng, Y M; Wang, M; Wilken, R; Asavapibhop, B; Srimanobhas, N; Adiguzel, A; Bakirci, M N; Cerci, S; Dozen, C; Dumanoglu, I; Eskut, E; Girgis, S; Gokbulut, G; Gurpinar, E; Hos, I; Kangal, E E; Kayis Topaksu, A; Onengut, G; Ozdemir, K; Ozturk, S; Polatoz, A; Sogut, K; Sunar Cerci, D; Tali, B; Topakli, H; Vergili, M; Akin, I V; Aliev, T; Bilin, B; Bilmis, S; Deniz, M; Gamsizkan, H; Guler, A M; Karapinar, G; Ocalan, K; Ozpineci, A; Serin, M; Sever, R; Surat, U E; Yalvac, M; Zeyrek, M; Gülmez, E; Isildak, B; Kaya, M; Kaya, O; Ozkorucuklu, S; Bahtiyar, H; Barlas, E; Cankocak, K; Günaydin, Y O; Vardarlı, F I; Yücel, M; Levchuk, L; Sorokin, P; Aggleton, R; Brooke, J J; Clement, E; Cussans, D; Flacher, H; Frazier, R; Goldstein, J; Grimes, M; Heath, G P; Heath, H F; Jacob, J; Kreczko, L; Lucas, C; Meng, Z; Newbold, D M; Paramesvaran, S; Poll, A; Senkin, S; Smith, V J; Williams, T; Bell, K W; Belyaev, A; Brew, C; Brown, R M; Cockerill, D J A; Coughlan, J A; Harder, K; Harper, S; Ilic, J; Olaiya, E; Petyt, D; Shepherd-Themistocleous, C H; Thea, A; Tomalin, I R; Womersley, W J; Worm, S D; Baber, M; Bainbridge, R; Buchmuller, O; Burton, D; Colling, D; Cripps, N; Cutajar, M; Dauncey, P; Davies, G; Della Negra, M; Dunne, P; Ferguson, W; Fulcher, J; Futyan, D; Gilbert, A; Guneratne Bryer, A; Hall, G; Hatherell, Z; Hays, J; Iles, G; Jarvis, M; Karapostoli, G; Kenzie, M; Lane, R; Lucas, R; Lyons, L; Magnan, A-M; Marrouche, J; Mathias, B; Nandi, R; Nash, J; Nikitenko, A; Pela, J; Pesaresi, M; Petridis, K; Pioppi, M; Raymond, D M; Rogerson, S; Rose, A; Seez, C; Sharp, P; Sparrow, A; Tapper, A; Vazquez Acosta, M; Virdee, T; Wakefield, S; Wardle, N; Cole, J E; Hobson, P R; Khan, A; Kyberd, P; Leggat, D; Leslie, D; Martin, W; Reid, I D; Symonds, P; Teodorescu, L; Turner, M; Dittmann, J; Hatakeyama, K; Kasmi, A; Liu, H; Scarborough, T; Charaf, O; Cooper, S I; Henderson, C; Rumerio, P; Avetisyan, A; Bose, T; Fantasia, C; Heister, A; Lawson, P; Lazic, D; Richardson, C; Rohlf, J; Sperka, D; St John, J; Sulak, L; Alimena, J; Bhattacharya, S; Christopher, G; Cutts, D; Demiragli, Z; Ferapontov, A; Garabedian, A; Heintz, U; Jabeen, S; Kukartsev, G; Laird, E; Landsberg, G; Luk, M; Narain, M; Segala, M; Sinthuprasith, T; Speer, T; Swanson, J; Breedon, R; Breto, G; Calderon De La Barca Sanchez, M; Chauhan, S; Chertok, M; Conway, J; Conway, R; Cox, P T; Erbacher, R; Gardner, M; Ko, W; Kopecky, A; Lander, R; Miceli, T; Mulhearn, M; Pellett, D; Pilot, J; Ricci-Tam, F; Rutherford, B; Searle, M; Shalhout, S; Smith, J; Squires, M; Tripathi, M; Wilbur, S; Yohay, R; Andreev, V; Cline, D; Cousins, R; Erhan, S; Everaerts, P; Farrell, C; Felcini, M; Hauser, J; Ignatenko, M; Jarvis, C; Rakness, G; Takasugi, E; Valuev, V; Weber, M; Babb, J; Clare, R; Ellison, J; Gary, J W; Hanson, G; Heilman, J; Jandir, P; Lacroix, F; Liu, H; Long, O R; Luthra, A; Malberti, M; Nguyen, H; Shrinivas, A; Sturdy, J; Sumowidagdo, S; Wimpenny, S; Andrews, W; Branson, J G; Cerati, G B; Cittolin, S; D'Agnolo, R T; Evans, D; Holzner, A; Kelley, R; Kovalskyi, D; Lebourgeois, M; Letts, J; Macneill, I; Padhi, S; Palmer, C; Pieri, M; Sani, M; Sharma, V; Simon, S; Sudano, E; Tadel, M; Tu, Y; Vartak, A; Wasserbaech, S; Würthwein, F; Yagil, A; Yoo, J; Barge, D; Bradmiller-Feld, J; Campagnari, C; Danielson, T; Dishaw, A; Flowers, K; Franco Sevilla, M; Geffert, P; George, C; Golf, F; Incandela, J; Justus, C; Magaña Villalba, R; Mccoll, N; Pavlunin, V; Richman, J; Rossin, R; Stuart, D; To, W; West, C; Apresyan, A; Bornheim, A; Bunn, J; Chen, Y; Di Marco, E; Duarte, J; Kcira, D; Mott, A; Newman, H B; Pena, C; Rogan, C; Spiropulu, M; Timciuc, V; Wilkinson, R; Xie, S; Zhu, R Y; Azzolini, V; Calamba, A; Carroll, R; Ferguson, T; Iiyama, Y; Jang, D W; Paulini, M; Russ, J; Vogel, H; Vorobiev, I; Cumalat, J P; Drell, B R; Ford, W T; Gaz, A; Luiggi Lopez, E; Nauenberg, U; Smith, J G; Stenson, K; Ulmer, K A; Wagner, S R; Alexander, J; Chatterjee, A; Chu, J; Eggert, N; Gibbons, L K; Hopkins, W; Khukhunaishvili, A; Kreis, B; Mirman, N; Nicolas Kaufman, G; Patterson, J R; Ryd, A; Salvati, E; Sun, W; Teo, W D; Thom, J; Thompson, J; Tucker, J; Weng, Y; Winstrom, L; Wittich, P; Winn, D; Abdullin, S; Albrow, M; Anderson, J; Apollinari, G; Bauerdick, L A T; Beretvas, A; Berryhill, J; Bhat, P C; Burkett, K; Butler, J N; Chetluru, V; Cheung, H W K; Chlebana, F; Cihangir, S; Elvira, V D; Fisk, I; Freeman, J; Gao, Y; Gottschalk, E; Gray, L; Green, D; Grünendahl, S; Gutsche, O; Hanlon, J; Hare, D; Harris, R M; Hirschauer, J; Hooberman, B; Jindariani, S; Johnson, M; Joshi, U; Kaadze, K; Klima, B; Kwan, S; Linacre, J; Lincoln, D; Lipton, R; Liu, T; Lykken, J; Maeshima, K; Marraffino, J M; Martinez Outschoorn, V I; Maruyama, S; Mason, D; McBride, P; Mishra, K; Mrenna, S; Musienko, Y; Nahn, S; Newman-Holmes, C; O'Dell, V; Prokofyev, O; Ratnikova, N; Sexton-Kennedy, E; Sharma, S; Soha, A; Spalding, W J; Spiegel, L; Taylor, L; Tkaczyk, S; Tran, N V; Uplegger, L; Vaandering, E W; Vidal, R; Whitbeck, A; Whitmore, J; Wu, W; Yang, F; Yun, J C; Acosta, D; Avery, P; Bourilkov, D; Cheng, T; Das, S; De Gruttola, M; Di Giovanni, G P; Dobur, D; Field, R D; Fisher, M; Fu, Y; Furic, I K; Hugon, J; Kim, B; Konigsberg, J; Korytov, A; Kropivnitskaya, A; Kypreos, T; Low, J F; Matchev, K; Milenovic, P; Mitselmakher, G; Muniz, L; Rinkevicius, A; Shchutska, L; Skhirtladze, N; Snowball, M; Yelton, J; Zakaria, M; Gaultney, V; Hewamanage, S; Linn, S; Markowitz, P; Martinez, G; Rodriguez, J L; Adams, T; Askew, A; Bochenek, J; Chen, J; Diamond, B; Haas, J; Hagopian, S; Hagopian, V; Johnson, K F; Prosper, H; Veeraraghavan, V; Weinberg, M; Baarmand, M M; Dorney, B; Hohlmann, M; Kalakhety, H; Yumiceva, F; Adams, M R; Apanasevich, L; Bazterra, V E; Betts, R R; Bucinskaite, I; Cavanaugh, R; Evdokimov, O; Gauthier, L; Gerber, C E; Hofman, D J; Khalatyan, S; Kurt, P; Moon, D H; O'Brien, C; Silkworth, C; Turner, P; Varelas, N; Akgun, U; Albayrak, E A; Bilki, B; Clarida, W; Dilsiz, K; Duru, F; Haytmyradov, M; Merlo, J-P; Mermerkaya, H; Mestvirishvili, A; Moeller, A; Nachtman, J; Ogul, H; Onel, Y; Ozok, F; Penzo, A; Rahmat, R; Sen, S; Tan, P; Tiras, E; Wetzel, J; Yetkin, T; Yi, K; Barnett, B A; Blumenfeld, B; Bolognesi, S; Fehling, D; Gritsan, A V; Maksimovic, P; Martin, C; Swartz, M; Baringer, P; Bean, A; Benelli, G; Gray, J; Kenny, R P; Murray, M; Noonan, D; Sanders, S; Sekaric, J; Stringer, R; Wang, Q; Wood, J S; Barfuss, A F; Chakaberia, I; Ivanov, A; Khalil, S; Makouski, M; Maravin, Y; Saini, L K; Shrestha, S; Svintradze, I; Gronberg, J; Lange, D; Rebassoo, F; Wright, D; Baden, A; Calvert, B; Eno, S C; Gomez, J A; Hadley, N J; Kellogg, R G; Kolberg, T; Lu, Y; Marionneau, M; Mignerey, A C; Pedro, K; Skuja, A; Temple, J; Tonjes, M B; Tonwar, S C; Apyan, A; Barbieri, R; Bauer, G; Busza, W; Cali, I A; Chan, M; Di Matteo, L; Dutta, V; Gomez Ceballos, G; Goncharov, M; Gulhan, D; Klute, M; Lai, Y S; Lee, Y-J; Levin, A; Luckey, P D; Ma, T; Paus, C; Ralph, D; Roland, C; Roland, G; Stephans, G S F; Stöckli, F; Sumorok, K; Velicanu, D; Veverka, J; Wyslouch, B; Yang, M; Yoon, A S; Zanetti, M; Zhukova, V; Dahmes, B; De Benedetti, A; Gude, A; Kao, S C; Klapoetke, K; Kubota, Y; Mans, J; Pastika, N; Rusack, R; Singovsky, A; Tambe, N; Turkewitz, J; Acosta, J G; Cremaldi, L M; Kroeger, R; Oliveros, S; Perera, L; Sanders, D A; Summers, D; Avdeeva, E; Bloom, K; Bose, S; Claes, D R; Dominguez, A; Gonzalez Suarez, R; Keller, J; Knowlton, D; Kravchenko, I; Lazo-Flores, J; Malik, S; Meier, F; Snow, G R; Dolen, J; Godshalk, A; Iashvili, I; Jain, S; Kharchilava, A; Kumar, A; Rappoccio, S; Alverson, G; Barberis, E; Baumgartel, D; Chasco, M; Haley, J; Massironi, A; Nash, D; Orimoto, T; Trocino, D; Wang, R J; Wood, D; Zhang, J; Anastassov, A; Hahn, K A; Kubik, A; Lusito, L; Mucia, N; Odell, N; Pollack, B; Pozdnyakov, A; Schmitt, M; Stoynev, S; Sung, K; Velasco, M; Won, S; Berry, D; Brinkerhoff, A; Chan, K M; Drozdetskiy, A; Hildreth, M; Jessop, C; Karmgard, D J; Kellams, N; Kolb, J; Lannon, K; Luo, W; Lynch, S; Marinelli, N; Morse, D M; Pearson, T; Planer, M; Ruchti, R; Slaunwhite, J; Valls, N; Wayne, M; Wolf, M; Woodard, A; Antonelli, L; Bylsma, B; Durkin, L S; Flowers, S; Hill, C; Hughes, R; Kotov, K; Ling, T Y; Puigh, D; Rodenburg, M; Smith, G; Vuosalo, C; Winer, B L; Wolfe, H; Wulsin, H W; Berry, E; Elmer, P; Halyo, V; Hebda, P; Hunt, A; Jindal, P; Koay, S A; Lujan, P; Marlow, D; Medvedeva, T; Mooney, M; Olsen, J; Piroué, P; Quan, X; Raval, A; Saka, H; Stickland, D; Tully, C; Werner, J S; Zenz, S C; Zuranski, A; Brownson, E; Lopez, A; Mendez, H; Ramirez Vargas, J E; Alagoz, E; Benedetti, D; Bolla, G; Bortoletto, D; De Mattia, M; Everett, A; Hu, Z; Jha, M K; Jones, M; Jung, K; Kress, M; Leonardo, N; Lopes Pegna, D; Maroussov, V; Merkel, P; Miller, D H; Neumeister, N; Radburn-Smith, B C; Shipsey, I; Silvers, D; Svyatkovskiy, A; Wang, F; Xie, W; Xu, L; Yoo, H D; Zablocki, J; Zheng, Y; Parashar, N; Stupak, J; Adair, A; Akgun, B; Ecklund, K M; Geurts, F J M; Li, W; Michlin, B; Padley, B P; Redjimi, R; Roberts, J; Zabel, J; Betchart, B; Bodek, A; Covarelli, R; de Barbaro, P; Demina, R; Eshaq, Y; Ferbel, T; Garcia-Bellido, A; Goldenzweig, P; Han, J; Harel, A; Miner, D C; Petrillo, G; Vishnevskiy, D; Zielinski, M; Bhatti, A; Ciesielski, R; Demortier, L; Goulianos, K; Lungu, G; Malik, S; Mesropian, C; Arora, S; Barker, A; Chou, J P; Contreras-Campana, C; Contreras-Campana, E; Duggan, D; Ferencek, D; Gershtein, Y; Gray, R; Halkiadakis, E; Hidas, D; Lath, A; Panwalkar, S; Park, M; Patel, R; Rekovic, V; Robles, J; Salur, S; Schnetzer, S; Seitz, C; Somalwar, S; Stone, R; Thomas, S; Thomassen, P; Walker, M; Rose, K; Spanier, S; Yang, Z C; York, A; Bouhali, O; Eusebi, R; Flanagan, W; Gilmore, J; Kamon, T; Khotilovich, V; Krutelyov, V; Montalvo, R; Osipenkov, I; Pakhotin, Y; Perloff, A; Roe, J; Rose, A; Safonov, A; Sakuma, T; Suarez, I; Tatarinov, A; Toback, D; Akchurin, N; Cowden, C; Damgov, J; Dragoiu, C; Dudero, P R; Faulkner, J; Kovitanggoon, K; Kunori, S; Lee, S W; Libeiro, T; Volobouev, I; Appelt, E; Delannoy, A G; Greene, S; Gurrola, A; Johns, W; Maguire, C; Mao, Y; Melo, A; Sharma, M; Sheldon, P; Snook, B; Tuo, S; Velkovska, J; Arenton, M W; Boutle, S; Cox, B; Francis, B; Goodell, J; Hirosky, R; Ledovskoy, A; Li, H; Lin, C; Neu, C; Wood, J; Gollapinni, S; Harr, R; Karchin, P E; Kottachchi Kankanamge Don, C; Lamichhane, P; Belknap, D A; Borrello, L; Carlsmith, D; Cepeda, M; Dasu, S; Duric, S; Friis, E; Grothe, M; Hall-Wilton, R; Herndon, M; Hervé, A; Klabbers, P; Klukas, J; Lanaro, A; Lazaridis, C; Levine, A; Loveless, R; Mohapatra, A; Ojalvo, I; Perry, T; Pierro, G A; Polese, G; Ross, I; Sarangi, T; Savin, A; Smith, W H; Woods, N

    A search for invisible decays of Higgs bosons is performed using the vector boson fusion and associated ZH production modes. In the ZH mode, the Z boson is required to decay to a pair of charged leptons or a [Formula: see text] quark pair. The searches use the 8 [Formula: see text] pp collision dataset collected by the CMS detector at the LHC, corresponding to an integrated luminosity of up to 19.7 [Formula: see text]. Certain channels include data from 7 [Formula: see text] collisions corresponding to an integrated luminosity of 4.9 [Formula: see text]. The searches are sensitive to non-standard-model invisible decays of the recently observed Higgs boson, as well as additional Higgs bosons with similar production modes and large invisible branching fractions. In all channels, the observed data are consistent with the expected standard model backgrounds. Limits are set on the production cross section times invisible branching fraction, as a function of the Higgs boson mass, for the vector boson fusion and ZH production modes. By combining all channels, and assuming standard model Higgs boson cross sections and acceptances, the observed (expected) upper limit on the invisible branching fraction at [Formula: see text] [Formula: see text] is found to be 0.58 (0.44) at 95 % confidence level. We interpret this limit in terms of a Higgs-portal model of dark matter interactions.

  10. A map of the invisible journeys into particle physics

    CERN Document Server

    Butterworth, Jon

    2017-01-01

    What is the universe really made of? How do we know? Follow the map of the invisible to find out... Over the last sixty years, scientists around the world have worked together to explore the fundamental constituents of matter, and the forces that govern their behaviour. The result, so far, is the ‘Standard Model’ of elementary particles: a theoretical map of the basic building blocks of the universe. With the discovery of the Higgs boson in 2012, the map as we know it was completed, but also extended into strange new territory. A Map of the Invisible is an explorer’s guide to the Standard Model and the extraordinary realms of particle physics. After shrinking us down to the size of a sub-atomic particle, pioneering physicist Jon Butterworth takes us on board his research vessel for a journey in search of atoms and quarks, electrons and neutrinos, and the forces that shape the universe. Step by step, discovery by discovery, we journey into the world of the unseen, from the atom to black holes and dark ...

  11. Dynamics of processing invisible faces in the brain: automatic neural encoding of facial expression information.

    Science.gov (United States)

    Jiang, Yi; Shannon, Robert W; Vizueta, Nathalie; Bernat, Edward M; Patrick, Christopher J; He, Sheng

    2009-02-01

    The fusiform face area (FFA) and the superior temporal sulcus (STS) are suggested to process facial identity and facial expression information respectively. We recently demonstrated a functional dissociation between the FFA and the STS as well as correlated sensitivity of the STS and the amygdala to facial expressions using an interocular suppression paradigm [Jiang, Y., He, S., 2006. Cortical responses to invisible faces: dissociating subsystems for facial-information processing. Curr. Biol. 16, 2023-2029.]. In the current event-related brain potential (ERP) study, we investigated the temporal dynamics of facial information processing. Observers viewed neutral, fearful, and scrambled face stimuli, either visibly or rendered invisible through interocular suppression. Relative to scrambled face stimuli, intact visible faces elicited larger positive P1 (110-130 ms) and larger negative N1 or N170 (160-180 ms) potentials at posterior occipital and bilateral occipito-temporal regions respectively, with the N170 amplitude significantly greater for fearful than neutral faces. Invisible intact faces generated a stronger signal than scrambled faces at 140-200 ms over posterior occipital areas whereas invisible fearful faces (compared to neutral and scrambled faces) elicited a significantly larger negative deflection starting at 220 ms along the STS. These results provide further evidence for cortical processing of facial information without awareness and elucidate the temporal sequence of automatic facial expression information extraction.

  12. The Evolution of Policy Enactment on Gender-Based Violence in Schools

    Science.gov (United States)

    Parkes, Jenny

    2016-01-01

    This article examines how policies and strategies to address school-related gender-based violence have evolved since 2000, when gender-based violence within education was largely invisible. Through an exploration of policy enactment in three countries--Liberia, South Africa, and Brazil--it traces remarkable progress in policy, programmes, and…

  13. The secret of the invisible man. The function of the visibility of behavior in identity and change

    Directory of Open Access Journals (Sweden)

    Fernando Mandujano

    2007-05-01

    Full Text Available This article is about the many functions that the visibility of an individual's behaviour has for their identity, and for the efficiency of their processes. The analysis addresses three concerns: first, the issue of the visibility-invisibility of behaviour; second, individual and social perception of that visibility-invisibility; and lastly, the impact of that perception on identity and change.

  14. ¿Violencia invisible o del éxtasis al dolor? Invisible violence or from ecstasy to pain?

    Directory of Open Access Journals (Sweden)

    Lourdes Fernández Rius

    2008-04-01

    Full Text Available Los valores y roles para cada género no tienen el mismo reconocimiento social. Se trata de una construcción cultural que pretende, apoyándose en las diferencias, y en una dicotómica jerarquización y poder, establecer una desigualdad que acentúa la supremacía de lo masculino como valor. En la cultura patriarcal - como tendencia - suelen ser los hombres los más violentos, para un comportamiento de dependencia y docilidad en las mujeres. Por ello las relaciones de pareja, asociadas con fantasías de amor, constituyen un espacio de poder y son acosadas constantemente por vivencias de servidumbre y dominio. Diferencia - jerarquía - desigualdad - discriminación - violencia, circuito invisible en retroalimentación que la cultura reedita cotidianamente y que se expresa desde formas psicológicas, hasta daños extremos fundamentalmente hacia las mujeres en los vínculos amorosos.The values and roles for each gender are not socially recognized in an impartial way. It is a cultural construction that seeks, relying on the differences and, on a dichotomous hierarchy and power, to establish an inequality that reinforces the supremacy of masculinity as a value. In patriarchal culture - as a trend - men tend to be the most violent, and women to have a behavior of dependence and docility. Therefore the coupling relationships associated with fantasies of love are a space of power and are constantly harassed by experiences of servitude and domination. Difference - hierarchy - inequality - discrimination - violence, invisible feedback circuit that culture reedits daily and which expresses itself from psychological form to extreme damages primarily toward women on the amorous relationship.

  15. Unpacking the invisible knapsack: The invention of white privilege pedagogy

    Directory of Open Access Journals (Sweden)

    Leslie Margolin

    2015-12-01

    Full Text Available This article uses Ricoeur’s hermeneutics of suspicion, an interpretive strategy directed to the hidden or repressed meanings behind texts, to examine the origins of white privilege pedagogy, in particular their foundational technique, “unpacking the invisible knapsack.” This article’s chief finding is that this pedagogy, though designed to fight racism, has the unintended effect of supporting white privilege. Teaching whites to “unpack their invisible knapsack” does not make them more willing to take action against racial inequality. On the contrary, it makes them more complacent, more at home in an unjust world, and more comfortable with their whiteness. White privilege pedagogy does this by focusing on personal identity (whites’ personal identity over institutional structures, by paying more attention to whites’ experiences than to blacks’, by falsely claiming that the confession of white privileges leads to social action beneficial to blacks, and by restoring and expanding whites’ sense of moral rightness.

  16. Monetary reward modulates task-irrelevant perceptual learning for invisible stimuli.

    Directory of Open Access Journals (Sweden)

    David Pascucci

    Full Text Available Task Irrelevant Perceptual Learning (TIPL shows that the brain's discriminative capacity can improve also for invisible and unattended visual stimuli. It has been hypothesized that this form of "unconscious" neural plasticity is mediated by an endogenous reward mechanism triggered by the correct task performance. Although this result has challenged the mandatory role of attention in perceptual learning, no direct evidence exists of the hypothesized link between target recognition, reward and TIPL. Here, we manipulated the reward value associated with a target to demonstrate the involvement of reinforcement mechanisms in sensory plasticity for invisible inputs. Participants were trained in a central task associated with either high or low monetary incentives, provided only at the end of the experiment, while subliminal stimuli were presented peripherally. Our results showed that high incentive-value targets induced a greater degree of perceptual improvement for the subliminal stimuli, supporting the role of reinforcement mechanisms in TIPL.

  17. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  18. Children and adolescents facing a continuous security threat: Aggressive behavior and post-traumatic stress symptoms.

    Science.gov (United States)

    Nuttman-Shwartz, Orit

    2017-07-01

    There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of

  19. Invisible watermarking optical camera communication and compatibility issues of IEEE 802.15.7r1 specification

    Science.gov (United States)

    Le, Nam-Tuan

    2017-05-01

    Copyright protection and information security are two most considered issues of digital data following the development of internet and computer network. As an important solution for protection, watermarking technology has become one of the challenged roles in industry and academic research. The watermarking technology can be classified by two categories: visible watermarking and invisible watermarking. With invisible technique, there is an advantage on user interaction because of the visibility. By applying watermarking for communication, it will be a challenge and a new direction for communication technology. In this paper we will propose one new research on communication technology using optical camera communications (OCC) based invisible watermarking. Beside the analysis on performance of proposed system, we also suggest the frame structure of PHY and MAC layer for IEEE 802.15.7r1 specification which is a revision of visible light communication (VLC) standardization.

  20. Examining Charter School Policy and Public School District Resource Allocation in Ohio

    Science.gov (United States)

    Linick, Matthew A.

    2016-01-01

    This project focuses on the competitive pressure, or the threat of competitive pressure, generated by charter school policy. This paper uses longitudinal district-level data and multiple quasi-experimental designs to examine the relationship between two Ohio charter school policies and changes in public school district instructional resource…

  1. Designing for the invisible: user-centered design of infrastructure awareness systems

    DEFF Research Database (Denmark)

    Ramos, Juan David Hincapie; Tabard, Aurélien; Bardram, Jakob

    2010-01-01

    Infrastructure awareness systems reveal invisible aspects of infrastructures to their existing or potential users. Designing such systems is challenging as it requires making visible the hidden activity of infrastructures while providing information of interest to the users. To address...

  2. Notes from the back room: gender, power, and (In)visibility in women's experiences of masturbation.

    Science.gov (United States)

    Fahs, Breanne; Frank, Elena

    2014-01-01

    While popular culture has more frequently depicted women's masturbation in recent years, scholarly attention to women's own meaning making about masturbation remains largely absent. Existing research that emphasizes women's masturbation frequency, health correlates, masturbation as a factor in couples therapy, and masturbation as a substitute for partnered sexual behaviors have dominated the research, largely neglecting social identity correlates and women's subjectivities about masturbation. This study drew upon qualitative interviews with 20 women (mean age = 34, SD = 13.35) from diverse backgrounds to illuminate five themes in women's experiences with masturbation: (a) assumptions that most women self-penetrate during masturbation even when primarily using clitoral stimulation; (b) masturbation as sexual labor; (c) masturbation as a threat to male dominance; (d) masturbation as routine tension release; and (e) masturbation as a source of joy, fun, and pleasure. Because women revealed such a diverse set of experiences, we explored the advantages and disadvantages of the invisibility of women's masturbation. As a result of the internalization of stereotypically masculine scripts about sexuality-including an imagined penetrative focus, goal-oriented drive toward orgasm, sex as labor, and masturbation as nonemotional-women's masturbation experiences, regardless of sexual orientation, revealed the power imbalances often present in partnered (hetero)sexual dynamics.

  3. The Psychosocial Experience of High School Girls Highly Susceptible to Stereotype Threat: A Phenomenological Study

    Science.gov (United States)

    Picho, Katherine

    2016-01-01

    The author used phenomenology to explore the subjective experience of ninth-grade girls susceptible to mathematics-related stereotype threat in their authentic learning environments. The sample constituted students categorized as either having low or high susceptibility to stereotype threat (SST) enrolled in Honors mathematics classes at an urban…

  4. Invisible losses and the logics of resettlement compensation.

    Science.gov (United States)

    Witter, Rebecca; Satterfield, Terre

    2014-10-01

    The necessity of compensating people negatively affected by conservation and other development projects has been widely acknowledged. It is less widely acknowledged that because conventional compensation assessments focus on material resources and their economic equivalents, many important losses incurred by resettlers are invisible to project authorities. Through ethnographic observations and interviews, we documented losses identified by people facing resettlement from Mozambique's Limpopo National Park. We also examined resettlement planning documents to determine why decision makers' assessments of natural resource use and value neglect losses residents identified as critical. Identifying, preventing, and mitigating invisible losses in resettlement planning necessitates a better understanding of intangible benefits residents derive from resources, which are often as or more important than their readily apparent material properties. These benefits include but are not limited to decision-making authority linked to owning land versus having the use of fields; ancestral identity and social belonging linked to gravesites; the importance of tree roots that provide a powerful sense of security because they suppress hunger in periods of scarcity; and the importance of people's location within social networks and hierarchies as they determine the benefits versus risks that will be incurred through resettlement. © 2014 Society for Conservation Biology.

  5. Harry Potter and the Public School Library

    Science.gov (United States)

    DeMitchell, Todd A.; Carney, John J.

    2005-01-01

    For multitudes of children Harry Potter is a hero. He fights evil and stands up for his friends. However, not all adults agree. Instead, he is perceived as a threat by many. This article discusses how some adults on a school board reacted to this perceived threat. The majority of a school board voted to restrict access to Harry Potter books in the…

  6. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  7. Rose George: Deep Sea and Foreign Going: Inside Shipping, the Invisible Industry that Brings you 90% of Everything

    DEFF Research Database (Denmark)

    Taudal Poulsen, René

    2014-01-01

    Book review of: Rose George: Deep Sea and Foreign Going: Inside Shipping, the Invisible Industry that Brings you 90% of Everything. London :Portobello Books, 2013. 320 pp. ISBN 9781846272639......Book review of: Rose George: Deep Sea and Foreign Going: Inside Shipping, the Invisible Industry that Brings you 90% of Everything. London :Portobello Books, 2013. 320 pp. ISBN 9781846272639...

  8. MO-E-18C-06: Enriching Medical Physics Education By Visualizing The Invisible

    International Nuclear Information System (INIS)

    Sprawls, P

    2014-01-01

    Purpose: To enhance the understanding of medical physics concepts and develop higher levels of learning relating to invisible physics phenomena such as radiation. To provide medical physics educators in all countries of the world with understanding of knowledge structures in the human brain, the different levels of learning, and the types of knowledge required for higher level functions such as problem solving, creative innovations, and applied clinical applications. To provide medical physics educators with an open access resource (tool) that they can use in their teaching activities to enrich and elevate the level of learning for their students, residents, etc. with respect to the invisible realm of medical physics. Methods: An experienced clinical medical physicist and educator has created and provided with open access three complementary web-based resources to achieve the purposes described above. One is a module focusing on the medical physics learning process with respect to mental knowledge structures, how they relate to outcomes and applications, and learning activities that are required to develop the required knowledge structures. The second is an extensive set of visuals that educators can use in their activities (classes, small group discussions, etc.) to visualize the invisible. The third is an interactive online simulation where learners can adjust factors and visually observe changes in x-radiation.These resources are available online at www.BLINDED FOR REVIEW . Results: Medical physics education, especially for non-physicists, is becoming much more interesting and useful especially with respect to invisible radiation. The global impact is that medical imaging professionals can be more effective in optimizing x-ray imaging procedures and risk management when they have knowledge levels that enhance problem solving, innovation, and creativity. Conclusion: Medical physics educators in all institutions can be much more effective and efficient in the

  9. MO-E-18C-06: Enriching Medical Physics Education By Visualizing The Invisible

    Energy Technology Data Exchange (ETDEWEB)

    Sprawls, P [Emory University and Sprawls Educational Foundation, Montreat, NC (United States)

    2014-06-15

    Purpose: To enhance the understanding of medical physics concepts and develop higher levels of learning relating to invisible physics phenomena such as radiation. To provide medical physics educators in all countries of the world with understanding of knowledge structures in the human brain, the different levels of learning, and the types of knowledge required for higher level functions such as problem solving, creative innovations, and applied clinical applications. To provide medical physics educators with an open access resource (tool) that they can use in their teaching activities to enrich and elevate the level of learning for their students, residents, etc. with respect to the invisible realm of medical physics. Methods: An experienced clinical medical physicist and educator has created and provided with open access three complementary web-based resources to achieve the purposes described above. One is a module focusing on the medical physics learning process with respect to mental knowledge structures, how they relate to outcomes and applications, and learning activities that are required to develop the required knowledge structures. The second is an extensive set of visuals that educators can use in their activities (classes, small group discussions, etc.) to visualize the invisible. The third is an interactive online simulation where learners can adjust factors and visually observe changes in x-radiation.These resources are available online at www.BLINDED FOR REVIEW . Results: Medical physics education, especially for non-physicists, is becoming much more interesting and useful especially with respect to invisible radiation. The global impact is that medical imaging professionals can be more effective in optimizing x-ray imaging procedures and risk management when they have knowledge levels that enhance problem solving, innovation, and creativity. Conclusion: Medical physics educators in all institutions can be much more effective and efficient in the

  10. Flavor connections and neutrino mass hierarchy in variant invisible axion models without domain wall problem

    International Nuclear Information System (INIS)

    Geng, C.Q.; Ng, J.N.

    1988-08-01

    New types of invisible axion model based on the recent variant axion models are presented. They belong to the N=1 type model and hence are free of domain wall problems. The Peccei-Quinn symmetry transformations are not totally generation and flavor blind, which may help in understanding the small values of electron and u-quark and large t-quark masses. The light neutrino mass pattern in the two Higgs singlet models can have a very different hierarchy that differs from the other type invisible axion model. (Author) (25 refs.)

  11. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness.

    Science.gov (United States)

    Bedyńska, Sylwia; Krejtz, Izabela; Sedek, Grzegorz

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement - namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed.

  12. Hiding the interior region of core-shell nanoparticles with quantum invisible cloaks

    Science.gov (United States)

    Lee, Jeng Yi; Lee, Ray-Kuang

    2014-04-01

    Based on the scattering cancellation, we provide a method not only making a nanoparticle nearly invisible, but also hiding its interior region from the outside probing matter wave. By applying the interplay among the nodal points of partial waves along with the concept of streamline in fluid dynamics for probability flux, a quantum invisible cloak to the electron transport in a host semiconductor is demonstrated by simultaneously guiding the probability flux outside a hidden region and keeping the total scattering cross section negligible. As the probability flux vanishes in the interior region, one can embed any materials inside a multiple core-shell nanoparticle without affecting physical observables from the outside. Our results reveal the possibility to design a protection shield layer for fragile interior parts from the impact of transport electrons.

  13. A School Shooting Plot Foiled

    Science.gov (United States)

    Swezey, James A.; Thorp, Kimberly A.

    2010-01-01

    Dinkes, Cataldi, and Lin-Kelly (2007) claims that 78% of public schools reported one or more violent incidents during the 2005/2006 school year. School shootings are a rare but real threat on school campuses. Shootings at private schools are even less frequent with only a few recorded examples in the United States. This case study examines how a…

  14. Coordinate transformations make perfect invisibility cloaks with arbitrary shape

    International Nuclear Information System (INIS)

    Yan Wei; Yan Min; Ruan Zhichao; Qiu Min

    2008-01-01

    By investigating wave properties at cloak boundaries, invisibility cloaks with arbitrary shape constructed by general coordinate transformations are confirmed to be perfectly invisible to the external incident wave. The differences between line transformed cloaks and point transformed cloaks are discussed. The fields in the cloak medium are found analytically to be related to the fields in the original space via coordinate transformation functions. At the exterior boundary of the cloak, it is shown that no reflection is excited even though the permittivity and permeability do not always have a perfectly matched layer form, whereas at the inner boundary, no reflection is excited either, and in particular no field can penetrate into the cloaked region. However, for the inner boundary of any line transformed cloak, the permittivity and permeability in a specific tangential direction are always required to be infinitely large. Furthermore, the field discontinuity at the inner boundary always exists; the surface current is induced to make this discontinuity self-consistent. A point transformed cloak does not experience such problems. The tangential fields at the inner boundary are all zero, implying that no field discontinuity exists

  15. Racism, Invisibility, and the Alienation of the African American in ...

    African Journals Online (AJOL)

    Although Ralph Ellison's Invisible Man has enjoyed a plethora of readings, how the Marxist concept of alienation and estrangement figure in the narrative has been largely ignored. Moreover, critics appear not to be in agreement about Ellison's aesthetic project in this novel. While some acknowledge the “Negro slant” of the ...

  16. Search for invisibly decaying Higgs boson at Large Hadron Collider

    Indian Academy of Sciences (India)

    boson with a mass of 120 GeV/c2 for LHC energy of 14 TeV. Since the ... The exercise described here for the determination of the significance for excess ... to search for the invisible Higgs boson with less than 10 fb−1 at 3σ level [8]. We report ...

  17. Unconscious neural processing differs with method used to render stimuli invisible

    Directory of Open Access Journals (Sweden)

    Sergey Victor Fogelson

    2014-06-01

    Full Text Available Visual stimuli can be kept from awareness using various methods. The extent of processing that a given stimulus receives in the absence of awareness is typically used to make claims about the role of consciousness more generally. The neural processing elicited by a stimulus, however, may also depend on the method used to keep it from awareness, and not only on whether the stimulus reaches awareness. Here we report that the method used to render an image invisible has a dramatic effect on how category information about the unseen stimulus is encoded across the human brain. We collected fMRI data while subjects viewed images of faces and tools, that were rendered invisible using either continuous flash suppression (CFS or chromatic flicker fusion (CFF. In a third condition, we presented the same images under normal fully visible viewing conditions. We found that category information about visible images could be extracted from patterns of fMRI responses throughout areas of neocortex known to be involved in face or tool processing. However, category information about stimuli kept from awareness using CFS could be recovered exclusively within occipital cortex, whereas information about stimuli kept from awareness using CFF was also decodable within temporal and frontal regions. We conclude that unconsciously presented objects are processed differently depending on how they are rendered subjectively invisible. Caution should therefore be used in making generalizations on the basis of any one method about the neural basis of consciousness or the extent of information processing without consciousness.

  18. Unconscious neural processing differs with method used to render stimuli invisible.

    Science.gov (United States)

    Fogelson, Sergey V; Kohler, Peter J; Miller, Kevin J; Granger, Richard; Tse, Peter U

    2014-01-01

    Visual stimuli can be kept from awareness using various methods. The extent of processing that a given stimulus receives in the absence of awareness is typically used to make claims about the role of consciousness more generally. The neural processing elicited by a stimulus, however, may also depend on the method used to keep it from awareness, and not only on whether the stimulus reaches awareness. Here we report that the method used to render an image invisible has a dramatic effect on how category information about the unseen stimulus is encoded across the human brain. We collected fMRI data while subjects viewed images of faces and tools, that were rendered invisible using either continuous flash suppression (CFS) or chromatic flicker fusion (CFF). In a third condition, we presented the same images under normal fully visible viewing conditions. We found that category information about visible images could be extracted from patterns of fMRI responses throughout areas of neocortex known to be involved in face or tool processing. However, category information about stimuli kept from awareness using CFS could be recovered exclusively within occipital cortex, whereas information about stimuli kept from awareness using CFF was also decodable within temporal and frontal regions. We conclude that unconsciously presented objects are processed differently depending on how they are rendered subjectively invisible. Caution should therefore be used in making generalizations on the basis of any one method about the neural basis of consciousness or the extent of information processing without consciousness.

  19. Violence prevention in special education schools - an integrated practice?

    Science.gov (United States)

    Pihl, Patricia; Grytnes, Regine; Andersen, Lars Peter S

    2018-06-01

    Research has shown that employees in special education settings are at high risk for work-related threats and violence. Previous research has not yet been able to identify the essential components of training programs that offer protection from work-related threats and violence. Therefore, the aim of this study was to explore how employees in special education schools deal with prevention of work-related threats and violence. Group interviews were conducted with 14 employees working at 5 special education schools. Results show that employees use a wide range of prevention strategies drawing on specific violence prevention techniques as well as professional pedagogical approaches. We propose that the prevention of threats and violence in special education schools can be understood as an integrated pedagogical practice operating on three interrelated levels. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    OpenAIRE

    Sylwia Bedyńska; Izabela Krejtz; Grzegorz Sedek

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness ...

  1. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  2. Schiffer's Conjecture, Interior Transmission Eigenvalues and Invisibility Cloaking: Singular Problem vs. Nonsingular Problem

    OpenAIRE

    Liu, Hongyu

    2012-01-01

    In this note, we present some interesting observations on the Schiffer's conjecture, interior transmission eigenvalue problem and their connections to singular and nonsingular invisibility cloaking problems of acoustic waves.

  3. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  4. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  5. The (Dis)appearance of Ai Weiwei: Translations and (In)visibilities

    DEFF Research Database (Denmark)

    Glud, Louise Nørgaard; Stenbøg, Anne Sofie Christensen; Albrechtslund, Anders

    This paper offers a study of surveillance themes relating to Ai Weiwei’s highly discussed disappearance and later reappearance in 2011. Our study is based on an Actor-Network Theory (ANT) approach and we focus on the manifold negotiations and (in)visibilities relating to the dramatic events as well...... as Ai’s artwork and life....

  6. The (Dis)appearance of Ai Weiwei: Translations and (In)visibilities

    DEFF Research Database (Denmark)

    Stenbøg, Sofie; Nørgaard Glud, Louise; Albrechtslund, Anders

    2013-01-01

    This paper offers a study of surveillance themes relating to Ai Weiwei’s highly discussed disappearance and later reappearance in 2011. Our study is based on an Actor-Network Theory (ANT) approach and we focus on the manifold negotiations and (in)visibilities relating to the dramatic events as well...... as Ai’s artwork and life....

  7. Emotional Valence, Arousal, and Threat Ratings of 160 Chinese Words among Adolescents.

    Science.gov (United States)

    Ho, Samuel M Y; Mak, Christine W Y; Yeung, Dannii; Duan, Wenjie; Tang, Sandy; Yeung, June C; Ching, Rita

    2015-01-01

    This study was conducted to provide ratings of valence/pleasantness, arousal/excitement, and threat/potential harm for 160 Chinese words. The emotional valence classification (positive, negative, or neutral) of all of the words corresponded to that of the equivalent English language words. More than 90% of the participants, junior high school students aged between 12 and 17 years, understood the words. The participants were from both mainland China and Hong Kong, thus the words can be applied to adolescents familiar with either simplified (e.g. in mainland China) or traditional Chinese (e.g. in Hong Kong) with a junior secondary school education or higher. We also established eight words with negative valence, high threat, and high arousal ratings to facilitate future research, especially on attentional and memory biases among individuals prone to anxiety. Thus, the new emotional word list provides a useful source of information for affective research in the Chinese language.

  8. Toward making the invisible visible: Studying science teaching self-efficacy beliefs

    Science.gov (United States)

    Perkins, Catherine J.

    This dissertation consists of two articles to be submitted for publication. The first, a literature review, makes visible common influences on science teaching self-efficacy beliefs and also points to potentially invisible validation concerns regarding the instrument used. The second investigates the participants' invisible science teaching self-efficacy beliefs and, through the use of a more focused interview, makes those beliefs visible. Science teaching self-efficacy beliefs are science teachers' perceptions of their abilities to teach science effectively. The construct "teaching self-efficacy" originated in social cognitive theory (Bandura, 1977). The first article reviews the mixed results from teaching self-efficacy research in science contexts. The review focuses upon factors that facilitate or inhibit the development of self-efficacy beliefs among science teachers across stages of their careers. Although many studies of science teaching self-efficacy beliefs have utilized the Science Teaching Efficacy Belief Instrument - STEBI (Enochs & Riggs, 1990; Riggs & Enochs, 1990), this review also includes non-STEBI studies in order to represent diverse lines of research methodology. The review's findings indicate that antecedent factors such as science activities in and out of school, teacher preparation, science teaching experiences and supportive job contexts are significant influences on the development of science teaching self-efficacy beliefs. The review also indicates that the majority of these studies are short term and rely on a single STEBI administration with the collection of antecedent/demographic and/or interview data. The second article documents a study that responded to the above literature review findings. This study utilized multiple STEBI administrations during the preservice and beginning year of teaching for two science teachers. Rather than general questions, these participants were asked item specific, yet open-ended, questions to determine

  9. Hope, connectedness, and action: responses of adolescents and young adults to the threat of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Fernald, M.C.

    1985-01-01

    This study undertook to assess the degree to which a person's sense of interconnectedness with others may have a mediating effect on whether one reacts to the consciousness of nuclear threat with feelings of despair (helplessness and hopelessness) or with a sense of empowerment (hope, efficacy, and action for change). Subjects included 119 public high school students and 14 Friends' school students, ranging from 12-18 years of age; 58 university students ranging from 18-25 years of age; and 24 parents of public school students, 10 adult Friends, and 38 members of Physicians for Social Responsibility, ranging from 20-83 years of age. A self-rating questionnaire was administered to assess subjects' conscious level of concern about nuclear issues, feelings of connectedness with others in general and about nuclear concerns, feelings of hope and efficacy in general and with regard to nuclear issues, and participation in activities reflecting concerns about nuclear threat. Correlational analyses (multiple regression, Spearman Rho, Kendall's Tau) showed that general feelings of hope, level of activity, and feelings of connectedness about nuclear concerns were the best predictors of hope about nuclear concerns. Conscious level of concern and feelings of connectedness about nuclear concerns, along with age and SES were the best predictors of an active response to nuclear threat; additionally, parents' level of concern about nuclear issues was predictive of their children's degree of activity in response to nuclear threat. Adolescents' level of concern and degree of connectedness with others was predicted by their parents' degree of connectedness.

  10. When risk becomes invisible in the everyday life of day care

    DEFF Research Database (Denmark)

    Villumsen, Anne Marie; Kristensen, Ole Steen

    2016-01-01

    . When risk become invisible, it not only impedes the mono-professional help the children receive, it also inhibits a crucial multidisciplinary collaborative provision of support to children at risk and their families. The identification of children at risk seems to be based on an unexamined selection...

  11. Invisible Light: a global infotainment community based on augmented reality technologies

    Science.gov (United States)

    Israel, Kai; Wozniak, Peter; Vauderwange, Oliver; Curticapean, Dan

    2015-10-01

    Theoretical details about optics and photonics are not common knowledge nowadays. Physicists are keen to scientifically explain `light,' which has a huge impact on our lives. It is necessary to examine it from multiple perspectives and to make the knowledge accessible to the public in an interdisciplinary, scientifically well-grounded and appealing medial way. To allow an information exchange on a global scale, our project "Invisible Light" establishes a worldwide accessible platform. Its contents will not be created by a single instance, but user-generated, with the help of the global community. The article describes the infotainment portal "Invisible Light," which stores scientific articles about light and photonics and makes them accessible worldwide. All articles are tagged with geo-coordinates, so they can be clearly identified and localized. A smartphone application is used for visualization, transmitting the information to users in real time by means of an augmented reality application. Scientific information is made accessible for a broad audience and in an attractive manner.

  12. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    Science.gov (United States)

    Bedyńska, Sylwia; Krejtz, Izabela; Sedek, Grzegorz

    2018-01-01

    Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement – namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed. PMID:29666599

  13. Chronic Stereotype Threat Is Associated With Mathematical Achievement on Representative Sample of Secondary Schoolgirls: The Role of Gender Identification, Working Memory, and Intellectual Helplessness

    Directory of Open Access Journals (Sweden)

    Sylwia Bedyńska

    2018-04-01

    Full Text Available Stereotype threat affects performance in many different groups across many different domains. Despite a large body of experimental research on situational stereotype threat, little attention has been paid to the consequences of repeated experience of stereotype threat. Using structural equation modeling on data from a representative sample of girls from secondary schools, the current research examined the relations of chronic stereotype threat with mathematical achievement, and effectiveness of working memory functions. Moving beyond past theory, this study examined a new mechanism by which chronic stereotype threat decreases school achievement – namely intellectual helplessness. We assumed that repeated experience of stereotype threat works as intellectual helplessness training. After the phase of cognitive mobilization, cognitive exhaustion appears, because the individual has no gain from intense cognitive effort. Corroborating previous research on acute stereotype threat, we demonstrated that chronic stereotype threat is negatively associated with mathematical achievement. Additionally, it was also associated with lower effectiveness of working memory functions, which seems to show depletion of working memory as an effect of chronic stereotype threat. The results also demonstrated that both mediational paths from chronic stereotype threat to mathematical achievement: through working memory depletion and through intellectual helplessness were significant but only for girls that were highly identified with their gender group. In sum, we extended a well-established model of acute stereotype threat to its chronic version and suggested a new mechanism of chronic stereotype threat, which involves intellectual helplessness. Implications for stereotype threat theory and educational practice are discussed.

  14. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  15. Interacting with sexist men triggers social identity threat among female engineers.

    Science.gov (United States)

    Logel, Christine; Walton, Gregory M; Spencer, Steven J; Iserman, Emma C; von Hippel, William; Bell, Amy E

    2009-06-01

    Social identity threat is the notion that one of a person's many social identities may be at risk of being devalued in a particular context (C. M. Steele, S. J. Spencer, & J. Aronson, 2002). The authors suggest that in domains in which women are already negatively stereotyped, interacting with a sexist man can trigger social identity threat, undermining women's performance. In Study 1, male engineering students who scored highly on a subtle measure of sexism behaved in a dominant and sexually interested way toward an ostensible female classmate. In Studies 2 and 3, female engineering students who interacted with such sexist men, or with confederates trained to behave in the same way, performed worse on an engineering test than did women who interacted with nonsexist men. Study 4 replicated this finding and showed that women's underperformance did not extend to an English test, an area in which women are not negatively stereotyped. Study 5 showed that interacting with sexist men leads women to suppress concerns about gender stereotypes, an established mechanism of stereotype threat. Discussion addresses implications for social identity threat and for women's performance in school and at work.

  16. Shifts of visuospatial attention to invisible (metacontrast-masked) singletons: Clues from reaction times and event-related potential

    OpenAIRE

    Manfred Heumann; Ulrich Ansorge

    2006-01-01

    In the current study, we tested whether a masked and, thus, invisible singleton-cue captures atten-tion in a stimulus-driven manner or in a top-down contingent manner. The manual RT (Reaction Time) capture effect with the invisible singleton--cue decreased substantially when a match between the singleton-cue and the top-down controlled set of searched-for target features was also decreased. By contrast, with the PCN (Posterior Contralateral Negativity), an electrophysiological measure of the ...

  17. Invisible Cost Effective Mechanics for Anterior Space Closure.

    Science.gov (United States)

    Jumle, Aatish Vinod; Bagrecha, Saurabh; Gharat, Ninad; Misal, Abhijit; Toshniwal, N G

    2015-01-01

    The shifting paradigm towards invisible orthodontic treatment and also awareness in patients has allured their focus towards the most esthetic treatment approach. Also the lingual treatment is proved successful and is very well accepted by the patients. The problem that persist is its high expenses, which is not affordable by all patients. This article is a effort to treat a simple Class I malocclusion with anterior spacing using a simple, esthetic, Cost effective approach with acceptable results when esthetics plays a priority role.

  18. Deflecting the trajectory and changing the narrative: how self-affirmation affects academic performance and motivation under identity threat.

    Science.gov (United States)

    Sherman, David K; Hartson, Kimberly A; Binning, Kevin R; Purdie-Vaughns, Valerie; Garcia, Julio; Taborsky-Barba, Suzanne; Tomassetti, Sarah; Nussbaum, A David; Cohen, Geoffrey L

    2013-04-01

    To the extent that stereotype and identity threat undermine academic performance, social psychological interventions that lessen threat could buffer threatened students and improve performance. Two studies, each featuring a longitudinal field experiment in a mixed-ethnicity middle school, examined whether a values affirmation writing exercise could attenuate the achievement gap between Latino American and European American students. In Study 1, students completed multiple self-affirmation (or control) activities as part of their regular class assignments. Latino American students, the identity threatened group, earned higher grades in the affirmation than control condition, whereas White students were unaffected. The effects persisted 3 years and, for many students, continued into high school by lifting their performance trajectory. Study 2 featured daily diaries to examine how the affirmation affected psychology under identity threat, with the expectation that it would shape students' narratives of their ongoing academic experience. By conferring a big-picture focus, affirmation was expected to broaden construals, prevent daily adversity from being experienced as identity threat, and insulate academic motivation from identity threat. Indeed, affirmed Latino American students not only earned higher grades than nonaffirmed Latino American students but also construed events at a more abstract than concrete level and were less likely to have their daily feelings of academic fit and motivation undermined by identity threat. Discussion centers on how social-psychological processes propagate themselves over time and how timely interventions targeting these processes can promote well-being and achievement.

  19. Le socle d'une œuvre, invisible mais essentiel

    OpenAIRE

    Huguenin, Daniel

    2015-01-01

    Tiré du site internet du blog des Musées d'art et d'histoire (http://blog.mahgeneve.ch): "Le support se faisant aujourd'hui le plus discret possible, voire invisible. Sa réalisation nécessite une étroite collaboration entre les différents acteurs d'une exposition car le socleur doit allier les besoins de la conservation et de la muséographie.".

  20. THE WORK PROCESS IN RADIOLOGICAL NURSING: INVISIBILITY OFIONIZING RADIATION

    OpenAIRE

    Melo,Juliana Almeida Coelho de; Gelbcke,Francine Lima; Huhn,Andrea; Vargas,Mara Ambrosina de Oliveira

    2015-01-01

    ABSTRACT Qualitative descriptive and exploratory research, performed with 20 nursing professionals working in a general radiology unit and surgery center with the "C-arm" equipment, and the hemodynamics unit of a southern Brazilian teaching hospital. Aim was to analyze the dimensions of the work process for radiological technology nurse professionals. This paper made clear that radiological technologies are outside nursing, which leads to the invisibility of ionizing radiation, leading to ina...

  1. Invisible players: a family systems model.

    Science.gov (United States)

    Hellstedt, Jon

    2005-10-01

    This article attempts to demonstrate that the family is a key player in the athlete's development and performance, sometimes invisible, but often all too visible. The practice of clinical sport psychology is enriched by a family-based orientation to the assessment and treatment of athletes. Creating a workable family system is a challenge for parents. They have many difficult decisions to make, and are often without support and direction in making those choices. Sport psychiatrists and psychologists can be helpful to parents as well as athletes by using family-based assessments and treatment interventions that provide education, challenge, and support as they negotiate the tasks and transitions in the family life cycle.

  2. Electromagnetic Detection of a Perfect Invisibility Cloak

    International Nuclear Information System (INIS)

    Zhang Baile; Wu, Bae-Ian

    2009-01-01

    A perfect invisibility cloak is commonly believed to be undetectable from electromagnetic (EM) detection because it is equivalent to a curved but empty EM space created from coordinate transformation. Based on the intrinsic asymmetry of coordinate transformation applied to motions of photons and charges, we propose a method to detect this curved EM space by shooting a fast-moving charged particle through it. A broadband radiation generated in this process makes a cloak visible. Our method is the only known EM mechanism so far to detect an ideal perfect cloak (curved EM space) within its working band.

  3. Making the Invisible Visible: Disciplinary Literacy in Secondary School Classrooms

    Science.gov (United States)

    Mac Mahon, Brendan

    2014-01-01

    In Ireland, policy on literacy now aims to expand the role that post-primary teachers of all subjects have in developing students' literacy skills. This paper draws on data from a wider research study carried out in secondary schools in 2010 and focuses on the classroom support with disciplinary literacy provided by subject teachers for students…

  4. The mineralogical phase transformation of invisible gold-concentrate by microwave heating, and enhancement of their gold leaching rate

    Science.gov (United States)

    Bak, Geonyoung; Kim, Bongju; Choi, Nagchoul; Park*, Cheonyoung

    2015-04-01

    In this study, in order to obtain the maximum Au leaching rate, an invisible gold concentrate sample was microwave-treated and a thiourea leaching experiment was performed. It is found that gold exists as invisible as a result of observation with an optical microscope and an electron microscope. As the invisible gold concentrate sample was exposed to microwave longer, its temperature and weight loss were increased together and its S content was decreased. The conditions for the maximum Au leaching rate and the fast leaching effect were a particle size of -325×400 mesh, exposure to microwave for 70 minutes, 1.0 g of thiourea, 0.0504 g of sodium sulfite and 0.425 g of ferric sulfate. However, the condition under which Au was leached out to the maximum was applied to the control sample, but its Au leaching rate was just in a range of 78% to 88%. Such results suggest that the effect of sodium sulfite and ferric sulfate was more effective in the microwave-treated sample than in the control sample. Therefore, it was confirmed that the complete and very fast Au leaching can be achieved by means of the microwave pretreatment of invisible gold concentrate.

  5. Invisible Higgs boson decay with B→Kνν constraint

    International Nuclear Information System (INIS)

    Kim, C. S.; Park, Seong Chan; Wang Kai; Zhu Guohuai

    2010-01-01

    If the Higgs boson were the only particle within the LHC accessible range, precision measurement of the Higgs's properties would play a unique role in studying electroweak symmetry breaking as well as possible new physics. We try to use low energy experiments such as rare B decay to constrain a challenging decay mode of Higgs, in which a Higgs decays to a pair of light (≅1∼2 GeV) SM singlet S and becomes invisible. By using the current experimental bound of rare decay B→Kνν and computing the contribution of B→KSS to (the) B→K+Ee, we obtain an upper bound on the Higgs coupling to such light singlet. It is interesting that the partial width of the invisible decay mode h→SS by taking the upper bound value of coupling is at a comparable level with h→WW/ZZ or WW ( * ) decay modes, making the Higgs identifiable but with a different predicted decay branching ratio from [the] standard model Higgs decay. It will then have an impact on precision measurement of the Higgs's properties. We also study the implication for cosmology from such a light singlet and propose a solution to the potential problem.

  6. When physics becomes art: Signatures of the invisible lands in Geneva

    CERN Document Server

    2002-01-01

    Signatures of the Invisible, an exhibition that brings together science and art, arrives in Geneva next week. Thanks to CERN and the London Institute, eleven European artists have worked with physicists from the Laboratory and the result of this collaboration will be shown in the Centre d'Art Contemporain until May.

  7. Internet invisible y web semántica : ¿el futuro de los sistemas de información en línea?

    OpenAIRE

    Codina Bonilla, Lluís

    2003-01-01

    Los cambios en la Web Invisible, cuyas fronteras no dejan de retroceder, y el desarrollo de la web semántica marcarán buena parte del futuro de los sistemas de búsqueda en línea de los próximos años. La Web Invisible es cada vez menos invisible porque, poco a poco, y de una forma u otra, sus contenidos se van incorporando a los motores de búsqueda. La web semántica es la más ambiciosa e importante apuesta tecnológica y científica del W3 Consortium y afectará en gran medida a los desarrollos f...

  8. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  9. Making the Invisible Visible: School Counselors Empowering Students with Disabilities through Self-Advocacy Training

    Science.gov (United States)

    Hatch, Trish; Shelton, T.; Monk, Gerald

    2009-01-01

    Professional School Counselors (PSCs) are trained to be leaders in school reform, collaborators with other educators, and advocates for all students. While PSCs provide academic, career, and personal/social interventions for the student body as part of a comprehensive school counseling program the needs of students with disabilities are often…

  10. The boundary conditions for point transformed electromagnetic invisibility cloaks

    International Nuclear Information System (INIS)

    Weder, Ricardo

    2008-01-01

    In this paper we study point transformed electromagnetic invisibility cloaks in transformation media that are obtained by transformation from general anisotropic media. We assume that there are several point transformed electromagnetic cloaks located in different points in space. Our results apply in particular to the first-order invisibility cloaks introduced by Pendry et al and to the high-order invisibility cloaks introduced by Hendi et al and by Cai et al. We identify the appropriate cloaking boundary conditions that the solutions of Maxwell equations have to satisfy at the outside, ∂K + , and at the inside, ∂K - , of the boundary of the cloaked object K in the case where the permittivity and the permeability are bounded below and above in K. Namely, that the tangential components of the electric and the magnetic fields have to vanish at ∂K + -which is always true-and that the normal components of the curl of the electric and the magnetic fields have to vanish at ∂K - . These results are proven requiring that energy be conserved. In the case of one spherical cloak with a spherically stratified K and a radial current at ∂K we verify by an explicit calculation that our cloaking boundary conditions are satisfied and that cloaking of active devices holds, even if the current is at the boundary of the cloaked object. As we prove our results for media that are obtained by transformation from general anisotropic media, our results apply to the cloaking of objects with passive and active devices contained in general anisotropic media, in particular to objects with passive and active devices contained inside general crystals. Our results suggest a method to enhance cloaking in the approximate transformation media that are used in practice. Namely, to coat the boundary of the cloaked object (the inner boundary of the cloak) with a material that imposes the boundary conditions above. As these boundary conditions have to be satisfied for exact transformation

  11. Added Value of Contrast-Enhanced Ultrasound on Biopsies of Focal Hepatic Lesions Invisible on Fusion Imaging Guidance.

    Science.gov (United States)

    Kang, Tae Wook; Lee, Min Woo; Song, Kyoung Doo; Kim, Mimi; Kim, Seung Soo; Kim, Seong Hyun; Ha, Sang Yun

    2017-01-01

    To assess whether contrast-enhanced ultrasonography (CEUS) with Sonazoid can improve the lesion conspicuity and feasibility of percutaneous biopsies for focal hepatic lesions invisible on fusion imaging of real-time ultrasonography (US) with computed tomography/magnetic resonance images, and evaluate its impact on clinical decision making. The Institutional Review Board approved this retrospective study. Between June 2013 and January 2015, 711 US-guided percutaneous biopsies were performed for focal hepatic lesions. Biopsies were performed using CEUS for guidance if lesions were invisible on fusion imaging. We retrospectively evaluated the number of target lesions initially invisible on fusion imaging that became visible after applying CEUS, using a 4-point scale. Technical success rates of biopsies were evaluated based on histopathological results. In addition, the occurrence of changes in clinical decision making was assessed. Among 711 patients, 16 patients (2.3%) were included in the study. The median size of target lesions was 1.1 cm (range, 0.5-1.9 cm) in pre-procedural imaging. After CEUS, 15 of 16 (93.8%) focal hepatic lesions were visualized. The conspicuity score was significantly increased after adding CEUS, as compared to that on fusion imaging (p making for 11 of 16 patients (68.8%). The addition of CEUS could improve the conspicuity of focal hepatic lesions invisible on fusion imaging. This dual guidance using CEUS and fusion imaging may affect patient management via changes in clinical decision-making.

  12. Illustrating the (in)visible: Understanding the impact of loss in adults living with secondary lymphedema after cancer

    Science.gov (United States)

    Thomas, Roanne; Hamilton, Ryan

    2014-01-01

    Life with a disability is often riddled with paradoxes, one of which is being visibly marked, while personal experiences, losses, and challenges remain hidden. Our article draws attention to this paradox among people who live with secondary lymphedema after cancer (SLC). SLC is a relatively unfamiliar chronic condition within medical and lay discourses of cancer, which proves challenging for the many cancer survivors who are in search of information and understanding. Thirteen men and women with SLC were recruited from two research sites (Fredericton, NB, and Ottawa, ON, Canada) to participate in semi-structured interviews about the physical and psychosocial aspects of SLC. Using a methodology of interpretive description, our analysis of participant interviews reveals the complex ways in which men and women felt both visible and invisible within various contexts. We discuss three majors themes: (in)visibility and appearance related to material losses; (in)visibility and action connected to visible losses in function, as well as invisible struggles to care for oneself; and the loss of present and future well-being, as SLC renders some limitations visible while potentially obscuring a hopeful future indefinitely. Our research indicates that timely diagnosis of SLC would be an immediate first step in recognizing the physical and emotional dimensions of the condition. To accomplish this, increased awareness is needed. To enhance quality of life for those living with SLC, the development of new resources and psychosocial supports is also required. PMID:25148936

  13. Visible Fists, Clandestine Kicks, and Invisible Elbows: Three Forms of Regulating Neoliberal Poverty

    Directory of Open Access Journals (Sweden)

    Javier Auyero

    2010-10-01

    Full Text Available Argentina In a preliminary attempt to understand the daily production of poor people’s subordination in contemporary Argentina, this paper explores the workings of overt and covert forms of state violence against the urban destitute and of more subtle modes of domination. Attention to the simultaneous operation of what this paper calls visible fists, clandestine kicks, and invisible elbows in the daily life of the dispossessed serves to a better integrate violence into the study of popular politics, and b cast light on the productive (and not merely repressive nature of state power.   Resumen: Puños visibles, patadas clandestinas y codos invisibles: tres formas de regulación de la pobreza neoliberal En un acercamiento preliminar a la producción cotidiana de la subordinación de los pobres urbanos en la Argentina contemporánea, este artículo explora las formas abiertas y encubiertas de violencia estatal contra los más destituidos y las modalidades más sutiles de dominación. Una atención simultánea a lo que el artículo denomina puños visibles, patadas clandestinas, y codos invisibles en la vida cotidiana de los desposeídos es útil a los efectos de: a integrar la violencia en el estudio de la política popular, y b iluminar la naturaleza productiva (y no meramente represiva del poder estatal.

  14. Invisibility cloaks with arbitrary geometries for layered and gradually changing backgrounds

    International Nuclear Information System (INIS)

    Li, C; Yao, K; Li, F

    2009-01-01

    Cloaks with arbitrary geometries are proposed which can make objects invisible in inhomogeneous backgrounds. The general and explicit expressions of the complex permittivity and permeability tensors are derived for cloaks embedded in layered and gradually changing media. The inner and the outer boundaries of the cloaks can be non-conformal with arbitrary shapes, which considerably improve the flexibility of the cloak applications. The interactions of electromagnetic waves with irregular cloaks are studied based on numerical simulations. The influences of the cloaked and uncloaked perfect electric conductor (PEC) cylinders upon the scattering fields of the multilayered backgrounds are quantitatively evaluated. The effect of loss on the cloaking performance has also been investigated. It is verified that cloaks with ideal parameters can smoothly deflect and guide the incoming beams to propagate around the shielded regions without disturbing the beams when they return to the inhomogeneous backgrounds. Therefore, the objects in the shielded region can be effectively invisible to the corresponding backgrounds. The performance of lossy cloaks will degrade with comparatively large power reduction of the transmitted beams.

  15. Unconscious processing of facial attractiveness: invisible attractive faces orient visual attention.

    Science.gov (United States)

    Hung, Shao-Min; Nieh, Chih-Hsuan; Hsieh, Po-Jang

    2016-11-16

    Past research has proven human's extraordinary ability to extract information from a face in the blink of an eye, including its emotion, gaze direction, and attractiveness. However, it remains elusive whether facial attractiveness can be processed and influences our behaviors in the complete absence of conscious awareness. Here we demonstrate unconscious processing of facial attractiveness with three distinct approaches. In Experiment 1, the time taken for faces to break interocular suppression was measured. The results showed that attractive faces enjoyed the privilege of breaking suppression and reaching consciousness earlier. In Experiment 2, we further showed that attractive faces had lower visibility thresholds, again suggesting that facial attractiveness could be processed more easily to reach consciousness. Crucially, in Experiment 3, a significant decrease of accuracy on an orientation discrimination task subsequent to an invisible attractive face showed that attractive faces, albeit suppressed and invisible, still exerted an effect by orienting attention. Taken together, for the first time, we show that facial attractiveness can be processed in the complete absence of consciousness, and an unconscious attractive face is still capable of directing our attention.

  16. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  17. Revealing the Invisible Hand: The Role of Teachers in Children's Peer Experiences

    Science.gov (United States)

    Farmer, Thomas W.; Lines, Meghan McAuliffe; Hamm, Jill V.

    2011-01-01

    To introduce this special issue, the concept of the teacher as an ''invisible hand'' is presented as a metaphor to describe the potentially influential but relatively understudied contribution that educators are likely to have on children's peer relationships and their broader interpersonal growth. Building from conceptual work distinguishing…

  18. Design and analysis of the trapeziform and flat acoustic cloaks with controllable invisibility performance in a quasi-space

    Directory of Open Access Journals (Sweden)

    Jian Zhu

    2015-07-01

    Full Text Available We present the design, implementation and detailed performance analysis for a class of trapeziform and flat acoustic cloaks. An effective large invisible area is obtained compared with the traditional carpet cloak. The cloaks are realized with homogeneous metamaterials which are made of periodic arrangements of subwavelength unit cells composed of steel embedded in air. The microstructures and its effective parameters of the cloaks are determined quickly and precisely in a broadband frequency range by using the effective medium theory and the proposed parameters optimization method. The invisibility capability of the cloaks can be controlled by the variation of the key design parameters and scale factor which are proved to have more influence on the performance in the near field than that in the far field. Different designs are suitable for different application situations. Good cloaking performance demonstrates that such a device can be physically realized with natural materials which will greatly promote the real applications of invisibility cloak.

  19. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  20. Illusory body ownership of an invisible body interpolated between virtual hands and feet via visual-motor synchronicity.

    Science.gov (United States)

    Kondo, Ryota; Sugimoto, Maki; Minamizawa, Kouta; Hoshi, Takayuki; Inami, Masahiko; Kitazaki, Michiteru

    2018-05-15

    Body ownership can be modulated through illusory visual-tactile integration or visual-motor synchronicity/contingency. Recently, it has been reported that illusory ownership of an invisible body can be induced by illusory visual-tactile integration from a first-person view. We aimed to test whether a similar illusory ownership of the invisible body could be induced by the active method of visual-motor synchronicity and if the illusory invisible body could be experienced in front of and facing away from the observer. Participants observed left and right white gloves and socks in front of them, at a distance of 2 m, in a virtual room through a head-mounted display. The white gloves and socks were synchronized with the observers' actions. In the experiments, we tested the effect of synchronization, and compared this to a whole-body avatar, measuring self-localization drift. We observed that visual hands and feet were sufficient to induce illusory body ownership, and this effect was as strong as using a whole-body avatar.

  1. Search for Invisibly Decaying Higgs Bosons with Large Decay Width Using the OPAL Detector at LEP

    CERN Document Server

    Abbiendi, G.; Akesson, P.F.; Alexander, G.; Anagnostu, G.; Anderson, K.J.; Asai, S.; Axen, D.; Bailey, I.; Barberio, E.; Bailari, T.; Barlow, R.J.; Batly, R.J.; Bechtle, P.; Behnke, T.; Bell, Kenneth Watson; Bell, P.J.; Bella, G.; Bellerive, A.; Benelli, G.; Bethke, S.; Biebel, O.; Boeriu, O.; Bock, P.; Boutemeur, M.; Braibant, S.; Brown, Robert M.; Burckhart, H.J.; Campana, S.; Capiluppi, P.; Carnegie, R.K.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, D.G.; Ciocca, C.; Csilling, A.; Cuffiani, M.; Dado, S.; De Roeck, A.; De Wolf, E.A.; Desch, K.; Dienes, B.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Etzion, E.; Fabbri, F.; Ferrari, P.; Fiedler, F.; Fleck, I.; Ford, M.; Frey, A.; Gagnon, P.; Gary, John William; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Giunta, Marina; Goldberg, J.; Gross, E.; Grunhaus, J.; Gruwe, M.; Gupta, A.; Hajdu, C.; Hamann, M.; Hanson, G.G.; Harel, A.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Herten, G.; Heuer, R.D.; Hill, J.C.; Horvath, D.; Igo-Kemenes, P.; Ishii, K.; Jeremie, H.; Jovanovic, P.; Junk, T.R.; Kanzaki, J.; Karlen, D.; Kawagoe, K.; Kawamoto, T.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kluth, S.; Kobayashi, T.; Kobel, M.; Komamiya, S.; Kramer, T.; Krasznahorkay, A., Jr.; Krieger, P.; von Krogh, J.; Kuhl, T.; Kupper, M.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Lellouch, D.; Letts, J.; Levinson, L.; Lillich, J.; Lloyd, S.L.; Loebinger, F.K.; Lu, J.; Ludwig, A.; Ludwig, J.; Mader, W.; Marcellini, S.; Martin, A.J.; Mashimo, T.; Mattig, Peter; McKenna, J.; McPherson, R.A.; Meijers, F.; Menges, W.; Merritt, F.S.; Mes, H.; Meyer, N.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Mohr, W.; Mori, T.; Mutter, A.; Nagai, K.; Nakamura, I.; Nanjo, H.; Neal, H.A.; Nisius, R.; O'Neale, S.W.; Oh, A.; Oreglia, M.J.; Orito, S.; Pahl, C.; Pasztor, G.; Pilcher, J.E.; Pinfold, J.; Plane, D.E.; Pooth, O.; Przybycien, M.; Quadt, A.; Rabertz, K.; Rembser, C.; Renkel, P.; Roney, J.M.; Rossi, A.M.; Rozen, Y.; Runge, K.; Sachs, K.; Saeki, T.; Sarkisyan, E.K.G.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schorner-Sadenius, T.; Schroder, M.; Schumacher, M.; Seuster, R.; Shears, T.G.; shen, B.C.; sherwood, P.; Skuja, A.; Smith, A.M.; Sobie, R.; Soldner-Rembold, S.; Stahl, A.; Strom, David M.; Strohmer, R.; Tarem, S.; Tasevsky, M.; Teuscher, R.; Thomson, M.A.; Torrence, E.; Toya, D.; Tran, P.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Ujvari, B.; Vollmer, C.F.; Vannerem, P.; Vertesi, R.; Verzocchi, M.; Voss, H.; Vossebeld, J.; Ward, C.P.; Ward, D.R.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wengler, T.; Wermes, N.; Wilson, G.W.; Wilson, J.A.; Wolf, G.; Wyatt, T.R.; Yamashita, S.; Zer-Zion, D.; Zivkovic, Lidija

    2007-01-01

    This paper describes a topological search for an invisibly decaying Higgs boson,H, produced via the Bjorken process (e+e- -> HZ). The analysis is based on data recorded using the OPAL detector at LEP at centre-of-mass energies from 183 to 209 GeV corresponding to a total integrated luminosity of 629pb-1. In the analysis only hadronic decays of the Z boson are considered. A scan over Higgs boson masses from 1 to 120 GeV and decay widths from 1 to 3000 GeV revealed no indication for a signal in the data. From a likelihood ratio of expected signal and Standard Model background we determine upper limits on cross-section times branching ratio to an invisible final state. For moderate Higgs boson decay widths, these range from about 0.07pb Mh = 60GeV) to 0.57pb (Mh = 114GeV). For decay widths above 200GeV the upper limits are of the order of 0.15pb. The results can be interpreted in general scenarios predicting a large invisible decay width of the Higgs boson. As an example we interpret the results in the so-called...

  2. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  3. Invisible marking system by extreme ultraviolet radiation: the new frontier for anti-counterfeiting tags

    International Nuclear Information System (INIS)

    Lazzaro, P. Di; Bollanti, S.; Flora, F.; Mezi, L.; Murra, D.; Torre, A.; Bonfigli, F.; Montereali, R.M.; Vincenti, M.A.

    2016-01-01

    We present a marking technology which uses extreme ultraviolet radiation to write invisible patterns on tags based on alkali fluoride thin films. The shape of the pattern is pre-determined by a mask (in the case of contact lithography) or by a suitable mirror (projection lithography). Tags marked using this method offer a much better protection against fakes than currently available anti-counterfeiting techniques. The complexity and cost of this technology can be tailored to the value of the good to be protected, leaving, on the other hand, the specific reading technique straightforward. So far, we have exploited our invisible marking to tag artworks, identity cards, electrical components, and containers of radioactive wastes. Advantages and limits of this technology are discussed in comparison with the anti-counterfeiting systems available in the market.

  4. Managing specific learning disability in schools in India.

    Science.gov (United States)

    Karande, Sunil; Sholapurwala, Rukhshana; Kulkarni, Madhuri

    2011-07-01

    Specific learning disability (dyslexia, dysgraphia, and dyscalculia) afflicts 5-15% of school-going children. Over the last decade; awareness about this invisible handicap has grown in India. However, much needs to be done to ensure that each afflicted child gets an opportunity to achieve his or her full academic potential in regular mainstream schools. In order to achieve this ideal scenario, all regular classroom teachers should be sensitized to suspect, and trained to screen for this disability when the child is in primary school. School managements should become proactive to set up resource rooms and employ special educators to ensure that these children receive regular and affordable remedial education; and be diligent in ensuring that these children get the mandatory provisions both during school and board examinations. Once specific learning disability is recognized as a disability by the Government of India, these children with the backing of the Right to Education Act, would be able to benefit significantly.

  5. Indicators of School Crime Safety, 2000.

    Science.gov (United States)

    Kaufman, Phillip; Chen, Xianglei; Choy, Susan P.; Ruddy, Sally A.; Miller, Amanda K.; Fleury, Jill K.; Chandler, Kathryn A.; Rand, Michael R.; Klaus, Patsy; Planty, Michael

    Providing the latest data, this report on school safety presents a mixed picture: while overall crime has declined, violence, gangs, and drugs remain at some schools. Victimization at school declined from 1995-99, though rates for fighting and weapon threats remain steady. Students seem more secure, and gang activity decreased; however, in grades…

  6. Added value of contrast-enhanced ultrasound on biopsies of focal hepatic lesions invisible on fusion imaging guidance

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Tae Wook; Lee, Min Woo; Song, Kyoung Doo; Kim, Mimi; Kim, Seung Soo; Kim, Seong Hyun; Ha, Sang Yun [Samsung Medical Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2017-01-15

    To assess whether contrast-enhanced ultrasonography (CEUS) with Sonazoid can improve the lesion conspicuity and feasibility of percutaneous biopsies for focal hepatic lesions invisible on fusion imaging of real-time ultrasonography (US) with computed tomography/magnetic resonance images, and evaluate its impact on clinical decision making. The Institutional Review Board approved this retrospective study. Between June 2013 and January 2015, 711 US-guided percutaneous biopsies were performed for focal hepatic lesions. Biopsies were performed using CEUS for guidance if lesions were invisible on fusion imaging. We retrospectively evaluated the number of target lesions initially invisible on fusion imaging that became visible after applying CEUS, using a 4-point scale. Technical success rates of biopsies were evaluated based on histopathological results. In addition, the occurrence of changes in clinical decision making was assessed. Among 711 patients, 16 patients (2.3%) were included in the study. The median size of target lesions was 1.1 cm (range, 0.5–1.9 cm) in pre-procedural imaging. After CEUS, 15 of 16 (93.8%) focal hepatic lesions were visualized. The conspicuity score was significantly increased after adding CEUS, as compared to that on fusion imaging (p < 0.001). The technical success rate of biopsy was 87.6% (14/16). After biopsy, there were changes in clinical decision making for 11 of 16 patients (68.8%). The addition of CEUS could improve the conspicuity of focal hepatic lesions invisible on fusion imaging. This dual guidance using CEUS and fusion imaging may affect patient management via changes in clinical decision-making.

  7. Added value of contrast-enhanced ultrasound on biopsies of focal hepatic lesions invisible on fusion imaging guidance

    International Nuclear Information System (INIS)

    Kang, Tae Wook; Lee, Min Woo; Song, Kyoung Doo; Kim, Mimi; Kim, Seung Soo; Kim, Seong Hyun; Ha, Sang Yun

    2017-01-01

    To assess whether contrast-enhanced ultrasonography (CEUS) with Sonazoid can improve the lesion conspicuity and feasibility of percutaneous biopsies for focal hepatic lesions invisible on fusion imaging of real-time ultrasonography (US) with computed tomography/magnetic resonance images, and evaluate its impact on clinical decision making. The Institutional Review Board approved this retrospective study. Between June 2013 and January 2015, 711 US-guided percutaneous biopsies were performed for focal hepatic lesions. Biopsies were performed using CEUS for guidance if lesions were invisible on fusion imaging. We retrospectively evaluated the number of target lesions initially invisible on fusion imaging that became visible after applying CEUS, using a 4-point scale. Technical success rates of biopsies were evaluated based on histopathological results. In addition, the occurrence of changes in clinical decision making was assessed. Among 711 patients, 16 patients (2.3%) were included in the study. The median size of target lesions was 1.1 cm (range, 0.5–1.9 cm) in pre-procedural imaging. After CEUS, 15 of 16 (93.8%) focal hepatic lesions were visualized. The conspicuity score was significantly increased after adding CEUS, as compared to that on fusion imaging (p < 0.001). The technical success rate of biopsy was 87.6% (14/16). After biopsy, there were changes in clinical decision making for 11 of 16 patients (68.8%). The addition of CEUS could improve the conspicuity of focal hepatic lesions invisible on fusion imaging. This dual guidance using CEUS and fusion imaging may affect patient management via changes in clinical decision-making

  8. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  9. The Invisible Web: Uncovering Information Sources Search Engines Can't See.

    Science.gov (United States)

    Sherman, Chris; Price, Gary

    This book takes a detailed look at the nature and extent of the Invisible Web, and offers pathfinders for accessing the valuable information it contains. It is designed to fit the needs of both novice and advanced Web searchers. Chapter One traces the development of the Internet and many of the early tools used to locate and share information via…

  10. Black’s Survival Strategy: Tricksterism in Ralph Ellison’s Invisible Man

    Directory of Open Access Journals (Sweden)

    Meiling Fu

    2017-01-01

    Full Text Available This paper is intended to investigate tricksterism in Ralph Waldo Ellison’s Invisible Man. Through analyzing the successful tricksters and the unsuccessful tricksters, this research concludes that tricksterism is a survival strategy in the society of white supremacy, and black people have to wear the mask and trick the white people for the cause of eliminating racial discrimination.

  11. Why Information Literacy Is Invisible

    Directory of Open Access Journals (Sweden)

    William Badke

    2011-03-01

    Full Text Available Despite the many information literacy programs on higher education campuses, the literature of information literacy and the concept of information literacy as a viable academic subject remain hidden to most professors and academic administrators. Information literacy is invisible to academia because it is misunderstood, academic administrators have not put it on their institutions' agendas, the literature of information literacy remains in the library silo, there is a false belief that information literacy is acquired only by experience, there is a false assumption that technological ability is the same as information literacy, faculty culture makes information literacy less significant than other educational pursuits, faculty have a limited perception of the ability of librarians. and accrediting bodies have not yet advanced information literacy to a viable position in higher education. The new information age demands that these barriers be overcome and information literacy take a prominent place within the academic experience.

  12. Invisible waves and hidden realms: augmented reality and experimental art

    Science.gov (United States)

    Ruzanka, Silvia

    2012-03-01

    Augmented reality is way of both altering the visible and revealing the invisible. It offers new opportunities for artistic exploration through virtual interventions in real space. In this paper, the author describes the implementation of two art installations using different AR technologies, one using optical marker tracking on mobile devices and one integrating stereoscopic projections into the physical environment. The first artwork, De Ondas y Abejas (The Waves and the Bees), is based on the widely publicized (but unproven) hypothesis of a link between cellphone radiation and the phenomenon of bee colony collapse disorder. Using an Android tablet, viewers search out small fiducial markers in the shape of electromagnetic waves hidden throughout the gallery, which reveal swarms of bees scattered on the floor. The piece also creates a generative soundscape based on electromagnetic fields. The second artwork, Urban Fauna, is a series of animations in which features of the urban landscape become plants and animals. Surveillance cameras become flocks of birds while miniature cellphone towers, lampposts, and telephone poles grow like small seedlings in time-lapse animation. The animations are presented as small stereoscopic projections, integrated into the physical space of the gallery. These two pieces explore the relationship between nature and technology through the visualization of invisible forces and hidden alternate realities.

  13. Sexual Violence, Race and Media (InVisibility: Intersectional Complexities in a Transnational Frame

    Directory of Open Access Journals (Sweden)

    Vrushali Patil

    2015-08-01

    Full Text Available Intersectional scholarship argues that women of color have distinct experiences of rape compared to white women and highlights their relative invisibility as victims compared to white women victims in news media. While the bulk of intersectional work has examined such issues within one nation and particularly within the US, in an era of increasingly transnationalized media content, we explore such intersectionalities in a transnational frame. That is, we explore the treatment of the rape of a local Indian woman in New Delhi, India, and the rape of a white woman in Steubenville, USA, in the New York Times and the Times of India. We find that contra assumptions in the intersectional literature, the racialized Indian victim is hyper-visible across both papers while the white US victim is relatively invisible. Situating both newspapers within the global histories of the development of news as a particular genre of storytelling, we argue that their respective locations within larger processes shaped by colonial, imperial and neo-colonial histories have critical implications for the coverage each paper offers. Thus, we argue that issues of race and visibility in media operate very differently depending on the space and scale of analysis. In an increasingly globalized world, then, we must start paying attention to the transnational and its implications for rape, race and (invisibility in news media. Ultimately, our approach brings together processes of racialization at multiple scales—both below the nation and above the nation—to offer a more complex, multi-scalar understanding of how racialization processes impact rape coverage.

  14. Accounting for the Invisible Work of Hospital Orderlies

    DEFF Research Database (Denmark)

    Stisen, Allan; Verdezoto, Nervo; Blunck, Henrik

    2016-01-01

    the coordination changes in orderlies’ work practices in connection to the implementation of a workflow application at the hospital. By applying a mixed methods approach (both qualitative and quantitative studies), this paper calls for attention to the changes in orderlies’ coordination activities while moving......The cooperative, invisible non-clinical work of hospital orderlies is often overlooked. It consists foremost of transferring patients between hospital departments. As the overall efficiency of the hospital is highly dependent on the coordination of the work of orderlies, this study investigates...... coordination. We also present design recommendations for future design of coordination tools to support orderlies’ work practices....

  15. Homogenous isotropic invisible cloak based on geometrical optics.

    Science.gov (United States)

    Sun, Jingbo; Zhou, Ji; Kang, Lei

    2008-10-27

    Invisible cloak derived from the coordinate transformation requires its constitutive material to be anisotropic. In this work, we present a cloak of graded-index isotropic material based on the geometrical optics theory. The cloak is realized by concentric multilayered structure with designed refractive index to achieve the low-scattering and smooth power-flow. Full-wave simulations on such a design of a cylindrical cloak are performed to demonstrate the cloaking ability to incident wave of any polarization. Using normal nature material with isotropy and low absorption, the cloak shows light on a practical path to stealth technology, especially that in the optical range.

  16. The invisible accounting side of ERP systems

    Directory of Open Access Journals (Sweden)

    Iliyan Dimitrov

    2017-12-01

    Full Text Available ERP (Enterprise Resource planning systems are widely used in many organizations, including companies in Bulgaria. Depending of the point of view statistical results of their implementation in recent years are contradictory (Infostat, 2017, (Eurostat, 2017. This paper reveals an overview of researchers and practitioners’ interpretations, who express opinion for an essence and advantages of adopting ERP systems. In academic and professional discussions one potential benefit stays invisible. The purpose of this publication is to provide new sight of essence and potential benefits which are given with ERP implementation. Some advantages of ERP systems are discussed. Some aspects of the links between ERP systems, management accounting and financial accounting are described.

  17. Search for invisibly decaying Higgs bosons in $e^{+}e^{-} \\rightarrow Z^{0}h^{0}$ production at $\\sqrt{s} = 183 - 209 GeV$

    CERN Document Server

    Abbiendi, G.; Akesson, P.F.; Alexander, G.; Anagnostou, G.; Anderson, K.J.; Asai, S.; Axen, D.; Bailey, I.; Barberio, E.; Barillari, T.; Barlow, R.J.; Batley, R.J.; Bechtle, P.; Behnke, T.; Bell, K.W.; Bell, P.J.; Bella, G.; Bellerive, A.; Benelli, G.; Bethke, S.; Biebel, O.; Boeriu, O.; Bock, P.; Boutemeur, M.; Braibant, S.; Brown, R.M.; Burckhart, H.J.; Campana, S.; Capiluppi, P.; Carnegie, R.K.; Carter, A.A.; Carter, J.R.; Chang, C.Y.; Charlton, D.G.; Ciocca, C.; Csilling, A.; Cuffiani, M.; Dado, S.; De Roeck, A.; De Wolf, E.A.; Desch, K.; Dienes, B.; Dubbert, J.; Duchovni, E.; Duckeck, G.; Duerdoth, I.P.; Etzion, E.; Fabbri, F.; Ferrari, P.; Fiedler, F.; Fleck, I.; Ford, M.; Frey, A.; Gagnon, P.; Gary, J.W.; Geich-Gimbel, C.; Giacomelli, G.; Giacomelli, P.; Giunta, M.; Goldberg, J.; Gross, E.; Grunhaus, J.; Gruwe, M.; Gupta, A.; Hajdu, C.; Hamann, M.; Hanson, G.G.; Harel, A.; Hauschild, M.; Hawkes, C.M.; Hawkings, R.; Herten, G.; Heuer, R.D.; Hill, J.C.; Horvath, D.; Igo-Kemenes, P.; Ishii, K.; Jeremie, H.; Jovanovic, P.; Junk, T.R.; Kanzaki, J.; Karlen, D.; Kawagoe, K.; Kawamoto, T.; Keeler, R.K.; Kellogg, R.G.; Kennedy, B.W.; Kluth, S.; Kobayashi, T.; Kobel, M.; Komamiya, S.; Kramer, T.; Krasznahorkay, A., Jr.; Krieger, P.; von Krogh, J.; Kuhl, T.; Kupper, M.; Lafferty, G.D.; Landsman, H.; Lanske, D.; Lellouch, D.; Letts, J.; Levinson, L.; Lillich, J.; Lloyd, S.L.; Loebinger, F.K.; Lu, J.; Ludwig, A.; Ludwig, J.; Mader, W.; Marcellini, S.; Martin, A.J.; Mashimo, T.; Mattig, P.; McKenna, J.; McPherson, R.A.; Meijers, F.; Menges, W.; Merritt, F.S.; Mes, H.; Meyer, N.; Michelini, A.; Mihara, S.; Mikenberg, G.; Miller, D.J.; Mohr, W.; Mori, T.; Mutter, A.; Nagai, K.; Nakamura, I.; Nanjo, H.; Neal, H.A.; O'Neale, S.W.; Oh, A.; Oreglia, M.J.; Orito, S.; Pahl, C.; Pasztor, G.; Pater, J.R.; Pilcher, J.E.; Pinfold, J.; Plane, D.E.; Pooth, O.; Przybycien, M.; Quadt, A.; Rabbertz, K.; Rembser, C.; Renkel, P.; Roney, J.M.; Rossi, A.M.; Rozen, Y.; Runge, K.; Sachs, K.; Saeki, T.; Sarkisyan, E.K.G.; Schaile, A.D.; Schaile, O.; Scharff-Hansen, P.; Schieck, J.; Schorner-Sadenius, T.; Schroder, M.; Schumacher, M.; Seuster, R.; Shears, T.G.; Shen, B.C.; Sherwood, P.; Skuja, A.; Smith, A.M.; Sobie, R.; Soldner-Rembold, S.; Spano, F.; Stahl, A.; Strom, D.; Strohmer, R.; Tarem, S.; Tasevsky, M.; Teuscher, R.; Thomson, M.A.; Torrence, E.; Toya, D.; Trigger, I.; Trocsanyi, Z.; Tsur, E.; Turner-Watson, M.F.; Ueda, I.; Ujvari, B.; Vollmer, C.F.; Vannerem, P.; Vertesi, R.; Verzocchi, M.; Voss, H.; Vossebeld, J.; Ward, C.P.; Ward, D.R.; Watkins, P.M.; Watson, A.T.; Watson, N.K.; Wells, P.S.; Wengler, T.; Wermes, N.; Wilson, G.W.; Wilson, J.A.; Wolf, G.; Wyatt, T.R.; Yamashita, S.; Zer-Zion, D.; Zivkovic, L.

    2010-01-01

    A search is performed for Higgs bosons decaying into invisible final states, produced in association with a Zo boson in e+e- collisions at energies between 183 and 209 GeV. The search is based on data samples collected by the OPAL detector at LEP corresponding to an integrated luminosity of about 660 pb-1. The analysis aims to select events containing the hadronic decay products of the Zo boson and large missing momentum, as expected from Higgs boson decay into a pair of stable weakly interacting neutral particles, such as the lightest neutralino in the Minimal Supersymmetric Standard Model. The same analysis is applied to a search for nearly invisible Higgs boson cascade decays into stable weakly interacting neutral particles. No excess over the expected background from Standard Model processes is observed. Limits on the production of invisibly decaying Higgs bosons produced in association with a Zo boson are derived. Assuming a branching ratio BR(ho->invisible)=1, a lower limit of 108.2 GeV is placed on the...

  18. Rural schools: In the middle of nowhere.The invisible cities in the world of education

    Directory of Open Access Journals (Sweden)

    Rosa Vázquez Recio

    2008-04-01

    Full Text Available This article includes some reflections about rural schools, coming from the personal and professional experience of the author. The article claims that rural schools should cease to be forgotten or underestimated and that they should be recognized as real schools. This issue is linked to the field of initial teacher training, making some considerations to be taken into account in order to promote a change in the appraisal and recognition of schools in the rural world.

  19. Invisible axion in the hidden sector of no-scale supergravity

    International Nuclear Information System (INIS)

    Sato, Hikaru

    1987-01-01

    We propose a new axion model which incorporates the U(1) PQ symmetry into a hidden sector, as well as an observable sector, of no-scale supergravity models. The axion is a spin-zero field in the hidden sector. The U(1) PQ symmetry is naturally embedded in the family symmetry of the no-scale models. Invisible axions live in the gravity hidden sector without conflict with the cosmological and astrophysical constraints. (orig.)

  20. Searches for invisible decays of the Higgs boson in pp collisions at √s=7, 8, and 13 TeV

    Energy Technology Data Exchange (ETDEWEB)

    Khachatryan, V.; Sirunyan, A.M.; Tumasyan, A. [Yerevan Physics Institute, Yerevan (Armenia); Adam, W. [Institut für Hochenergiephysik, Wien (Austria); Collaboration: The CMS collaboration; and others

    2017-02-28

    Searches for invisible decays of the Higgs boson are presented. The data collected with the CMS detector at the LHC correspond to integrated luminosities of 5.1, 19.7, and 2.3 fb{sup −1} at centre-of-mass energies of 7, 8, and 13 TeV, respectively. The search channels target Higgs boson production via gluon fusion, vector boson fusion, and in association with a vector boson. Upper limits are placed on the branching fraction of the Higgs boson decay to invisible particles, as a function of the assumed production cross sections. The combination of all channels, assuming standard model production, yields an observed (expected) upper limit on the invisible branching fraction of 0.24 (0.23) at the 95% confidence level. The results are also interpreted in the context of Higgs-portal dark matter models.

  1. Searches for invisible decays of the Higgs boson in pp collisions at $\\sqrt{s}= $ 7, 8, and 13 TeV

    CERN Document Server

    Khachatryan, Vardan; Tumasyan, Armen; Adam, Wolfgang; Aşılar, Ece; Bergauer, Thomas; Brandstetter, Johannes; Brondolin, Erica; Dragicevic, Marko; Erö, Janos; Flechl, Martin; Friedl, Markus; Fruehwirth, Rudolf; Ghete, Vasile Mihai; Hartl, Christian; Hörmann, Natascha; Hrubec, Josef; Jeitler, Manfred; König, Axel; Krätschmer, Ilse; Liko, Dietrich; Matsushita, Takashi; Mikulec, Ivan; Rabady, Dinyar; Rad, Navid; Rahbaran, Babak; Rohringer, Herbert; Schieck, Jochen; Strauss, Josef; Waltenberger, Wolfgang; Wulz, Claudia-Elisabeth; Dvornikov, Oleg; Makarenko, Vladimir; Zykunov, Vladimir; Mossolov, Vladimir; Shumeiko, Nikolai; Suarez Gonzalez, Juan; Alderweireldt, Sara; De Wolf, Eddi A; Janssen, Xavier; Lauwers, Jasper; Van De Klundert, Merijn; Van Haevermaet, Hans; Van Mechelen, Pierre; Van Remortel, Nick; Van Spilbeeck, Alex; Abu Zeid, Shimaa; Blekman, Freya; D'Hondt, Jorgen; Daci, Nadir; De Bruyn, Isabelle; Deroover, Kevin; Lowette, Steven; Moortgat, Seth; Moreels, Lieselotte; Olbrechts, Annik; Python, Quentin; Tavernier, Stefaan; Van Doninck, Walter; Van Mulders, Petra; Van Parijs, Isis; Brun, Hugues; Clerbaux, Barbara; De Lentdecker, Gilles; Delannoy, Hugo; Fasanella, Giuseppe; Favart, Laurent; Goldouzian, Reza; Grebenyuk, Anastasia; Karapostoli, Georgia; Lenzi, Thomas; Léonard, Alexandre; Luetic, Jelena; Maerschalk, Thierry; Marinov, Andrey; Randle-conde, Aidan; Seva, Tomislav; Vander Velde, Catherine; Vanlaer, Pascal; Yonamine, Ryo; Zenoni, Florian; Zhang, Fengwangdong; Cimmino, Anna; Cornelis, Tom; Dobur, Didar; Fagot, Alexis; Garcia, Guillaume; Gul, Muhammad; Khvastunov, Illia; Poyraz, Deniz; Salva Diblen, Sinem; Schöfbeck, Robert; Sharma, Archana; Tytgat, Michael; Van Driessche, Ward; Yazgan, Efe; Zaganidis, Nicolas; Bakhshiansohi, Hamed; Beluffi, Camille; Bondu, Olivier; Brochet, Sébastien; Bruno, Giacomo; Caudron, Adrien; De Visscher, Simon; Delaere, Christophe; Delcourt, Martin; Francois, Brieuc; Giammanco, Andrea; Jafari, Abideh; Jez, Pavel; Komm, Matthias; Lemaitre, Vincent; Magitteri, Alessio; Mertens, Alexandre; Musich, Marco; Nuttens, Claude; Piotrzkowski, Krzysztof; Quertenmont, Loic; Selvaggi, Michele; Vidal Marono, Miguel; Wertz, Sébastien; Beliy, Nikita; Aldá Júnior, Walter Luiz; Alves, Fábio Lúcio; Alves, Gilvan; Brito, Lucas; Hensel, Carsten; Moraes, Arthur; Pol, Maria Elena; Rebello Teles, Patricia; Belchior Batista Das Chagas, Ewerton; Carvalho, Wagner; Chinellato, Jose; Custódio, Analu; Melo Da Costa, Eliza; Da Silveira, Gustavo Gil; De Jesus Damiao, Dilson; De Oliveira Martins, Carley; Fonseca De Souza, Sandro; Huertas Guativa, Lina Milena; Malbouisson, Helena; Matos Figueiredo, Diego; Mora Herrera, Clemencia; Mundim, Luiz; Nogima, Helio; Prado Da Silva, Wanda Lucia; Santoro, Alberto; Sznajder, Andre; Tonelli Manganote, Edmilson José; Vilela Pereira, Antonio; Ahuja, Sudha; Bernardes, Cesar Augusto; Dogra, Sunil; Tomei, Thiago; De Moraes Gregores, Eduardo; Mercadante, Pedro G; Moon, Chang-Seong; Novaes, Sergio F; Padula, Sandra; Romero Abad, David; Ruiz Vargas, José Cupertino; Aleksandrov, Aleksandar; Hadjiiska, Roumyana; Iaydjiev, Plamen; Rodozov, Mircho; Stoykova, Stefka; Sultanov, Georgi; Vutova, Mariana; Dimitrov, Anton; Glushkov, Ivan; Litov, Leander; Pavlov, Borislav; Petkov, Peicho; Fang, Wenxing; Ahmad, Muhammad; Bian, Jian-Guo; Chen, Guo-Ming; Chen, He-Sheng; Chen, Mingshui; Chen, Ye; Cheng, Tongguang; Jiang, Chun-Hua; Leggat, Duncan; Liu, Zhenan; Romeo, Francesco; Shaheen, Sarmad Masood; Spiezia, Aniello; Tao, Junquan; Wang, Chunjie; Wang, Zheng; Zhang, Huaqiao; Zhao, Jingzhou; Ban, Yong; Chen, Geng; Li, Qiang; Liu, Shuai; Mao, Yajun; Qian, Si-Jin; Wang, Dayong; Xu, Zijun; Avila, Carlos; Cabrera, Andrés; Chaparro Sierra, Luisa Fernanda; Florez, Carlos; Gomez, Juan Pablo; González Hernández, Carlos Felipe; Ruiz Alvarez, José David; Sanabria, Juan Carlos; Godinovic, Nikola; Lelas, Damir; Puljak, Ivica; Ribeiro Cipriano, Pedro M; Sculac, Toni; Antunovic, Zeljko; Kovac, Marko; Brigljevic, Vuko; Ferencek, Dinko; Kadija, Kreso; Micanovic, Sasa; Sudic, Lucija; Susa, Tatjana; Attikis, Alexandros; Mavromanolakis, Georgios; Mousa, Jehad; Nicolaou, Charalambos; Ptochos, Fotios; Razis, Panos A; Rykaczewski, Hans; Tsiakkouri, Demetra; Finger, Miroslav; Finger Jr, Michael; Carrera Jarrin, Edgar; Assran, Yasser; Elkafrawy, Tamer; Mahrous, Ayman; Calpas, Betty; Kadastik, Mario; Murumaa, Marion; Perrini, Lucia; Raidal, Martti; Tiko, Andres; Veelken, Christian; Eerola, Paula; Pekkanen, Juska; Voutilainen, Mikko; Härkönen, Jaakko; Jarvinen, Terhi; Karimäki, Veikko; Kinnunen, Ritva; Lampén, Tapio; Lassila-Perini, Kati; Lehti, Sami; Lindén, Tomas; Luukka, Panja-Riina; Tuominiemi, Jorma; Tuovinen, Esa; Wendland, Lauri; Talvitie, Joonas; Tuuva, Tuure; Besancon, Marc; Couderc, Fabrice; Dejardin, Marc; Denegri, Daniel; Fabbro, Bernard; Faure, Jean-Louis; Favaro, Carlotta; Ferri, Federico; Ganjour, Serguei; Ghosh, Saranya; Givernaud, Alain; Gras, Philippe; Hamel de Monchenault, Gautier; Jarry, Patrick; Kucher, Inna; Locci, Elizabeth; Machet, Martina; Malcles, Julie; Rander, John; Rosowsky, André; Titov, Maksym; Zghiche, Amina; Abdulsalam, Abdulla; Antropov, Iurii; Baffioni, Stephanie; Beaudette, Florian; Busson, Philippe; Cadamuro, Luca; Chapon, Emilien; Charlot, Claude; Davignon, Olivier; Granier de Cassagnac, Raphael; Jo, Mihee; Lisniak, Stanislav; Miné, Philippe; Nguyen, Matthew; Ochando, Christophe; Ortona, Giacomo; Paganini, Pascal; Pigard, Philipp; Regnard, Simon; Salerno, Roberto; Sirois, Yves; Strebler, Thomas; Yilmaz, Yetkin; Zabi, Alexandre; Agram, Jean-Laurent; Andrea, Jeremy; Aubin, Alexandre; Bloch, Daniel; Brom, Jean-Marie; Buttignol, Michael; Chabert, Eric Christian; Chanon, Nicolas; Collard, Caroline; Conte, Eric; Coubez, Xavier; Fontaine, Jean-Charles; Gelé, Denis; Goerlach, Ulrich; Le Bihan, Anne-Catherine; Skovpen, Kirill; Van Hove, Pierre; Gadrat, Sébastien; Beauceron, Stephanie; Bernet, Colin; Boudoul, Gaelle; Bouvier, Elvire; Carrillo Montoya, Camilo Andres; Chierici, Roberto; Contardo, Didier; Courbon, Benoit; Depasse, Pierre; El Mamouni, Houmani; Fan, Jiawei; Fay, Jean; Gascon, Susan; Gouzevitch, Maxime; Grenier, Gérald; Ille, Bernard; Lagarde, Francois; Laktineh, Imad Baptiste; Lethuillier, Morgan; Mirabito, Laurent; Pequegnot, Anne-Laure; Perries, Stephane; Popov, Andrey; Sabes, David; Sordini, Viola; Vander Donckt, Muriel; Verdier, Patrice; Viret, Sébastien; Toriashvili, Tengizi; Tsamalaidze, Zviad; Autermann, Christian; Beranek, Sarah; Feld, Lutz; Heister, Arno; Kiesel, Maximilian Knut; Klein, Katja; Lipinski, Martin; Ostapchuk, Andrey; Preuten, Marius; Raupach, Frank; Schael, Stefan; Schomakers, Christian; Schulz, Johannes; Verlage, Tobias; Weber, Hendrik; Albert, Andreas; Brodski, Michael; Dietz-Laursonn, Erik; Duchardt, Deborah; Endres, Matthias; Erdmann, Martin; Erdweg, Sören; Esch, Thomas; Fischer, Robert; Güth, Andreas; Hamer, Matthias; Hebbeker, Thomas; Heidemann, Carsten; Hoepfner, Kerstin; Knutzen, Simon; Merschmeyer, Markus; Meyer, Arnd; Millet, Philipp; Mukherjee, Swagata; Olschewski, Mark; Padeken, Klaas; Pook, Tobias; Radziej, Markus; Reithler, Hans; Rieger, Marcel; Scheuch, Florian; Sonnenschein, Lars; Teyssier, Daniel; Thüer, Sebastian; Cherepanov, Vladimir; Flügge, Günter; Hoehle, Felix; Kargoll, Bastian; Kress, Thomas; Künsken, Andreas; Lingemann, Joschka; Müller, Thomas; Nehrkorn, Alexander; Nowack, Andreas; Nugent, Ian Michael; Pistone, Claudia; Pooth, Oliver; Stahl, Achim; Aldaya Martin, Maria; Arndt, Till; Asawatangtrakuldee, Chayanit; Beernaert, Kelly; Behnke, Olaf; Behrens, Ulf; Bin Anuar, Afiq Aizuddin; Borras, Kerstin; Campbell, Alan; Connor, Patrick; Contreras-Campana, Christian; Costanza, Francesco; Diez Pardos, Carmen; Dolinska, Ganna; Eckerlin, Guenter; Eckstein, Doris; Eichhorn, Thomas; Eren, Engin; Gallo, Elisabetta; Garay Garcia, Jasone; Geiser, Achim; Gizhko, Andrii; Grados Luyando, Juan Manuel; Gunnellini, Paolo; Harb, Ali; Hauk, Johannes; Hempel, Maria; Jung, Hannes; Kalogeropoulos, Alexis; Karacheban, Olena; Kasemann, Matthias; Keaveney, James; Kleinwort, Claus; Korol, Ievgen; Krücker, Dirk; Lange, Wolfgang; Lelek, Aleksandra; Leonard, Jessica; Lipka, Katerina; Lobanov, Artur; Lohmann, Wolfgang; Mankel, Rainer; Melzer-Pellmann, Isabell-Alissandra; Meyer, Andreas Bernhard; Mittag, Gregor; Mnich, Joachim; Mussgiller, Andreas; Ntomari, Eleni; Pitzl, Daniel; Placakyte, Ringaile; Raspereza, Alexei; Roland, Benoit; Sahin, Mehmet Özgür; Saxena, Pooja; Schoerner-Sadenius, Thomas; Seitz, Claudia; Spannagel, Simon; Stefaniuk, Nazar; Van Onsem, Gerrit Patrick; Walsh, Roberval; Wissing, Christoph; Blobel, Volker; Centis Vignali, Matteo; Draeger, Arne-Rasmus; Dreyer, Torben; Garutti, Erika; Gonzalez, Daniel; Haller, Johannes; Hoffmann, Malte; Junkes, Alexandra; Klanner, Robert; Kogler, Roman; Kovalchuk, Nataliia; Lapsien, Tobias; Lenz, Teresa; Marchesini, Ivan; Marconi, Daniele; Meyer, Mareike; Niedziela, Marek; Nowatschin, Dominik; Pantaleo, Felice; Peiffer, Thomas; Perieanu, Adrian; Poehlsen, Jennifer; Sander, Christian; Scharf, Christian; Schleper, Peter; Schmidt, Alexander; Schumann, Svenja; Schwandt, Joern; Stadie, Hartmut; Steinbrück, Georg; Stober, Fred-Markus Helmut; Stöver, Marc; Tholen, Heiner; Troendle, Daniel; Usai, Emanuele; Vanelderen, Lukas; Vanhoefer, Annika; Vormwald, Benedikt; Akbiyik, Melike; Barth, Christian; Baur, Sebastian; Baus, Colin; Berger, Joram; Butz, Erik; Caspart, René; Chwalek, Thorsten; Colombo, Fabio; De Boer, Wim; Dierlamm, Alexander; Fink, Simon; Freund, Benedikt; Friese, Raphael; Giffels, Manuel; Gilbert, Andrew; Goldenzweig, Pablo; Haitz, Dominik; Hartmann, Frank; Heindl, Stefan Michael; Husemann, Ulrich; Katkov, Igor; Kudella, Simon; Lobelle Pardo, Patricia; Mildner, Hannes; Mozer, Matthias Ulrich; Müller, Thomas; Plagge, Michael; Quast, Gunter; Rabbertz, Klaus; Röcker, Steffen; Roscher, Frank; Schröder, Matthias; Shvetsov, Ivan; Sieber, Georg; Simonis, Hans-Jürgen; Ulrich, Ralf; Wagner-Kuhr, Jeannine; Wayand, Stefan; Weber, Marc; Weiler, Thomas; Williamson, Shawn; Wöhrmann, Clemens; Wolf, Roger; Anagnostou, Georgios; Daskalakis, Georgios; Geralis, Theodoros; Giakoumopoulou, Viktoria Athina; Kyriakis, Aristotelis; Loukas, Demetrios; Topsis-Giotis, Iasonas; Kesisoglou, Stilianos; Panagiotou, Apostolos; Saoulidou, Niki; Tziaferi, Eirini; Evangelou, Ioannis; Flouris, Giannis; Foudas, Costas; Kokkas, Panagiotis; Loukas, Nikitas; Manthos, Nikolaos; Papadopoulos, Ioannis; Paradas, Evangelos; Filipovic, Nicolas; Bencze, Gyorgy; Hajdu, Csaba; Hidas, Pàl; Horvath, Dezso; Sikler, Ferenc; Veszpremi, Viktor; Vesztergombi, Gyorgy; Zsigmond, Anna Julia; Beni, Noemi; Czellar, Sandor; Karancsi, János; Makovec, Alajos; Molnar, Jozsef; Szillasi, Zoltan; Bartók, Márton; Raics, Peter; Trocsanyi, Zoltan Laszlo; Ujvari, Balazs; Bahinipati, Seema; Choudhury, Somnath; Mal, Prolay; Mandal, Koushik; Nayak, Aruna; Sahoo, Deepak Kumar; Sahoo, Niladribihari; Swain, Sanjay Kumar; Bansal, Sunil; Beri, Suman Bala; Bhatnagar, Vipin; Chawla, Ridhi; Bhawandeep, Bhawandeep; Kalsi, Amandeep Kaur; Kaur, Anterpreet; Kaur, Manjit; Kumar, Ramandeep; Kumari, Priyanka; Mehta, Ankita; Mittal, Monika; Singh, Jasbir; Walia, Genius; Kumar, Ashok; Bhardwaj, Ashutosh; Choudhary, Brajesh C; Garg, Rocky Bala; Keshri, Sumit; Malhotra, Shivali; Naimuddin, Md; Nishu, Nishu; Ranjan, Kirti; Sharma, Ramkrishna; Sharma, Varun; Bhattacharya, Rajarshi; Bhattacharya, Satyaki; Chatterjee, Kalyanmoy; Dey, Sourav; Dutt, Suneel; Dutta, Suchandra; Ghosh, Shamik; Majumdar, Nayana; Modak, Atanu; Mondal, Kuntal; Mukhopadhyay, Supratik; Nandan, Saswati; Purohit, Arnab; Roy, Ashim; Roy, Debarati; Roy Chowdhury, Suvankar; Sarkar, Subir; Sharan, Manoj; Thakur, Shalini; Behera, Prafulla Kumar; Chudasama, Ruchi; Dutta, Dipanwita; Jha, Vishwajeet; Kumar, Vineet; Mohanty, Ajit Kumar; Netrakanti, Pawan Kumar; Pant, Lalit Mohan; Shukla, Prashant; Topkar, Anita; Aziz, Tariq; Dugad, Shashikant; Kole, Gouranga; Mahakud, Bibhuprasad; Mitra, Soureek; Mohanty, Gagan Bihari; Parida, Bibhuti; Sur, Nairit; Sutar, Bajrang; Banerjee, Sudeshna; Bhowmik, Sandeep; Dewanjee, Ram Krishna; Ganguly, Sanmay; Guchait, Monoranjan; Jain, Sandhya; Kumar, Sanjeev; Maity, Manas; Majumder, Gobinda; Mazumdar, Kajari; Sarkar, Tanmay; Wickramage, Nadeesha; Chauhan, Shubhanshu; Dube, Sourabh; Hegde, Vinay; Kapoor, Anshul; Kothekar, Kunal; Rane, Aditee; Sharma, Seema; Behnamian, Hadi; Chenarani, Shirin; Eskandari Tadavani, Esmaeel; Etesami, Seyed Mohsen; Fahim, Ali; Khakzad, Mohsen; Mohammadi Najafabadi, Mojtaba; Naseri, Mohsen; Paktinat Mehdiabadi, Saeid; Rezaei Hosseinabadi, Ferdos; Safarzadeh, Batool; Zeinali, Maryam; Felcini, Marta; Grunewald, Martin; Abbrescia, Marcello; Calabria, Cesare; Caputo, Claudio; Colaleo, Anna; Creanza, Donato; Cristella, Leonardo; De Filippis, Nicola; De Palma, Mauro; Fiore, Luigi; Iaselli, Giuseppe; Maggi, Giorgio; Maggi, Marcello; Miniello, Giorgia; My, Salvatore; Nuzzo, Salvatore; Pompili, Alexis; Pugliese, Gabriella; Radogna, Raffaella; Ranieri, Antonio; Selvaggi, Giovanna; Silvestris, Lucia; Venditti, Rosamaria; Verwilligen, Piet; Abbiendi, Giovanni; Battilana, Carlo; Bonacorsi, Daniele; Braibant-Giacomelli, Sylvie; Brigliadori, Luca; Campanini, Renato; Capiluppi, Paolo; Castro, Andrea; Cavallo, Francesca Romana; Chhibra, Simranjit Singh; Codispoti, Giuseppe; Cuffiani, Marco; Dallavalle, Gaetano-Marco; Fabbri, Fabrizio; Fanfani, Alessandra; Fasanella, Daniele; Giacomelli, Paolo; Grandi, Claudio; Guiducci, Luigi; Marcellini, Stefano; Masetti, Gianni; Montanari, Alessandro; Navarria, Francesco; Perrotta, Andrea; Rossi, Antonio; Rovelli, Tiziano; Siroli, Gian Piero; Tosi, Nicolò; Albergo, Sebastiano; Chiorboli, Massimiliano; Costa, Salvatore; Di Mattia, Alessandro; Giordano, Ferdinando; Potenza, Renato; Tricomi, Alessia; Tuve, Cristina; Barbagli, Giuseppe; Ciulli, Vitaliano; Civinini, Carlo; D'Alessandro, Raffaello; Focardi, Ettore; Gori, Valentina; Lenzi, Piergiulio; Meschini, Marco; Paoletti, Simone; Sguazzoni, Giacomo; Viliani, Lorenzo; Benussi, Luigi; Bianco, Stefano; Fabbri, Franco; Piccolo, Davide; Primavera, Federica; Calvelli, Valerio; Ferro, Fabrizio; Lo Vetere, Maurizio; Monge, Maria Roberta; Robutti, Enrico; Tosi, Silvano; Brianza, Luca; Dinardo, Mauro Emanuele; Fiorendi, Sara; Gennai, Simone; Ghezzi, Alessio; Govoni, Pietro; Malberti, Martina; Malvezzi, Sandra; Manzoni, Riccardo Andrea; Menasce, Dario; Moroni, Luigi; Paganoni, Marco; Pedrini, Daniele; Pigazzini, Simone; Ragazzi, Stefano; Tabarelli de Fatis, Tommaso; Buontempo, Salvatore; Cavallo, Nicola; De Nardo, Guglielmo; Di Guida, Salvatore; Esposito, Marco; Fabozzi, Francesco; Fienga, Francesco; Iorio, Alberto Orso Maria; Lanza, Giuseppe; Lista, Luca; Meola, Sabino; Paolucci, Pierluigi; Sciacca, Crisostomo; Thyssen, Filip; Azzi, Patrizia; Bacchetta, Nicola; Benato, Lisa; Bisello, Dario; Boletti, Alessio; Carlin, Roberto; Carvalho Antunes De Oliveira, Alexandra; Checchia, Paolo; Dall'Osso, Martino; De Castro Manzano, Pablo; Dorigo, Tommaso; Dosselli, Umberto; Gasparini, Fabrizio; Gasparini, Ugo; Gozzelino, Andrea; Lacaprara, Stefano; Margoni, Martino; Meneguzzo, Anna Teresa; Pazzini, Jacopo; Pozzobon, Nicola; Ronchese, Paolo; Simonetto, Franco; Torassa, Ezio; Zanetti, Marco; Zotto, Pierluigi; Zumerle, Gianni; Braghieri, Alessandro; Magnani, Alice; Montagna, Paolo; Ratti, Sergio P; Re, Valerio; Riccardi, Cristina; Salvini, Paola; Vai, Ilaria; Vitulo, Paolo; Alunni Solestizi, Luisa; Bilei, Gian Mario; Ciangottini, Diego; Fanò, Livio; Lariccia, Paolo; Leonardi, Roberto; Mantovani, Giancarlo; Menichelli, Mauro; Saha, Anirban; Santocchia, Attilio; Androsov, Konstantin; Azzurri, Paolo; Bagliesi, Giuseppe; Bernardini, Jacopo; Boccali, Tommaso; Castaldi, Rino; Ciocci, Maria Agnese; Dell'Orso, Roberto; Donato, Silvio; Fedi, Giacomo; Giassi, Alessandro; Grippo, Maria Teresa; Ligabue, Franco; Lomtadze, Teimuraz; Martini, Luca; Messineo, Alberto; Palla, Fabrizio; Rizzi, Andrea; Savoy-Navarro, Aurore; Spagnolo, Paolo; Tenchini, Roberto; Tonelli, Guido; Venturi, Andrea; Verdini, Piero Giorgio; Barone, Luciano; Cavallari, Francesca; Cipriani, Marco; Del Re, Daniele; Diemoz, Marcella; Gelli, Simone; Longo, Egidio; Margaroli, Fabrizio; Marzocchi, Badder; Meridiani, Paolo; Organtini, Giovanni; Paramatti, Riccardo; Preiato, Federico; Rahatlou, Shahram; Rovelli, Chiara; Santanastasio, Francesco; Amapane, Nicola; Arcidiacono, Roberta; Argiro, Stefano; Arneodo, Michele; Bartosik, Nazar; Bellan, Riccardo; Biino, Cristina; Cartiglia, Nicolo; Cenna, Francesca; Costa, Marco; Covarelli, Roberto; Degano, Alessandro; Demaria, Natale; Finco, Linda; Kiani, Bilal; Mariotti, Chiara; Maselli, Silvia; Migliore, Ernesto; Monaco, Vincenzo; Monteil, Ennio; Obertino, Maria Margherita; Pacher, Luca; Pastrone, Nadia; Pelliccioni, Mario; Pinna Angioni, Gian Luca; Ravera, Fabio; Romero, Alessandra; Ruspa, Marta; Sacchi, Roberto; Shchelina, Ksenia; Sola, Valentina; Solano, Ada; Staiano, Amedeo; Traczyk, Piotr; Belforte, Stefano; Casarsa, Massimo; Cossutti, Fabio; Della Ricca, Giuseppe; Zanetti, Anna; Kim, Dong Hee; Kim, Gui Nyun; Kim, Min Suk; Lee, Sangeun; Lee, Seh Wook; Oh, Young Do; Sekmen, Sezen; Son, Dong-Chul; Yang, Yu Chul; Lee, Ari; Kim, Hyunchul; Brochero Cifuentes, Javier Andres; Kim, Tae Jeong; Cho, Sungwoong; Choi, Suyong; Go, Yeonju; Gyun, Dooyeon; Ha, Seungkyu; Hong, Byung-Sik; Jo, Youngkwon; Kim, Yongsun; Lee, Byounghoon; Lee, Kisoo; Lee, Kyong Sei; Lee, Songkyo; Lim, Jaehoon; Park, Sung Keun; Roh, Youn; Almond, John; Kim, Junho; Lee, Haneol; Oh, Sung Bin; Radburn-Smith, Benjamin Charles; Seo, Seon-hee; Yang, Unki; Yoo, Hwi Dong; Yu, Geum Bong; Choi, Minkyoo; Kim, Hyunyong; Kim, Ji Hyun; Lee, Jason Sang Hun; Park, Inkyu; Ryu, Geonmo; Ryu, Min Sang; Choi, Young-Il; Goh, Junghwan; Hwang, Chanwook; Lee, Jongseok; Yu, Intae; Dudenas, Vytautas; Juodagalvis, Andrius; Vaitkus, Juozas; Ahmed, Ijaz; Ibrahim, Zainol Abidin; Komaragiri, Jyothsna Rani; Md Ali, Mohd Adli Bin; Mohamad Idris, Faridah; Wan Abdullah, Wan Ahmad Tajuddin; Yusli, Mohd Nizam; Zolkapli, Zukhaimira; Castilla-Valdez, Heriberto; De La Cruz-Burelo, Eduard; Heredia-De La Cruz, Ivan; Hernandez-Almada, Alberto; Lopez-Fernandez, Ricardo; Magaña Villalba, Ricardo; Mejia Guisao, Jhovanny; Sánchez Hernández, Alberto; Carrillo Moreno, Salvador; Oropeza Barrera, Cristina; Vazquez Valencia, Fabiola; Carpinteyro, Severiano; Pedraza, Isabel; Salazar Ibarguen, Humberto Antonio; Uribe Estrada, Cecilia; Morelos Pineda, Antonio; Krofcheck, David; Butler, Philip H; Ahmad, Ashfaq; Ahmad, Muhammad; Hassan, Qamar; Hoorani, Hafeez R; Khan, Wajid Ali; Saddique, Asif; Shah, Mehar Ali; Shoaib, Muhammad; Waqas, Muhammad; Bialkowska, Helena; Bluj, Michal; Boimska, Bożena; Frueboes, Tomasz; Górski, Maciej; Kazana, Malgorzata; Nawrocki, Krzysztof; Romanowska-Rybinska, Katarzyna; Szleper, Michal; Zalewski, Piotr; Bunkowski, Karol; Byszuk, Adrian; Doroba, Krzysztof; Kalinowski, Artur; Konecki, Marcin; Krolikowski, Jan; Misiura, Maciej; Olszewski, Michal; Walczak, Marek; Bargassa, Pedrame; Beirão Da Cruz E Silva, Cristóvão; Di Francesco, Agostino; Faccioli, Pietro; Ferreira Parracho, Pedro Guilherme; Gallinaro, Michele; Hollar, Jonathan; Leonardo, Nuno; Lloret Iglesias, Lara; Nemallapudi, Mythra Varun; Rodrigues Antunes, Joao; Seixas, Joao; Toldaiev, Oleksii; Vadruccio, Daniele; Varela, Joao; Vischia, Pietro; Bunin, Pavel; Gavrilenko, Mikhail; Golutvin, Igor; Gorbunov, Ilya; Kamenev, Alexey; Karjavin, Vladimir; Lanev, Alexander; Malakhov, Alexander; Matveev, Viktor; Palichik, Vladimir; Perelygin, Victor; Savina, Maria; Shmatov, Sergey; Shulha, Siarhei; Skatchkov, Nikolai; Smirnov, Vitaly; Voytishin, Nikolay; Zarubin, Anatoli; Chtchipounov, Leonid; Golovtsov, Victor; Ivanov, Yury; Kim, Victor; Kuznetsova, Ekaterina; Murzin, Victor; Oreshkin, Vadim; Sulimov, Valentin; Vorobyev, Alexey; Andreev, Yuri; Dermenev, Alexander; Gninenko, Sergei; Golubev, Nikolai; Karneyeu, Anton; Kirsanov, Mikhail; Krasnikov, Nikolai; Pashenkov, Anatoli; Tlisov, Danila; Toropin, Alexander; Epshteyn, Vladimir; Gavrilov, Vladimir; Lychkovskaya, Natalia; Popov, Vladimir; Pozdnyakov, Ivan; Safronov, Grigory; Spiridonov, Alexander; Toms, Maria; Vlasov, Evgueni; Zhokin, Alexander; Bylinkin, Alexander; Chistov, Ruslan; Danilov, Mikhail; Rusinov, Vladimir; Andreev, Vladimir; Azarkin, Maksim; Dremin, Igor; Kirakosyan, Martin; Leonidov, Andrey; Rusakov, Sergey V; Terkulov, Adel; Baskakov, Alexey; Belyaev, Andrey; Boos, Edouard; Bunichev, Viacheslav; Dubinin, Mikhail; Dudko, Lev; Gribushin, Andrey; Klyukhin, Vyacheslav; Kodolova, Olga; Lokhtin, Igor; Miagkov, Igor; Obraztsov, Stepan; Perfilov, Maxim; Petrushanko, Sergey; Savrin, Viktor; Blinov, Vladimir; Skovpen, Yuri; Azhgirey, Igor; Bayshev, Igor; Bitioukov, Sergei; Elumakhov, Dmitry; Kachanov, Vassili; Kalinin, Alexey; Konstantinov, Dmitri; Krychkine, Victor; Petrov, Vladimir; Ryutin, Roman; Sobol, Andrei; Troshin, Sergey; Tyurin, Nikolay; Uzunian, Andrey; Volkov, Alexey; Adzic, Petar; Cirkovic, Predrag; Devetak, Damir; Dordevic, Milos; Milosevic, Jovan; Rekovic, Vladimir; Alcaraz Maestre, Juan; Barrio Luna, Mar; Calvo, Enrique; Cerrada, Marcos; Chamizo Llatas, Maria; Colino, Nicanor; De La Cruz, Begona; Delgado Peris, Antonio; Escalante Del Valle, Alberto; Fernandez Bedoya, Cristina; Fernández Ramos, Juan Pablo; Flix, Jose; Fouz, Maria Cruz; Garcia-Abia, Pablo; Gonzalez Lopez, Oscar; Goy Lopez, Silvia; Hernandez, Jose M; Josa, Maria Isabel; Navarro De Martino, Eduardo; Pérez-Calero Yzquierdo, Antonio María; Puerta Pelayo, Jesus; Quintario Olmeda, Adrián; Redondo, Ignacio; Romero, Luciano; Senghi Soares, Mara; de Trocóniz, Jorge F; Missiroli, Marino; Moran, Dermot; Cuevas, Javier; Fernandez Menendez, Javier; Gonzalez Caballero, Isidro; González Fernández, Juan Rodrigo; Palencia Cortezon, Enrique; Sanchez Cruz, Sergio; Suárez Andrés, Ignacio; Vizan Garcia, Jesus Manuel; Cabrillo, Iban Jose; Calderon, Alicia; Castiñeiras De Saa, Juan Ramon; Curras, Esteban; Fernandez, Marcos; Garcia-Ferrero, Juan; Gomez, Gervasio; Lopez Virto, Amparo; Marco, Jesus; Martinez Rivero, Celso; Matorras, Francisco; Piedra Gomez, Jonatan; Rodrigo, Teresa; Ruiz-Jimeno, Alberto; Scodellaro, Luca; Trevisani, Nicolò; Vila, Ivan; Vilar Cortabitarte, Rocio; Abbaneo, Duccio; Auffray, Etiennette; Auzinger, Georg; Bachtis, Michail; Baillon, Paul; Ball, Austin; Barney, David; Bloch, Philippe; Bocci, Andrea; Bonato, Alessio; Botta, Cristina; Camporesi, Tiziano; Castello, Roberto; Cepeda, Maria; Cerminara, Gianluca; D'Alfonso, Mariarosaria; D'Enterria, David; Dabrowski, Anne; Daponte, Vincenzo; David Tinoco Mendes, Andre; De Gruttola, Michele; De Roeck, Albert; Di Marco, Emanuele; Dobson, Marc; Dorney, Brian; Du Pree, Tristan; Duggan, Daniel; Dünser, Marc; Dupont, Niels; Elliott-Peisert, Anna; Fartoukh, Stephane; Franzoni, Giovanni; Fulcher, Jonathan; Funk, Wolfgang; Gigi, Dominique; Gill, Karl; Girone, Maria; Glege, Frank; Gulhan, Doga; Gundacker, Stefan; Guthoff, Moritz; Hammer, Josef; Harris, Philip; Hegeman, Jeroen; Innocente, Vincenzo; Janot, Patrick; Kieseler, Jan; Kirschenmann, Henning; Knünz, Valentin; Kornmayer, Andreas; Kortelainen, Matti J; Kousouris, Konstantinos; Krammer, Manfred; Lange, Clemens; Lecoq, Paul; Lourenco, Carlos; Lucchini, Marco Toliman; Malgeri, Luca; Mannelli, Marcello; Martelli, Arabella; Meijers, Frans; Merlin, Jeremie Alexandre; Mersi, Stefano; Meschi, Emilio; Moortgat, Filip; Morovic, Srecko; Mulders, Martijn; Neugebauer, Hannes; Orfanelli, Styliani; Orsini, Luciano; Pape, Luc; Perez, Emmanuel; Peruzzi, Marco; Petrilli, Achille; Petrucciani, Giovanni; Pfeiffer, Andreas; Pierini, Maurizio; Racz, Attila; Reis, Thomas; Rolandi, Gigi; Rovere, Marco; Ruan, Manqi; Sakulin, Hannes; Sauvan, Jean-Baptiste; Schäfer, Christoph; Schwick, Christoph; Seidel, Markus; Sharma, Archana; Silva, Pedro; Sphicas, Paraskevas; Steggemann, Jan; Stoye, Markus; Takahashi, Yuta; Tosi, Mia; Treille, Daniel; Triossi, Andrea; Tsirou, Andromachi; Veckalns, Viesturs; Veres, Gabor Istvan; Wardle, Nicholas; Zagoździńska, Agnieszka; Zeuner, Wolfram Dietrich; Bertl, Willi; Deiters, Konrad; Erdmann, Wolfram; Horisberger, Roland; Ingram, Quentin; Kaestli, Hans-Christian; Kotlinski, Danek; Rohe, Tilman; Bachmair, Felix; Bäni, Lukas; Bianchini, Lorenzo; Casal, Bruno; Dissertori, Günther; Dittmar, Michael; Donegà, Mauro; Grab, Christoph; Heidegger, Constantin; Hits, Dmitry; Hoss, Jan; Kasieczka, Gregor; Lecomte, Pierre; Lustermann, Werner; Mangano, Boris; Marionneau, Matthieu; Martinez Ruiz del Arbol, Pablo; Masciovecchio, Mario; Meinhard, Maren Tabea; Meister, Daniel; Micheli, Francesco; Musella, Pasquale; Nessi-Tedaldi, Francesca; Pandolfi, Francesco; Pata, Joosep; Pauss, Felicitas; Perrin, Gaël; Perrozzi, Luca; Quittnat, Milena; Rossini, Marco; Schönenberger, Myriam; Starodumov, Andrei; Tavolaro, Vittorio Raoul; Theofilatos, Konstantinos; Wallny, Rainer; Aarrestad, Thea Klaeboe; Amsler, Claude; Caminada, Lea; Canelli, Maria Florencia; De Cosa, Annapaola; Galloni, Camilla; Hinzmann, Andreas; Hreus, Tomas; Kilminster, Benjamin; Ngadiuba, Jennifer; Pinna, Deborah; Rauco, Giorgia; Robmann, Peter; Salerno, Daniel; Yang, Yong; Zucchetta, Alberto; Candelise, Vieri; Doan, Thi Hien; Jain, Shilpi; Khurana, Raman; Konyushikhin, Maxim; Kuo, Chia-Ming; Lin, Willis; Lu, Yun-Ju; Pozdnyakov, Andrey; Yu, Shin-Shan; Kumar, Arun; Chang, Paoti; Chang, You-Hao; Chang, Yu-Wei; Chao, Yuan; Chen, Kai-Feng; Chen, Po-Hsun; Dietz, Charles; Fiori, Francesco; Hou, George Wei-Shu; Hsiung, Yee; Liu, Yueh-Feng; Lu, Rong-Shyang; Miñano Moya, Mercedes; Paganis, Efstathios; Psallidas, Andreas; Tsai, Jui-fa; Tzeng, Yeng-Ming; Asavapibhop, Burin; Singh, Gurpreet; Srimanobhas, Norraphat; Suwonjandee, Narumon; Adiguzel, Aytul; Bakirci, Mustafa Numan; Damarseckin, Serdal; Demiroglu, Zuhal Seyma; Dozen, Candan; Eskut, Eda; Girgis, Semiray; Gokbulut, Gul; Guler, Yalcin; Hos, Ilknur; Kangal, Evrim Ersin; Kara, Ozgun; Kiminsu, Ugur; Oglakci, Mehmet; Onengut, Gulsen; Ozdemir, Kadri; Ozturk, Sertac; Polatoz, Ayse; Sunar Cerci, Deniz; Turkcapar, Semra; Zorbakir, Ibrahim Soner; Zorbilmez, Caglar; Bilin, Bugra; Bilmis, Selcuk; Isildak, Bora; Karapinar, Guler; Yalvac, Metin; Zeyrek, Mehmet; Gülmez, Erhan; Kaya, Mithat; Kaya, Ozlem; Yetkin, Elif Asli; Yetkin, Taylan; Cakir, Altan; Cankocak, Kerem; Sen, Sercan; Grynyov, Boris; Levchuk, Leonid; Sorokin, Pavel; Aggleton, Robin; Ball, Fionn; Beck, Lana; Brooke, James John; Burns, Douglas; Clement, Emyr; Cussans, David; Flacher, Henning; Goldstein, Joel; Grimes, Mark; Heath, Greg P; Heath, Helen F; Jacob, Jeson; Kreczko, Lukasz; Lucas, Chris; Newbold, Dave M; Paramesvaran, Sudarshan; Poll, Anthony; Sakuma, Tai; Seif El Nasr-storey, Sarah; Smith, Dominic; Smith, Vincent J; Bell, Ken W; Belyaev, Alexander; Brew, Christopher; Brown, Robert M; Calligaris, Luigi; Cieri, Davide; Cockerill, David JA; Coughlan, John A; Harder, Kristian; Harper, Sam; Olaiya, Emmanuel; Petyt, David; Shepherd-Themistocleous, Claire; Thea, Alessandro; Tomalin, Ian R; Williams, Thomas; Baber, Mark; Bainbridge, Robert; Buchmuller, Oliver; Bundock, Aaron; Burton, Darren; Casasso, Stefano; Citron, Matthew; Colling, David; Corpe, Louie; Dauncey, Paul; Davies, Gavin; De Wit, Adinda; Della Negra, Michel; Di Maria, Riccardo; Dunne, Patrick; Elwood, Adam; Futyan, David; Haddad, Yacine; Hall, Geoffrey; Iles, Gregory; James, Thomas; Lane, Rebecca; Laner, Christian; Lucas, Robyn; Lyons, Louis; Magnan, Anne-Marie; Malik, Sarah; Mastrolorenzo, Luca; Nash, Jordan; Nikitenko, Alexander; Pela, Joao; Penning, Bjoern; Pesaresi, Mark; Raymond, David Mark; Richards, Alexander; Rose, Andrew; Seez, Christopher; Summers, Sioni; Tapper, Alexander; Uchida, Kirika; Vazquez Acosta, Monica; Virdee, Tejinder; Wright, Jack; Zenz, Seth Conrad; Cole, Joanne; Hobson, Peter R; Khan, Akram; Kyberd, Paul; Leslie, Dawn; Reid, Ivan; Symonds, Philip; Teodorescu, Liliana; Turner, Mark; Borzou, Ahmad; Call, Kenneth; Dittmann, Jay; Hatakeyama, Kenichi; Liu, Hongxuan; Pastika, Nathaniel; Charaf, Otman; Cooper, Seth; Henderson, Conor; Rumerio, Paolo; West, Christopher; Arcaro, Daniel; Avetisyan, Aram; Bose, Tulika; Gastler, Daniel; Rankin, Dylan; Richardson, Clint; Rohlf, James; Sulak, Lawrence; Zou, David; Benelli, Gabriele; Berry, Edmund; Cutts, David; Garabedian, Alex; Hakala, John; Heintz, Ulrich; Hogan, Julie Managan; Jesus, Orduna; Kwok, Ka Hei Martin; Laird, Edward; Landsberg, Greg; Mao, Zaixing; Narain, Meenakshi; Piperov, Stefan; Sagir, Sinan; Spencer, Eric; Syarif, Rizki; Breedon, Richard; Breto, Guillermo; Burns, Dustin; Calderon De La Barca Sanchez, Manuel; Chauhan, Sushil; Chertok, Maxwell; Conway, John; Conway, Rylan; Cox, Peter Timothy; Erbacher, Robin; Flores, Chad; Funk, Garrett; Gardner, Michael; Ko, Winston; Lander, Richard; Mclean, Christine; Mulhearn, Michael; Pellett, Dave; Pilot, Justin; Shalhout, Shalhout; Smith, John; Squires, Michael; Stolp, Dustin; Tripathi, Mani; Wilbur, Scott; Yohay, Rachel; Bravo, Cameron; Cousins, Robert; Everaerts, Pieter; Florent, Alice; Hauser, Jay; Ignatenko, Mikhail; Mccoll, Nickolas; Saltzberg, David; Schnaible, Christian; Takasugi, Eric; Valuev, Vyacheslav; Weber, Matthias; Burt, Kira; Clare, Robert; Ellison, John Anthony; Gary, J William; Ghiasi Shirazi, Seyyed Mohammad Amin; Hanson, Gail; Heilman, Jesse; Jandir, Pawandeep; Kennedy, Elizabeth; Lacroix, Florent; Long, Owen Rosser; Olmedo Negrete, Manuel; Paneva, Mirena Ivova; Shrinivas, Amithabh; Si, Weinan; Wei, Hua; Wimpenny, Stephen; Yates, Brent; Branson, James G; Cerati, Giuseppe Benedetto; Cittolin, Sergio; Derdzinski, Mark; Gerosa, Raffaele; Holzner, André; Klein, Daniel; Krutelyov, Vyacheslav; Letts, James; Macneill, Ian; Olivito, Dominick; Padhi, Sanjay; Pieri, Marco; Sani, Matteo; Sharma, Vivek; Simon, Sean; Tadel, Matevz; Vartak, Adish; Wasserbaech, Steven; Welke, Charles; Wood, John; Würthwein, Frank; Yagil, Avraham; Zevi Della Porta, Giovanni; Amin, Nick; Bhandari, Rohan; Bradmiller-Feld, John; Campagnari, Claudio; Dishaw, Adam; Dutta, Valentina; Flowers, Kristen; Franco Sevilla, Manuel; Geffert, Paul; George, Christopher; Golf, Frank; Gouskos, Loukas; Gran, Jason; Heller, Ryan; Incandela, Joe; Mullin, Sam Daniel; Ovcharova, Ana; Richman, Jeffrey; Stuart, David; Suarez, Indara; Yoo, Jaehyeok; Anderson, Dustin; Apresyan, Artur; Bendavid, Joshua; Bornheim, Adolf; Bunn, Julian; Chen, Yi; Duarte, Javier; Lawhorn, Jay Mathew; Mott, Alexander; Newman, Harvey B; Pena, Cristian; Spiropulu, Maria; Vlimant, Jean-Roch; Xie, Si; Zhu, Ren-Yuan; Andrews, Michael Benjamin; Azzolini, Virginia; Ferguson, Thomas; Paulini, Manfred; Russ, James; Sun, Menglei; Vogel, Helmut; Vorobiev, Igor; Weinberg, Marc; Cumalat, John Perry; Ford, William T; Jensen, Frank; Johnson, Andrew; Krohn, Michael; Mulholland, Troy; Stenson, Kevin; Wagner, Stephen Robert; Alexander, James; Chaves, Jorge; Chu, Jennifer; Dittmer, Susan; Mcdermott, Kevin; Mirman, Nathan; Nicolas Kaufman, Gala; Patterson, Juliet Ritchie; Rinkevicius, Aurelijus; Ryd, Anders; Skinnari, Louise; Soffi, Livia; Tan, Shao Min; Tao, Zhengcheng; Thom, Julia; Tucker, Jordan; Wittich, Peter; Zientek, Margaret; Winn, Dave; Abdullin, Salavat; Albrow, Michael; Apollinari, Giorgio; Banerjee, Sunanda; Bauerdick, Lothar AT; Beretvas, Andrew; Berryhill, Jeffrey; Bhat, Pushpalatha C; Bolla, Gino; Burkett, Kevin; Butler, Joel Nathan; Cheung, Harry; Chlebana, Frank; Cihangir, Selcuk; Cremonesi, Matteo; Elvira, Victor Daniel; Fisk, Ian; Freeman, Jim; Gottschalk, Erik; Gray, Lindsey; Green, Dan; Grünendahl, Stefan; Gutsche, Oliver; Hare, Daryl; Harris, Robert M; Hasegawa, Satoshi; Hirschauer, James; Hu, Zhen; Jayatilaka, Bodhitha; Jindariani, Sergo; Johnson, Marvin; Joshi, Umesh; Klima, Boaz; Kreis, Benjamin; Lammel, Stephan; Linacre, Jacob; Lincoln, Don; Lipton, Ron; Liu, Tiehui; Lopes De Sá, Rafael; Lykken, Joseph; Maeshima, Kaori; Magini, Nicolo; Marraffino, John Michael; Maruyama, Sho; Mason, David; McBride, Patricia; Merkel, Petra; Mrenna, Stephen; Nahn, Steve; Newman-Holmes, Catherine; O'Dell, Vivian; Pedro, Kevin; Prokofyev, Oleg; Rakness, Gregory; Ristori, Luciano; Sexton-Kennedy, Elizabeth; Soha, Aron; Spalding, William J; Spiegel, Leonard; Stoynev, Stoyan; Strobbe, Nadja; Taylor, Lucas; Tkaczyk, Slawek; Tran, Nhan Viet; Uplegger, Lorenzo; Vaandering, Eric Wayne; Vernieri, Caterina; Verzocchi, Marco; Vidal, Richard; Wang, Michael; Weber, Hannsjoerg Artur; Whitbeck, Andrew; Acosta, Darin; Avery, Paul; Bortignon, Pierluigi; Bourilkov, Dimitri; Brinkerhoff, Andrew; Carnes, Andrew; Carver, Matthew; Curry, David; Das, Souvik; Field, Richard D; Furic, Ivan-Kresimir; Konigsberg, Jacobo; Korytov, Andrey; Ma, Peisen; Matchev, Konstantin; Mei, Hualin; Milenovic, Predrag; Mitselmakher, Guenakh; Rank, Douglas; Shchutska, Lesya; Sperka, David; Thomas, Laurent; Wang, Jian; Wang, Sean-Jiun; Yelton, John; Linn, Stephan; Markowitz, Pete; Martinez, German; Rodriguez, Jorge Luis; Ackert, Andrew; Adams, Jordon Rowe; Adams, Todd; Askew, Andrew; Bein, Samuel; Diamond, Brendan; Hagopian, Sharon; Hagopian, Vasken; Johnson, Kurtis F; Khatiwada, Ajeeta; Prosper, Harrison; Santra, Arka; Baarmand, Marc M; Bhopatkar, Vallary; Colafranceschi, Stefano; Hohlmann, Marcus; Noonan, Daniel; Roy, Titas; Yumiceva, Francisco; Adams, Mark Raymond; Apanasevich, Leonard; Berry, Douglas; Betts, Russell Richard; Bucinskaite, Inga; Cavanaugh, Richard; Evdokimov, Olga; Gauthier, Lucie; Gerber, Cecilia Elena; Hofman, David Jonathan; Jung, Kurt; Kurt, Pelin; O'Brien, Christine; Sandoval Gonzalez, Irving Daniel; Turner, Paul; Varelas, Nikos; Wang, Hui; Wu, Zhenbin; Zakaria, Mohammed; Zhang, Jingyu; Bilki, Burak; Clarida, Warren; Dilsiz, Kamuran; Durgut, Süleyman; Gandrajula, Reddy Pratap; Haytmyradov, Maksat; Khristenko, Viktor; Merlo, Jean-Pierre; Mermerkaya, Hamit; Mestvirishvili, Alexi; Moeller, Anthony; Nachtman, Jane; Ogul, Hasan; Onel, Yasar; Ozok, Ferhat; Penzo, Aldo; Snyder, Christina; Tiras, Emrah; Wetzel, James; Yi, Kai; Anderson, Ian; Blumenfeld, Barry; Cocoros, Alice; Eminizer, Nicholas; Fehling, David; Feng, Lei; Gritsan, Andrei; Maksimovic, Petar; Martin, Christopher; Osherson, Marc; Roskes, Jeffrey; Sarica, Ulascan; Swartz, Morris; Xiao, Meng; Xin, Yongjie; You, Can; Al-bataineh, Ayman; Baringer, Philip; Bean, Alice; Boren, Samuel; Bowen, James; Bruner, Christopher; Castle, James; Forthomme, Laurent; Kenny III, Raymond Patrick; Kropivnitskaya, Anna; Majumder, Devdatta; Mcbrayer, William; Murray, Michael; Sanders, Stephen; Stringer, Robert; Tapia Takaki, Daniel; Wang, Quan; Ivanov, Andrew; Kaadze, Ketino; Khalil, Sadia; Maravin, Yurii; Mohammadi, Abdollah; Saini, Lovedeep Kaur; Skhirtladze, Nikoloz; Toda, Sachiko; Rebassoo, Finn; Wright, Douglas; Anelli, Christopher; Baden, Drew; Baron, Owen; Belloni, Alberto; Calvert, Brian; Eno, Sarah Catherine; Ferraioli, Charles; Gomez, Jaime; Hadley, Nicholas John; Jabeen, Shabnam; Kellogg, Richard G; Kolberg, Ted; Kunkle, Joshua; Lu, Ying; Mignerey, Alice; Ricci-Tam, Francesca; Shin, Young Ho; Skuja, Andris; Tonjes, Marguerite; Tonwar, Suresh C; Abercrombie, Daniel; Allen, Brandon; Apyan, Aram; Barbieri, Richard; Baty, Austin; Bi, Ran; Bierwagen, Katharina; Brandt, Stephanie; Busza, Wit; Cali, Ivan Amos; Demiragli, Zeynep; Di Matteo, Leonardo; Gomez Ceballos, Guillelmo; Goncharov, Maxim; Hsu, Dylan; Iiyama, Yutaro; Innocenti, Gian Michele; Klute, Markus; Kovalskyi, Dmytro; Krajczar, Krisztian; Lai, Yue Shi; Lee, Yen-Jie; Levin, Andrew; Luckey, Paul David; Maier, Benedikt; Marini, Andrea Carlo; Mcginn, Christopher; Mironov, Camelia; Narayanan, Siddharth; Niu, Xinmei; Paus, Christoph; Roland, Christof; Roland, Gunther; Salfeld-Nebgen, Jakob; Stephans, George; Sumorok, Konstanty; Tatar, Kaya; Varma, Mukund; Velicanu, Dragos; Veverka, Jan; Wang, Jing; Wang, Ta-Wei; Wyslouch, Bolek; Yang, Mingming; Zhukova, Victoria; Benvenuti, Alberto; Chatterjee, Rajdeep Mohan; Evans, Andrew; Finkel, Alexey; Gude, Alexander; Hansen, Peter; Kalafut, Sean; Kao, Shih-Chuan; Kubota, Yuichi; Lesko, Zachary; Mans, Jeremy; Nourbakhsh, Shervin; Ruckstuhl, Nicole; Rusack, Roger; Tambe, Norbert; Turkewitz, Jared; Acosta, John Gabriel; Oliveros, Sandra; Avdeeva, Ekaterina; Bartek, Rachel; Bloom, Kenneth; Claes, Daniel R; Dominguez, Aaron; Fangmeier, Caleb; Gonzalez Suarez, Rebeca; Kamalieddin, Rami; Kravchenko, Ilya; Malta Rodrigues, Alan; Meier, Frank; Monroy, Jose; Siado, Joaquin Emilo; Snow, Gregory R; Stieger, Benjamin; Alyari, Maral; Dolen, James; George, Jimin; Godshalk, Andrew; Harrington, Charles; Iashvili, Ia; Kaisen, Josh; Kharchilava, Avto; Kumar, Ashish; Parker, Ashley; Rappoccio, Salvatore; Roozbahani, Bahareh; Alverson, George; Barberis, Emanuela; Hortiangtham, Apichart; Massironi, Andrea; Morse, David Michael; Nash, David; Orimoto, Toyoko; Teixeira De Lima, Rafael; Trocino, Daniele; Wang, Ren-Jie; Wood, Darien; Bhattacharya, Saptaparna; Hahn, Kristan Allan; Kubik, Andrew; Kumar, Ajay; Low, Jia Fu; Mucia, Nicholas; Odell, Nathaniel; Pollack, Brian; Schmitt, Michael Henry; Sung, Kevin; Trovato, Marco; Velasco, Mayda; Dev, Nabarun; Hildreth, Michael; Hurtado Anampa, Kenyi; Jessop, Colin; Karmgard, Daniel John; Kellams, Nathan; Lannon, Kevin; Marinelli, Nancy; Meng, Fanbo; Mueller, Charles; Musienko, Yuri; Planer, Michael; Reinsvold, Allison; Ruchti, Randy; Smith, Geoffrey; Taroni, Silvia; Wayne, Mitchell; Wolf, Matthias; Woodard, Anna; Alimena, Juliette; Antonelli, Louis; Brinson, Jessica; Bylsma, Ben; Durkin, Lloyd Stanley; Flowers, Sean; Francis, Brian; Hart, Andrew; Hill, Christopher; Hughes, Richard; Ji, Weifeng; Liu, Bingxuan; Luo, Wuming; Puigh, Darren; Winer, Brian L; Wulsin, Howard Wells; Cooperstein, Stephane; Driga, Olga; Elmer, Peter; Hardenbrook, Joshua; Hebda, Philip; Lange, David; Luo, Jingyu; Marlow, Daniel; Mc Donald, Jeffrey; Medvedeva, Tatiana; Mei, Kelvin; Mooney, Michael; Olsen, James; Palmer, Christopher; Piroué, Pierre; Stickland, David; Tully, Christopher; Zuranski, Andrzej; Malik, Sudhir; Barker, Anthony; Barnes, Virgil E; Folgueras, Santiago; Gutay, Laszlo; Jha, Manoj; Jones, Matthew; Jung, Andreas Werner; Miller, David Harry; Neumeister, Norbert; Schulte, Jan-Frederik; Shi, Xin; Sun, Jian; Svyatkovskiy, Alexey; Wang, Fuqiang; Xie, Wei; Xu, Lingshan; Parashar, Neeti; Stupak, John; Adair, Antony; Akgun, Bora; Chen, Zhenyu; Ecklund, Karl Matthew; Geurts, Frank JM; Guilbaud, Maxime; Li, Wei; Michlin, Benjamin; Northup, Michael; Padley, Brian Paul; Redjimi, Radia; Roberts, Jay; Rorie, Jamal; Tu, Zhoudunming; Zabel, James; Betchart, Burton; Bodek, Arie; de Barbaro, Pawel; Demina, Regina; Duh, Yi-ting; Ferbel, Thomas; Galanti, Mario; Garcia-Bellido, Aran; Han, Jiyeon; Hindrichs, Otto; Khukhunaishvili, Aleko; Lo, Kin Ho; Tan, Ping; Verzetti, Mauro; Agapitos, Antonis; Chou, John Paul; Contreras-Campana, Emmanuel; Gershtein, Yuri; Gómez Espinosa, Tirso Alejandro; Halkiadakis, Eva; Heindl, Maximilian; Hidas, Dean; Hughes, Elliot; Kaplan, Steven; Kunnawalkam Elayavalli, Raghav; Kyriacou, Savvas; Lath, Amitabh; Nash, Kevin; Saka, Halil; Salur, Sevil; Schnetzer, Steve; Sheffield, David; Somalwar, Sunil; Stone, Robert; Thomas, Scott; Thomassen, Peter; Walker, Matthew; Delannoy, Andrés G; Foerster, Mark; Heideman, Joseph; Riley, Grant; Rose, Keith; Spanier, Stefan; Thapa, Krishna; Bouhali, Othmane; Celik, Ali; Dalchenko, Mykhailo; De Mattia, Marco; Delgado, Andrea; Dildick, Sven; Eusebi, Ricardo; Gilmore, Jason; Huang, Tao; Juska, Evaldas; Kamon, Teruki; Mueller, Ryan; Pakhotin, Yuriy; Patel, Rishi; Perloff, Alexx; Perniè, Luca; Rathjens, Denis; Rose, Anthony; Safonov, Alexei; Tatarinov, Aysen; Ulmer, Keith; Akchurin, Nural; Cowden, Christopher; Damgov, Jordan; De Guio, Federico; Dragoiu, Cosmin; Dudero, Phillip Russell; Faulkner, James; Gurpinar, Emine; Kunori, Shuichi; Lamichhane, Kamal; Lee, Sung Won; Libeiro, Terence; Peltola, Timo; Undleeb, Sonaina; Volobouev, Igor; Wang, Zhixing; Greene, Senta; Gurrola, Alfredo; Janjam, Ravi; Johns, Willard; Maguire, Charles; Melo, Andrew; Ni, Hong; Sheldon, Paul; Tuo, Shengquan; Velkovska, Julia; Xu, Qiao; Arenton, Michael Wayne; Barria, Patrizia; Cox, Bradley; Goodell, Joseph; Hirosky, Robert; Ledovskoy, Alexander; Li, Hengne; Neu, Christopher; Sinthuprasith, Tutanon; Sun, Xin; Wang, Yanchu; Wolfe, Evan; Xia, Fan; Clarke, Christopher; Harr, Robert; Karchin, Paul Edmund; Sturdy, Jared; Belknap, Donald; Caillol, Cécile; Dasu, Sridhara; Dodd, Laura; Duric, Senka; Gomber, Bhawna; Grothe, Monika; Herndon, Matthew; Hervé, Alain; Klabbers, Pamela; Lanaro, Armando; Levine, Aaron; Long, Kenneth; Loveless, Richard; Ojalvo, Isabel; Perry, Thomas; Pierro, Giuseppe Antonio; Polese, Giovanni; Ruggles, Tyler; Savin, Alexander; Smith, Nicholas; Smith, Wesley H; Taylor, Devin; Woods, Nathaniel

    2017-02-28

    Searches for invisible decays of the Higgs boson are presented. The data collected with the CMS detector at the LHC correspond to integrated luminosities of 5.1, 19.7, and 2.3 fb$^{-1}$ at centre-of-mass energies of 7, 8, and 13 TeV, respectively. The search channels target Higgs boson production via gluon fusion, vector boson fusion, and in association with a vector boson. Upper limits are placed on the branching fraction of the Higgs boson decay to invisible particles, as a function of the assumed production cross sections. The combination of all channels, assuming standard model production, yields an observed (expected) upper limit on the invisible branching fraction of 0.24 (0.23) at the 95% confidence level. The results are also interpreted in the context of Higgs-portal dark matter models.

  2. The Invisible Hand of Innovation showing in the General Purpose Technology of Electricity

    NARCIS (Netherlands)

    van der Kooij, B.J.G.

    2017-01-01

    The unintended economic effect on society as result of individual behaviour —Adam Smith’s ‘Invisible Hand’ of economic progress in the eighteenth century — had its equivalent in technological progress. In the nineteenth century, again individual behaviour with its Acts of Innovation and Acts of

  3. The Lived Experience of Students with an Invisible Disability at a Canadian University

    Science.gov (United States)

    Mullins, Laura; Preyde, Michele

    2013-01-01

    University institutions are required by law to make their services accessible to students with disabilities. Canadian universities have gone a long way to eliminate the physical obstacles that present barriers for students. Many students with disabilities have invisible disabilities that require different types of adjustments. Although some…

  4. Forensic Luminol Blood Test for Preventing Cross-contamination in Dentistry: An Evaluation of a Dental School Clinic

    OpenAIRE

    Marcelo Carlos Bortoluzzi; Peterson Cadore; Andrea Gallon; Soraia Almeida Watanabe Imanishi

    2014-01-01

    Background: More than 200 different diseases may be transmitted from exposure to blood in the dental setting. The aim of this study is to identify possible faults in the cross-contamination chain control in a dental school clinic searching for traces of blood in the clinical contact surfaces (CCS) through forensic luminol blood test. Methods: Traces of invisible blood where randomly searched in CCS of one dental school clinic. Results: Forty eight surfaces areas in the CCS were tes...

  5. Teachers’ discourses on young lesbians in the portuguese school context

    Directory of Open Access Journals (Sweden)

    Liliana Rodrigues

    2015-05-01

    Full Text Available This paper aims to analyze teachers’ discourses on young lesbians in the Portuguese schools. To that end, we carried out semi-structured interviews with 24 Portuguese teachers of middle and secondary schools. After having analyzed the retrieved data from the interviews, we identified four main themes: gender polarization; lesbian invisibility; homophobia; and measures against homophobia. Based on their discourses, we concluded that these interviewees have a small amount of knowledge about lesbian women’s sexuality. Despite the legislative progress concerning the Lesbian, Gay, Bisexual and Transgender People's rights in Portugal, teachers are not prepared to deal with this issue both inside and outside the school environment. Furthermore, this research includes some recommendations to deal with homophobia in the Portuguese school context. This study will hopefully contribute to a better understanding of the discourses and practices towards young lesbians in the school panorama, highlighting the importance of promoting non-discriminatory attitudes in the Portuguese schools

  6. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  7. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  8. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  9. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  10. Visible and invisible displacement with dynamic visual occlusion in bottlenose dolphins (Tursiops spp).

    Science.gov (United States)

    Johnson, Christine M; Sullivan, Jess; Buck, Cara L; Trexel, Julie; Scarpuzzi, Mike

    2015-01-01

    Anticipating the location of a temporarily obscured target-what Piaget (the construction of reality in the child. Basic Books, New York, 1954) called "object permanence"-is a critical skill, especially in hunters of mobile prey. Previous research with bottlenose dolphins found they could predict the location of a target that had been visibly displaced into an opaque container, but not one that was first placed in an opaque container and then invisibly displaced to another container. We tested whether, by altering the task to involve occlusion rather than containment, these animals could show more advanced object permanence skills. We projected dynamic visual displays at an underwater-viewing window and videotaped the animals' head moves while observing these displays. In Experiment 1, the animals observed a small black disk moving behind occluders that shifted in size, ultimately forming one large occluder. Nine out of ten subjects "tracked" the presumed movement of the disk behind this occluder on their first trial-and in a statistically significant number of subsequent trials-confirming their visible displacement abilities. In Experiment 2, we tested their invisible displacement abilities. The disk first disappeared behind a pair of moving occluders, which then moved behind a stationary occluder. The moving occluders then reappeared and separated, revealing that the disk was no longer behind them. The subjects subsequently looked to the correct stationary occluder on eight of their ten first trials, and in a statistically significant number of subsequent trials. Thus, by altering the stimuli to be more ecologically valid, we were able to show that the dolphins could indeed succeed at an invisible displacement task.

  11. Astrology Pseudoscience and a Discussion About Its Threats to Society

    Directory of Open Access Journals (Sweden)

    Tevfik UYAR

    2016-05-01

    Full Text Available Astrology, a pseudoscience, is highly popular in Turkey. Astrologers, who are its practitioners, produce discourses in the scientific field at the media and at their own platforms. Furthermore, it is possible to find some instances of astrology related activities in Turkish universities. In this article, demarcation of science from pseudoscience and the pseudoscientific status of astrology were discussed in a first place. Next, threats of astrological discourse within economic, educational and medical fields and their threats to society were expressed with some examples. Instances of the astrological activities within higher education institutions, such as an astrology-based master degree thesis, the astrology certificate programs, and an astrology column in an official medical school magazine were evaluated, and it was put forward that they contributed to increase the level of threat and it was also claimed that the existence of astrological activities in the universities contradicts the main purpose and principles of the higher education. In conclusion, some regulatory actions like the implementation of the scientific literacy and demarcation problem to each level of educational curriculum, a general policy for excluding the pseudoscience from higher education institutions and a recommended health warning at the top of the astrology were suggested.

  12. Making the Invisible Visible: Engaging Elementary Preservice Teachers in Science and Literacy Connections

    Science.gov (United States)

    Gwekwerere, Yovita; Buley, Jan

    2011-01-01

    Picture books can be used to teach children to infer, hypothesise, question, identify, explain and compare. By making the "invisible visible" preservice teachers in Canada explored ways to enhance the development of critical science and literacy skills through the creation of picture books in collaboration with students in Grades 5 and…

  13. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  14. Invisibility cloak with image projection capability.

    Science.gov (United States)

    Banerjee, Debasish; Ji, Chengang; Iizuka, Hideo

    2016-12-13

    Investigations of invisibility cloaks have been led by rigorous theories and such cloak structures, in general, require extreme material parameters. Consequently, it is challenging to realize them, particularly in the full visible region. Due to the insensitivity of human eyes to the polarization and phase of light, cloaking a large object in the full visible region has been recently realized by a simplified theory. Here, we experimentally demonstrate a device concept where a large object can be concealed in a cloak structure and at the same time any images can be projected through it by utilizing a distinctively different approach; the cloaking via one polarization and the image projection via the other orthogonal polarization. Our device structure consists of commercially available optical components such as polarizers and mirrors, and therefore, provides a significant further step towards practical application scenarios such as transparent devices and see-through displays.

  15. Arbitrarily elliptical-cylindrical invisible cloaking

    International Nuclear Information System (INIS)

    Jiang Weixiang; Cui Tiejun; Yu Guanxia; Lin Xianqi; Cheng Qiang; Chin, J Y

    2008-01-01

    Based on the idea of coordinate transformation (Pendry, Schurig and Smith 2006 Science 312 1780), arbitrarily elliptical-cylindrical cloaks are proposed and designed. The elliptical cloak, which is composed of inhomogeneous anisotropic metamaterials in an elliptical-shell region, will deflect incoming electromagnetic (EM) waves and guide them to propagate around the inner elliptical region. Such EM waves will return to their original propagation directions without distorting the waves outside the elliptical cloak. General formulations of the inhomogeneous and anisotropic permittivity and permeability tensors are derived for arbitrarily elliptical axis ratio k, which can also be used for the circular cloak when k = 1. Hence the elliptical cloaks can make a large range of objects invisible, from round objects (when k approaches 1) to long and thin objects (when k is either very large or very small). We also show that the material parameters in elliptical cloaking are singular at only two points, instead of on the whole inner circle for circular cloaking, which are much easier to be realized in actual applications. Full-wave simulations are given to validate the arbitrarily elliptical cloaking

  16. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  17. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  18. Teacher Victimization in Authoritative School Environments

    Science.gov (United States)

    Kapa, Ryan R.; Luke, Jeremy; Moulthrop, Dorothy; Gimbert, Belinda

    2018-01-01

    Background: Victimization in schools is not limited to students. Teachers increasingly face threats and attacks from their students. An authoritative school environment, characterized by high structure and support, has been associated with lower rates of victimization. The purpose of this study was to explore the relationship between authoritative…

  19. The [in]visibility of HIV/AIDS in the Malawi public sphere 1 | Lwanda ...

    African Journals Online (AJOL)

    This paper argues that, far from being invisible, issues of sexuality are omnipresent in the African public sphere. However, this presence is not usually found in the medical nor overtly gender/sexual arenas but in general social contexts. Western derived research models have sought and continue to seek to situate gender ...

  20. Higgs characterisation in the presence of theoretical uncertainties and invisible decays

    Energy Technology Data Exchange (ETDEWEB)

    Englert, Christoph [University of Glasgow, SUPA, School of Physics and Astronomy, Glasgow (United Kingdom); Kogler, Roman [Universitaet Hamburg, Institut fuer Experimentalphysik, Hamburg (Germany); Schulz, Holger; Spannowsky, Michael [Durham University, Department of Physics, Institute for Particle Physics Phenomenology, Durham (United Kingdom)

    2017-11-15

    While the Higgs characterisation programme is well under way, direct signs for new physics beyond the Standard Model remain elusive. Performing a fit of fully differential Higgs production cross sections at the LHC to a subset of Higgs-relevant effective operators, we discuss the extent to which theoretical uncertainties can limit the sensitivity in such a new physics search programme. Extending the dimension-6 Higgs Effective Field Theory framework by introducing new light degrees of freedom that can contribute to an invisible (or undetectable) Higgs decay width h → φφ, we show how differential coupling fits can disentangle effects from non-Standard Model couplings and an invisible decay width, as present in many new physics scenarios, such as Higgs-portal dark matter. Including the so-called off-shell measurement that has been advocated as a sensitive determination of the Higgs width in the κ framework, we show explicitly that this method does not provide complementary sensitivity for scale-separated new physics Λ >> m{sub h} >> m{sub φ}, which is favoured in beyond the Standard Model scenarios that relate astrophysics and collider phenomenology in the light of non-observation of new physics during run 1 of the LHC. (orig.)

  1. Improvement in grade of minerals using simultaneous Bio-oxidation of invisible gold concentrate and deep-sea manganese crust

    Science.gov (United States)

    Myung, EunJi; Cho, Kang Hee; Kim, Hyun Soo; Park, Cheon Young

    2016-04-01

    Many sulfides of metal such as galena, sphalerite, chalcopyrite, and pyrite, are semiconductors. When two kinds of such minerals contact each other in an electrolyte, a galvanic couple, where the mineral of lower rest potential as anode, and that of higher rest potential as cathode forms. Manganese dioxide is also a semiconductor with much higher rest potential than all sulfides mentioned above, so that a galvanic couple in which both the minerals would dissolve simultaneously can form, when it contacts with any of the sulfides. The aim of this study was to investigate the improvement in grade of minerals using the simultaneous bio-oxidation of deep-sea manganese crust and invisible gold concentrate. The samples(deep-sea manganese crust and invisible gold concentrate) were characterized by chemical and XRD analysis. The primary components of the invisible gold concentrate was pyrite and quartz and the deep-sea manganese crust was amorphous material, as detected using XRD. The result of chemical analysis showed that Au, Ag, Te contents in the invisible gold concentrate 130.2, 954.1 and 1,043.6 mg/kg, respectively. and that Mn, Ni, Co contents in the deep-sea manganese crust 19,501.5, 151.9, 400.4 mg/kg, respectively. In order to increase the bacteria's tolerance of heavy metals, the bacteria using bio-oxidation experiments were repeatedly subcultured in an Cu adaptation-medium containing of 382.98 mg/l for 20 periods of 21 days. The improvement in grade of samples of in present adapted bacteria condition was greater than another conditions(control and in present non-adapted bacteria). The Au-Ag-Te contents in the invisible gold concentrate was enhanced in the order of physical oxidation, simultaneous/non-adaptive bio-oxidation, adaptive/bio-oxidation, simultaneous/adaptive bio-oxidation. If the bacteria is adapted to heavy metal ions and an optimization of conditions is found in future bio-oxidation-leaching processes. Acknowledgment : "This research was supported

  2. Invisible nursing research: thoughts about mixed methods research and nursing practice.

    Science.gov (United States)

    Fawcett, Jacqueline

    2015-04-01

    In this this essay, the author addresses the close connection between mixed methods research and nursing practice. If the assertion that research and practice are parallel processes is accepted, then nursing practice may be considered "invisible mixed methods research," in that almost every encounter between a nurse and a patient involves collection and integration of qualitative (word) and quantitative (number) information that actually is single-case mixed methods research. © The Author(s) 2015.

  3. Reply to Jaakkola (2014): "Do animals understand invisible displacement? A critical review".

    Science.gov (United States)

    Pepperberg, Irene M

    2015-05-01

    Jaakkola (2014) critiques studies that investigate nonhuman capacities to track objects undergoing invisible displacements. She states that the results of most of these studies are tainted by cuing, that conceptual understanding is lacking, and that, as a consequence, great apes are the only nonhumans to have full Stage 6 object permanence. Any critique, however, must clearly take into account all published information on the techniques being used, including more recent data that counter its negative claims. Furthermore, disagreements as to the interpretation of the underlying mechanisms, although common, need not always cast doubt on the actual findings reported. Here I present material with respect to Grey parrots (Psittacus erithacus) to counter Jaakkola's critique. First, I take issue with Jaakkola's claims of cuing, based both on data from newer studies and citations from the original material. Second, I discuss her suggestions that associative learning rather than inferential mechanisms underlie demonstrated performance, pointing out some difficulties in drawing clear lines between the 2 interpretations. In sum, I argue that Grey parrots, at least, do indeed succeed on tasks involving invisible displacement, and demonstrate full object permanence. (c) 2015 APA, all rights reserved).

  4. Supersymmetric SU(11), the invisible axion, and proton decay

    International Nuclear Information System (INIS)

    Alwis, S.P. de; Kim, J.E.

    1981-09-01

    We supersymmetrize the very attractive flavour unification model SU(11). As with other supersymmetric GUTs the gauge hierarchy problem is simplified, but we may also have observable (tausub(p) is approximately 10 33 yrs) proton decay. The required split multiplets are obtained by making the adjoint take a particular direction. Supersymmetry is broken softly at the TeV scale. There is a unique U(1)sub(A) symmetry, and hence there are no true Nambu-Goldstone bosons. The U(1)sub(A) is broken at the GUT scale and there result an invisible axion and neutrino masses. (author)

  5. Invisible and microscopic gold in pyrite: Methods and new data for massive sulfide ores of the Urals

    Science.gov (United States)

    Vikentyev, I. V.

    2015-07-01

    Au speciation in sulfides (including "invisible" Au), which mostly controls the loss of Au during ore dressing, is discussed. Modern methods of analysis of Au speciation, with discussion of limitations by locality and sensitivity, are reviewed. The results of sulfide investigation by the methods of scanning and transmission electron microscopy, mass spectrometric analysis with laser ablation (LA-ICP-MS), the thermochemical method (study of ionic Au speciation), and automated "quantitative mineralogy," are demonstrated for weakly metamorphosed VHMS deposits of the Urals (Galkinsk and Uchaly). Significant content of Au is scattered in sulfides, such as pyrite, chalcopyrite, and sphalerite, with quantitative predomination of pyrite. The portion of such "invisible" gold ranges from flakes) with a monocrystal diffraction pattern of some particles and a ring diffraction pattern of other particles was registered in the ores of these deposits by the methods of transmission electron microscopy. The low degree (or absence) of metamorphic recrystallization results in (1) predomination of thin intergrowths of sulfides, which is the main reason for the bad concentration of ores (especially for the Galkinsk deposit) and (2) the high portion of "invisible" gold in the massive sulfide ores, which explains the low yield of Au in copper and zinc concentrates, since it is lost in tailings with predominating pyrite.

  6. Invisible Violence or from Ecstasy to Pain?

    Directory of Open Access Journals (Sweden)

    Lourdes Fernández Rius

    2008-01-01

    Full Text Available The values and roles for each gender are not socially recognized in an impartial way. It is a cultural construction that seeks, relying on the differences and, on a dichotomous hierarchy and power, to establish an inequality that reinforces the supremacy of masculinity as a value. In patriarchal culture – as a trend – men tend to be the most violent, and women to have a behavior of dependence and docility. Therefore the coupling relationships associated with fantasies of love are a space of power and are constantly harassed by experiences of servitude and domination. Difference – hierarchy – inequality – discrimination – violence, invisible feedback circuit that culture reedits daily and which expresses itself from psychological form to extreme damages primarily toward women on the amorous relationship.

  7. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  8. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  9. Closeted or out? Gay and Lesbian Educators Reveal Their Experiences about Their Sexual Identities in K-12 Schools

    Science.gov (United States)

    Hooker, Steven D.

    2010-01-01

    Lesbian, gay, bisexual, and transgender school educators are practically invisible within the nature of heterosexist and homophobic education (Blount, 2005). "Openly gay and lesbian teachers were once thought of as immoral, and in some states coming out is still a risk to one's job" (McCarthy, 2003, p. 182). One's sexual orientation has nothing to…

  10. [Street Outreach Offices: visibility, invisibility, and enhanced visibility].

    Science.gov (United States)

    Hallais, Janaína Alves da Silveira; Barros, Nelson Filice de

    2015-07-01

    This article discusses care for street people from a socio-anthropological perspective, using participant observation conducted with a team from a street outreach project. Based on observations, street people are historically viewed as marginal and rarely obtain access to health services, thus making them invisible to the Brazilian Unified National Health System. Brazil's National Policy for the Homeless provides for their access to health care, but such care is not always guaranteed in practice, because health services and professionals have little experience in dealing with homeless persons. The study concludes that enhanced visibility is needed to ensure care for people living on the street, establishing a therapeutic bond that deconstructs stigmatizing practice.

  11. Developing Safe Schools Partnerships with Law Enforcement

    Science.gov (United States)

    Rosiak, John

    2009-01-01

    Safe schools are the concern of communities throughout the world. If a school is safe, and if children feel safe, students "are better able to learn. But what are the steps to make" this happen? First, it is important to understand the problem: What are the threats to school safety? These include crime-related behaviors that find their way to…

  12. Broadband unidirectional invisibility for airborne sound

    Science.gov (United States)

    Kan, Weiwei; Guo, Mengping; Shen, Zhonghua

    2018-05-01

    We present a metafluid-based broadband cloak capable of guiding acoustic waves around obstacles along given directions while maintaining the wavefront undisturbed. The required parameter distribution of the proposed cloak is derived by coordinate transformation and practically implemented by employing the acoustic metafluid formed with periodically arranged slabs in acoustic chambers. The method for independently modulating the effective mass density and bulk modulus of the metafluid is developed by tuning the geometry parameters and the temperature of the acoustic chamber in a specific process. By virtue of this free-modulated method, the range of realizable effective parameters is substantially broadened, and the acoustic impedance of the anisotropic structures can be well matched to the background. The performance of the designed structure is quantitatively evaluated in the frequency range of 3-4 kHz by the averaged invisibility factor. The results show that the proposed cloak is effective in manipulating the acoustic field along the given direction and suppressing the wave scattering from the hidden object.

  13. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  14. Search strategies for pair production of heavy Higgs bosons decaying invisibly at the LHC

    Science.gov (United States)

    Arganda, E.; Diaz-Cruz, J. L.; Mileo, N.; Morales, R. A.; Szynkman, A.

    2018-04-01

    The search for heavy Higgs bosons at the LHC represents an intense experimental program, carried out by the ATLAS and CMS collaborations, which includes the hunt for invisible Higgs decays and dark matter candidates. No significant deviations from the SM backgrounds have been observed in any of these searches, imposing significant constraints on the parameter space of different new physics models with an extended Higgs sector. Here we discuss an alternative search strategy for heavy Higgs bosons decaying invisibly at the LHC, focusing on the pair production of a heavy scalar H together with a pseudoscalar A, through the production mode q q bar →Z* → HA. We identify as the most promising signal the final state made up of 4 b +ET miss, coming from the heavy scalar decay mode H → hh → b b bar b b bar , with h being the discovered SM-like Higgs boson with mh = 125GeV, together with the invisible channel of the pseudoscalar. We work within the context of simplified MSSM scenarios that contain quite heavy sfermions of most types with O (10)TeV masses, while the stops are heavy enough to reproduce the 125 GeV mass for the lightest SM-like Higgs boson. By contrast, the gauginos/higgsinos and the heavy MSSM Higgs bosons have masses near the EW scale. Our search strategies, for a LHC center-of-mass energy of √{ s } = 14TeV, allow us to obtain statistical significances of the signal over the SM backgrounds with values up to ∼ 1.6 σ and ∼ 3 σ, for total integrated luminosities of 300fb-1 and 1000fb-1, respectively.

  15. Improvement of Secret Image Invisibility in Circulation Image with Dyadic Wavelet Based Data Hiding with Run-Length Coded Secret Images of Which Location of Codes are Determined with Random Number

    OpenAIRE

    Kohei Arai; Yuji Yamada

    2011-01-01

    An attempt is made for improvement of secret image invisibility in circulation images with dyadic wavelet based data hiding with run-length coded secret images of which location of codes are determined by random number. Through experiments, it is confirmed that secret images are almost invisible in circulation images. Also robustness of the proposed data hiding method against data compression of circulation images is discussed. Data hiding performance in terms of invisibility of secret images...

  16. Effects of Violence Prevention Behavior on Exposure to Workplace Violence and Threats: A Follow-Up Study.

    Science.gov (United States)

    Gadegaard, Charlotte Ann; Andersen, Lars Peter; Hogh, Annie

    2018-04-01

    This longitudinal study investigates the relationship between prevention behaviors, that is, enacted violence prevention policies, and exposure to workplace violence and threats across four different high risk work sectors: psychiatry, special schools, eldercare, and the prison and probation services. Logistic regression analysis of a 1-year follow-up sample of 3.016 employees from these four sectors shows that prevention behaviors are significantly and negatively associated with self-reported exposure to workplace violence and threats-in the prison and probation services, eldercare, and in psychiatry, while no significant associations are found for special schools. The results therefore show clear sector differences with regard to the preventive effect of violence prevention behaviors. Furthermore, this multisector comparison suggests that prevention behaviors are more effective in relation to a moderate frequency of violence and threats, and that only top management prevention behavior can prevent very frequent incidents (odds ratio [ OR] = 0.58). This study contributes to the literature by use of a longitudinal design and acceptable response rates, while also simultaneously investigating several high risk sectors. The results imply that when managing workplace violence in high risk areas of human service work, there should be emphasis on the use of violence prevention behaviors from top management, supervisor, and among coworkers. However, type of sector and the frequency of workplace violence should be analyzed to evaluate the potential impact of prevention behaviors.

  17. Object permanence in cats (Felis catus): an ecological approach to the study of invisible displacements.

    Science.gov (United States)

    Dumas, C

    1992-12-01

    A single invisible displacement object permanence task was administered to 19 cats (Felis catus). In this task, cats watched a target object from behind a transparent panel. However, cats had to walk around an opaque panel to reach the object. While cats were behind the opaque panel, the object was hidden behind one of two screens. As cats did not perceive the disappearance of the object behind the target screen, the object was invisibly hidden. Results showed that cats solved this task with great flexibility, which markedly contrasts with what has been observed in previous research. The discussion emphasizes the difference between the typical Piagetian task in which the information necessary to succeed must be dealt with in retrospective way, whereas in our task cats had to anticipate a new position of the object. The ecological relevance of this new task is also discussed.

  18. "We Are the Ones that Talk about Difficult Subjects": Nurses in Schools Working to Support Young People's Mental Health

    Science.gov (United States)

    Spratt, Jennifer; Philip, Kate; Shucksmith, Janet; Kiger, Alice; Gair, Dorothy

    2010-01-01

    As health professionals in an educational setting, nurses in schools occupy a unique place in the spectrum of children's services. Yet the service is often overlooked and has been described as invisible. This paper draws on findings from a study, funded by the Scottish Government's National Programme for Improving Mental Health and Well-being,…

  19. Invisible Perceptions: Understanding the Perceptions of University Tutors towards Trainee Teachers with Parental Responsibilities

    Science.gov (United States)

    Murtagh, Lisa

    2017-01-01

    In recent decades, Higher Education has undoubtedly changed giving rise to an increasingly diverse student population. However, there has been only limited research on students with parental responsibilities. When they are considered, this is often in a somewhat pejorative way. The challenges faced by such trainees are often invisible. This paper…

  20. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  1. Training for Tragedy: Critical Challenges for School Psychologists

    Science.gov (United States)

    DeNisco, Alison

    2013-01-01

    School psychologists are often the first professionals to reach students with mental illness, and part of their role is to help identify threats that can lead to events such as the massacre at Sandy Hook Elementary School in Newtown, Conn., which left 20 children and six adults dead, including school psychologist Mary Sherlach, who was one of the…

  2. What's in Your Portfolio? How Parents Rank Traditional Public, Private, and Charter Schools in Post-Katrina New Orleans' Citywide System of School Choice

    Science.gov (United States)

    Lincove, Jane A.; Cowen, Joshua M.; Imbrogno, Jason P.

    2018-01-01

    We examine the characteristics of schools preferred by parents in New Orleans, Louisiana, where a "portfolio" of school choices is available. This tests the conditions under which school choice induces healthy competition between public and private schools through the threat of student exit. Using unique data from parent applications to…

  3. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  5. The Invisibility of Disability: Using Dance to Shake from Bioethics the Idea of 'Broken Bodies'.

    Science.gov (United States)

    Harmon, Shawn H E

    2015-09-01

    Complex social and ethical problems are often most effectively solved by engaging them at the messy and uncomfortable intersections of disciplines and practices, a notion that grounds the InVisible Difference project, which seeks to extend thinking and alter practice around the making, status, ownership, and value of work by contemporary dance choreographers by examining choreographic work through the lenses of law, bioethics, dance scholarship, and the practice of dance by differently-abled dancers. This article offers a critical thesis on how bioethics has come to occupy a marginal and marginalizing role in questions about the differently-abled body. In doing so, it has rendered the disabled community largely invisible to and in bioethics. It then defends the claim that bioethics - as a social undertaking pursued collaboratively by individuals from different disciplines - must take much better notice of the body and the embodied individual if it is to better achieve its ends, which include constructing a moral and just society. Finally, this article considers how the arts, and specifically dance (and here dance by differently-abled dancers), provides us with rich evidence about the body and our ability to respond positively to normally 'othered' bodies. It concludes that greater attention to empirical evidence like that being generated in InVisible Difference will help to expand the reach and significance of bioethics, and thereby its relevance to (and consciousness of) important questions about the status of bodies and bodily differences, which must be considered as central to its ambitions. © 2014 John Wiley & Sons Ltd.

  6. Does Stereotype Threat Affect Post-Course Scores on the Astronomy Diagnostic Test?

    Science.gov (United States)

    Deming, G. L.; Hufnagel, B.; Landato, J. M.; Hodari, A. K.

    2003-12-01

    During the 1990s, Claude Steele and others demonstrated that women mathematics students under-performed while men over-performed on selected GRE questions when told that the exam could differentiate by gender. Stereotype threat is triggered for these women when they fear someone else may negatively stereotype them, and therefore, their performance is affected. In a limited study involving 229 students, we investigated the effect of stereotype threat on performance on the Astronomy Diagnostic Test (ADT). The ADT was administered as a pre-test in four introductory astronomy classes intended for non-science majors. The same professors taught pairs of classes at the University of Maryland, a large research institution, and W. R. Harper College, a small liberal arts school. The classes were treated the same until the final day before the post-course ADT was given. One "threatened" class at each campus was told that gender mattered so they should be sure to include it on the ADT. The "control" classes were told that gender does not matter. The results show no stereotype threat effect on the women in these introductory classes. The university men did slightly over-perform at low statistical significance. As Steele suggested, students must identify with a subject in order to strongly invoke a stereotype threat. This research was supported in part by the National Science Foundation through grants REC-0089239 to GLD, DGE-97014489 to BH, and DGE-9714452 for AKH.

  7. Search for invisible decays of the Higgs boson produced through vector boson fusion at $\\sqrt{s} = 13~\\mathrm{TeV}$

    CERN Document Server

    CMS Collaboration

    2018-01-01

    A search for invisible decays of the Higgs boson is performed using $13~\\mathrm{TeV}$ proton-proton collision data collected by the CMS experiment at the LHC in 2016, corresponding to an integrated luminosity of $35.9~\\mathrm{fb}^{-1}$. The search targets the production of the Higgs boson through vector boson fusion. The data are found to be in agreement with the predicted background contributions from standard model processes. An observed (expected) upper limit of $0.28~(0.21)$, at $95\\%$ confidence level, is placed on the invisible branching fraction of the $125~\\mathrm{GeV}$ Higgs boson. Upper limits are also computed on the product of the cross section and branching fraction of a scalar Higgs boson-like particle, with mass ranging between $110$ and $1000~\\mathrm{GeV}$. Finally, a combination of several analyses searching for invisible decays of the Higgs boson, based on $35.9~\\mathrm{fb}^{-1}$ of data collected by the CMS detector in 2016, is performed. An observed (expected) upper limit of $0.24~(0.18)$ ...

  8. Does stereotype threat influence performance of girls in stereotyped domains? A meta-analysis.

    Science.gov (United States)

    Flore, Paulette C; Wicherts, Jelte M

    2015-02-01

    Although the effect of stereotype threat concerning women and mathematics has been subject to various systematic reviews, none of them have been performed on the sub-population of children and adolescents. In this meta-analysis we estimated the effects of stereotype threat on performance of girls on math, science and spatial skills (MSSS) tests. Moreover, we studied publication bias and four moderators: test difficulty, presence of boys, gender equality within countries, and the type of control group that was used in the studies. We selected study samples when the study included girls, samples had a mean age below 18years, the design was (quasi-)experimental, the stereotype threat manipulation was administered between-subjects, and the dependent variable was a MSSS test related to a gender stereotype favoring boys. To analyze the 47 effect sizes, we used random effects and mixed effects models. The estimated mean effect size equaled -0.22 and significantly differed from 0. None of the moderator variables was significant; however, there were several signs for the presence of publication bias. We conclude that publication bias might seriously distort the literature on the effects of stereotype threat among schoolgirls. We propose a large replication study to provide a less biased effect size estimate. Copyright © 2014 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  9. Search for Invisible Decays of Sub-GeV Dark Photons in Missing-Energy Events at the CERN SPS.

    Science.gov (United States)

    Banerjee, D; Burtsev, V; Cooke, D; Crivelli, P; Depero, E; Dermenev, A V; Donskov, S V; Dubinin, F; Dusaev, R R; Emmenegger, S; Fabich, A; Frolov, V N; Gardikiotis, A; Gninenko, S N; Hösgen, M; Kachanov, V A; Karneyeu, A E; Ketzer, B; Kirpichnikov, D V; Kirsanov, M M; Kovalenko, S G; Kramarenko, V A; Kravchuk, L V; Krasnikov, N V; Kuleshov, S V; Lyubovitskij, V E; Lysan, V; Matveev, V A; Mikhailov, Yu V; Myalkovskiy, V V; Peshekhonov, V D; Peshekhonov, D V; Petuhov, O; Polyakov, V A; Radics, B; Rubbia, A; Samoylenko, V D; Tikhomirov, V O; Tlisov, D A; Toropin, A N; Trifonov, A Yu; Vasilishin, B; Vasquez Arenas, G; Ulloa, P; Zhukov, K; Zioutas, K

    2017-01-06

    We report on a direct search for sub-GeV dark photons (A^{'}), which might be produced in the reaction e^{-}Z→e^{-}ZA^{'} via kinetic mixing with photons by 100 GeV electrons incident on an active target in the NA64 experiment at the CERN SPS. The dark photons would decay invisibly into dark matter particles resulting in events with large missing energy. No evidence for such decays was found with 2.75×10^{9} electrons on target. We set new limits on the γ-A^{'} mixing strength and exclude the invisible A^{'} with a mass ≲100  MeV as an explanation of the muon g_{μ}-2 anomaly.

  10. Search for invisible decays of sub-GeV dark photons in missing-energy events at the CERN SPS

    CERN Document Server

    Banerjee, D.

    2017-01-05

    We report on a direct search for sub-GeV dark photons (A') which might be produced in the reaction e^- Z \\to e^- Z A' via kinetic mixing with photons by 100 GeV electrons incident on an active target in the NA64 experiment at the CERN SPS. The A's would decay invisibly into dark matter particles resulting in events with large missing energy. No evidence for such decays was found with 2.75\\cdot 10^{9} electrons on target. We set new limits on the \\gamma-A' mixing strength and exclude the invisible A' with a mass < 100 MeV as an explanation of the muon g_\\mu-2 anomaly.

  11. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. What is Molecular is not invisible to the eyes

    Directory of Open Access Journals (Sweden)

    Frank Lizaraso Caparó

    2017-01-01

    Full Text Available A molecular failure (in principle invisible will determine symptoms, diseases and conditions of Health pretty visible. Molecular studies have been developed mostly in populations in Europe, USA (Descendants of Europeans and African Americans Africa and Asia. The Peruvians are represented in the Latin / Hispanic who is genetically too heterogeneous (eg, Mexican Latino is different from Argentinian or Puerto Rican (11. Peru globally has about 70% of South American native ancestors, which has been scarcely represented In molecular studies there is a pending task to characterize its population, as well as being Watchers of our endemic pathogens and those adapted to our territory.

  13. Lurking and L2 Learners on a Facebook Group: The Voices of the Invisibles

    Science.gov (United States)

    Shafie, Latisha Asmaak; Yaacob, Aizan; Singh, Paramjit Kaur Karpal

    2016-01-01

    This qualitative research investigates the practice of lurking among English as a second language (ESL) learners in a Facebook group discussion. Lurking is a term used to describe the activity of following and observing any online discussions or activities without contributing to the discussions. Lurkers are often accused of being invisible and…

  14. Three-dimensional finite element analysis on canine teeth distalization by different accessories of bracket-free invisible orthodontics technology

    Science.gov (United States)

    Xu, Nuo; Lei, Xue; Yang, Xiaoli; Li, Xinhui; Ge, Zhenlin

    2018-04-01

    Objective: to compare canine tooth stress distribution condition during maxillary canine tooth distalization by different accessories of bracket-free invisible orthodontics technology after removal of maxillary first premolar, and provide basis for clinical design of invisible orthodontics technology. Method: CBCT scanning image of a patient with individual normal occlusion was adopted, Mimics, Geomagic and ProlE software were used for establishing three-dimensional models of maxilla, maxillary dentition, parodontium, invisible orthodontics appliance and accessories, ANSYS WORKBENCH was utilized as finite element analysis tools for analyzing stress distribution and movement pattern of canine tooth and parodontium when canine tooth was equipped with power arm and vertical rectangle accessory. Meanwhile, canine tooth none-accessory design group was regarded as a control. Result: teeth had even bistal surface stress distribution in the power arm group; stress was concentrated on distal tooth neck, and the stress was gradually deviated to mesial-labial side and distal lingual side in vertical rectangle group and none-accessory group. Conclusion: teeth tend to move as a whole in the Power arm group, vertical rectangle group has lower tooth gradient compared with the none-accessory group, teeth are inclined for movement in the none-accessory group, and canine teeth tend to rotate to the distal lingual side.

  15. Leaking and Death-Threats by Students: A Study in German Schools

    Science.gov (United States)

    Bondü, Rebecca; Scheithauer, Herbert

    2014-01-01

    Leaking comprises observable behavior or statements that signal intentions of committing a violent offense and is considered an important warning sign for school shootings. School staff who are confronted with leaking have to assess its seriousness and react appropriately--a difficult task, because knowledge about leaking is sparse. The present…

  16. Experimental demonstration of invisible electromagnetic impedance matching cylindrical transformation optics cloak shell

    Science.gov (United States)

    Chen, Mingji; Wang, Changxian; Cheng, Xiaodong; Gong, Congcheng; Song, Weili; Yuan, Xujin; Fang, Daining

    2018-04-01

    The realization of an ideal invisible cloak implementing transformation optics is still missing. An impedance matching concept is implanted into transformation optics cloak to generate an impedance matching cloak (IMC) shell. In this work, it is proved that impedance matching structure reduces the cloaking structure’s disturbance to a propagating electromagnetic field and improves its invisibility measured by scattering field intensity. Such a cylindrical IMC shell is designed, fabricated with proposed rounded rectangular split-ring-resonators (RR-SRRs), and experimental measurements show the total scattering field of a perfect electric conductor (PEC) cylinder surrounded by an IMC shell is improved greatly compared to the PEC cylinder showing electromagnetic wave front ripple suppression and a considerable scattering shrinking effect. IMC shell backward scattering field is suppressed down to 7.29%, compared to the previous value of 86.7% due to its impedance matching character, and overall scattering field intensity shrinking is down to 19.3% compared to the previously realized value of 56.4%. Sideward scattering field recorded in the experiment also has a remarkable improvement compared to the PEC cylinder. The impedance matching concept might enlighten the realization of an ideal cloak and other novel electromagnetic cloaking and shielding structures.

  17. Errores en la estrategia argumentativa de la interpretación providencialista de la mano invisible de adam smith: el caso de la teoría de los sentimientos morales

    OpenAIRE

    Indavera Stieben, Leandro Gastón

    2011-01-01

    Generalmente, los que defienden la interpretación providencialista de la mano invisible de Adam Smith, sostienen que los individuos guiados por una mano invisible poseen ciertas cualidades que se espera se orientan a ciertos fines beneficiosos para la sociedad. Este sería, ni más ni menos, el sentido de la famosa expresión smitheana. En este artículo mostraré, por el contrario, que en el pasaje de la mano invisible de La teoría de los sentimientos morales los individuos guiados por una mano i...

  18. Supporting College and University Students with Invisible Disabilities: A Guide for Faculty and Staff Working with Students with Autism, AD/HD, Language Processing Disorders, Anxiety, and Mental Illness

    Science.gov (United States)

    Oslund, Christy

    2013-01-01

    With increasing numbers of students with invisible disabilities attending college and university, faculty and staff find themselves faced with new challenges. This practical handbook provides lecturers, tutors, disability services, and administrative staff with an overview of the invisible disabilities they may encounter, dispelling common myths…

  19. Bullying in Nigerian Secondary Schools: Strategies for Counseling Intervention

    Science.gov (United States)

    Fareo, Dorcas Oluremi

    2015-01-01

    School bullying is a serious problem for young people in the society and Nigeria at large. It is a threat that no school disregards or dismisses. It can have negative consequences on the general school climate and on the right of students to learn in a safe environment without fear. Bullying can also have negative lifelong consequences both for…

  20. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  1. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  2. Visibility and Invisibility: the Work of Women

    Directory of Open Access Journals (Sweden)

    Patricia Alejandra Collado

    2009-01-01

    Full Text Available The crisis of employment, combined with theories about the end of work, place labor at the center of the agenda. Given this situation, it is found that debates around labor in general (its productive and reproductive spheres, its relation with employment and the visible and invisible forms of conducting work have been approached by one of the most neglected traditions of social thinking: feminism. Feminist thinkers have questioned the meaning of work and non-work in relation to the constant increase of the participation of women in the labor market. Although feminist proposals have different levels of analysis and emphasis, it is necessary to return to their unique production, in order to unveil the situation of greater exploitation and oppression, of workers in general and in particular of women. This situation is facilitated by the apparent “invisibilization” or by the loss of the centrality of labor.

  3. Sum frequency generation of CO on (III) and polycrystalline platinum electrode surfaces: Evidence for SFG invisible surface CO

    Energy Technology Data Exchange (ETDEWEB)

    Baldelli, S.; Markovic, N.; Ross, P.; Shen, Y.R.; Somorjai, G.

    1999-10-21

    The vibrational spectroscopy sum frequency generation (SFG) is used to investigate the adsorption of carbon monoxide on the single crystal (111) and polycrystalline platinum surfaces. By varying the frequency and polarization of the light beams, different surface species of CO species are probed. SFG signal intensities for different polarization indicate that adsorbed CO polarizability is significantly perturbed from the gas-phase molecule. The SFG signal of CO disappears well below the main oxidation potential of CO to CO{sub 2}. The disappearance of the CO signal is interpreted as a transformation in the CO layer to a state which is invisible to SFG. The invisible state is suggested to be CO with the bond axis nearly parallel to the platinum surface.

  4. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  5. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  6. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  7. Violence and school shootings.

    Science.gov (United States)

    Flannery, Daniel J; Modzeleski, William; Kretschmar, Jeff M

    2013-01-01

    Multiple-homicide school shootings are rare events, but when they happen they significantly impact individuals, the school and the community. We focus on multiple-homicide incidents and identified mental health issues of shooters. To date, studies of school shootings have concluded that no reliable profile of a shooter exists, so risk should be assessed using comprehensive threat assessment protocols. Existing studies primarily utilize retrospective case histories or media accounts. The field requires more empirical and systematic research on all types of school shootings including single victim incidents, those that result in injury but not death and those that are successfully averted. We discuss current policies and practices related to school shootings and the role of mental health professionals in assessing risk and supporting surviving victims.

  8. Invisible Z′ and dark matter: LHC vs LUX constraints

    International Nuclear Information System (INIS)

    Arcadi, Giorgio; Mambrini, Yann; Tytgat, Michel H.G.; Zaldívar, Bryan

    2014-01-01

    We consider a simple, yet generic scenario in which a new heavy Z′ gauge boson couples both to SM fermions and to dark matter. In this framework we confront the best LHC limits on an extra gauge boson Z′ to the constraints on couplings to dark matter from direct detection experiments. In particular we show that the LHC searches for resonant production of dileptons and the recent exclusion limits obtained by the LUX collaboration give complementary constraints. Together, they impose strong bounds on the invisible branching ratio and exclude a large part of the parameter space for generic Z′ models. Our study encompasses many possible Z′ models, including SSM, E 6 -inspired or B-L scenario

  9. The Michelson interferometer-how to detect invisible interference patterns

    International Nuclear Information System (INIS)

    Verovnik, Ivo; Likar, Andrej

    2004-01-01

    In a Michelson interferometer, the contrast of the interference pattern fades away due to incoherence of light when the mirrors are not in equidistant positions. We propose an experiment where the distance between the interference fringes can be determined, even when the difference in length of the interferometer arms is far beyond the coherence length of the light, i.e. when the interference pattern disappears completely for the naked eye. We used a semiconductor laser with two photodiodes as sensors, which enabled us to follow the fluctuations of the light intensity on the screen. The distance between invisible interference fringes was determined from periodic changes of the summed fluctuating signal, obtained by changing the distance between the two sensors

  10. The ''invisible'' radioactive scale

    International Nuclear Information System (INIS)

    Bjoernstad, T.; Ramsoey, T.

    1999-04-01

    Production and up-concentration of naturally occurring radioactive material (NORM) in the petroleum industry has attracted steadily increasing attention during the last 15 years. Most production engineers today associate this radioactivity with precipitates (scales) and sludges in production tubing, pumps, valves, separators, settling tanks etc., wherever water is being transported or treated. 226 Ra and 228 Ra are the most well known radioactive constituents in scale. Surprisingly little known is the radioactive contamination by 210 Pb and progeny 210 Bi and 210 Po. These are found in combination with 226 Ra in ordinary scale, often in layer of non-radioactive metallic lead in water transportation systems, but also in pure gas and condensate handling systems ''unsupported'' by 226 Ra, but due to transportation and decay of the noble gas 222 Rn in NG/LNG. This latter contamination may be rather thin, in some cases virtually invisible. When, in addition, the radiation energies are low enough for not being detectable on the equipment outer surface, its existence has for most people in the industry been a secret. The report discusses transportation and deposition mechanisms, detection methods and provides some examples of measured results from the North Sea on equipment sent for maintenance. It is concluded that a regular measurement program for this type of contamination should be mandatory under all dismantling processes of transportation and fluid handling equipment for fluids and gases offshore and onshore

  11. INVISIBLE MURDERER: NEONATAL TETANUS

    Directory of Open Access Journals (Sweden)

    Yonca SONMEZ

    2006-06-01

    Full Text Available Neonatal tetanus (NNT has been secondary in the whole world in the death list of diseases which can be protected by the help of vaccine. It’s an important community health problem in the less-developed countries in which pre-birth care services are limited, assisting a mother at childbirth by uneducated people in dirty atmosphere and the immunity against tetanus is not enough. Studies have shown that minor part of the cases have been expressed in most of the countries. Because of that NNT have been called as “silent/invisible murderer”. In Turkey, in the year of 2003 it has been seen 15 cases, and 12 of them have been resulted in death. The methods which will be applied to carry out the elimination of NNT are; the vaccination of pregnant women with at least two doses tetanus toxoid and providing clean birth conditions for all of the pregnant women. However, in Turkey the proportion of the women who have two doses of tetanus vaccine is 41%. To eliminate NNT in our country, all the pregnant women must be attained, the ones who are attained must be presented with qualified pre-birth care service which also includes tetanus immunity and the births must be carried out under healty conditions. As smallpox and polio eradication, NNT elimination will also be accomplished by self-sacrificing works of personnel in primary health care. [TAF Prev Med Bull 2006; 5(3.000: 229-233

  12. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  13. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  14. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  15. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  16. Invisible but Essential: The Role of Professional Networks in Promoting Faculty Agency in Career Advancement

    Science.gov (United States)

    Niehaus, Elizabeth; O'Meara, KerryAnn

    2015-01-01

    The benefits of professional networks are largely invisible to the people embedded in them (O'Reilly 1991), yet professional networks may provide key benefits for faculty careers. The purpose of the study reported here was to explore the role of professional networks in faculty agency in career advancement, specifically focusing on the overall…

  17. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  18. THE CYBER THREAT AND THE PROBLEM OF INFORMATION SECURITY - A critical analysis of the concepts of cyber-power and cyber-space

    Directory of Open Access Journals (Sweden)

    Sebastian SÂRBU

    2017-06-01

    Full Text Available In this paper we approached from a researcher’s angle and analyzed the concepts of cyber-space, cyber-power from the security school perspective, from that of the international organizations, and from the civil society point of view. Therefore we referred to the documents and the international initiatives concerning the security of data transfer in the context of the current threats against cybernetic security on the one hand, and its interpretation as a threat to the values, rights and democratic freedoms of the civil society, on the other. The risk society is defined both through the grid of political sociology, of the Copenhagen school, as a key element of reference in this case, as well as through the necessity to build a safe cyber space, here being scrutinized in a value-based antithesis between terror and democracy / freedom of speech.

  19. Pervasive Computing Goes to School

    Science.gov (United States)

    Plymale, William O.

    2005-01-01

    In 1991 Mark Weiser introduced the idea of ubiquitous computing: a world in which computers and associated technologies become invisible, and thus indistinguishable from everyday life. This invisible computing is accomplished by means of "embodied virtuality," the process of drawing computers into the physical world. Weiser proposed that…

  20. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  1. Prevention of Targeted School Violence by Responding to Students' Psychosocial Crises: The NETWASS Program

    Science.gov (United States)

    Leuschner, Vincenz; Fiedler, Nora; Schultze, Martin; Ahlig, Nadine; Göbel, Kristin; Sommer, Friederike; Scholl, Johanna; Cornell, Dewey; Scheithauer, Herbert

    2017-01-01

    The standardized, indicated school-based prevention program "Networks Against School Shootings" combines a threat assessment approach with a general model of prevention of emergency situations in schools through early intervention in student psychosocial crises and training teachers to recognize warning signs of targeted school violence.…

  2. The copycat phenomenon after two Finnish school shootings: an adolescent psychiatric perspective.

    Science.gov (United States)

    Lindberg, Nina; Sailas, Eila; Kaltiala-Heino, Riittakerttu

    2012-07-28

    Two school shootings with altogether 18 victims took place in Finland in November 2007 and September 2008. Homicides and suicides are both associated with the copycat phenomenon. The aim of the present study was to characterize adolescent copycats who had threatened to carry out a school massacre. The nation-wide study evaluated 77 13- to 18-year-old adolescents who were sent for adolescent psychiatric evaluations between 8.11.2007 and 30.6.2009, one of the reasons for evaluation being a threat of massacre at school. The medical files of the copycats were retrospectively analysed using a special data collection form. Data on demographics, family- and school-related issues, previous psychiatric treatment and previous delinquency, current symptoms, family adversities and psychiatric diagnoses were collected. The severity of the threat expressed and the risk posed by the adolescent in question were evaluated. The Psychopathy Checklist Youth Version was used to assess psychopathic traits. All of the copycats were native Finns with a mean age of 15.0 years. Almost two thirds of them had a history of previous mental health treatment before the index threat. Almost two thirds of the copycats suffered from anxiety and depressive symptoms, and almost half of the sample expressed either suicidal ideation or suicidal plans. Behavioural problems including impulse control problems, aggressive outbursts, the destruction of property as well as non-physical and physical violence against other persons were common. The diagnosis groups highlighted were behavioural and emotional disorders, mood disorders as well as schizophrenia-related disorders. The prevalence of pervasive developmental disorders was high. Only one of the copycats was assessed as expressing high traits of psychopathy. The copycats with school massacre threats were characterized with a high prevalence of mental and behavioural disorders. Like actual school shooters, they showed psychotic symptoms and traumatic

  3. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  4. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  5. Visible technologies, invisible organisations: An empirical study of public beliefs about electricity supply networks

    International Nuclear Information System (INIS)

    Devine-Wright, Patrick; Devine-Wright, Hannah; Sherry-Brennan, Fionnguala

    2010-01-01

    Reducing carbon emissions in the energy system poses significant challenges to electricity transmission and distribution networks. Whilst these challenges are as much social as economic or technical, to date few research studies have investigated public beliefs about electricity supply networks. This research aimed to address this gap by means of a nationally representative study of UK adults (n=1041), probing beliefs about how electricity reaches the home, responsibility for electricity supply, associations with the words 'National Grid', as well as beliefs about the planning of new infrastructure. Findings suggest that electricity networks are represented predominantly in terms of technologies rather than organisations, specifically in terms of familiar, visible components such as cables or wires, rather than more systemic concepts such as networks. Transmission and distribution network operators were largely invisible to members of the public. In terms of planning new lines, most respondents assumed that government ministers were involved in decision-making, while local residents were widely perceived to have little influence; moreover, there was strong public support for placing new power lines underground, regardless of the cost. In conclusion, organisational invisibility, coupled with low expectations of participatory involvement, could provoke public opposition and delay siting new network infrastructure.

  6. Risk Assessment of the Naval Postgraduate School Gigabit Network

    National Research Council Canada - National Science Library

    Rowlands, Dennis

    2004-01-01

    This research thoroughly examines the current Naval Postgraduate School Gigabit Network security posture, identifies any possible threats or vulnerabilities, and recommends any appropriate safeguards...

  7. Invisibility and Cloaking: Origins, Present, and Future Perspectives

    Science.gov (United States)

    Fleury, Romain; Monticone, Francesco; Alù, Andrea

    2015-09-01

    The development of metamaterials, i.e., artificially structured materials that interact with waves in unconventional ways, has revolutionized our ability to manipulate the propagation of electromagnetic waves and their interaction with matter. One of the most exciting applications of metamaterial science is related to the possibility of totally suppressing the scattering of an object using an invisibility cloak. Here, we review the available methods to make an object undetectable to electromagnetic waves, and we highlight the outstanding challenges that need to be addressed in order to obtain a fully functional coating capable of suppressing the total scattering of an object. Our outlook discusses how, while passive linear cloaks are fundamentally limited in terms of bandwidth of operation and overall scattering suppression, active and/or nonlinear cloaks hold the promise to overcome, at least partially, some of these limitations.

  8. Visible and invisible the wonders of light phenomena

    CERN Document Server

    Bisi, Olmes

    2015-01-01

    Light phenomena have intrigued humankind since prehistory. Think of the rainbow, a sunset on the sea, a game of shadows. Humans have always used light for their own needs, from cooking food to illuminating a room. However, light is not only limited to what we can see with our eyes. The invisible part of the electromagnetic spectrum is broad and dynamic. This book outlines the mysteries and wonders of electromagnetism, heat, and light. It also covers the history of our scientific understanding of light. The dark as well as the bright sides of light are fully explored in these pages, from their impact on our world to their use in cutting-edge technologies in a variety of fields. Numerous full-color images and drawings complement the text, and light phenomena are explained in a simple and engaging way.

  9. Self-interest, Sympathy and the Invisible Hand : From Adam Smith to Market Liberalism

    OpenAIRE

    Avner Offer

    2012-01-01

    Adam Smith rejected Mandeville's invisible-hand doctrine of 'private vices, publick benefits'. In The Theory of Moral Sentiments his model of the 'impartial spectator' is driven not by sympathy for other people, but by their approbation. The innate capacity for sympathy makes approbation credible. Approbation needs to be authenticated, and in Smith's model authentication relies on innate virtue, which is not realistic. An alternative model of 'regard' makes use of signalling and is more pragm...

  10. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  11. The lived experience of parenting a child with autism in a rural area: making the invisible, visible.

    Science.gov (United States)

    Hoogsteen, Lindsey; Woodgate, Roberta L

    2013-01-01

    This qualitative study explored the lived experiences of parents parenting a child with autism while living in a rural area. The philosophy of hermeneutic phenomenology was used to guide this inquiry, and interviews of 26 families served as primary data. Thematic statements were isolated using van Manen's (1990) selective highlighting approach. "Making the invisible, visible" emerged as the essence of the parents' experience. Parents shared that although autism was an invisible disability, they in fact made it visible in their constant battles to ensure their child received the best quality of life. The major themes of this essence included a) he's not the Rain Man, b) society's lack of knowledge and understanding, and c) doing it on our own. Findings from this study may be used to guide program development that is concerned with improving the quality of life of families of children with autism living in rural areas.

  12. Search for the decay J/ψ→γ+invisible

    International Nuclear Information System (INIS)

    Insler, J.; Muramatsu, H.; Park, C. S.; Thorndike, E. H.; Yang, F.; Ricciardi, S.; Thomas, C.; Artuso, M.; Blusk, S.; Khalil, S.; Mountain, R.; Skwarnicki, T.; Stone, S.; Wang, J. C.; Zhang, L. M.; Bonvicini, G.; Cinabro, D.; Lincoln, A.; Smith, M. J.; Zhou, P.

    2010-01-01

    A search for J/ψ radiative decay to weakly interacting neutral final states was performed using the CLEO-c detector at the Cornell Electron Storage Ring. J/ψ events were selected by observing the hadronic decay ψ(2S)→π + π - J/ψ. A total of 3.7x10 6 J/ψ events were used to study the decay J/ψ→γ+X, where X is a narrow state that is invisible to the detector. No significant signal was observed, and upper limits on the branching fraction were set for masses m X up to 960 MeV/c 2 . The upper limit corresponding to m X =0 is 4.3x10 -6 at the 90% confidence level.

  13. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  14. Visualisations en bibliothèques: comment rendre visible l’invisible

    Directory of Open Access Journals (Sweden)

    Coleta Vaisman

    2014-04-01

    Full Text Available http://dx.doi.org/10.5007/1518-2924.2014v19n39p183 La bibliothèque est une sphère d'informations multidimensionnelle, à la fois abstraite et invisible et dotée de deux caractéristiques fondamentales sémantique et spatiale. Les relations sémantiques entre les données/informations constituent la structure de l'espace, autour d’attributs intrinsèques comme les mots-clés/sujets, les classifications, les hyperliens ou des structures connexes comme les thésaurus et vedettes-matière. Du point de vue des utilisateurs, le système d'informations en bibliothèque est un projet invisible et non transparent, alors que du point de vue du système, l'organisation taxinomique est indispensable voire vitale. La visualisation dans ce contexte se réfère à un processus qui transforme les données structurées invisibles et leurs relations sémantiques en un affichage lisible. Ainsi, le processus s’appuie sur le dessein classificatoire et cartographie les structures conceptuelles du système documentaire afin que d’une part l’utilisateur grâce à ses compétences puisse en extraire un sens que la machine n'aurait pu découvrir (recherche d’information et que d’autre part le professionnel de bibliothèque puisse engager des actions méta-cognitives sur le traitement de l’information. Les différentes approches (diagramme, arbres, circulaires, cartographiques, en 3D… sont des tentatives répondant aux problématiques imbriquées de visualisation et de repérage selon le principe de visualisation du focus (vue locale sur contexte (vue globale issu de la Gestalt théorie qui démontre que la perception humaine d’une scène est d’abord globale avant de porter son attention aux détails [CAR 99]. Deux dispositifs de médiation documentaire instrumentée initiés de façon concomitante des deux côtés de l’Atlantique illustrent efficacement cette démarche. Aux Etats Unis, la bibliothèque de Seattle a mis ainsi en place un projet d

  15. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  16. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  17. The invisible hand illusion: multisensory integration leads to the embodiment of a discrete volume of empty space.

    Science.gov (United States)

    Guterstam, Arvid; Gentile, Giovanni; Ehrsson, H Henrik

    2013-07-01

    The dynamic integration of signals from different sensory modalities plays a key role in bodily self-perception. When visual information is used in the multisensory process of localizing and identifying one's own limbs, the sight of a body part often plays a dominant role. For example, it has repeatedly been shown that a viewed object must resemble a humanoid body part to permit illusory self-attribution of that object. Here, we report a perceptual illusion that challenges these assumptions by demonstrating that healthy (nonamputated) individuals can refer somatic sensations to a discrete volume of empty space and experience having an invisible hand. In 10 behavioral and one fMRI experiment, we characterized the perceptual rules and multisensory brain mechanisms that produced this "invisible hand illusion." Our behavioral results showed that the illusion depends on visuotactile-proprioceptive integration that obeys key spatial and temporal multisensory rules confined to near-personal space. The fMRI results associate the illusion experience with increased activity in regions related to the integration of multisensory body-related signals, most notably the bilateral ventral premotor, intraparietal, and cerebellar cortices. We further showed that a stronger feeling of having an invisible hand is associated with a higher degree of effective connectivity between the intraparietal and ventral premotor cortices. These findings demonstrate that the integration of temporally and spatially congruent multisensory signals in a premotor-intraparietal circuit is sufficient to redefine the spatial boundaries of the bodily self, even when visual information directly contradicts the presence of a physical limb at the location of the perceived illusory hand.

  18. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  19. The Invisible Turn to the Future: Commemorative Culture in Contemporary Shanghai

    Directory of Open Access Journals (Sweden)

    Lü Pan

    2012-01-01

    Full Text Available After decades of fierce political struggles in the Mao era, the People’s Republic of China has strived economically under the open-door policy since the end of the 1970s. However, the still firm national monuments that weathered the social vicissitudes are left open to the question of how they could be incorporated into the new national ideology. In comparison to Beijing, Shanghai’s overwhelmingly predominant image centers on its role as the economic dragonhead of China. This article argues that Shanghai, exactly because of this ostensibly apolitical profile, provides a rarely discussed but highly meaningful approach to examining the dynamics between contemporary Chinese commemorative culture and the postsocialist urban spatial order. Unlike the East European cases, the “critical juncture” of ideology in China is invisible in the official narratives of the monuments. In some circumstances, the renovation of old memorials seem to fulfill the task of glorifying a certain past but in effect, it leaves the place a self-enclosed venue that sheds the rest of the city from the ideological burden. In other cases, some monuments of the seemingly core nationalistic narratives are marginalized. What’s more, new attentions are now drawn to the memorials for the history of “others” in the name of cosmopolitanism. The invisibility of the commemorative narratives speaks directly to the perplexity of assuming national identity in contemporary China. In the light of Prasenjit Duara’s idea of “bifurcated history”, national memory culture in Shanghai suggests the multiple possibilities of deciphering the city’s past and its future.

  20. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  1. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  2. Invisible cities? Urban issues in Oceania

    Directory of Open Access Journals (Sweden)

    Dorothée Dussy

    2016-08-01

    Full Text Available Why have cities stayed for so long an invisible object for the anthropology of Oceania? What is it to be an urban Pacific islander? What are the fields of interest of the anthropologists working in urban Oceania? Drawing on a review of urban research lead during the last decades in the Pacific archipelagos, this article aims at unfolding these different questions. We will evoke how anthropologists’ attraction for the authentic, the rural world and small indigenous communities have for long prevented any close look at the contemporary urban world. Urban cities are recent and have been created by colonisation; they are made of various populations of migrants whose trajectories have been molded by colonisation and globalization. The study of these recent cities associate various issues such as creolization, informal economy, periurbanisation, circular migration, relations between expatriates and indigenous people, and contemporary uses of tradition or “custom”. Eventually, the paper concludes with the will to claim the right for the anthropology of urban Oceania to find its place among the discipline, among the vast collection of studies evoking the rural and so-called traditional worlds of the region.

  3. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  4. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  5. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  6. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  7. There is no mass spectrometry evidence that the C14 sample from the Shroud of Turin comes from a “medieval invisible mending”

    Energy Technology Data Exchange (ETDEWEB)

    Bella, Marco, E-mail: Marco.Bella@uniroma1.it [Department of Chemistry, Sapienza University of Roma, P.le Aldo Moro 5, 00185 Roma (Italy); Garlaschelli, Luigi [Department of Chemistry, University of Pavia, Via Taramelli 10, 27100 Pavia (Italy); Samperi, Roberto [Department of Chemistry, Sapienza University of Roma, P.le Aldo Moro 5, 00185 Roma (Italy)

    2015-10-10

    Highlights: • This editorial regards a paper published on Thermochimica Acta, 425 (2005) 189. • The author hypothesized a “medieval invisible mending” on the Shroud of Turin. • There is no evidence of such a “medieval invisible mending”. • The two mass spectra presented differ only by the presence of a contaminant. • When the peaks due to the contaminant are removed, the two mass spectra look alike. - Abstract: This is an editorial regarding a paper published on Thermochimica Acta (R.N. Rogers, Thermochimca Acta, 425 (2005) 189–194). A close-up analysis of the pyrolysis-mass spectra reported in the original paper reveals that the differences found between the samples coming from different parts of the Shroud are just due to the presence of a contaminant with a long aliphatic chain. Except for the presence of the contaminant, the two pyrolysis-mass spectra look alike rather than different. Therefore, the pseudoscientific theory stating that the C14 sample might come from a “medieval invisible mending” remains unsupported by evidences.

  8. The Sun and its Planets as detectors for invisible matter

    Science.gov (United States)

    Bertolucci, Sergio; Zioutas, Konstantin; Hofmann, Sebastian; Maroudas, Marios

    2017-09-01

    Gravitational lensing of invisible streaming matter towards the Sun with speeds around 10-4 to 10-3 c could be the explanation of the puzzling solar flares and the unexplained solar emission in the EUV. Assuming that this invisible massive matter has some form of interaction with normal matter and that preferred directions exist in its flow, then one would expect a more pronounced solar activity at certain planetary heliocentric longitudes. This is best demonstrated in the case of the Earth and the two inner planets, considering their relatively short revolution time (365, 225 and 88 days) in comparison to a solar cycle of about 11 years. We have analyzed the solar flares as well as the EUV emission in the periods 1976-2015 and 1999-2015, respectively. The results derived from each data set mutually exclude systematics as the cause of the observed planetary correlations. We observe statistically significant signals when one or more planets have heliocentric longitudes mainly between 230° and 300°. We also analyzed daily data of the global ionization degree of the dynamic Earth atmosphere taken in the period 1995-2012. Again here, we observe a correlation between the total atmospheric electron content (TEC) and the orbital position of the inner three planets. Remarkably, the strongest correlation appears with the phase of the Moon. The broad velocity spectrum of the assumed constituents makes it difficult at this stage to identify its source(s) in space. More refined analyses might in the future increase the precision in the determination of the stream(s) direction and possibly allow to infer some properties of its constituents. Presently, no firmly established model of massive streaming particles exists, although in the literature there are abundant examples of hypotheses. Among them, the anti-quark nuggets model for dark matter seems the better suited to explain our observations and deserves further study.

  9. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  10. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  11. Constraints on new phenomena via Higgs boson couplings and invisible decays with the ATLAS detector

    NARCIS (Netherlands)

    Aad, G.; et al., [Unknown; Aben, R.; Angelozzi, I.; Beemster, L.J.; Bentvelsen, S.; Berge, D.; Bobbink, G.J.; Bos, K.; Brenner, L.; Butti, P.; Castelli, A.; Colijn, A.P.; de Jong, P.; Deigaard, I.; Deluca, C.; Duda, D.; Ferrari, P.; Hartjes, F.; Hessey, N.P.; Hod, N.; Igonkina, O.; Karastathis, N.; Kluit, P.; Koffeman, E.; Linde, F.; Mahlstedt, J.; Meyer, J.; Oussoren, K.P.; Sabato, G.; Salek, D.; Slawinska, M.; Valencic, N.; van den Wollenberg, W.; van der Deijl, P.C.; van der Geer, R.; van der Graaf, H.; van Vulpen, I.; Verkerke, W.; Vermeulen, J.C.; Vreeswijk, M.; Weits, H.; Williams, S.

    2015-01-01

    The ATLAS experiment at the LHC has measured the Higgs boson couplings and mass, and searched for invisible Higgs boson decays, using multiple production and decay channels with up to 4.7 fb−1 of pp collision data at √s=7 TeV and 20.3 fb−1 at √s=8 TeV. In the current study, the measured production

  12. Detection of invisible and crucial events: from seismic fluctuations to the war against terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Allegrini, Paolo; Fronzoni, Leone; Grigolini, Paolo; Latora, Vito; Mega, Mirko S.; Palatella, Luigi E-mail: luigi.palatella@df.unipi.it; Rapisarda, Andrea; Vinciguerra, Sergio

    2004-04-01

    We argue that the recent discovery of the non-Poissonian statistics of the seismic main-shocks is a special case of a more general approach to the detection of the distribution of the time increments between one crucial but invisible event and the next. We make the conjecture that the proposed approach can be applied to the analysis of terrorist network with significant benefits for the Intelligence Community.

  13. A Search for Nothing: Dark Matter and Invisible Decays of the Higgs Boson at the ATLAS Detector

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00421104

    This thesis presents a search for invisible decays of the Higgs boson using the vector boson fusion channel. This uses 36 fb$^{-1}$ of proton-proton collision data at $\\sqrt{s}$ = 13 TeV using the ATLAS detector at the Large Hadron Collider. The experimental methods for understanding the signal and background processes as well as detector effects are described in detail. The search is carried out in several regions defined by kinematic requirements on the final-state objects, and the observed event yields are used in a profile-likelihood fit in order to constrain the backgrounds. The results are interpreted using a modified frequentist method and are found to be consistent with the Standard Model expectations. An upper limit of 34% (28% expected) at 95% C.L. is placed on the invisible branching ratio of the Higgs boson. Re-interpretation of these results in terms of dark matter is also discussed, in the context of the Higgs portal and other simplified models.

  14. Econophysical visualization of Adam Smith’s invisible hand

    Science.gov (United States)

    Cohen, Morrel H.; Eliazar, Iddo I.

    2013-02-01

    Consider a complex system whose macrostate is statistically observable, but yet whose operating mechanism is an unknown black-box. In this paper we address the problem of inferring, from the system’s macrostate statistics, the system’s intrinsic force yielding the observed statistics. The inference is established via two diametrically opposite approaches which result in the very same intrinsic force: a top-down approach based on the notion of entropy, and a bottom-up approach based on the notion of Langevin dynamics. The general results established are applied to the problem of visualizing the intrinsic socioeconomic force-Adam Smith’s invisible hand-shaping the distribution of wealth in human societies. Our analysis yields quantitative econophysical representations of figurative socioeconomic forces, quantitative definitions of “poor” and “rich”, and a quantitative characterization of the “poor-get-poorer” and the “rich-get-richer” phenomena.

  15. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  16. Acoustic invisibility cloaks of arbitrary shapes for complex background media

    Science.gov (United States)

    Zhu, Jian; Chen, Tianning; Liang, Qingxuan; Wang, Xiaopeng; Xiong, Jie; Jiang, Ping

    2016-04-01

    We report on the theoretical investigation of the acoustic cloaks working in complex background media in this paper. The constitutive parameters of arbitrary-shape cloaks are derived based on the transformation acoustic theory and coordinate transformation technique. The detailed analysis of boundaries conditions and potential applications of the cloaks are also presented in our work. To overcome the difficulty of achieving the materials with ideal parameters in nature, concentric alternating layered isotropic materials is adopted to approximate the required properties of the cloak. Theoretical design and excellent invisibility are demonstrated by numerical simulations. The inhomogeneous medium and arbitrary-shape acoustic cloaks grow closer to real application and may be a new hot spot in future.

  17. Komas uit 'n Bamboesstok en Invisible Cities van Italo Calvino

    Directory of Open Access Journals (Sweden)

    H. van Vuuren

    1986-05-01

    Calvino’s novel also has a character, the fictionalised Marco Polo, who plays such an important role in Komas uil 'n bamboesstok. When the traces of Italo Calvino’s work are sought in Komas, the coherence between poems in the volume emerges more clearly. The importance of Calvino’s “novel” as intertext does not primarily reside in the clarifying reciprocity which it has with single poems or pairs of poems. It is the central intertcxt in the volume, seeing that it is of determining importance for its structure. Opperman’s poetic technique in this volume reiterates the structure of Invisible cities: multiplicity which in the end can be reduced to unity.

  18. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  19. Can Film Show the Invisible? The Work of Montage in Ethnographic Filmmaking

    DEFF Research Database (Denmark)

    Suhr, Christian; Willerslev, Rane

    2012-01-01

    This article suggests that film can evoke hidden dimensions of ethnographic reality, not by striving for ever more realistic depictions – a position often associated with observational cinema – but rather by exploiting the artificial means through which human vision can be transcended. Achieved...... particularly through the use of montage, such disruptions can multiply the perspectives from which filmic subject matter is perceived, thus conveying its invisible and irreducible otherness. This, however, is an argument not for dismissing the realism of much ethnographic filmmaking, but rather to demonstrate...

  20. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  1. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  2. Prevention of homicidal violence in schools in Germany: the Berlin Leaking Project and the Networks Against School Shootings Project (NETWASS).

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Schroer-Hippel, Miriam; Panno, Jennifer; Neumetzler, Katharina; Fisch, Sarah; Scholl, Johanna; Scheithauer, Herbert

    2011-01-01

    Since 1999, Germany has experienced at least twelve serious cases of targeted school violence. This article describes two projects designed to fill the gap between universal prevention and emergency response in preventing severe forms of school violence in Germany. The Berlin Leaking Project examined the viability of preventive efforts based on early identification of leaking behavior that often precedes targeted school attacks. Leaking refers to any behavior or communication that indicates a student is preparing to carry out a violent attack. This would include explicit or implied threats of violence, apparent fascination with prior acts of violence such as Columbine, and any evidence of planning or preparation to carry out an attack. The NETWASS project will test a training program and intervention strategy based on those findings, examining the usefulness of a threat assessment approach to prevent violence by training teachers to recognize leaking behavior by students. This approach is extended by training teachers on a larger scale to identify leaking and then having a school-based team evaluate the student and initiate appropriate interventions, such as mental health services, and in some cases, law enforcement action. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  3. Strategic Planning for School Success.

    Science.gov (United States)

    Herman, Jerry J.

    1993-01-01

    Strategic planners concerned with such matters as high-achieving students, high-performing teachers, broad-based community support, and a two-way involvement with the community must analyze the strengths, weaknesses, opportunities, and threats existing in the school's internal and external environment. A sample SWOT analysis is included. (MLH)

  4. Facilitating women's success in business: Interrupting the process of stereotype threat through affirmation of personal values.

    Science.gov (United States)

    Kinias, Zoe; Sim, Jessica

    2016-11-01

    Two field experiments examined if and how values affirmations can ameliorate stereotype threat-induced gender performance gaps in an international competitive business environment. Based on self-affirmation theory (Steele, 1988), we predicted that writing about personal values unrelated to the perceived threat would attenuate the gender performance gap. Study 1 found that an online assignment to write about one's personal values (but not a similar writing assignment including organizational values) closed the gender gap in course grades by 89.0% among 423 Masters of Business Administration students (MBAs) at an international business school. Study 2 replicated this effect among 396 MBAs in a different cohort with random assignment and tested 3 related mediators (self-efficacy, self-doubt, and self-criticism). Personal values reflection (but not reflecting on values including those of the organization or writing about others' values) reduced the gender gap by 66.5%, and there was a significant indirect effect through reduced self-doubt. These findings show that a brief personal values writing exercise can dramatically improve women's performance in competitive environments where they are negatively stereotyped. The results also demonstrate that stereotype threat (Steele & Aronson, 1995) can occur within a largely non-American population with work experience and that affirming one's core personal values (without organizational values) can ameliorate the threat. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  5. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  6. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  7. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  8. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  9. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  10. A millimetre-wave MIMO radar system for threat detection in urban environments

    Science.gov (United States)

    Kirschner, A. J.; Guetlein, J.; Bertl, S.; Detlefsen, J.

    2012-10-01

    The European Defence Agency (EDA) engages countermeasures against Improvised Explosive Devices (IEDs) by funding several scientific programs on threat awareness, countermeasures IEDs or land-mine detection, in which this work is only one of numerous projects. The program, denoted as Surveillance in an urban environment using mobile sensors (SUM), covers the idea of equipping one or more vehicles of a patrol or a convoy with a set of sensors exploiting different physical principles in order to gain detailed insights of the road situation ahead. In order to give an added value to a conventional visual camera system, measurement data from an infra-red (IR) camera, a radiometer and a millimetre-wave radar are fused with data from an optical image and are displayed on a human-machine-interface (HMI) which shall assist the vehicle's co-driver to identify suspect objects or persons on or next to the road without forcing the vehicle to stop its cruise. This paper shall especially cover the role of the millimetre-wave radar sensor and its different operational modes. Measurement results are discussed. It is possible to alter the antenna mechanically which gives two choices for a field of view and angular resolution trade-off. Furthermore a synthetic aperture radar mode is possible and has been tested successfully. MIMO radar principles like orthogonal signal design were exploited tofrom a virtual array by 4 transmitters and 4 receivers. In joint evaluation, it was possible to detect e.g. grenade shells under cardboard boxes or covered metal barrels which were invisible for optical or infra-red detection.

  11. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  12. Energy and Environmental Policy Trends: The Invisible Cost of Pipeline Constraints

    Directory of Open Access Journals (Sweden)

    G. Kent Fellows

    2018-03-01

    Full Text Available THE INVISIBLE COST OF PIPELINE CONSTRAINTS Over much of the last decade pipeline constraints and the resulting apportionment of pipeline capacity have meant reduced returns on Alberta’s Oil Exports. There is a natural price discount between the US benchmark West Texas Intermediate (WTI Crude oil price and the Canadian benchmark Western Canada Select (WCS price. This differential reflects the lower quality of WCS relative to WTI and the costs associated with pipeline tolls to transport this oil from Alberta to US refining hubs. However, at present western Canada is experiencing significant pipeline capacity constraints which have dramatically increased this discount relative to historical levels.

  13. An Innovative School Health Education Model Designed for Student Achievement.

    Science.gov (United States)

    Rohwer, John; Wandberg, Bob

    New threats to the health of American children, often psychosocial in nature due to societal changes, must be addressed. The Minnesota School Health Education Model is based on the integration of four primary components: (1) school health education goals aimed at health promotion, disease prevention, and long-term positive health effects on…

  14. The copycat phenomenon after two Finnish school shootings: an adolescent psychiatric perspective

    Directory of Open Access Journals (Sweden)

    Lindberg Nina

    2012-07-01

    Full Text Available Abstract Background Two school shootings with altogether 18 victims took place in Finland in November 2007 and September 2008. Homicides and suicides are both associated with the copycat phenomenon. The aim of the present study was to characterize adolescent copycats who had threatened to carry out a school massacre. Methods The nation-wide study evaluated 77 13- to 18-year-old adolescents who were sent for adolescent psychiatric evaluations between 8.11.2007 and 30.6.2009, one of the reasons for evaluation being a threat of massacre at school. The medical files of the copycats were retrospectively analysed using a special data collection form. Data on demographics, family- and school-related issues, previous psychiatric treatment and previous delinquency, current symptoms, family adversities and psychiatric diagnoses were collected. The severity of the threat expressed and the risk posed by the adolescent in question were evaluated. The Psychopathy Checklist Youth Version was used to assess psychopathic traits. Results All of the copycats were native Finns with a mean age of 15.0 years. Almost two thirds of them had a history of previous mental health treatment before the index threat. Almost two thirds of the copycats suffered from anxiety and depressive symptoms, and almost half of the sample expressed either suicidal ideation or suicidal plans. Behavioural problems including impulse control problems, aggressive outbursts, the destruction of property as well as non-physical and physical violence against other persons were common. The diagnosis groups highlighted were behavioural and emotional disorders, mood disorders as well as schizophrenia-related disorders. The prevalence of pervasive developmental disorders was high. Only one of the copycats was assessed as expressing high traits of psychopathy. Conclusion The copycats with school massacre threats were characterized with a high prevalence of mental and behavioural disorders. Like

  15. Walter bustamante tejada, los invisibles en antioquia, 1886-1936: una arqueología de los discursos sobre la homosexualidad.

    OpenAIRE

    Bedoya Molina, Juan Pablo

    2011-01-01

    Los invisibles en Antioquia, 1886-1936: Una arqueología de los discursos sobre la homosexualidad del historiador Walter Alonso Bustamante Tejada, se presenta como un texto pionero para el estudio de la historia de la homosexualidad en Antioquia.

  16. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  17. Invisible work of using and monitoring knowledge by parents (end-users) of children with chronic conditions.

    Science.gov (United States)

    Lagosky, Stephanie; Bartlett, Doreen; Shaw, Lynn

    2016-01-01

    Parents who care for young children with chronic conditions are knowledge users. Their efforts, time, and energy to source, consider and monitor information add to the 'invisible' work of parents in making decisions about care, school transitions, and interventions. Little is known or understood about the work of parents as knowledge users. To understand the knowledge use patterns and how these patterns may be monitored in parents caring for their young children with cerebral palsy (CP). An embedded case study methodology was used. In-depth qualitative interviews and visual mapping were employed to collect and analyze data based on the experiences of three mothers of young children with CP. Knowledge use in parents caring for their young children with CP is multi-factorial, complex and temporal. Findings resulted in a provisional model elaborating on the ways knowledge is used by parents and how it may be monitored. The visual mapping of pathways and actions of parents as end users makes the processes of knowledge use more visible and open to be valued as well as appreciated by others. The provisional model has implications for knowledge mobilization as a strategy in childhood rehabilitation and the facilitation of knowledge use in the lives of families with children with chronic health conditions.

  18. Networks of echoes imitation, innovation and invisible leaders

    CERN Document Server

    West, Bruce J; Grigolini, Paolo

    2014-01-01

    Networks of Echoes: Imitation, Innovation and Invisible Leaders is a mathematically rigorous and data rich book on a fascinating area of the science and engineering of social webs.  There are hundreds of complex network phenomena whose statistical properties are described by inverse power laws.  The phenomena of interest are not arcane events that we encounter only fleetingly, but are events that dominate our lives. We examine how this intermittent statistical behavior intertwines itself with what appears to be the organized activity of social groups.  The book is structured as answers to a sequence of questions such as: How are decisions reached in elections and boardrooms?  How is the stability of a society undermined by zealots and committed minorities, and how is that stability re-established?  Can we learn to answer such questions about human behavior by studying the way flocks of birds retain their formation when eluding a predator?  These questions and others are answered using a generic model of...

  19. The beautiful invisible creativity, imagination, and theoretical physics

    CERN Document Server

    Vignale, Giovanni

    2011-01-01

    Challenging the image of theoretical physics as a dry discipline, The Beautiful Invisible shows that this highly abstract science is in fact teeming with beautiful concepts, and the task of imagining them demands profound creativity, just as creative as the work of poets or magical realist novelists such as Borges and Musil. "A good scientific theory is like a symbolic tale, an allegory of reality," writes Giovanni Vignale, as he uncovers the unexpected links between theoretical physics and artistic creativity. In engaging and at times poetic prose, and with ample quotations from many of the writers he admires, Vignale presents his own unorthodox accounts of fundamental theoretical concepts such as Newtonian mechanics, superconductivity, and Einstein's theory of relativity, illuminating their profound implications. Throughout, the author treats readers to glimpses of physics as "exercised in the still night, when only the moon rages." Indeed, as we delve behind now-familiar concepts such as "electron spin" an...

  20. Parent interactions in mediating behaviour problems of school-aged students: A case study set in a small BC Coastal community

    OpenAIRE

    de Jong, Marian Elizabeth

    2015-01-01

    In the process of parents’ interactions with principals and teachers to resolve behaviour problems, what happens that is likely to create positive outcomes for children in school? Research literature establishes that parent interactions, whether for behaviour or academic reasons, are directed by subtly defined or invisible parameters that provide inherent institutional influence to outcomes. Bourdieu’s social reproduction theory, which relates to the influence of cultural, social, and symbo...

  1. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  2. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  3. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  4. Invisible hand effect in an evolutionary minority game model

    Science.gov (United States)

    Sysi-Aho, Marko; Saramäki, Jari; Kaski, Kimmo

    2005-03-01

    In this paper, we study the properties of a minority game with evolution realized by using genetic crossover to modify fixed-length decision-making strategies of agents. Although the agents in this evolutionary game act selfishly by trying to maximize their own performances only, it turns out that the whole society will eventually be rewarded optimally. This “invisible hand” effect is what Adam Smith over two centuries ago expected to take place in the context of free market mechanism. However, this behaviour of the society of agents is realized only under idealized conditions, where all agents are utilizing the same efficient evolutionary mechanism. If on the other hand part of the agents are adaptive, but not evolutionary, the system does not reach optimum performance, which is also the case if part of the evolutionary agents form a uniformly acting “cartel”.

  5. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  6. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  7. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  8. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  9. The voices of the invisible girls : reintegration of former female child soldiers in Burundi

    OpenAIRE

    Aase, Camilla Carlsen

    2013-01-01

    Master thesis in development management - University of Agder 2013 Child soldiers are used in armed groups and forces around the word. Children as young as seven years of age have been reported to actively participate in armed conflict. The phenomenon of child soldiering has become increasingly recognized in recent decades. Females constitute between ten per cent to one third of the fighting forces worldwide. Despite this, girls and women have until recently been highly invisible in both r...

  10. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  11. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  12. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  13. Calibration of the Atlas electromagnetic calorimeter. Search for the Higgs boson in its invisible decays; Etalonnage du calorimetre electromagnetique d'ATLAS. Recherche du boson de Higgs dans ses desintegrations invisibles

    Energy Technology Data Exchange (ETDEWEB)

    Neukermans, L

    2002-05-01

    The most promising channels for an intermediate mass Higgs boson discovery at LHC are leptonic and photonic decays. Therefore, a good uniformity of response of the electromagnetic calorimeter is required to reach the 0.7% constant term needed. This thesis deals with the absolute calibration of this detector. An electrical description of the calibration system, the detector and its read-out chain has been made for a better comprehension of the signal pulse shapes. A method, using a convolution of the calibration waveforms, has been developed to predict physics response, leading to absolute calibration. The level of accuracy obtained allows to reach the 0.3% contribution to the constant term required. Test beam analysis of a prototype module showed the performance of the electromagnetic calorimeter in terms of local resolution and linearity. A uniformity study has been made, leading to a 0.8% dispersion on a {delta}{eta} x {delta}{phi} = 1.2 x 0.75 area. In a second part, the observability of an invisible Higgs boson produced via weak boson fusion at the LHC is presented. A level 1 trigger strategy for this purely jet and missing E{sub T} final states is discussed. A method to measure the level of background using physics events is presented. This analysis shows that an invisible branching ratio of 25% could be reached at 95% CL with only 30 fb{sup -1} for a Higgs boson mass of 120 GeV/c{sup 2}. (author)

  14. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  15. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  16. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  17. Invisible wounds: corporal punishment in British schools as a form of ritual.

    Science.gov (United States)

    Benthall, J

    1991-01-01

    This article examines a presumed historical association between corporal punishment and the British "ruling class," taking as data the elaborate forms of beating practiced at a well-known English fee-paying boarding school in the 1950s and here documented in detail. Analogies with other forms of ritual studied by anthropologists are considered, as well as the psychosexual dynamics of beating for both officiants and victims. The paper argues that ritual corporal punishment must be seen in retrospect as a clear case of child abuse that is both physical and sexual. Such rituals of authority, though virtually abolished in Britain, may well exist in a different form in present day residential institutions for children in some Third World countries that have borrowed from now outdated European practices.

  18. Coping with stereotype threat: denial as an impression management strategy.

    Science.gov (United States)

    von Hippel, William; von Hippel, Courtney; Conway, Leanne; Preacher, Kristopher J; Schooler, Jonathan W; Radvansky, Gabriel A

    2005-07-01

    Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.

  19. A feminist post-structuralist analysis of an exemplar South African school history text

    Directory of Open Access Journals (Sweden)

    Jill Fardon

    2010-01-01

    Full Text Available A feminist post-structuralist perspective offers an alternative paradigm for the study of gender bias in History texts. It focuses on multiple perspectives and open interpretation, opens up space for female voices of the past and present, and deconstructs realist historical narrative. Our aim in this article is to discuss feminist post-structuralism as an innovative approach to History as a school subject, and to demonstrate its implications for the analysis of school History texts. We seek to identify and expose biases that marginalise women in school History texts and contribute to correcting these. Additionally, we seek to develop new knowledge for understanding gender differences. An example of the empirical application of the feminist post-structuralist perspective is provided. The exemplar text analysed supports masculine historical narrative, using a neutral and naturalising style, and renders women and the feminine meaning invisible. It is suggested that non-traditional forms of writing will help to dislodge the inherent hegemony in History texts and challenge the masculine status quo in school History texts.

  20. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  1. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  2. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  3. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  4. School violence and the culture of honor.

    Science.gov (United States)

    Brown, Ryan P; Osterman, Lindsey L; Barnes, Collin D

    2009-11-01

    We investigated the hypothesis that a sociocultural variable known as the culture of honor would be uniquely predictive of school-violence indicators. Controlling for demographic characteristics associated in previous studies with violent crime among adults, we found that high-school students in culture-of-honor states were significantly more likely than high-school students in non-culture-of-honor states to report having brought a weapon to school in the past month. Using data aggregated over a 20-year period, we also found that culture-of-honor states had more than twice as many school shootings per capita as non-culture-of-honor states. The data revealed important differences between school violence and general patterns of homicide and are consistent with the view that many acts of school violence reflect retaliatory aggression springing from intensely experienced social-identity threats.

  5. A separable surface-enhanced Raman scattering substrate modified with MIL-101 for detection of overlapping and invisible compounds after thin-layer chromatography development.

    Science.gov (United States)

    Zhang, Bin Bin; Shi, Yi; Chen, Hui; Zhu, Qing Xia; Lu, Feng; Li, Ying Wei

    2018-01-02

    By coupling surface-enhanced Raman spectroscopy (SERS) with thin-layer chromatography (TLC), a powerful method for detecting complex samples was successfully developed. However, in the TLC-SERS method, metal nanoparticles serving as the SERS-active substrate are likely to disturb the detection of target compounds, particularly in overlapping compounds after TLC development. In addition, the SERS detection of compounds that are invisible under both visible light and UV 254/365 after TLC development is still a significant challenge. In this study, we demonstrated a facile strategy to fabricate a TLC plate with metal-organic framework-modified gold nanoparticles as a separable SERS substrate, on which all separated components, including overlapping and invisible compounds, could be detected by a point-by-point SERS scan along the developing direction. Rhodamine 6G (R6G) was used as a probe to evaluate the performance of the substrate. The results indicated that the substrate provided good sensitivity and reproducibility, and optimal SERS signals could be collected in 5 s. Furthermore, this new substrate exhibited a long shelf life. Thus, our method has great potential for the sensitive and rapid detection of overlapping and invisible compounds in complex samples after TLC development. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  6. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  7. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  8. Invisible gold in Colombian auriferous soils

    International Nuclear Information System (INIS)

    Bustos Rodriguez, H.; Oyola Lozano, D.; Rojas Martinez, Y. A.; Perez Alcazar, G. A.; Balogh, A. G.

    2005-01-01

    Optic microscopy, X-ray diffraction (XRD), Moessbauer spectroscopy (MS), Electron microprobe analysis (EPMA) and secondary ions mass spectroscopy (SIMS) were used to study Colombian auriferous soils. The auriferous samples, collected from El Diamante mine, located in Guachavez-Narino (Colombia), were prepared by means of polished thin sections and polished sections for EPMA and SIMS. Petrography analysis was made using an optical microscope with a vision camera, registering the presence, in different percentages, of the following phases: pyrite, quartz, arsenopyrite, sphalerite, chalcopyrite and galena. By XRD analysis, the same phases were detected and their respective cell parameters calculated. By MS, the presence of two types of pyrite was detected and the hyperfine parameters are: δ 1 = 0.280 ± 0.01 mm/s and ΔQ 1 = 0.642 ± 0.01 mm/s, δ 2 = 0.379 ± 0.01 mm/s and ΔQ 2 = 0.613 ± 0.01 mm/s. For two of the samples MS detected also the arsenopyrite and chalcopyrite presence. The mean composition of the detected gold regions, established by EPMA, indicated 73% Au and 27% Ag (electrum type). Multiple regions of approximately 200 x 200 μm of area in each mineral sample were analyzed by SIMS registering the presence of 'invisible gold' associated mainly with the pyrite and occasionally with the arsenopyrite.

  9. Invisible gold in Colombian auriferous soils

    Energy Technology Data Exchange (ETDEWEB)

    Bustos Rodriguez, H., E-mail: hbustos@ut.edu.co; Oyola Lozano, D.; Rojas Martinez, Y. A. [Universidad del Tolima, Departamento de Fisica (Colombia); Perez Alcazar, G. A. [Universidad del Valle, Departamento de Fisica (Colombia); Balogh, A. G. [Darmstadt University of Technology, Institute of Materials Science (Germany)

    2005-11-15

    Optic microscopy, X-ray diffraction (XRD), Moessbauer spectroscopy (MS), Electron microprobe analysis (EPMA) and secondary ions mass spectroscopy (SIMS) were used to study Colombian auriferous soils. The auriferous samples, collected from El Diamante mine, located in Guachavez-Narino (Colombia), were prepared by means of polished thin sections and polished sections for EPMA and SIMS. Petrography analysis was made using an optical microscope with a vision camera, registering the presence, in different percentages, of the following phases: pyrite, quartz, arsenopyrite, sphalerite, chalcopyrite and galena. By XRD analysis, the same phases were detected and their respective cell parameters calculated. By MS, the presence of two types of pyrite was detected and the hyperfine parameters are: {delta}{sub 1} = 0.280 {+-} 0.01 mm/s and {Delta}Q{sub 1} = 0.642 {+-} 0.01 mm/s, {delta}{sub 2} = 0.379 {+-} 0.01 mm/s and {Delta}Q{sub 2} = 0.613 {+-} 0.01 mm/s. For two of the samples MS detected also the arsenopyrite and chalcopyrite presence. The mean composition of the detected gold regions, established by EPMA, indicated 73% Au and 27% Ag (electrum type). Multiple regions of approximately 200 x 200 {mu}m of area in each mineral sample were analyzed by SIMS registering the presence of 'invisible gold' associated mainly with the pyrite and occasionally with the arsenopyrite.

  10. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  11. Analysis in temporal regime of dispersive invisible structures designed from transformation optics

    Science.gov (United States)

    Gralak, B.; Arismendi, G.; Avril, B.; Diatta, A.; Guenneau, S.

    2016-03-01

    A simple invisible structure made of two anisotropic homogeneous layers is analyzed theoretically in temporal regime. The frequency dispersion is introduced and analytic expression of the transient part of the field is derived for large times when the structure is illuminated by a causal excitation. This expression shows that the limiting amplitude principle applies with transient fields decaying as the power -3 /4 of the time. The quality of the cloak is then reduced at short times and remains preserved at large times. The one-dimensional theoretical analysis is supplemented with full-wave numerical simulations in two-dimensional situations which confirm the effect of dispersion.

  12. Exploring the Invisible Universe: A Tactile and Braille Exhibit of Astronomical Images

    Science.gov (United States)

    Arcand, K. K.; Watzke, M.; de Pree, C.

    2010-06-01

    A tactile/Braille exhibit for the visually impaired community in the USA was launched in July 2009. The exhibit is part of the global From Earth to the Universe (FETTU) project, a Cornerstone of the International Year of Astronomy 2009. The science content of the travelling tactile/Braille exhibit includes explanations of our Sun, Eta Carinae, the Crab Nebula, the Whirlpool Galaxy and the electromagnetic spectrum, and was adapted from the tactile/Braille book Touch the Invisible Sky. We present some of the early observations and findings on the tactile/Braille FETTU exhibit. The new exhibit opens a wider door to experiencing and understanding astronomy for the underserved visually impaired population.

  13. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  14. Search for invisible decays of a Higgs boson produced in association with a Z boson in ATLAS

    Czech Academy of Sciences Publication Activity Database

    Aad, G.; Abajyan, T.; Abbott, B.; Böhm, Jan; Chudoba, Jiří; Hejbal, Jiří; Jakoubek, Tomáš; Kepka, Oldřich; Kupčo, Alexander; Kůs, Vlastimil; Lokajíček, Miloš; Lysák, Roman; Marčišovský, Michal; Mikeštíková, Marcela; Myška, Miroslav; Němeček, Stanislav; Dos Santos, D.R.; Růžička, P.; Šícho, Petr; Staroba, Pavel; Svatoš, Michal; Taševský, Marek; Tic, Tomáš; Vrba, Václav

    2014-01-01

    Roč. 112, č. 20 (2014), "201802-1"-"201802-20" ISSN 0031-9007 R&D Projects: GA MŠk(CZ) LG13009 Institutional support: RVO:68378271 Keywords : Higgs particle * invisible decay * p p scattering * channel cross section * branching ratio * upper limit * ATLAS * CERN LHC Coll * dark matter Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 7.512, year: 2014

  15. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  16. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  17. The invisible universe the story of radio astronomy

    CERN Document Server

    Verschuur, Gerrit

    2015-01-01

    Hidden from human view, accessible only to sensitive receivers attached to huge radio telescopes, the invisible universe beyond our senses continues to fascinate and intrigue our imaginations. Closer to home, in the Milky Way galaxy, radio astronomers listen patiently to the ticking of pulsars that tell of star death and states of matter of awesome densities. All of this happens out there in the universe hidden from our eyes, even when aided by the Hubble Space Telescope. This is the story of radio astronomy, of how radio waves are generated by stars, supernova, quasars, colliding galaxies and by the very beginnings of the universe itself. The author discusses what radio astronomers are doing in the New Mexico desert, in a remote valley in Puerto Rico, and in the green Pocahontas Valley in West Virginia, as well as dozens of other remote sites around the world. With each of these observatories, the scientists collect and analyze their data, "listening" to the radio signals from space in order to learn what, ...

  18. Rupture on the Brazilian documentary photography: Claudia Andujar and the poetry of the (invisible

    Directory of Open Access Journals (Sweden)

    Rafael Castanheira Pedroso de Moraes

    2014-07-01

    Full Text Available This article aims to analyse Claudia Andujar’s photographies from her books Yanomami and The vulnerability of being not only to reflect about their conceptual characteristics that mix social engagement and personal expression, but also to identify the photographer’s technical and aesthetic choices to document the invisible phenomenons of the Yanomami’s culture. Using innovatives strategies of representation, Andujar reached inedited results from the political and aesthetic points of view, which marked a break with the Brazilian documentary photography history.

  19. Etre visible, devenir invisible et la capacité de voir. Ľ migration rom comme événement politique

    Czech Academy of Sciences Publication Activity Database

    Kouba, Petr

    -, č. 203/204 (2017), s. 139-159 ISSN 0018-4306 R&D Projects: GA ČR(CZ) GA16-23046S Institutional support: RVO:67985955 Keywords : visibility * invisibility * event * power of the powerless Subject RIV: AA - Philosophy ; Religion OBOR OECD: Philosophy, History and Philosophy of science and technology

  20. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.